Search the Community

Showing results for tags 'loader'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 18 results

  1. Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It encrypts the PE file to be run with different keys each time and embeds it in a new section of the loader binary. Currently, it works on 64 bit PE files. [hide][Hidden Content]]
  2. Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It encrypts the PE file to be run with different keys each time and embeds it in a new section of the loader binary. Currently, it works on 64 bit PE files. [hide][Hidden Content]]
  3. Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. Initial Project Goals Learn how Reflective Loader works. Write a Reflective Loader in Assembly. Compatible with Cobalt Strike. Cross compile from macOS/Linux. Implement Inline-Assembly into a C project. Future Project Goals Use the initial project as a template for more advanced evasion techniques leveraging the flexibility of Assembly. Implement Cobalt Strike options such as no RWX, stompPE, module stomping, changing the MZ header, etc. Write a decent Aggressor script. Support x86. Have different versions of reflective loader to choose from. Implement HellsGate/HalosGate for the initial calls that reflective loader uses (pNtFlushInstructionCache, VirtualAlloc, GetProcAddress, LoadLibraryA, etc). Optimize the assembly code. Hash/obfuscate strings. Some kind of template language overlay that can modify/randomize the registers/methods. [hide][Hidden Content]]
  4. itsMe

    AutoIt PowerShell Loader

    Download and loader .NET payload [hide][Hidden Content]]
  5. Functional -Hidden download -Saving Users -Dynamic interchangeable links from the panel (DLR) -Auto run -CIS sorter C#, Framework 4, PHP 7.1 Only for '.exe' files now. [Hidden Content]
  6. Simple Malware Loader Builder, written in C#, using CodeDom Loader's Features IpLogger url (for Statistic) File Drop Path Task Shedule Auto Delete Hidden Attribute Loader's Icon Show Message At Start [hide][Hidden Content]]
  7. Xyirus Function Download Schedule autoRun SelfDelete [HIDE][Hidden Content]]
  8. [Hidden Content]
  9. 6KB - Server [HIDE][Hidden Content]] [Hidden Content]
  10. Hey guys, long time. Was an official here a while back but life got plans and i ended up getting occupied with it. so was asking a question, is there anyone who can offer links to helpful sites or even a project source for this question? I need to write a loader that loads a linux exe and executes it.It should use a hexdump software as well as mmap for allocating memory. Any help will be greately appreciated. Thanks. Big hello to Top10, Jok3rjok3r and caballo/d33p3st from the times back
  11. itsMe

    AutiIt PowerShell Loader

    Script Function: AutiIt PowerShell Loader [*]Download payload as reversed base64 [*]Run powershell command to load it in memory [Hidden Content]
  12. PilotEdit is a handy text editor you can use for working with plain text files, as well as for coding projects in a bunch of popular programming languages: HTML, PHP, Java and more. There are several outstanding features in PilotEdit. One of them is that it lets you work with huge files, larger than 4 GB. It also includes a built-in FTP client that enables you to open, edit, download an upload files directly from and to your FTP server without much hassle. PilotEdit supports keyword and syntax highlighting, which means that special commands in programming languages are displayed in a different color –making coding a lot easier. It also includes tools to compare and merge files, and to perform advanced search and replace operations. Though it may not be as fully featured as other coding editors, PilotEdit is a handy little tool that works perfectly fine for small coding projects and daily text editing. PilotEdit is able to handle huge plain text and coding files in a clean, user-friendly interface. [Hidden Content] [HIDE][Hidden Content]]
  13. dEEpEst

    AbSent Loader

    Definition of a loader A "Loader" or "Dropper" is a type of malware not dissimilar to a botnet, usually built on the same C&C architecture they lack some of the more advanced features a fully featured botnet might have and instead try to be as lightweight as possible to be used as the 1st stage in an attack. Many commercially available loaders extend their lifetime on the black market by going modular, providing updates and plugins that extend the loaders capability and provide the seller a larger revenue stream by selling the plugins separately from the main "Base" bot, these usually include but not limited too: DDOS Functions Password Stealing HRDP Web Injects Keyloggers C&C Architecture Many loaders and botnets, id say 90% nowadays use a PHP web panel for controlling the network, reasons being its easy to setup, provides a modest amount of security if done properly, and it looks pretty, allowing for graphs and maps of bots, nice pretty tables of executing tasks and client info, all makes a PHP panel for the C&C architecture a nice option, especially good for marketing (People like pretty things). Unfortunately, or fortunity depending on the color of your hat, these panels are usually rather insecure, vulnerable to SQL injection and XSS, allowing for easy takeovers and shutdowns. So easy I've knowen people to exclusively build their botnet from others vulnerable panels, stealing all their bots and running a "Botkiller", basically an antivirus built into the client designed to detect and kill any competing malware on the infected system. The architecture of these Php based control panels is very simple, they have a PHP file usually called something like "gate.php" or something not so obvious like "store.php", this page is the contact point for the client. The client will send a POST request (Some use GET) to the page containing the clients' information, and the page will respond with a command to execute. The way the commands are sent and phrased are different for every variant but is usually done with JSON or plain text. If done properly the page will verify the client is legit and make sure the supplied data isn't an XSS or an SQLi attack, and add it to the panel's database. The Standard Client Loop The client is what runs on an infected system, its job is simple, stay hidden and execute tasks. On executing the client will try to "Make itself at home" that is, become persistent in the system, setting up defences to stop itself being killed and making sure its run when the system turns on again, it will also attempt to collect as much information about the computer it can, what version of the Operating System its running on, What privileges it has, the username, etc. It then gathers all this Information and sends it off to the C&C, receiving any tasks back and acting upon them. Some clients will try to be clever about the way it goes about this, commonly waiting for a while before actually executing anything to seem less suspicious. Afterwards we enter the "loop" the client will go dormant for a set amount of time, usually around the 5 minute mark before reaching out for any new commands and letting the C&C know its still alive. Reason being to lighten the network load of the server and the infected system, the bigger the network, usually the longer the wait. Disclaimer: I do not accept responsibility for the misuse of provided code blah blah blah don't be a cunt Download: [HIDE][Hidden Content]]
  14. dEEpEst

    Kardon Loader

    Download: [HIDE][Hidden Content]] Password:
  15. J0k3rj0k3r

    Arkei 9.1.2 Stealer & Loader

    Pass level23hacktools Download [Hidden Content]
  16. Info: [Hidden Content] Thousands of organizations use Burp Suite to find security exposures before it’s too late. By using cutting-edge scanning technology, you can identify the very latest vulnerabilities. Our researchers frequently uncover brand new vulnerability classes that Burp is the first to report. What is Burp Suite you ask? Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web applications. Because of its popularity and breadth as well as depth of features, we have created this useful page as a collection of Burp Suite knowledge and information. In its simplest form, Burp Suite can be classified as an Interception Proxy. While browsing their target application, a penetration tester can configure their internet browser to route traffic through the Burp Suite proxy server. Burp Suite then acts as a (sort of) Man In The Middle by capturing and analyzing each request to and from the target web application so that they can be analyzed. Penetration testers can pause, manipulate and replay individual HTTP requests in order to analyze potential parameters or injection points. Injection points can be specified for manual as well as automated fuzzing attacks to discover potentially unintended application behaviors, crashes and error messages. Please use Java 8 because from version 9 and up xbootclasspath argument has been disabled. Works only with Java 8. [Hidden Content] Pass:
  17. This paper and proof of concept describes the Wiederganger-Attack, a new attack vector that reliably allows to escalate unbounded array access vulnerabilities occurring in specifically allocated memory regions to full code execution on programs running on i386/x86_64 Linux. Wiederganger-attacks abuse determinism in Linux ASLR implementation combined with the fact that (even with protection mechanisms such as relro and glibc's pointer mangling enabled) there exist easy-to-hijack, writable (function) pointers in application memory. View the full article