Jump to content

Search the Community

Showing results for tags 'remote'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. What's new ? [Beta] Ransomware plugin (RSA 4096 + AES 256) Multiple hosts (and support of dynamic hosts) Offline keylogger fully independant Client built with MSBuild + CSC (instead of patching with DnLib) Directory size in file manager (only top files) ... Current features Clients written in C# and VB (32 and 64 bit) (dlls + exes) Passwords recovery History recovery Autofill recovery Keywords recovery Remote camera viewer (+ save pictures) Remote microphone (auto saved) Remote desktop control (+ save pictures) Remote keyboard Remote mouse Remote chat Remote DotNet Code Execution (VB + C#) Process manager Kill process (native techniques) Suspend process (native techniques) Resume process (native techniques) ShellCode injection (NtWriteVirtualMemory + NtCreateThreadEx) ShellCode injection (NtMapViewOfSection + NtCreateThreadEx) Shutdown system Reboot system Suspend system Hibernate system Log out user BSOD Lock workstation Offline keylogger (automatically saved) Realtime keylogger (automatically saved) Managed pe execution (current process) Unmanaged pe execution (current process) Managed dll execution (current process) Unmanaged dll execution (current process) Shellcode execution (current process) Blur screenlocker Audio up Audio down Hide + show taskbar Hide + show desktop icons Set wallpaper File manager Delete file Download file Rename file Upload file Get information (CPU, hardware, system) Shortcuts (download, desktop and documents paths) Logs (automatically saved) Big Update Latest [New] Open link in misc panel [New] Information retrieve windows activation key [New] Added packet size log [New] Auto Save Recovery Option [New] Stub automatically obfuscated [New] Added buffer size settings to download file [New] Directory size in file manager (only top files) [New] Ransomware (RSA 4096 + AES) [New] Multiple hosts for client [New][UI] Added packet size to client's ui (sent & received) [Tweaks] Keylogger offline fully independant (sends keystrokes every 30 sec) [Tweaks] Client built with MSBuild + CSC (instead of patching with DnLib) [Tweaks] Download File use long instead of int [Tweaks] Download File improved [Tweaks] Remote Desktop Improved [Tweaks] Code & Folder refractoring [Tweaks] Invoking asynchronous methods on right UI components [Tweaks][UI] One dashboard for all features [Tweaks][UI] UI remade [Fix] Screenlocker crashing when closed [Fix] Many bugs corrected [Removed] Installer [Removed] Dll Client (C# & VB) [Removed] Client (VB) [Removed] Costura from Client (manual binding) [hide][Hidden Content]]
  2. Download Java 11+. Most preferrably Java 15. Download the Zip Attached in the Latest Release. Run the file run-on-linux.desktop OR run-on-windows.bat Getting Started with Remote Hacker Probe or see Video. Remote Hacker Probe V.2.3 Fixed Host - Port reading bug in DLL Loader Client. [hide][Hidden Content]] Server Scan [Hidden Content]
  3. Creating a Command and Control Server with Backdoor 0.0 | (0 ratings) | 1 student | Author: Rausson Gouveia Course Duration: 5 sections • 13 lectures • 2h 29m total length What you'll learn: Python logic Advanced python You will learn about client/server connection creating a command and control server Requirements: Python language experience Description: Hello, I'm here to introduce you to my newest project: Creating a Backdoor Command and Control Server using python.do you know what a Trojan Access Remote is? Not ? So here, in this course, we are going to learn what it is and create our own.This course is for all those who want to learn what a RAT Trojan access Remote is and how dangerous this tool is in the hands of those who know how to use it, an extremely important tool for red teams and also used by cyberterrorists.This course has 3 modules, where we will learn about what a RAT is, then we will create our own server and then our client.And what can we do with this RAT? It's very simple, we are going to use the server to download files, upload files and also access the terminal of our viima.This server that we are going to create is managed, being able to receive several connections and a list of victims, and we will be able to choose which victim we want to manage by using the ID.What we need ? A computer with an operating system, whether linux or windows, in the class I will be using linux and we will also use python2 and python3.All codes used in this class are commented and made available to all our students.Here's an example of using our RAT#my server waiting for connection$shell>when a victim connects, I will be able to view it on my server using the targets command#after I use the command "targets" the server will show me all my connections.$shell>targets(Victim_0)(vimit_1)(...............)#Now I can choose which victim I can manage, I will choose #victim 0, in this case I will type "target_0"$shell>target_0#Ok, now I can manage victim 0, now I can upload and download file for victim and access the terminal.Liked ? Can you imagine what you can do with this knowledge? remembering that this project has an academic purpose, like all cybernetic weapons on the internet. Who this course is for: Everyone who wants to learn about network connections [Hidden Content] [hide][Hidden Content]]
  4. This python script allows to extract of various information from a Microsoft Remote Desktop Web Access (RDWA) application, such as the FQDN of the remote server, the internal AD domain name (from the FQDN), and the remote Windows Server version. [hide][Hidden Content]]
  5. Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue. It uses an agent written in golang and integrates with MeshCentral Features Teamviewer-like remote desktop control Real-time remote shell Remote file browser (download and upload files) Remote command and script execution (batch, powershell and python scripts) Event log viewer Services management Windows patch management Automated checks with email/SMS alerting (cpu, disk, memory, services, scripts, event logs) Automated task runner (run scripts on a schedule) Remote software installation via chocolatey Software and hardware inventory Windows versions supported Windows 7, 8.1, 10, Server 2008R2, 2012R2, 2016, 2019 [hide][Hidden Content]]
  6. Remote Desktop entirely coded in PowerShell. Power Remote Desktop is a fully functional Remote Desktop Application entirely coded in PowerShell. It doesn't rely on any existing Remote Desktop Application or Protocol to function. A serious advantage of this application is its nature (PowerShell) and its ease of use and installation. This project demonstrate why PowerShell contains the word Power. It is unfortunately often an underestimated programming language that is not only resumed to running commands or being a more fancy replacement to the old Windows command-line interpreter (cmd). Tested on: Windows 10 Windows 11 Remote Desktop Streaming with support of HDPI and Scaling. Remote Control: Mouse (Moves, Clicks, Wheel) and Key Strokes (Keyboard) Secure: Network traffic is encrypted using TLSv1.2 or 1.3. Access to server is granted via a challenge-based authentication mechanism (using user defined complex password). Network traffic encryption is using whether a default X509 Certificate (Requires Administrator) or your custom X509 Certificate. Server certificate fingerprint validation supported and optionally persistent between sessions. Clipboard text synchronization between Viewer and Server. Mouse cursor icon state is synchronized between Viewer (Virtual Desktop) and Server. Multi-Screen (Monitor) support. If remote computer have more than one desktop screen, you can choose which desktop screen to capture. View Only mode for demonstration. You can disable remote control abilities and just show your screen to remote peer. Session concurrency. Multiple viewers can connect to a single server at the same time. Prevent computer to enter in sleep mode while server is waiting for viewers. Only pieces of desktop that was updated are sent to viewer to increase streaming speed. 3.1 Stable Latest Code refactoring and improvement. Desktop streaming improvement to gain few more FPS. Support password-protected external x509 Certificates. [hide][Hidden Content]]
  7. Fast and Secure Remote Desktop Software Full Control and View Connect to a remote desktop from anywhere over a secure connection using the Full Control and View mode. View the remote screen, move the remote mouse pointer and send keystrokes. Use the toolbar at the top of the remote control window to run other tasks. File Transfer Send and receive files to/from a remote desktop using the File Transfer mode with a classic two-pane file manager interface. You can open multiple remote computers in tabs. Drag and drop is also supported. Two-factor Authentication Enable two-step verification for ultimate protection. You can generate a time-based token and add it to Google Authenticator or a similar app. When you start a remote session Remote Utilities will ask you for a one-time password (OTP). [Hidden Content] [hide][Hidden Content]]
  8. Remote Computer Manager – is a network utility for remote computer management. The program allow network administrators to centrally manage network PCs and make: remote desktop control, remote shutdown, run (execute) commands, launch applications and processes, Wake-on-LAN over IPv4, Wake on LAN over IPv6, lock workstation, log on, log off, sleep, hibernate, wake up, reboot, power on, power off, lock and unlock input devices, registry merge, file copy, installation of MSI packages, clock (time) synchronization and other remote operations for computers on network (Windows and Linux PCs). Using Remote Computer Manager you can perform a remote shutdown, power on (turn on), power off (turn off) and restart (reset) the remote computer with Intel AMT (Active Management Technology) and AMD DASH (Desktop and Mobile Architecture for System Hardware). Features • Remote desktop control. • Actions with processes (Get list, create and terminate process) on remote computers. • Operations with services (Get list, install and uninstall, start and stop service) on LAN PC’s. • View registry of network PC’s. • Browse event log of network computers. • Remote command prompt. • Launch (execute) applications and files on remote PC’s. • Taking netstat information of remote computers. • Taking screenshots of network PC’s. • File operations (send file, get file, copy file, move file, rename file and delete file) on LAN computers. • Actions with registry (create key, add/edit value) on network PC’s. • Merge registry files with the registry of network computers. • Installation of MSI packages on remote PC’s. • Remote shutdown, reboot, power off with DCOM and WMI for Windows PC’s. • Remote reboot, shutdown, power off with SSH for Linux PC’s. • Turn on, shutdown, reboot, turn off network computers with Intel AMT (vPro) and AMD DASH. • Wake on LAN over IPv4 and IPv6. • Wake up network computers with magic packet. • Switching network PC’s into sleep and hibernate state. • Logon and logoff users on remote computers. • Lock workstation, lock and unlock input devices on network PC’s. • Send message to network computers. • Browse files of LAN computers. • Time zone and time synchronization on remote PC’s. [Hidden Content] [Hidden Content]
  9. [ENG] This update adds the ability to disable Windows Defender at the first start of the Client (requires administrator permissions). ATTENTION To make the best use of the Windows Defender function, it must be disabled before starting the Client, once the Client is started with administrator permissions it is highly recommended to restar… DOSrat è un semplice Remote Administration Tool (RAT) scritto in C++, esso permette di eseguire diverse azioni sul PC nel quale è installato il Client. Features Possibilità di cambiare la porta da utilizzare (5555 default). Possibilità di creare un Client personalizzato direttamente dal server. Possibilità di gestire più Client connessi contemporaneamente (max 50). Il Client persiste anche dopo il riavvio del PC remoto. 1.1.5 Novità Aggiornata la grafica del comando TPC. Aggiornata la grafica del comando GINF. Aggiornata la grafica nella lista delle connessioni. Aggiunta possibilità di vedere la versione del Client dalla lista delle connessioni (Se il Client è inferiore alla 1.1.5 verranno visualizzati dei punti di domanda) 1.1.5 Fixes Quando il Client cerca di connettersi al Server ora aggiorna dinamicamente l'IP. Delle volte non veniva creato il file per salvare le sessioni del comando LKL, ora il file e le cartelle vengono create correttamente. Se il Server viene chiuso il Client continua ad eseguire i comandi dati. (quindi anche senza connessione) Migliorato il protocollo del Client per gestire la perdita di connessione. Risolto il bug delle connessioni multiple da un singolo Client. [hide][Hidden Content]] Server.exe Scan [Hidden Content]
  10. CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems. Features Feature Reverse Shell X X Download File X X Upload File X X Screenshot X X File Explorer X X Get OS Info X X Run Hidden X Restart X X Shutdown X X Disclaimer THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
  11. Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file) You need to install lcab first (sudo apt-get install lcab) Check REPRODUCE.md for manual reproduce steps If your generated cab is not working, try pointing out exploit.html URL to calc.cab Finally try the docx in a Windows Virtual Machine: [hide][Hidden Content]]
  12. james bond

    tool remote

    Hello , I'm looking for a software to retrieve or extract the openbullet configs on a remote Thank you ;)
  13. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.3 Fixed missing output messages for Invoke-Binary Extracted AMSI bypass from the menu to avoid menu problems due to M$ AV signatures Dynamic AMSI bypass implemented to avoid AV signatures [hide][Hidden Content]]
  14. RDP Servers? Before Going to RDP servers we will learn that what is RDP and what's use it. After that, we will learn what are the RDP servers and will discuss some RDP/ VPS service providers. What is RDP? RDP stands for Remote desktop protocol. Remote Desktop Protocol owns by Microsoft, you may also notice a software called Remote Desktop Connection on your Windows computer. RDP allows user to remotely control or connect to an RDP Server enabled Computer through the internet or Local networks. Remote Desktop Protocol allows remote users to control the other windows pc which is situated in other location and its so cool to have an RDP server for your self I will talk about it later. Remote Desktop Protocol is Only For Windows, by RDP you can only connect to a Windows RDP server, and also not all windows version supports RDP sever establish, only some of windows server version supports it. So Basically, RDP is for transmitting the remote server's monitor/screen to the Client User and the Client User's keyboard and mouse to the remote server, by this client user have full control of the RDP server. What is an RDP Server? For the shake of simplicity, The RDP Server is a windows machine that has installed the necessary components to share the control of that machine to an RDP remote user or an RDP client User. let's understand with a basic example, suppose you have a Windows PC in which you installed necessary components (RDS etc.) to share its control with another user, in this case, your pc is an RDP server. What is a client? The client are you. Yes! a client is who controls the remote servers using and RDP client software. You can connect to an RDP server from windows, macOS, IOs, android cause Microsoft officially provides RDP client apps for all of the above platforms. You can also connect to an RDP server using Linux or other platform but using third party solutions or applications. Requirements to connect to an RDP Server There are no special requirements to establish a connection between the RDP server and your Device, you just need an RDP server IP address with a port and an RDP client on your device. For android, you can find the Official RD client app of Microsoft in google play store and for windows, you can use preinstalled software the Remote Desktop Connection. How To Get an RDP Server For Yourself Cause of the Extreme Popularity of RDP/VPS at present, there are lots of RDP/VPS providers on the internet. Some are costly and some are very cheap. If you want to take a trial you can use Amazon AWS or Microsoft Azure for testing and experience the RDP server. AWS 1 year - aws.amazon.com/free Azure 100$ Credit - azure.microsoft.com/en-us/free/students/ What The Use OF RDP? I think after reading the above lines you should know why to use RDP/VPS, but if you don't know then let me explain to you the advantage of it. First read the above paragraphs about RDP, RDP servers, RDP Client carefully. I hope Now you understood what RDP and how it works, now you know that we can establish a connection to a Windows RDP server using RDP client software which is available for android, ios and macOS, so it's clear here that you can control a windows machine which has a good amount of ram, high processing power by just your smartphone, isn't it cool? it's super cool to control a high-end computer using your Low-end device. You can use it if you haven't a Computer, you can use it for anonymous reasons, and for privacy reasons of for doing some anonymous activity which you don't want to do on your PC and your local network. And One More Thing I use RDPs for High-Speed & Unlimited internet(up to 5gp/ps) and as a hosting.
  15. New Android Remote Tool (SpyMax Modded Version) Tested on Android : 5,6,7,8,9,10,11 Application Features : ------ Manage : .Files .Sms .contacts .Calls .Applications .Accounts ------ Monitor : .camera .live screen .microphone .keylogger .Location . real time calls monitor ------ tools : .Download apk and install .show message .open link .call number .phone info ----- Social media Hunter: - Facebook - gmail - more coming soon ------ super mode : -Anti-Kill -Anti-Delete -Realtime Monitor Active App -Auto Click Start Screen Record -Anti shutdown phone New Update Free Version : -Auto grant Request battery optimization [ super mod ] -update anti-remove to work on more phones [ super mod ] -hide bars when camera open -more stable payload for weak phones [hide][Hidden Content]] Scan Server [Hidden Content]
  16. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.2 Fixed minor duplicated code problem Dockerfile improvements Amsi bypass update [hide][Hidden Content]]
  17. The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use. The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc. Remote Hacker Probe Core is open source and constantly improved. and is no longer being updated or worked on. Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows. The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here. Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program. Server Features : Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes. Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up. The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE). Event Logging. High Speed File Upload / Download. Main Features : Probe Client : The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer. Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL) Download, Upload, Delete and browse the entire file System. Reverse Shell, Full Access to the command line. Scan Remote Network for hosts. Port scan hosts in the Target Network. Scan Remote Network for hosts vulerable to Eternal Blue Get Process Information by Process name. Geolocate Client using IP Address. Shutdown / Restart the Remote PC. Grab screenshot of the Remote PC. Record Microphone input. Add to Startup Persistence on command. Display Message box. Open URLS in the default browser. USB Infection. Active Window logging. UAC Status shown in main table. Client Path shown in main table. Keylogger. Password Recovery. Pidgin. FileZilla. Vault & IE. WinSCP. WiFi. Credential Manager. Task Manager. Remote Hacker Probe Pro V.2 This is the final release of Remote Hacker Probe. I am no longer going to update this. The professional (paid) version is now open source and is merged into this repository. [Hidden Content]
  18. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]
  19. Comcast TV Remote Hack Opens Homes to Snooping 🌀Researchers disclosed the ‘WarezTheRemote’ attack, affecting Comcast’s XR11 voice remote control. 🌀A security flaw allowing attackers to remotely snoop in on victims’ private conversations was found to stem from an unexpected device – their TV remotes. 🌀The flaw stems from Comcast’s XR11, a popular voice-activated remote control for cable TV, which has more than 18 million units deployed across the U.S. The remote enables users to say the channel or content they want to watch rather than keying in the channel number or typing to search. 🌀However, researchers found a serious vulnerability in the remote, allowing attackers to take it over (details below). Worse, the ensuing attack, dubbed WarezTheRemote, does not require any interaction from the victim — it’s extremely cheap to carry out (a hacker merely needs a low-priced RF transceiver and antenna), and can be launched remotely (from up to 65 feet away).
  20. The Remote Hacker Probe is a Remote Access and Post Exploitation Framework coded in C++/Java. Server Features : Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes. Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up. The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE). Event Logging. High Speed File Upload / Download. Main Features : Execute DLL’s in memory using Reflective DLL Injection over Socket. Download, Upload, Delete and browse the entire file System. Reverse Shell, Full Access to the command line. Scan Remote Network for hosts. Port scan hosts in the Target Network. Scan Remote Network for hosts vulerable to Eternal Blue. Get Process Information by Process name. Geolocate Client using IP Address on an interactive Map. Shutdown / Restart the Remote PC. Grab screenshot of the Remote PC. Record Microphone input. Add to Startup Persistence on command. Display Message box. Open URLS in the default browser. USB Infection. Active Window logging. Client Path. Keylogger. Password Recovery. Pidgin. FileZilla. Vault & IE. WinSCP. WiFi. Credential Manager. Task Manager. Remote Hacker Probe V.1.1 RCE Vulnerability fixed. File Manager bugs improved. Unauthorized File Upload / Download fixed. It is checked if you triggered the file download or not. [hide][Hidden Content]]
  21. Babylon RAT v 1.7.0.0 ------------------------------------------------------------------------- A Native Remote Control System Babylon RAT was a premium remote administration tool that was being sold in private. It was cracked numerous times in early versions and in late 2015 the original author of Babylon RAT released the tool for free to download in public forums and websites like HackForums.NET, Nulled and **censored**. Babylon RAT received small updates and little improvements before it was released free to the public, however, some functions and implementations where never completed as planned such as: -Bitcoin Miner -Stealer -Injector -Recovery 2 -Anti-Malware Info: Complete changelog: Date 28/11/2020 [GUI] Protected version to make it harder to modify, reverse and make fake copies. Always check file checksums. [DEL] Removed DDoS feature to make it HF friendly version. Also reverted default latest stub v 1.6.0.0 [hide][Hidden Content]] Server Scan Scan result: This file was detected by 33 / 40 engines [Hidden Content]
  22. KEYLOGGER ~ REMOTE ACCESS ~ DDOS ~ ENCRYPTER | 2020 Webcam screenshot, Desktop screenshot, Microphone recorder, Stealer(Passwords, Credit Cards, Cookies, History, Bookmarks), Keylogger, Autorun(Registry, Taskscheduler, StartupDIR), DDoS(HTTP, UDP, SYN, ICMP, SLOWLORIS), Bruteforce (SSH, FTP, Telnet), TaskManager, Port Scanner, Wifi scanner, File encryptor/dycryptor, Get installed antivirus, Check if in VirtualBox, SandBox, Debugger, Power control, Block system input, BSoD, ForkBomb, Text to speech, Clipboard control, System volume control, Send key press, Move cursor, Get cursor position, Get active window title, Get battery status, Min/Max all windows, Change wallpapers, Download & Upload file(anonfile.com), Get BSSID, Get coordinates by BSSID, WHOIS, Geoplugin, VirusTotal checker. Create webcame S.S : inferno.exe WEBCAM_SCREENSHOT "screenshot.jpg" "4500" "1" Disable monitor : inferno.exe MONITOR "OFF" [Hidden Content]
  23. A cloud based remote android managment suite, powered by NodeJS Features GPS Logging Microphone Recording View Contacts SMS Logs Send SMS Call Logs View Installed Apps View Stub Permissions Live Clipboard Logging Live Notification Logging View WiFi Networks (logs previously seen) File Explorer & Downloader Command Queuing Built In APK Builder D3VL Provides no warranty with this software and will not be responsible for any direct or indirect damage caused due to the usage of this tool. L3MON is built for both Educational and Internal use ONLY. L3MON - v1.1.2 Jack-Rogers released this on 1 May V1.1.2 - Patches applied to fix Java Issues on Linux. [HIDE][Hidden Content]]
  24. Venom Software A quality remote administration tool was the top request we had from our macro exploit users, and that’s how Venom Software was born. There’s no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access. Sales + Info: [Hidden Content] [Hidden Content] Tutorial Hidden Remote Desktop HRDP [Hidden Content] Tutorial Hidden Remote Desktop VNC [Hidden Content] Tested by Me / itsMe Download: [HIDE][Hidden Content]] Server Scan [Hidden Content]
  25. Functions Desktop Capture Webcam Capture Sound Capture Computer Power Shutdown Restart Logoff BSoD Startup Management Add to Autorun Uninstall Files Manager Current Directory List of Files Remove a File Remove all Files Upload File Download File Run File Run File as Administrator Process Manager Process list Process Kill Kill all Processes Disable Task Manager Send Message Speak Message Open URL Set wallpapers ForkBomb Get Passwords Get Cookies Get History Clipboard editing Block Input Remote Shell Navigation buttons Bugs fixed / Input blocking added / Process protection added 😉 [HIDE][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.