Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'remote'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Dark-wOrm v0.3.2 Preview Download: kosred: [hide][Hidden Content]] upload.ee: [hide][Hidden Content]]
  2. BX RAT V1.3 PREVIEW DOWNLOAD: kosred: [hide][Hidden Content]] upload.ee: [hide][Hidden Content]]
  3. BOZOK RAT 1.5.1 PREVIEW DOWNLOAD kosred: [hide][Hidden Content]] upload.ee: [hide][Hidden Content]]
  4. Description Remote access is one of the most powerful tools available to Windows administrators—particularly in the era of the remote workforce. Once configured, you can troubleshoot Windows remotely, control power usage, deploy workspaces and software, and synchronize files across devices and the cloud—all without ever touching the user’s PC. This hands-on, practical course covers the skills necessary for a system admin to configure, optimize, and manage remote access in Windows 11. Instructor Joli Ballew explores the core technologies—virtual private networks (VPNs) and clients—and then shows how to prepare a desktop computer for remote access and make the connection. She also explains how to configure and manage remote storage options and troubleshoot connection issues. Plus, get tips for using the command line and PowerShell to script remote admin tasks and creating group policy settings that can be used across your organization. [Hidden Content] [hide][Hidden Content]]
  5. What is RDP? For this attack we’ll use a tool called “crowbar” that gonna help us to brute force the credentials of the target machine. What is Crowbar? We can Download the tool right here [Hidden Content]
  6. Dameware Mini Remote Control Affordable remote control software for all your customer support and help desk needs Key Features Multi-platform desktop sharing and remote control Remote access to sleeping and powered-off computers Multi-factor authentication Flexible user access control Customize and automatically deploy remote control agents Remote session tools and utilities [Hidden Content] [hide][Hidden Content]]
  7. This module offers a unique solution for remotely controlling one or multiple screens using only PowerShell. Unlike other remote desktop tools that rely on external protocols and software, our module utilizes its own remote desktop protocol. The module consists of both a client and a server component, both of which are written entirely in PowerShell. Our protocol provides secure, encrypted communication using TLS and offers both challenge-based password authentication and certificate-based authentication. In addition to providing full mouse and keyboard control over the remote desktop, our module also replicates the mouse cursor icon for the viewer, synchronizes the clipboard between the local and remote systems, and more. Despite the limitations of PowerShell, we have implemented techniques to optimize network traffic and improve the streaming experience, resulting in a smooth and efficient remote desktop experience. Tested on: Windows 10 Windows 11 Remote Desktop Streaming: This feature allows you to stream the desktop of the remote computer to your own device. The streaming supports HDPI and scaling, providing a high-quality display on various screens and resolutions. Remote Control: With this feature, you can control the mouse (including moves, clicks, and wheel) and keyboard of the remote computer as if you were sitting in front of it. Secure: To protect the privacy and security of your remote desktop sessions, the module uses TLSv1.2 or 1.3 to encrypt the network traffic. Access to the server is granted through a challenge-based authentication mechanism that requires a user-defined complex password. Network Traffic Encryption: The module supports encrypting the network traffic using either a default X509 certificate (which requires administrator privileges) or your own custom X509 certificate. Server Certificate Fingerprint Validation: To ensure the authenticity of the server, the module allows you to validate the fingerprint of the server certificate and optionally persist this validation between sessions. Clipboard Synchronization: This feature allows you to synchronize the clipboard text between the viewer (your device) and the server (the remote computer). You can easily copy and paste text between the two systems. Mouse Cursor Icon Synchronization: The module also synchronizes the state of the mouse cursor icon between the viewer (virtual desktop) and the server, providing a more seamless and intuitive remote desktop experience. Multi-Screen Support: If the remote computer has more than one desktop screen, you can choose which screen to capture and stream to your device. View Only Mode: This feature allows you to disable remote control abilities and simply view the screen of the remote computer. It can be useful for demonstrations or presentations. Session Concurrency: Multiple viewers can connect to a single server at the same time, allowing multiple users to collaborate on the same remote desktop. Sleep Mode Prevention: To ensure that the remote desktop remains active and responsive, the module prevents the remote computer from entering sleep mode while it is waiting for viewers to connect. Streaming Optimization: To improve the streaming speed, the module only sends updated pieces of the desktop to the viewer, reducing the amount of data transmitted over the network. [Hidden Content]
  8. What's new ? [Beta] Ransomware plugin (RSA 4096 + AES 256) Multiple hosts (and support of dynamic hosts) Offline keylogger fully independant Client built with MSBuild + CSC (instead of patching with DnLib) Directory size in file manager (only top files) ... Current features Clients written in C# and VB (32 and 64 bit) (dlls + exes) Passwords recovery History recovery Autofill recovery Keywords recovery Remote camera viewer (+ save pictures) Remote microphone (auto saved) Remote desktop control (+ save pictures) Remote keyboard Remote mouse Remote chat Remote DotNet Code Execution (VB + C#) Process manager Kill process (native techniques) Suspend process (native techniques) Resume process (native techniques) ShellCode injection (NtWriteVirtualMemory + NtCreateThreadEx) ShellCode injection (NtMapViewOfSection + NtCreateThreadEx) Shutdown system Reboot system Suspend system Hibernate system Log out user BSOD Lock workstation Offline keylogger (automatically saved) Realtime keylogger (automatically saved) Managed pe execution (current process) Unmanaged pe execution (current process) Managed dll execution (current process) Unmanaged dll execution (current process) Shellcode execution (current process) Blur screenlocker Audio up Audio down Hide + show taskbar Hide + show desktop icons Set wallpaper File manager Delete file Download file Rename file Upload file Get information (CPU, hardware, system) Shortcuts (download, desktop and documents paths) Logs (automatically saved) Big Update Latest [New] Open link in misc panel [New] Information retrieve windows activation key [New] Added packet size log [New] Auto Save Recovery Option [New] Stub automatically obfuscated [New] Added buffer size settings to download file [New] Directory size in file manager (only top files) [New] Ransomware (RSA 4096 + AES) [New] Multiple hosts for client [New][UI] Added packet size to client's ui (sent & received) [Tweaks] Keylogger offline fully independant (sends keystrokes every 30 sec) [Tweaks] Client built with MSBuild + CSC (instead of patching with DnLib) [Tweaks] Download File use long instead of int [Tweaks] Download File improved [Tweaks] Remote Desktop Improved [Tweaks] Code & Folder refractoring [Tweaks] Invoking asynchronous methods on right UI components [Tweaks][UI] One dashboard for all features [Tweaks][UI] UI remade [Fix] Screenlocker crashing when closed [Fix] Many bugs corrected [Removed] Installer [Removed] Dll Client (C# & VB) [Removed] Client (VB) [Removed] Costura from Client (manual binding) [hide][Hidden Content]]
  9. Download Java 11+. Most preferrably Java 15. Download the Zip Attached in the Latest Release. Run the file run-on-linux.desktop OR run-on-windows.bat Getting Started with Remote Hacker Probe or see Video. Remote Hacker Probe V.2.3 Fixed Host - Port reading bug in DLL Loader Client. [hide][Hidden Content]] Server Scan [Hidden Content]
  10. Creating a Command and Control Server with Backdoor 0.0 | (0 ratings) | 1 student | Author: Rausson Gouveia Course Duration: 5 sections • 13 lectures • 2h 29m total length What you'll learn: Python logic Advanced python You will learn about client/server connection creating a command and control server Requirements: Python language experience Description: Hello, I'm here to introduce you to my newest project: Creating a Backdoor Command and Control Server using python.do you know what a Trojan Access Remote is? Not ? So here, in this course, we are going to learn what it is and create our own.This course is for all those who want to learn what a RAT Trojan access Remote is and how dangerous this tool is in the hands of those who know how to use it, an extremely important tool for red teams and also used by cyberterrorists.This course has 3 modules, where we will learn about what a RAT is, then we will create our own server and then our client.And what can we do with this RAT? It's very simple, we are going to use the server to download files, upload files and also access the terminal of our viima.This server that we are going to create is managed, being able to receive several connections and a list of victims, and we will be able to choose which victim we want to manage by using the ID.What we need ? A computer with an operating system, whether linux or windows, in the class I will be using linux and we will also use python2 and python3.All codes used in this class are commented and made available to all our students.Here's an example of using our RAT#my server waiting for connection$shell>when a victim connects, I will be able to view it on my server using the targets command#after I use the command "targets" the server will show me all my connections.$shell>targets(Victim_0)(vimit_1)(...............)#Now I can choose which victim I can manage, I will choose #victim 0, in this case I will type "target_0"$shell>target_0#Ok, now I can manage victim 0, now I can upload and download file for victim and access the terminal.Liked ? Can you imagine what you can do with this knowledge? remembering that this project has an academic purpose, like all cybernetic weapons on the internet. Who this course is for: Everyone who wants to learn about network connections [Hidden Content] [hide][Hidden Content]]
  11. This python script allows to extract of various information from a Microsoft Remote Desktop Web Access (RDWA) application, such as the FQDN of the remote server, the internal AD domain name (from the FQDN), and the remote Windows Server version. [hide][Hidden Content]]
  12. Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue. It uses an agent written in golang and integrates with MeshCentral Features Teamviewer-like remote desktop control Real-time remote shell Remote file browser (download and upload files) Remote command and script execution (batch, powershell and python scripts) Event log viewer Services management Windows patch management Automated checks with email/SMS alerting (cpu, disk, memory, services, scripts, event logs) Automated task runner (run scripts on a schedule) Remote software installation via chocolatey Software and hardware inventory Windows versions supported Windows 7, 8.1, 10, Server 2008R2, 2012R2, 2016, 2019 [hide][Hidden Content]]
  13. Remote Desktop entirely coded in PowerShell. Power Remote Desktop is a fully functional Remote Desktop Application entirely coded in PowerShell. It doesn't rely on any existing Remote Desktop Application or Protocol to function. A serious advantage of this application is its nature (PowerShell) and its ease of use and installation. This project demonstrate why PowerShell contains the word Power. It is unfortunately often an underestimated programming language that is not only resumed to running commands or being a more fancy replacement to the old Windows command-line interpreter (cmd). Tested on: Windows 10 Windows 11 Remote Desktop Streaming with support of HDPI and Scaling. Remote Control: Mouse (Moves, Clicks, Wheel) and Key Strokes (Keyboard) Secure: Network traffic is encrypted using TLSv1.2 or 1.3. Access to server is granted via a challenge-based authentication mechanism (using user defined complex password). Network traffic encryption is using whether a default X509 Certificate (Requires Administrator) or your custom X509 Certificate. Server certificate fingerprint validation supported and optionally persistent between sessions. Clipboard text synchronization between Viewer and Server. Mouse cursor icon state is synchronized between Viewer (Virtual Desktop) and Server. Multi-Screen (Monitor) support. If remote computer have more than one desktop screen, you can choose which desktop screen to capture. View Only mode for demonstration. You can disable remote control abilities and just show your screen to remote peer. Session concurrency. Multiple viewers can connect to a single server at the same time. Prevent computer to enter in sleep mode while server is waiting for viewers. Only pieces of desktop that was updated are sent to viewer to increase streaming speed. 3.1 Stable Latest Code refactoring and improvement. Desktop streaming improvement to gain few more FPS. Support password-protected external x509 Certificates. [hide][Hidden Content]]
  14. Fast and Secure Remote Desktop Software Full Control and View Connect to a remote desktop from anywhere over a secure connection using the Full Control and View mode. View the remote screen, move the remote mouse pointer and send keystrokes. Use the toolbar at the top of the remote control window to run other tasks. File Transfer Send and receive files to/from a remote desktop using the File Transfer mode with a classic two-pane file manager interface. You can open multiple remote computers in tabs. Drag and drop is also supported. Two-factor Authentication Enable two-step verification for ultimate protection. You can generate a time-based token and add it to Google Authenticator or a similar app. When you start a remote session Remote Utilities will ask you for a one-time password (OTP). [Hidden Content] [hide][Hidden Content]]
  15. Remote Computer Manager – is a network utility for remote computer management. The program allow network administrators to centrally manage network PCs and make: remote desktop control, remote shutdown, run (execute) commands, launch applications and processes, Wake-on-LAN over IPv4, Wake on LAN over IPv6, lock workstation, log on, log off, sleep, hibernate, wake up, reboot, power on, power off, lock and unlock input devices, registry merge, file copy, installation of MSI packages, clock (time) synchronization and other remote operations for computers on network (Windows and Linux PCs). Using Remote Computer Manager you can perform a remote shutdown, power on (turn on), power off (turn off) and restart (reset) the remote computer with Intel AMT (Active Management Technology) and AMD DASH (Desktop and Mobile Architecture for System Hardware). Features • Remote desktop control. • Actions with processes (Get list, create and terminate process) on remote computers. • Operations with services (Get list, install and uninstall, start and stop service) on LAN PC’s. • View registry of network PC’s. • Browse event log of network computers. • Remote command prompt. • Launch (execute) applications and files on remote PC’s. • Taking netstat information of remote computers. • Taking screenshots of network PC’s. • File operations (send file, get file, copy file, move file, rename file and delete file) on LAN computers. • Actions with registry (create key, add/edit value) on network PC’s. • Merge registry files with the registry of network computers. • Installation of MSI packages on remote PC’s. • Remote shutdown, reboot, power off with DCOM and WMI for Windows PC’s. • Remote reboot, shutdown, power off with SSH for Linux PC’s. • Turn on, shutdown, reboot, turn off network computers with Intel AMT (vPro) and AMD DASH. • Wake on LAN over IPv4 and IPv6. • Wake up network computers with magic packet. • Switching network PC’s into sleep and hibernate state. • Logon and logoff users on remote computers. • Lock workstation, lock and unlock input devices on network PC’s. • Send message to network computers. • Browse files of LAN computers. • Time zone and time synchronization on remote PC’s. [Hidden Content] [Hidden Content]
  16. [ENG] This update adds the ability to disable Windows Defender at the first start of the Client (requires administrator permissions). ATTENTION To make the best use of the Windows Defender function, it must be disabled before starting the Client, once the Client is started with administrator permissions it is highly recommended to restar… DOSrat è un semplice Remote Administration Tool (RAT) scritto in C++, esso permette di eseguire diverse azioni sul PC nel quale è installato il Client. Features Possibilità di cambiare la porta da utilizzare (5555 default). Possibilità di creare un Client personalizzato direttamente dal server. Possibilità di gestire più Client connessi contemporaneamente (max 50). Il Client persiste anche dopo il riavvio del PC remoto. 1.1.5 Novità Aggiornata la grafica del comando TPC. Aggiornata la grafica del comando GINF. Aggiornata la grafica nella lista delle connessioni. Aggiunta possibilità di vedere la versione del Client dalla lista delle connessioni (Se il Client è inferiore alla 1.1.5 verranno visualizzati dei punti di domanda) 1.1.5 Fixes Quando il Client cerca di connettersi al Server ora aggiorna dinamicamente l'IP. Delle volte non veniva creato il file per salvare le sessioni del comando LKL, ora il file e le cartelle vengono create correttamente. Se il Server viene chiuso il Client continua ad eseguire i comandi dati. (quindi anche senza connessione) Migliorato il protocollo del Client per gestire la perdita di connessione. Risolto il bug delle connessioni multiple da un singolo Client. [hide][Hidden Content]] Server.exe Scan [Hidden Content]
  17. CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems. Features Feature Reverse Shell X X Download File X X Upload File X X Screenshot X X File Explorer X X Get OS Info X X Run Hidden X Restart X X Shutdown X X Disclaimer THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
  18. Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file) You need to install lcab first (sudo apt-get install lcab) Check REPRODUCE.md for manual reproduce steps If your generated cab is not working, try pointing out exploit.html URL to calc.cab Finally try the docx in a Windows Virtual Machine: [hide][Hidden Content]]
  19. james bond

    tool remote

    Hello , I'm looking for a software to retrieve or extract the openbullet configs on a remote Thank you ;)
  20. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.3 Fixed missing output messages for Invoke-Binary Extracted AMSI bypass from the menu to avoid menu problems due to M$ AV signatures Dynamic AMSI bypass implemented to avoid AV signatures [hide][Hidden Content]]
  21. RDP Servers? Before Going to RDP servers we will learn that what is RDP and what's use it. After that, we will learn what are the RDP servers and will discuss some RDP/ VPS service providers. What is RDP? RDP stands for Remote desktop protocol. Remote Desktop Protocol owns by Microsoft, you may also notice a software called Remote Desktop Connection on your Windows computer. RDP allows user to remotely control or connect to an RDP Server enabled Computer through the internet or Local networks. Remote Desktop Protocol allows remote users to control the other windows pc which is situated in other location and its so cool to have an RDP server for your self I will talk about it later. Remote Desktop Protocol is Only For Windows, by RDP you can only connect to a Windows RDP server, and also not all windows version supports RDP sever establish, only some of windows server version supports it. So Basically, RDP is for transmitting the remote server's monitor/screen to the Client User and the Client User's keyboard and mouse to the remote server, by this client user have full control of the RDP server. What is an RDP Server? For the shake of simplicity, The RDP Server is a windows machine that has installed the necessary components to share the control of that machine to an RDP remote user or an RDP client User. let's understand with a basic example, suppose you have a Windows PC in which you installed necessary components (RDS etc.) to share its control with another user, in this case, your pc is an RDP server. What is a client? The client are you. Yes! a client is who controls the remote servers using and RDP client software. You can connect to an RDP server from windows, macOS, IOs, android cause Microsoft officially provides RDP client apps for all of the above platforms. You can also connect to an RDP server using Linux or other platform but using third party solutions or applications. Requirements to connect to an RDP Server There are no special requirements to establish a connection between the RDP server and your Device, you just need an RDP server IP address with a port and an RDP client on your device. For android, you can find the Official RD client app of Microsoft in google play store and for windows, you can use preinstalled software the Remote Desktop Connection. How To Get an RDP Server For Yourself Cause of the Extreme Popularity of RDP/VPS at present, there are lots of RDP/VPS providers on the internet. Some are costly and some are very cheap. If you want to take a trial you can use Amazon AWS or Microsoft Azure for testing and experience the RDP server. AWS 1 year - aws.amazon.com/free Azure 100$ Credit - azure.microsoft.com/en-us/free/students/ What The Use OF RDP? I think after reading the above lines you should know why to use RDP/VPS, but if you don't know then let me explain to you the advantage of it. First read the above paragraphs about RDP, RDP servers, RDP Client carefully. I hope Now you understood what RDP and how it works, now you know that we can establish a connection to a Windows RDP server using RDP client software which is available for android, ios and macOS, so it's clear here that you can control a windows machine which has a good amount of ram, high processing power by just your smartphone, isn't it cool? it's super cool to control a high-end computer using your Low-end device. You can use it if you haven't a Computer, you can use it for anonymous reasons, and for privacy reasons of for doing some anonymous activity which you don't want to do on your PC and your local network. And One More Thing I use RDPs for High-Speed & Unlimited internet(up to 5gp/ps) and as a hosting.
  22. New Android Remote Tool (SpyMax Modded Version) Tested on Android : 5,6,7,8,9,10,11 Application Features : ------ Manage : .Files .Sms .contacts .Calls .Applications .Accounts ------ Monitor : .camera .live screen .microphone .keylogger .Location . real time calls monitor ------ tools : .Download apk and install .show message .open link .call number .phone info ----- Social media Hunter: - Facebook - gmail - more coming soon ------ super mode : -Anti-Kill -Anti-Delete -Realtime Monitor Active App -Auto Click Start Screen Record -Anti shutdown phone New Update Free Version : -Auto grant Request battery optimization [ super mod ] -update anti-remove to work on more phones [ super mod ] -hide bars when camera open -more stable payload for weak phones [hide][Hidden Content]] Scan Server [Hidden Content]
  23. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.2 Fixed minor duplicated code problem Dockerfile improvements Amsi bypass update [hide][Hidden Content]]
  24. The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use. The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc. Remote Hacker Probe Core is open source and constantly improved. and is no longer being updated or worked on. Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows. The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here. Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program. Server Features : Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes. Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up. The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE). Event Logging. High Speed File Upload / Download. Main Features : Probe Client : The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer. Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL) Download, Upload, Delete and browse the entire file System. Reverse Shell, Full Access to the command line. Scan Remote Network for hosts. Port scan hosts in the Target Network. Scan Remote Network for hosts vulerable to Eternal Blue Get Process Information by Process name. Geolocate Client using IP Address. Shutdown / Restart the Remote PC. Grab screenshot of the Remote PC. Record Microphone input. Add to Startup Persistence on command. Display Message box. Open URLS in the default browser. USB Infection. Active Window logging. UAC Status shown in main table. Client Path shown in main table. Keylogger. Password Recovery. Pidgin. FileZilla. Vault & IE. WinSCP. WiFi. Credential Manager. Task Manager. Remote Hacker Probe Pro V.2 This is the final release of Remote Hacker Probe. I am no longer going to update this. The professional (paid) version is now open source and is merged into this repository. [Hidden Content]
  25. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.