Search the Community

Showing results for tags 'remote'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 282 results

  1. Malware program that includes a back door for administrative control over the target computer using Telegram. Features WebCam Threading Tasklist TaskKill Easy for Beginners ! [hide][Hidden Content]]
  2. Features Autorun Information of system Browse directories, delete files / folders View all processes Ability to delete a process Real time keylogger Encrypting files and directories Shutting down the operating system Throw Error MessageBox [hide][Hidden Content]]
  3. A pure python, post-exploitation, RAT (Remote Administration Tool) for macOS / OSX. Features Create a simple terminal instance For use on ALL APPLE OS's (macOS, OSX etc.) Undetected by anti-virus Undetectable by user Multi-threaded No dependencies (pure python) Persistent or non-persistent Retrieve any passwords Download and upload files undetected Get root via local privilege escalation Auto installer, simply run OSX-RAT on your target and the rest is handled automatically. Access to all phone data, files and chats from any apps [hide][Hidden Content]]
  4. A cloud based remote android managment suite, powered by NodeJS Features GPS Logging Microphone Recording View Contacts SMS Logs Send SMS Call Logs View Installed Apps View Stub Permissions Live Clipboard Logging Live Notification Logging View WiFi Networks (logs previously seen) File Explorer & Downloader Command Queuing Built In APK Builder D3VL Provides no warranty with this software and will not be responsible for any direct or indirect damage caused due to the usage of this tool. L3MON is built for both Educational and Internal use ONLY. L3MON - v1.1.2 Jack-Rogers released this on 1 May V1.1.2 - Patches applied to fix Java Issues on Linux. [HIDE][Hidden Content]]
  5. itsMe

    Loki - Remote Access Tool

    Loki Loki is a simple Remote Access Tool. Loki uses RSA-2048 with AES-256 to keep your communication with infected machines secure. Requirements Python 3.6.x | 3.7.x | 3.8.x Server tested on Windows 10 Kali Linux Bot tested on Windows 10 Payload generator tested on Windows 10 Features Upload & Download Chrome Launching Persistence Screenshare Screenshot Keylogger SFTP SSH [HIDE][Hidden Content]]
  6. Venom Software A quality remote administration tool was the top request we had from our macro exploit users, and that’s how Venom Software was born. There’s no easier way to spread your exploit in any environment, and take advantage of remote file management & registry / command access. Sales + Info: [Hidden Content] [Hidden Content] Tutorial Hidden Remote Desktop HRDP [Hidden Content] Tutorial Hidden Remote Desktop VNC [Hidden Content] Tested by Me / itsMe Download: [HIDE][Hidden Content]] Server Scan [Hidden Content]
  7. Functions Desktop Capture Webcam Capture Sound Capture Computer Power Shutdown Restart Logoff BSoD Startup Management Add to Autorun Uninstall Files Manager Current Directory List of Files Remove a File Remove all Files Upload File Download File Run File Run File as Administrator Process Manager Process list Process Kill Kill all Processes Disable Task Manager Send Message Speak Message Open URL Set wallpapers ForkBomb Get Passwords Get Cookies Get History Clipboard editing Block Input Remote Shell Navigation buttons Bugs fixed / Input blocking added / Process protection added [HIDE][Hidden Content]]
  8. DiscordRAT Discord Remote Administration Tool fully written in Python3. This is a RAT controlled over Discord with over 20 post exploitation modules. Disclaimer: This tool is for educational use only, the author will not be held responsible for any misuse of this tool. This is my first project on github as such this project is far from perfect , I will listen to any criticism as long as it is constructive. Setup Guide: You will first need to register a bot with the Discord developper portal and then add the bot to the server that you want. Once the bot is created copy the token of your bot and paste it at line 11. Now on go on discord , go to the settings , go to appearance , scroll to the bottom , and activate "Developer Mode",now go to the server where your bot added right click on the channel where you want the bot to post , click copy ID and finally , paste the ID in the parenthesis in line 99. Install requirements ("pip3 install -r requirements.txt") Then if steps above were succesful after launching the python file, or executable , it will post a message on the server with a generated uuid , all that is left to do is posting "!interact " with the given uuid. Now your bot should be available to use ! Requirements: Python3,Windows Compiling to exe (optional): If you want to compile the bot to exe you can use PyInstaller. Inside the directory of the bot execute "PyInstaller --onefile --noconsole" or "python3 -m PyInstaller --onefile --noconsole DiscordRAT(NoCV).py (or" If an error occured during compiling try to import the discord module "PyInstaller --onefile --noconsole --hidden-import=discord" Advice: If you have problems with the installation of win32api or other modules , try installing it in a python virtual environment. There are two python files one has opencv and webcam related modules the other does not, this has been done because open-cv adds multiple dozens of megabytes to the compiled .exe file. [HIDE][Hidden Content]]
  9. Functions: ComputerInfo, BatteryInfo, Location, Whois, ActiveWindow, Webcam, Microphone, Desktop, Keylogger, ClipboardSet, ClipboardGet, ProcessList, ProcessKill, ProcessStart, GetPasswords, GetCreditCards, GetHistory, GetBookmarks, GetCookies, OpenCD, CloseCD, DownloadFile, UploadFile, RunFile, RunFileAdmin, ListFiles, RemoveFile, RemoveDir, MoveFile, MoveDir, CopyFile, CopyDir, Speak, Shell, MessageBox, OpenURL, SendKeyPress, ScanNetwork, SetWallPaper, BlockInput, Monitor(off/on), DisplayRotate, ForkBomb, BsoD, Shutdown, Reboot, Hibernate, Logoff, Help, About, Uninstall. [HIDE][Hidden Content]]
  10. qi wang

    I want to buy remote management

    Hello, I need to buy a set of remote RATs that support Windows and Linux, and can run on Windows contact details ICQ: @Seczone Email: [email protected]
  11. WhatsRCE This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution) Auto install GCC (no harm command, you can see this is open-source) Saving to .GIF file How To Use ? [Hidden Content]
  12. Stitch - Python Remote Administration Tool (RAT) A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. [Hidden Content]
  13. Info: [HIDE][Hidden Content]] # Current Version: ############################################## # ############################################## - Added the Assembly Changer and Icon Changer. - Updated installation method. - Updated dynamic stub library. - Added process manager protection. - Added ip logger function. - Added dynamic stub library. - Fix single instance issue. - Fix the encryption error on mutex. Server Scan [Hidden Content]
  14. BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1. [Hidden Content]
  15. Apache Solr version 8.2.0 suffers from a remote code execution vulnerability. View the full article
  16. This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 1.9.6 and below. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request. View the full article
  17. This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned. View the full article
  18. Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability. View the full article
  19. rConfig version 3.9.2 suffers from a remote code execution vulnerability. View the full article
  20. 1337day-Exploits

    PHP-FPM Remote Code Execution

    This is a newer method to exploit php-fpm to achieve remote code execution when certain nginx with php-fpm configurations exist. View the full article
  21. This Metasploit module exploits a PHP object injection vulnerability in Joomla version 3.4.6. View the full article
  22. Trend Micro Anti-Threat Toolkit (ATTK) versions and below suffer from a remote code execution vulnerability. View the full article
  23. Whatsapp version 2.19.216 suffers from a remote code execution vulnerability. View the full article
  24. Zilab Remote Console Server version 3.2.9 suffers from a zrcs unquoted service path vulnerability. View the full article
  25. Remote exploit for Podman when configured with Varlink that allows for remote command execution, denial of service, directory traversal, and information disclosure vulnerabilities. View the full article