Search the Community

Showing results for tags 'stealer'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 47 results

  1. Builder: Panel: Advantages: Excellent build weight (600 kb, 350-400 kb under UPX) Completely untied from the seller panel (customers say that their logs are stolen, everything is open and access only you) High collection rate (3-10 seconds log) Collect from all accounts on your computer Sa:MP customer data collection (nick, favorite server database) Collecting data from Chromium browsers and browsers with non-standard data location (Passwords, Cookies, Autocomplete, Card Data) Chrome v80 support Collecting passwords from Edge Gathering Discord Sessions Collect all Telegram sessions Filezilla password collection (new/old) Collecting passwords and cookies from Mozila FireFox Collecting wallet files Collecting Pidgin passwords Pidgin's correspondence collection PSI/PSI Account Collection Collecting passwords to authorize NordVPN Collecting Steam files/information about established games and Steam profiles 2FA Authenticators Sessions (Authy) Recursive collection of files from your desktop Sending the log directly to the telegram, as well as saving on the server (for mass unloading) Your token is protected (your logs no one will salt) Not a bad answer, even on a clean OC Protection from re-log The most stable build in terms of the knock is used Cons: No self-removal of the build after launch There is no protection against virtuals update v1.2: Added definition of IP, country and city A new kind of log The ability to disable recursive collection of files from a slave. table (disconnected by default in the builder, if you turn on that longer collects log - sometimes the hosting does not accept large files, with the disconnected rake knocks for 2-3 seconds as an updated stylactic. The log itself is faked, now normally collects screenshots and all the information about the system Info: [Hidden Content] Download: [hide][Hidden Content]] Scan Server Link to scan result: [Hidden Content]
  2. This ia an simple and powerful stealer that steals victim credentials and send to your discord server... This File Steals: 1. Ip address 2. Screenshot 3. Discord token 4. Mac Address 5. System Information [hide][Hidden Content]]
  3. Def4lt

    oski stealer

    Oski Stealer is an extremely advanced stealer showcasing many desired features such as credit card and wallet stealing. Firstly, this stealer is completely web-based, accessible from any device and can be hosted offshore for anonymity. Secondly, the payload will self destruct after loading, making it hard to trace the malware. Given the strong stealing features alongside being silent makes this extremely severe. In other words, alongside an exploit this stealer can be spread completely undetected. Allowing you to grow logs of data on a new level for any of your needs. However, with this stealer being completely native, working on all systems, it is arguably the best. In conclusion we highly suggest using Oski Stealer alongside any of our exploits to expand any of your data logging needs! Features: – Advanced Stealer – Browser Cookies / Passwords: – Chromium Based: Chromium, Google Chrome, Kometa, Amigo, Torch, Orbitum, Opera, Comodo Dragon, Nichrome, Yandex Browser, Maxthon5, Sputnik, Epic Privacy Browser, Vivaldi, CocCoc and other browsers that use the working directory Chromium. – Firefox Based: Mozilla Firefox, Pale Moon, Waterfox, Cyberfox, BlackHawk, IceCat, K-Meleon and other browsers that use the working directory Firefox. Filezilla Stealer – Crypto-Wallet Stealer – Bitcoin Core, Ethereum, ElectrumLTC, Monero, Electrum, Exodus, Dash, Litecoin, ElectronCash, ZCash, MultiDoge, AnonCoin, BBQCoin, DevCoin, DigitalCoin, FlorinCoin, Franko, FreiCoin, GoldCoin, InfiniteCoin, IOCoin, IxCoin, MegaCoin, MinCoin, NameCoin, PrimeCoin, TerraCoin, YACoinFiles from machine data about machine. Installed Softwares Native Stub requiring no dependencies other than Windows installation Multi-profile (up to 10) Low stub size of 93kb Supports Windows 7/8 / 8.1 / 10 | x32 / x64 Does not require administrative privilege User-friendly Admin Panel ICQ:653580170 Whatsapp +79017473945 jabber: [email protected] [hide][Hidden Content]]
  4. Crypto-yank is a clipboard stealer that monitors for crypto addresses and replaces them with your own. Features: Written in Python 3 Support For: Bitcoin (Legacy & Segwit),Etherum,Dash,Doge,Ripple and Monero. Easy setup script. Specific crypto replacement. Comprised of regex to find and match addresses. Logging to log.txt About: crypto-yank is a clipboard stealer that replaces crypto-currency addresses found in the clipboard with your malicious address. When no address is found crypto-yank remains dormant until it finds a match. [hide][Hidden Content]]
  5. itsMe

    Crypto Stealer

    The most advanced Crypto Stealer Edit addresses, add webhook, mutex and build. [hide][Hidden Content]]
  6. itsMe

    Telegram Stealer

    You can use this .zip, to create .exe file, and use it to steal a Telegram session. [hide][Hidden Content]]
  7. Stealer + Clipper + Keylogger Stealer written on C#, logs will be sent to Telegram bot. Disclaimer I, the creator, am not responsible for any actions, and or damages, caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use. By using this software, you automatically agree to the above. Functions AntiAnalysis (VirtualBox, SandBox, Emulator, Debugger, VirusTotal, Any.Run) Steal system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Install keylogger & clipper Steam, Uplay, Minecraft session Desktop & Webcam screenshot ProtonVPN, OpenVPN, NordVPN Cryptocurrency Wallets Telegram sessions Pidgin accounts Discord tokens Filezilla hosts Process list Directories structure Product key Autorun module [hide][Hidden Content]] Scan
  8. itsMe

    Nexus Stealer + Panel

    The detailed description of the functionality below: Collect data from all Chromium browsers (Passwords, Credit Cards, Cookies, Autocomplete Forms, View History, Download History, Search History) Including data from Yandex Browser and browsers with non-standard data layout. Collecting all .dat files (recursion) of cryptocurrency wallets, as well as collecting cold wallets: Anoncoin, Bitcoin, Bitpay, Coinomi, DashCore, devcoin, Eidoo, Electrum, Electrum-NMC, Exodus, Feathercoin, Fetch, FLO, Franko, Freicoin, GoldCoin (GLD), Guarda, I0coin, iXcoin, Jaxx, Litecoin, Luckycoin, MegaCoin, Mincoin, Monero, Myptcryo, NovaCoin, Peercoin, Primecoin, 2FA Sessions - Authenticator (Authy) Collect all Telegram sessions Collect all session Discord Collect all Steam sessions Jabber Customer Correspondence Collection Collect all Filezilla profiles Collect all WinSCP profiles Collect all TotalCommander profiles Collect WindowsSecureVault credentials IE, Edge credential collection Collect all Pidgin accounts Collect all PSI accounts, PSI Collecting VPN client sessions Collecting Sessions and OpenVPN Authorization Data Collect details about Steam Collecting WiFi profile data Collect profiles from Credmanager Collecting system information, screenshots and geolocation data (useful for point processing of the client) Collecting a list of processes Grabber files Telegram alert Multi-user support Logger action in the panel Monitoring selected domains Ability to filter CIS-Logies (CIS), rep protection There is a Loader module with flexible parameters, the ability to specify multiple files at once and many filters A separate and convenient search page, with the ability to sort by a large number of criteria, including cookies and passwords, allowing you to automate the search for the necessary data. The ability to change the theme of design in one click, View log data without downloading (passwords, PC information) Automated panel installation Intuitive and at the same time beautiful admin panel. The ability to sort logs by custom templates (Presets), the ability to create/edit/delete patterns. The ability to download or delete all logs directly in the panel (in one click)! Clever filtering of fresh lairs Geostatistical information on the home page Regular updates tailored to the wishes of customers. We always try to implement what our users want. [hide][Hidden Content]] Server Scan [Hidden Content]
  9. Steals telegram session(without any notifications) and google chrome credentials. Sending via telegram bot. Definitely works in 2020 with Chrome Version 84.0.4147.105 (Official Build)(the newest on the uploading date: 08.08.2020) and Telegram version [hide][Hidden Content]]
  10. itsMe

    WifiPassword Stealer

    Get All Registered Wifi Passwords from Target Computer. [hide][Hidden Content]]
  11. itsMe

    Telegram Session Stealer

    Telegram Session Stealer [hide][Hidden Content]]
  12. itsMe

    Echelon Stealer v6.2.5

    Stealer with sending logs to Telegram bot Echelon Stealer v6.2.5 \ Clipper \ Chrome(v80) - source Update! v6.2.5 -Fixed the first password styling algorithm from browsers on the Chromium engine, when instead of passwords were empty spaces. Now everything is working properly. -Release profile is now the default and works properly. Debug - doesn't work. A little weight optimization. Don't forget that once you've assembled, the file will be in the OUTPUT folder at the root of the project!
  13. [hide][Hidden Content]]
  14. itsMe


    A program you send to your victim and you get all their passwords, credit cards, history & bookmarks. The information will be sent to you in a Discord Webhook. The .txt file attached contains all their browser information When the victim opens the file it will search all these browsers and give you all of the the information in the discord webhook Works on the following browsers: Google Chrome Microsoft Edge Chromium (The Edge Chromium one, not the original shitty one) Chromium Opera Brave Browser Epic Privacy Browser Amigo Vivaldi Orbitum Atom ( Kometa Comodo Dragon Torch Slimjet 360Browser Maxthon3 K-Melon Sputnik Nichrome CocCoc uCozMedia Chromodo Yandex (Old) [HIDE][Hidden Content]]
  15. New Update Bug fixes - Stealer with sending logs to Telegram bot Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets Stealer Functionality All based browsers Chromium, Edge, Gecko (Mozilla Firefox) Clipboard data Discord Session Telegram Session Outlook Grabber files with saving path directories and scanning subdirectories FileZilla Total Commander Pidgin Psi, Psi+ Screenshot PCinfo NordVPN OpenVPN ProtonVPN Crypto Wallets Armory Atomic Wallet Bitcoin Core Bytecoin Dash Core Electrum Ethereum Exodus Jaxx Litecoin Core Monero Zcash Additionally All ways to collect logs are random Self-removal after sending the log Log Resubmission Protection Written exclusively for educational purposes! I am not responsible for the use of this project and any of its parts code. Download: [HIDE][Hidden Content]] Server Scan [Hidden Content]
  16. Steal Tdata from PC (FTP) You need add info in string code. Host, user, pass. The author is not responsible for your actions with the code. I'm just a coder who does programming for the sake of learning. All information is provided for informational purposes only. [HIDE][Hidden Content]]
  17. itsMe

    Orphic META - Chrome Stealer

    A simple Chrome Stealer / Chrome Recovery for Windows 7+. Native. Written in C++. Orphic META - Free Google Chrome Stealer / Password Recovery - GMAIL ONLY Features - View your own Chrome Passwords. - Generate Stub to get someone else's. - Receive Via Gmail. - Message Box. [HIDE][Hidden Content]] Server Scan [Hidden Content]
  18. itsMe

    sANINA - Mini stealer

    Mini stealer who can steal: Skype Telegram Desktop file Screenshot Ip Addres You must create telegram bot! Please use @BotFather! [HIDE][Hidden Content]]
  19. 1) Descargue el contenido en la carpeta Panel en ftp 2) Descomprima el contenido de la carpeta Builder en cualquier ubicación conveniente 3) Abra el archivo builder.exe y proporcione un enlace directo a gate.php Sales: [Hidden Content] * I dont tested it, is clean but I dont know if works or not! [HIDE][Hidden Content]] Builder Logs Scan [Hidden Content]
  20. Password stealer for Google Chrome and Mozilla Firefox written in C++. You can compile and run it on Windows and Linux. It sends stolen links, logins and passwords to Telegram channel with bot you set in stealer.cpp file. [HIDE][Hidden Content]]
  21. dEEpEst

    Simple Telegraph Stealer, C ++

    Introduction Hay, today we’ll talk about what a stiller is and even write a demo, the panel will be written in the second part (if we get a lot of likes xD). What is a styler? A stiller is a certain class of trojans (malware, viruses - whatever you want), the functionality of which consists entirely of theft of passwords stored in the system, other information and sending them to the creator. Stiller, taking advantage of the Chukchi naivetyprogrammers, explores the repositories of frequently used programs and brazenly fishes from there all logins, passwords, etc. The next, he is the last stage of the work of the programs of this class - sending snacks to the attacker. Here somehow it all up and running. We will write in C ++ ( HARDCOR ), but using third-party libraries (for example, libcurl), in order to simplify the task, you can rewrite this malware using WinApi exclusively to get rid of unnecessary dependencies. We will have implemented only the most basic functions: Stilling passwords from "all" browsers on Chromium Obtaining information about the system screenshots What is the “trick” of our stiller Usually, the stiller sends the received information to the mail, but this is not very practical / convenient, our stiller will send all the data to the server, but it will not be issued to your mother . We will use Telegraph, a service for posting articles (mainly used in Telegram). This way we increase our anonymity a bit. The panel will access the service through Tor, Proxy, etc. In Telegraph'a has its own API, which significantly simplifies our task. Includes header file Here we connect all the libraries we need, namespaces. Also, the following classes are described here: Config Converters In the first class are given the needed values such as: Working directory Directory for «.bat» file (for removal) The name of the working directory Password for the final archive Page Telegraph, which will contain all the needed links (I will explain later) Access Token to edit pages on the Telegraph website The second class describes methods that give us space for maneuvering with encodings (ASCII, Unicode) [Hidden Content] Header file for working with WEB Here we describe a class Web, it has the following methods / variables: EditPage, to edit the page Telegraph GetPage, for page content Telegraph UploadFile, to upload files to the site ( " AnonFile ") GetHTML, for page source Api, site API Telegraph'a (it is not blocked in Russia, so it should be no problem) [Hidden Content]
  22. itsMe

    BTC Stealer [Source]

    [HIDE][Hidden Content]]
  23. [Hidden Content]
  24. dEEpEst

    dEEpEst Stealer Bitcoins

    Version 1.0.0


    -------------- INTALL -------------- Open "svchost.exe" with a hexadecimal editor, locate the default BTC address and replace it with yours. Then run "svchost.exe" on the PC you want it to work. With each start of windows the thief will start, to clean the PC and everything is as at the beginning, you must run "Killer DSB.exe" and restart the PC. After this there will be no trace. ___#___By dEEpEst___#___


  25. Download: [HIDE][Hidden Content]] Password: