Search the Community
Showing results for tags 'antiviruses'.
-
Clipper is written in C# and replaces it with the most similar one by the first and last characters from your list of wallets. It has a hidden installation in the system, auto-loading and bypassing popular antiviruses, it is removed from the place of the initial launch. Disclaimer This program is for educational purposes only. How you use this program is your responsibility. I will not be held accountable for any illegal activities. Wallets: Bitcoin - 1*** 3*** bc1*** Ethereum All Tokens - 0x*** All Tokens, USDT, ETC... Monero - 4*** 8*** Stellar - G*** Ripple - r*** Neocoin - A*** Bitcoin Cash - bitcoincash:*** q*** p*** Dogecoin - D*** Litecoin - M*** L*** Dashcoin - X*** Tron - T*** ZCash - t1*** Binance - bnb*** Fenix Clipper Release_2.0.0 Added an increase in file weight when creating a build and an increase in infection. pamp file. [Hidden Content] Server Scan [Hidden Content]
-
God Genesis is a C2 server purely coded in Python3 created to help Red Teamers and Penetration Testers. Currently, It only supports TCP reverse shell but waits a min, it’s a FUD and can give an admin shell from any targeted WINDOWS Machine. The List Of Commands It Supports:- =================================================================================================== BASIC COMMANDS: =================================================================================================== help –> Show This Options terminate –> Exit The Shell Completely exit –> Shell Works In Background And Prompted To C2 Server clear –> Clear The Previous Outputs =================================================================================================== SYSTEM COMMANDS: =================================================================================================== cd –> Change Directory pwd –> Prints Current Working Directory mkdir *dir_name* –> Creates A Directory Mentioned rm *dir_name* –> Deletes A Directoty Mentioned powershell [command] –> Run Powershell Command start *exe_name* –> Start Any Executable By Giving The Executable Name =================================================================================================== INFORMATION GATHERING COMMANDS: =================================================================================================== env –> Checks Enviornment Variables sc –> Lists All Services Running user –> Current User info –> Gives Us All Information About Compromised System av –> Lists All antivirus In Compromised System =================================================================================================== DATA EXFILTRATION COMMANDS: =================================================================================================== download *file_name* –> Download Files From Compromised System upload *file_name* –> Uploads Files To Victim Pc =================================================================================================== EXPLOITATION COMMANDS: =================================================================================================== persistence1 –> Persistance Via Method 1 persistence2 –> Persistance Via Method 2 get –> Download Files From Any URL chrome_pass_dump –> Dump All Stored Passwords From Chrome Bowser wifi_password –> Dump Passwords Of All Saved Wifi Networks keylogger –> Starts Key Logging Via Keylogger dump_keylogger –> Dump All Logs Done By Keylogger python_install –> Installs Python In Victim Pc Without UI Feature 1. The Payload.py is a FULLY UNDETECTABLE(FUD) use your own techniques for making an exe file. (Best Result When Backdoored With Some Other Legitimate Applications) 2. Able to perform privilege escalation on any Windows system. 3. Fud keylogger 4. 2 ways of achieving persistence 5. Recon automation to save your time. [hide][Hidden Content]]
-
- godgenesis:
- python3
- (and 9 more)