Search the Community

Showing results for tags 'generator'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 78 results

  1. Beaconator Beaconator is an aggressor script for Cobalt Strike used to generate a raw stageless shellcode and packing the generated shellcode using PEzor. Changelog v1.1 Fixed error check with the use of x86 arch & syscalls Fixed the “null value error” due to missing output folder Fixed issue with options persisting to subsequent payload generations Added PEzor’s BOF format Added the -cleanup option for BOFs Added the -sleep option Added more error checks Cleaned up the code [hide][Hidden Content]]
  2. Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass signature check but I cant be sure it can bypass heuristic scanning. Features PE binary Process Hollowing PPID Spoofing Random generated AES key and iv Final Shellcode, Key and IV are translated to morse code :) .NET binary AES + XOR encrypted shellcode APC Process Injection (explorer.exe) Random function names Random generated AES key and iv Final Shellcode, Key and IV are translated to morse code :) [hide][Hidden Content]]
  3. Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. [hide][Hidden Content]]
  4. COOK A customizable wordlist and password generator Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function to create complex endpoints, wordlists and passwords. Easy UX, Checkout Usage [hide][Hidden Content]]
  5. Cobalt Strike Shellcode Generator Adds Shellcode – Shellcode Generator to the Cobalt Strike top menu bar CSSG is an aggressor and python script used to more easily generate and format beacon shellcode Generates beacon stageless shellcode with exposed exit method, additional formatting, encryption, encoding, compression, multiline output, etc shellcode transforms are generally performed in descending menu order Options for the shellcode generator are: Listener: Select a valid listener with the “…” button. Shellcode will be generated form this listener selection Delivery: Stageless (Staged not supported for the shellcode generator) Exit Method: process – exits the entire process that beacon is present in when the beacon is closed thread – exits only the thread in which beacon is running when the beacon is closed Local Shellcode Checkbox: May use if you are going to execute the shellcode from an existing Beacon Generates a Beacon shellcode payload that inherits key function pointers from a same-arch parent Beacon Existing Session: The parent Beacon session where the shellcode will pull session metadata Shellcode should be run from within this Beacon session x86 Checkbox: Check to generate x86 shellcode, x64 is generated by default Or Use Shellcode File: Use an externally generated raw shellcode file in lieu of generating Beacon shellcode This allows you to use previously exported shellcode files or output from other tools (Donut, msfvenom, etc) Formatting: raw – raw binary shellcode output, no formatting applied hex – hex formatted shellcode output 0x90,0x90,0x90 – shellcode formatted into a C# style byte array \x90\x90\x90 – shellcode formatted into a C\C++ style byte array b64 – option to base64 encode the shellcode early in the generation process (before any encryption) XOR Encrypt Shellcode Checkbox: Check to XOR encrypt the shellcode (only one encryption type can be selected at a time) XOR Key(s): Randomly generated and editable XOR key character(s) to use for encryption Multiple characters will result in multiple rounds of XOR encryption (i.e. ABCD) AES Encrypt Shellcode Checkbox: Check to AES encrypt the shellcode (only one encryption type can be selected at a time) Uses a python script to perform AES Block Cipher AES-CBC encryption Shellcode is padded with \0 values to reach block size requirements A randomly generated IV is prepended to the encrypted shellcode data AES Key: Randomly generated and editable AES key to use for encryption 32byte key is generated and preferred for 256bit encryption strength Encryption key byte lengths accepted are 16, 24, and 32 Encoding/Compression: none – No additional encoding or compression is done to the shellcode b64 – base64 encode the shellcode gzip then b64 – gzip compress then base64 the shellcode gzip – gzip compress the shellcode b64 then gzip – base64 then gzip compress the shellcode Multiline Output: Can be used for non-raw/binary output formats none – no multiline formatting, shellcode is one long string quoted – Shellcode is broken up into lines surround by quotation marks chunks.push_back – Shellcode is broken up into lines surrounded by chunks.push_back(” and “); Multiline Length: Number of shellcode characters in each line if a multiline output option is selected Generate Button: Select directory for shellcode output Defalut filename will be beacon but can be changed Any encryption key used will be displayed in a popup and also written the Cobalt Strike Script Console The byte size of the raw beacon shellcode and final formatted beacon shellcode will be displayed in a popup and also written to the Script Console Location of files used to generate/build the shellcode are set the .cs file [hide][Hidden Content]]
  6. itsMe

    Keywords Generator

    Jquery Keywords Generator, Keywords Finder. 100% clients script to retreive a list of a long tail keywords [hide][Hidden Content]]
  7. itsMe

    Combo List Generator v4.0

    Combo List Generator for Android Devices (Termux) v4.0 Release Notes Google Scraping Fixed. Added Login & Authentication System. Major Bug Fixes. Stability & Performance Improvements. Combo List Generator v4.0 (Updated on 03/01/2021 02:15 IST) [hide][Hidden Content]]
  8. EXCELntDonut EXCELntDonut is an XLM (Excel 4.0) macro generator. Start with C# source code (EXE) and end with an XLM (Excel 4.0) macro that will execute your code in memory. XLM (Excel 4.0) macros can be saved in .XLS files. How it works You provide a C# file containing your payload (like an EXE with the main method that executes a cobalt strike beacon payload). That C# file is compiled using MCS into two .NET assemblies: x86 and x64. After compilation, the awesome tools Donut (for x86) and CLRvoyance (for x64) convert each assembly into position independent shellcode. Next, all null bytes are removed, since XLM (Excel 4.0) macros don’t play nicely with null bytes and the payload is chunked into lines with no more than 255 characters (for x86) or 10 characters (for x64). Once the shellcode is prepared, it’s combined with basic process injection functions (VirtualAlloc, WriteProcessMemory, and CreateThread) as well as an architecture check function to determine which payload (x86 or x64) to run on the target system. If you elect to execute sandbox checks or basic obfuscation, then those functions will update your macro. Finally, the output is placed in a CSV file (saved as .txt). [hide][Hidden Content]]
  9. TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3. Features Works on Windows/Linux Notify New Victim Via Email Undetectable Persistence Sends Screenshot of Victim PC's Screen via email Creates Executable Binary With Zero Dependencies Create less size ~ 5mb payload with advance functionality Obfusticate the Payload before Generating it, hence Bypassing few more antivirus Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload Function to Kill Antivirus on Victim PC and tries to disable the security Awesome Colourful Interface to generate payload On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them Distinguish Log Data on the Basics of Active Window Name (Check v1.3 Image for Better Understanding) Able to add custom Icon to evil file (New Argument is Added in v1.3 & onward version) Built-in Binder which can bind Keylogger to Any File [.pdf, .txt, .exe etc], Running legitimate file on front end & evil codes in back-end as a service. (New Argument is Added in v1.4 & onward version) Checks for Already Running Instance on System, If running instance found, then only legitimate file is executed [Multiple Instance Prohibiter to avoid Same Muliple Logs Email]. Attacker can Create/Compile for Both Windows/Linux OS Using Linux System, But Can only Create/Compile Windows Executable using Windows Machine Retrieves Saved Passwords from victim System and sends it to Attacker. [hide][Hidden Content]]
  10. Overview BlackGenerator is a template to create your own account generator without knowledge (minimum required), easily and quickly! it has many features and will meet your customers' expectations For questions or help please contact me Features Private generator (paid) Free Generator (for everyone) News system Powerful admin panel Automatic paypal purchases Uncrackable password encryption Custom packages Login logs Ticket system Notification system Custom dashboard + color picker Added up to 600K account at one time 100% Dynamic website Automatic tos FAQ page Account history + automatic refund (if the account does not work) Lottery system (win account & rank everyday) Partnership system Status system Realtime account stock Bookmark your accounts in your history Delete your accounts history Export your accounts to cvv or clipboard Requirements Domain name WebHosting Instructions Transfer all files to your website except the "database" folder. go to /inc/_global/ and configure the database settings in "config.php". Go to your database, login and select your DB, then click "import" button and import the "your-gen.sql" file in the "database" folder. Go to your website and create your account. Go to your database, in the "users" table modify your rank by 1 instead of 0 to put you in the administrator rank In the admin panel, configure your "IPN" and your "coinpayment" settings to receive Paypal and Bitcoin payments automatically Your Account Generator is ready! [Hidden Content] [hide][Hidden Content]]
  11. Let your customers buy gift cards/certificates for your services & products directly on your WordPress website. [Hidden Content] [hide][Hidden Content]]
  12. WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0 Follow The Instructions 1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ. 2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\ 3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ. 4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs. 5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!! ᴏʀ (1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ (2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1 (3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ [Hidden Content]
  13. Requirements: Ngrok PHP [hide][Hidden Content]]
  14. itsMe

    Discord Nitro Generator

    Generates discord nitro codes. Information Simple program to generate a chosen amount of nitro codes and saves them to a text file. Usage Input an amount of codes to generate. Open your text file (Codes.txt) Done. [hide][Hidden Content]]
  15. xeca is a project that creates encrypted PowerShell payloads for offensive purposes. Creating position independent shellcode from DLL files is also possible. [hide][Hidden Content]]
  16. Introduction SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded into a single polyglot template, which is platform-agnostic. There are few payloads available, including command execution, reverse shell establishment, binary execution and some more :> [hide][Hidden Content]]
  17. Create wordlists for bruteforce attack in termux without root and with unique features from lazybee tool [hide][Hidden Content]]
  18. Website Auto Traffic Generator Ultimate is a special tool for webmasters whose function is to perform search engine optimization (SEO) by generating a number of page views for your website. Websites and blogs are growing with popularity and especially in the accumulation of the number of page views, which gives them exposure and helps them reach more visitors. Features of Website Auto Traffic Generator Ultimate Surfing Mode New generation traffic feature! Traffic would be exactly as users browsing through multiple pages of your website Unlimited Traffic Making No limits for traffic generation, you can generate any number of traffic. Just put any maximum value! Traffics from Different Geographical Locations Web page traffics from different parts of the world. You can also manually set locations such USA, UK, China, Australia etc.! Keywords & Referral Based Traffic You can specify the keywords suitable for your sites to bring traffic from Search Engines. Also get referral traffic from multiple websites Multiple Sources Traffic from 8 Search Engines (Google, Bing etc.), 9 social media referrals (Fb, Linkedin, Instagram, YouTube etc.) and 10+ platforms/web browsers (Linux, android, Firefox, Chrome, Yandex etc.) Campaign Traffic Makes you to create campaigns and generate traffic based on that! Traffic Modes Manage and optimize sessions, page views and bounce rates of your website automatically 24/7 Help & Support & Moneyback Guarantee Official help support via email, remotely troubleshooting issues! 30 days complete moneyback guarantee! Advanced Switching Options You can define switching options for web browser, platform, location, session duration etc. to make the traffic exactly as regular user traffic! Advanced Location Specification WAT brings proxies automatically if you provide proxy site URL. You can also manually add proxies independently based on any location according to your preference. You no need to worry if the proxy works, WAT will check it automatically! Profiles You can save your whole settings somewhere in your PC as profiles. You may use import it to run at a different time! Organic & Direct Traffic Allows you to define whether the traffic is Organic or Direct traffic to flow! Google Analytics Support You can view the live traffic statistics in Google Analytics as well as any other Web Analytics Service [Hidden Content] [hide][Hidden Content]]
  19. [hide][Hidden Content]]
  20. itsMe

    Metasploit Payload Generator

    GEN-GENERATOR metasploit payload generator [hide][Hidden Content]]
  21. ShellGen (Shell Generator) This is a simple script that will generate a specific or all shellcodes for CTFs using the VPN IP address on tun0 (the IPv4). INFORMATION Update has been made from sys library to argparse library (done in version 0.8) [hide][Hidden Content]]
  22. EvilDLL v1.0 Malicious DLL (Win Reverse Shell) generator for DLL Hijacking [HIDE][Hidden Content]]
  23. Crawlomatic Multisite Scraper Post Generator Plugin for WordPress is a breaking edge website crawling and scraping, post generator autoblogging plugin that uses website crawling and scraping to turn your website into a autoblogging or even a money making machine! Demo: [Hidden Content] [HIDE][Hidden Content]]
  24. Features: Fully Undetectable Win32 MSFVenom Payload (meterpreter/shell reverse tcp) Port Forwarding using ngrok Tested: Win7/Win10 Requirements: Metasploit/MSFVenom mingw-w64: apt-get install mingw-w64 [HIDE][Hidden Content]]
  25. Golang reverse/bind shell generator This tool generates a Go binary that launches a shell of the desired type on the targeted host. The shell binary can be compiled for multiple platforms, supports partial polymorphism (unique functions’ names) and can use UDP protocol instead of the default TCP. If you send a DELETE command over the established connection, the shell binary removes itself from the host it was executed on. [HIDE][Hidden Content]]