Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'pyiris-backdoor:'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 1 result

  1. The PyIris project is a modular, stealthy and flexible remote-access-toolkit written completely in python. It allows users to dynamically build, generate, and encode/encrypt remote-access-trojan payloads for remote control of other compromised hosts. Features (Both Windows and Linux) Tab completion for most commands Dynamically generate scouts Robust error handling to allow scouts to recover from sudden disconnects Upload and download files from and to the target machine Sleep, kill and disconnect scouts Download files from external urls (web downloads) Keylogging in memory Displaying system information Taking screenshots without writing to disk See all currently open visible and nonvisible windows on the target Check to see if a scout is running with admin/root privileges Inject keystrokes Compile payloads into Windows EXEs or Linux ELFs Clear, set, or dump clipboard data Setting audio Take pictures from the webcam without writing to disk Stackable encryption of scout payload source code, in a theoretically infinite stack in infinite variations execute arbitrary python code and read the results even if the python interpreter is not installed on the target machine from compiled scouts request for admin/root sleep for an arbitrary length of time before running (To bypass AV dynamic program analysis) self-delete (only works for scripts) Stream webcam over TCP sockets (pretty laggy will work on a UDP version) Features (Windows) Archive persistence through the windows registry (HKEY_CURRENT_USER) Archive persistence through the windows startup folder Remote Command Execution through cmd.exe or powershell.exe (provided it is not blocked) Open URLs from a native browser (internet explorer ewww) Shutdown, restart, lock, logoff user gracefully without connection hanging from scout payload Execute or open files remotely Check the user idle time Dump saved chrome passwords (won’t work with the latest Chrome browsers since they changed encryption methods and I’m kinda lazy to update this lol) Disbale/ Enable the targets keyboard/mouse Bypass UAC through sdclt.exe (Has already been patched in recent windows updates) Features (Linux) Achieve persistence through cron jobs (crontab) Remote Command Execution through the bash shell [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.