Search the Community
Showing results for tags 'native'.
-
Features No malicious code Extremely stable Small stub size 7-11 KB No drop to disk ( Memory Execution ) No suspicious API calls 32-bit Native output (C++) Supports 32-bit .NET executables Tested with: .NET 2.0 .NET 3.0 - 3.5 .NET 4.0 - 4.8 Various EXEs Various RATs Various Bots Various Native Crypters [hide][Hidden Content]]
-
- 7
-
- net2native
- web-based
-
(and 3 more)
Tagged with:
-
[Hidden Content]
-
- 1
-
- openbullet
- native
- (and 4 more)
-
[Hidden Content]
-
- 4
-
- openbullet2
- native
- (and 4 more)
-
A free silent (hidden) open-source native file binder. Main Features Native (C) - Builds the final executable as a native (C) 32-bit file, has basically no run requirements Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one Multiple files - Supports binding any amount of files Compatible - Supports all tested Windows version (Windows 7 to Windows 10) and all file types Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file UnamBinder 1.2.1 Changed Icon path and Assembly Data to now literalize escape characters Added check for Assembly Version to ensure that it contains only numbers [Hidden Content]
-
UnamBinder 1.2.0 - A free silent native file binder A free silent (hidden) open-source native file binder. Main Features Native (C) - Builds the final executable as a native (C) 32-bit file, has basically no run requirements Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one Multiple files - Supports binding any amount of files Compatible - Supports all tested Windows version (Windows 7 to Windows 10) and all file types Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file UnamBinder 1.2.0 Replaced windres with a custom compiled windres that supports spaces in file paths Removed Base64 encoding/decoding in favor of using bytes directly, meaning no build file size overhead and much faster decoding Added new Fake Error option that will display a custom error when the build is started Added new Start Delay option to delay the dropping and execution of files, can bypass Windows Defender sandboxing Added extensive error checking and more thorough messages whenever anything goes wrong Added new log files for compiler errors Fixed support for executing all types of files Fixed possible bug when encoding very large files Cleaned up code [hide][Hidden Content]]
-
- 7
-
- unambinder
- 1.2.0
- (and 5 more)
-
UnamBinder 1.1.0 - A free silent native file binder A free silent (hidden) open-source native file binder. Main Features Native (C) - Builds the final executable as a native (C) 32-bit file, has basically no run requirements Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one Multiple files - Supports binding any amount of files Compatible - Supports all tested Windows version (Windows 7 to Windows 10) and all file types Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file [hide][Hidden Content]]
- 1 reply
-
- 3
-
- unambinder
- 1.1.0
- (and 5 more)
-
BeDrive Mobile is a file storage, management and sharing mobile app . It fully integrates with BeDrive web version and allows instant file synchronization between the two, while adding a number of extra features like offline storage, camera uploads, background transfers and more. [Hidden Content] [hide][Hidden Content]]
-
HatVenom HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures. Features Support for most common executable formats like elf, macho, pe. Support for most common architectures like x64, x86, aarch64, armle, mipsle, mipsbe. Ability to modify shellcode by changing pre-defined offsets. Basic functions There are all HatVenom basic functions that can be used to generate a payload, covert data, or inject shellcode. ip_bytes(ip) – Converts IP address to bytes allowed by the shellcode. port_bytes(port) – Converts numeric port to bytes allowed by the shellcode. string_bytes(string) – Converts a string to bytes allowed by the shellcode. generate(file_format, arch, shellcode, offsets={}) – Generates payload for specified target and with specified shellcode. generate_to(file_format, arch, shellcode, offsets={}, filename=’a.out’) – Generates payload for specified target and with specified shellcode and saves it to the specified file. [hide][Hidden Content]]
-
Builder: Panel: Advantages: Excellent build weight (600 kb, 350-400 kb under UPX) Completely untied from the seller panel (customers say that their logs are stolen, everything is open and access only you) High collection rate (3-10 seconds log) Collect from all accounts on your computer Sa:MP customer data collection (nick, favorite server database) Collecting data from Chromium browsers and browsers with non-standard data location (Passwords, Cookies, Autocomplete, Card Data) Chrome v80 support Collecting passwords from Edge Gathering Discord Sessions Collect all Telegram sessions Filezilla password collection (new/old) Collecting passwords and cookies from Mozila FireFox Collecting wallet files Collecting Pidgin passwords Pidgin's correspondence collection PSI/PSI Account Collection Collecting passwords to authorize NordVPN Collecting Steam files/information about established games and Steam profiles 2FA Authenticators Sessions (Authy) Recursive collection of files from your desktop Sending the log directly to the telegram, as well as saving on the server (for mass unloading) Your token is protected (your logs no one will salt) Not a bad answer, even on a clean OC Protection from re-log The most stable build in terms of the knock is used Cons: No self-removal of the build after launch There is no protection against virtuals update v1.2: Added definition of IP, country and city A new kind of log The ability to disable recursive collection of files from a slave. table (disconnected by default in the builder, if you turn on that longer collects log - sometimes the hosting does not accept large files, with the disconnected rake knocks for 2-3 seconds as an updated stylactic. The log itself is faked, now normally collects screenshots and all the information about the system Info: [Hidden Content] Download: [hide][Hidden Content]] Scan Server Link to scan result: [Hidden Content]
-
Babylon RAT v 1.7.0.0 ------------------------------------------------------------------------- A Native Remote Control System Babylon RAT was a premium remote administration tool that was being sold in private. It was cracked numerous times in early versions and in late 2015 the original author of Babylon RAT released the tool for free to download in public forums and websites like HackForums.NET, Nulled and **censored**. Babylon RAT received small updates and little improvements before it was released free to the public, however, some functions and implementations where never completed as planned such as: -Bitcoin Miner -Stealer -Injector -Recovery 2 -Anti-Malware Info: Complete changelog: Date 28/11/2020 [GUI] Protected version to make it harder to modify, reverse and make fake copies. Always check file checksums. [DEL] Removed DDoS feature to make it HF friendly version. Also reverted default latest stub v 1.6.0.0 [hide][Hidden Content]] Server Scan Scan result: This file was detected by 33 / 40 engines [Hidden Content]
- 1 reply
-
- 24
-
- babylon-rat
- native
-
(and 5 more)
Tagged with:
-
Lime Crypter v0.5 A free FUD obfuscation tool An obfuscation tool for .Net + Native files. Main Features .NET - Coded in C#, required framework 4.0 dependency. Injection - Hide payload behind a legit process Lime Crypter v0.5 | .NET + NATIVE + Source Code [HIDE][Hidden Content]]
-
Инструмент запутывания для .NET + собственных файлов. Применение некоторых методов уклонения для обхода антивирусного программного обеспечения и установки персистентности в машине. Кроме того, выходные полезные данные могут быть связаны с законным приложением, в то время как байты вводятся в законный процесс. VIRUSTOTAL --------------------------------------------------------------------------------------------------------------------------------------------------- Основные функции .NET-кодируется в Visual Basic .NET, требуется зависимость framework 4.0. Codedom - нет необходимости во внешней dll для компиляции USG - Добавление некоторых нежелательных методов и переименование всех переменных с помощью китайского языка Injection - Hide payload behind a legit process Bind - Add file to run with your payload runtime Anti Analysis - Stop taskmanager and wireshark from analysing your payload Anti Virtual Machines - Uninstall itself if the machine is virtual to avoid scanning or analyzing --------------------------------------------------------------------------------------------------------------------------------------------------- Необходимые компоненты .NET Framework 4.0 --------------------------------------------------------------------------------------------------------------------------------------------------- PS: Nyan Cat создатель, не несет ответственности за любые действия, и или убытки, вызванные этим программным обеспечением. Вы несете полную ответственность за свои действия и признаете, что это программное обеспечение было создано только в образовательных целях. Основная цель этого программного обеспечения не должна использоваться злонамеренно, или на любой системе, которой вы не владеете, или имеете право использовать. Используя это программное обеспечение, Вы автоматически соглашаетесь с вышеизложенным. Ссылка на Yandex [Hidden Content]