Search the Community

Showing results for tags 'with'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 139 results

  1. A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’. Appends a text file containing the server’s IPv4 address to ‘run.jar’. If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment. To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.14 Added an option to encrypt data sent to and from the backdoor. [hide][Hidden Content]]
  2. Description Darkshot is a scraper tool on steroids, to analyze all of the +2 Billions pictures publicly available on Lightshot. It uses OCR to analyze pictures and auto-categorize them thanks to keywords and detection functions. You can find pretty much everything : credentials, personal informations (emails, phone numbers, addresses, ID cards, passeports), banking information, etc. Since it's modulable, you can make your own detection function and use it as a monitoring tool. Features Multi-threading Anti-conflicting threads protection Auto-saving and resuming session 3 links generators : Ascending, Descending and Random Auto-translating keywords Auto-analyzing pictures with multiple OCR langs Auto-downloading OCR langs training data Auto-categorizing pictures with keywords, groups and detection functions Auto-exporting pictures per groups with their statistics in HTML Modulable : add your own detection functions and keywords [hide][Hidden Content]]
  3. Description GHunt is an OSINT tool to extract information from any Google Account using an email. It can currently extract: Owner's name Last time the profile was edited Google ID If the account is a Hangouts Bot Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.) Possible YouTube channel Possible other usernames Public photos (P) Phones models (P) Phones firmwares (P) Installed softwares (P) Google Maps reviews (M) Possible physical location (M) Latest news 02/10/2020 : Since few days ago, Google return a 404 when we try to access someone's Google Photos public albums, we can only access it if we have a link of one of his albums. Either this is a bug and this will be fixed, either it's a protection that we need to find how to bypass. 03/10/2020 : Successfully bypassed. (commit 01dc016) It requires the "Profile photos" album to be public (it is by default) [hide][Hidden Content]]
  4. Reverse PowerShell Functions that can be used to gain Reverse Shells with PowerShell. Invoke-ReversePowerShell function can be used to connect to Start-Listener as well as netcat and Metasploit modules or whatever other listeners you use. This is a PowerShell module meaning it only contains functions/cmdlets to be imported into a PowerShell session. If you wish to execute one of the commands whenever the file is run just add the command you wish to execute to the bottom of the file. BLUE TEAM DISCOVERY Find-ReverseShell.ps1 can be used to search the Windows Event Log for when a Reverse Shell is created that uses a System.Net.Sockets.TcpListener object. This will discover any reverse shell that creates a TcpListener object and not just the below module. This method does not catch PowerCat.ps1 which I am still looking for a good way to discover. This part is still a work in progress. [hide][Hidden Content]]
  5. BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. About BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. this botnet controller comes with a lot of features and the most secure panel for free Developed By: Black.Hacker What You Can Do Upload File Open Webpage [Visiable, Hidden] Show MessageBox Take Screenshot Steal Firefox Cookies Steal Saved Passwords [ Chrome, Firefox ] Steal Chrome Cookies Steal Chrome History Execute Scripts Execute Shell Commands Keylogger Computer operations [ Restart, Shutdown, Logout ] Uninstall Client Move Client Blacklist Client Close Client Requirements PHP >= 7.0 NET Framework How to Install PHP Panel Clone the Repo Compress BlackNET panel folder and upload it to your hosting Create a database with any name you want Change the database information and app path in config/config.sample.php Rename config.sample.php to config.php Change files and folders permission to 777 [ Uploads Folder] Make Sure that all DLLs are included in Plugins Folder Go to install.php to create the botnet tables automatically Enable a Cron Job for ping.php and remove.php What's New v3.5.2 1. Added Queue System to handle commands 2. Added NordVPN Stealer 3. Added Clipboard Stealer 4. Cleaner, Faster, Better Connection 5. Fixed Socket Issues 6. Update BlackUpload to 1.5 7. Update PHP Mailer 8. Removes some useless functions 9. Bugs Fixes [hide][Hidden Content]]
  6. ShinobuClipper Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMZ, WMH, WMU, WMX, Yandex money, Qiwi addresses in clipboard. Info 9 kilobytes compiled executable No admininistrator rights required Hide file after start Open source Autorun [hide][Hidden Content]]
  7. watermark_disabler Disabling "Activate Windows" watermark made simple, the code in this repository is a PoC, and has not been tested above Windows 10 1803. How does this work? The function responsible for drawing whole desktop including the watermark is xxxDesktopPaintCallback located in win32kfull.sys. Both of the approaches used by this project were found while analyzing functions further down in the callstack. [hide][Hidden Content]]
  8. Pipe different tools with google dork Scanner [hide][Hidden Content]]
  9. This Live-Chat-Bot recognizes duplicate questions and can provide answers, which are generated automatically. You never have to answer a question twice! This is a Live-Chat with the ability to learn, so if you want to, it will remember your answers! [Hidden Content] [hide][Hidden Content]]
  10. English | 2020 | ASIN: B08FJD63MX | 113 Pages | PDF/AZW3/Kindle | 26.3 MB Are you looking for a proven and secure career path for your kid? Maybe he or she is already interested in computer programming or just loves to use a computer for some free time activities? What about a book that would make you and your kid engage, have fun, and learn at the same time? If you answered “Yes” to at least one of these questions, then keep reading… LEARNING PROGRAMMING HAS NEVER BEEN EASIER! PROBABLY THE FASTEST WAY TO MASTER ONE OF THE MOST WIDELY USED CODING LANGUAGES IN THE WORLD… It is not a secret that the world is leading more and more towards science and technology, and the demand for IT and computer programming professionals are higher than ever before! What is the best way to start? I believe that mastering a powerful programming language is one of the best skills you could learn! Which one should you choose? My choice is definitely PYTHON - one of the most popular and widely used programming languages around the world! And it is not as difficult as it may sound… if you are already in computer programming or know a thing or two about Python, you know what I am talking about… If presented correctly, even Your Kids Can Easily Learn It! As young as 7 or 8 years old, sometimes even younger! Inside this book, you’ll find a perfect introduction to Python Programming that will make your kid excited every time he or she sits down in from of the computer. Not to play games – but to learn! [hide][Hidden Content]]
  11. English | 2020 | ISBN: B08FDXVR2P | 107 Pages | PDF/AZW3 | 7.14 MB Do you want to learn a popular programming language in no time? Do you want to improve your skills in coding? Or do you want to learn coding to earn? If your answer to this question is yes, then keep reading! Java is a widely-used programming language on the Web and in computing applications. It is a free download solution that allows users to access the latest versions and implement updates. This particular programming language is present in the majority of today’s web applications and computing technologies. Java’s scalable characteristics make it suitable for deployment in a wide range of applications, including apps for small electronic devices like cell phones and software solutions for large scale operations such as data centers. The growing preference for deploying Java is attributable to its robust functional features and sound security credentials. [hide][Hidden Content]]
  12. Coding With Python: The Essential Course To Master In A Smart Way Software Concepts, Tools English | 2020 | ASIN: B08DVC7SZX | 83 Pages | PDF/AZW3/KINDLE | 8.11 MB Do you want to learn the basics concepts of Phyton coding? Do you want to know more about Phyton and make things work in no time? Then this book is for you! The first thing we need to look at here is the keywords. These seem pretty straightforward, but it is so important to understand that they tell the compiler how it needs to act and behave with the projects that you are doing. These keywords are ones that are reserved to tell the compiler what it needs to do. Since they are reserved, the computer programmer needs to remember to use them properly so that the compiler can take that command and get things done. You need only to use them in the specified parts of the code, or it leads to error messages and other problems. If you properly use them, the compiler will be given command of what you want it to do, and it can then execute the code in the right way. These words are essential to the whole code and learning what they are is going to make code writing more comfortable as well. You will be able to notice a lot of these keywords as we progress through this guidebook and write some of our codes. [hide][Hidden Content]]
  13. Learning C# by Developing Games with Unity: C# Programming for Unity Game Development - 2020 English | 2020 | ASIN: B08FF4LLVK | 166 Pages | PDF, EPUB, AZW3 | 5.68 MB Learning C# by Developing Games with Unity C# Programming for Unity Game Development About this book Never before has the video game market been at a better time. There are currently many platforms available and the emergence of mobile devices has revolutionized the sector. The existence of multiple platforms implies great challenges for developers in decision making, both in the choice of platforms and in the sizing of work teams , One solution to these problems is to use a game engine, and without a doubt the most popular and used engine of the moment is Unity, Unity is the most popular engine for reasons such as its powerful tools, its ability to generate games on more than 20 different platforms, its excellent learning curve and the hundreds of add-ons available to it developed by third parties. What you'll learn: In this book you will learn in a practical way with numerous examples that will guide you step by step: Getting to know the Unity interface Learn C# programming syntax from scratch What the fundamental elements of the Unity engine are Understand programming fundamentals with practice examples in C# Explore the interface and features of Unity Create a game design document and prototype level Explore intermediate programming topics and best practices Implement game mechanics, interactions, and UI elements with C# Develop your first games [hide][Hidden Content]]
  14. [Hidden Content]
  15. [Hidden Content]
  16. Key Features Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts A step-by-step guide that will take you from low-level security skills to covering loops with shellcode Book Description Security is always a major concern for your application, your system, or your environment. This book’s main goal is to build up your skills for low-level security exploits, enabling you to find vulnerabilities and cover loopholes with shellcode, assembly, and Metasploit. This book covers topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers how to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios. By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and at the network level. What you will learn Create an isolated lab to test and inject Shellcodes (Windows and Linux) Understand both Windows and Linux behavior in overflow attacks Learn the assembly programming language Create Shellcode using assembly and Metasploit Detect buffer overflows Debug and reverse-engineer using tools such as gdb, edb, and immunity (Windows and Linux) Exploit development and Shellcode injections (Windows and Linux) Prevent and protect against buffer overflows and heap corruption Who this book is for This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field. Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful. Table of Contents Introduction Lab Setup Assembly Language in Linux Reverse Engineering Creating Shellcode Buffer Overflow Attacks Exploit Development – Part 1 Exploit Development – Part 2 Real World scenarios part 1 Real World scenarios part 2 Real World scenarios part 3 Detection and Prevention [Hidden Content] [hide][Hidden Content]]
  17. Create WordPress Websites and Blogs: Especially for Beginners, Freelancers, and Graphic Designers Who Don’t Want to Code What you’ll learn You will learn how to “spin up” new WordPress sites in under one minute You will learn exactly how I build websites for my clients. You will learn how to create websites, portfolios, and blogs with WordPress You will learn how to download, install and configure WordPress plugins You will learn to use Photoshop and more to create beautiful website graphics You will create a responsive website that looks good on any browser Requirements You should have a basic understanding of computers and software A modern browser like Chrome, Safari, or Firefox Internet access You do not need any coding experience or programming knowledge You can follow along with free themes, but I also show you how to use several premium themes – the typical cost is $60 per theme, if you choose to go that route We will work locally (no cost), but if you want to launch your site you will need to purchase a domain name and hosting Description A Beginner’s Guide to WordPress! The main goal of this course is to teach anyone, even a complete beginner, how to setup a complete WordPress website quickly and easily. While other courses teach you all of the in-depth, complicated things about building websites in WordPress, this course focuses on only those things needed to get your website up and running as efficiently as possible. You do not need to wade through hours and hours of lectures to create a stunning website. WordPress is wonderful because once you have your site up, you can refine it over time as you are able. If you’re like most designers or freelancers or entrepreneurs, chances are good you don’t want to spend weeks perfecting your website – you want something up ASAP! To help you reach that goal as quickly as possible, I move quickly through the content to help get you up and running fast – so come ready to rapidly dive into the meat of this course! [Hidden Content] [Hidden Content]
  18. Build smart looking Kotlin apps with UI and functionality for the Android platform Key Features Start your Android programming career, or just have fun publishing apps on Google Play marketplace The first-principle introduction to Kotlin through Android, to start building easy-to-use apps Learn by example and build four real-world apps and dozens of mini-apps Book Description Android is the most popular mobile operating system in the world and Kotlin has been declared by Google as a first-class programming language to build Android apps. With the imminent arrival of the most anticipated Android update, Android 10 (Q), this book gets you started building apps compatible with the latest version of Android. It adopts a project-style approach, where we focus on teaching the fundamentals of Android app development and the essentials of Kotlin by building three real-world apps and more than a dozen mini-apps. The book begins by giving you a strong grasp of how Kotlin and Android work together before gradually moving onto exploring the various Android APIs for building stunning apps for Android with ease. You will learn to make your apps more presentable using different layouts. You will dive deep into Kotlin programming concepts such as variables, functions, data structures, Object-Oriented code, and how to connect your Kotlin code to the UI. You will learn to add multilingual text so that your app is accessible to millions of more potential users. You will learn how animation, graphics, and sound effects work and are implemented in your Android app. By the end of the book, you will have sound knowledge about significant Kotlin programming concepts and start building your own fully featured Android apps. What you will learn Learn how Kotlin and Android work together Build a graphical drawing app using Object-Oriented Programming (OOP) principles Build beautiful, practical layouts using ScrollView, RecyclerView, NavigationView, ViewPager and CardView Write Kotlin code to manage an apps' data using different strategies including JSON and the built-in Android SQLite database Add user interaction, data captures, sound, and animation to your apps Implement dialog boxes to capture input from the user Build a simple database app that sorts and stores the user's data Who this book is for This book is for people who are new to Kotlin, Android and want to develop Android apps.It also acts as a refresher for those who have some experience in programming with Android and Kotlin. Table of Contents Getting Started with Android and Kotlin Kotlin, XML, and the UI Designer Exploring Android Studio and the Project Structure Getting Started with Layouts and Material Design Beautiful Layouts with CardView and ScrollView The Android Lifecycle Kotlin Variables, Operators, and Expressions Kotlin Decisions and Loops Kotlin Functions Object-Oriented Programming Inheritance in Kotlin Connecting Our Kotlin to the UI and Nullability Bringing Android Widgets to Life Android Dialog Windows Handling Data and Generating Random Numbers Adapters and Recyclers Data Persistence and Sharing Localization Animations and Interpolations Drawing Graphics Threads and Starting the Live Drawing App Particle Systems and Handling Screen Touches Android Sound Effects and the Spinner Widget Design Patterns, Multiple Layouts, and Fragments Advanced UI with Paging and Swiping Advanced UI with Navigation Drawer and Fragment Android Databases A Quick Chat Before You Go [Hidden Content] [hide][Hidden Content]]
  19. Building Machine Learning Systems with Python: Explore machine learning and deep learning techniques English | 2018 | ISBN: 1788623223 | 394 pages | PDF | 16.79 MB Building Machine Learning Systems with Python: Explore machine learning and deep learning techniques for building intelligent systems using scikit-learn and TensorFlow, 3rd Edition Get more from your data by creating practical machine learning systems with Python Key Features Develop your own Python-based machine learning system Discover how Python offers multiple algorithms for modern machine learning systems Explore key Python machine learning libraries to implement in your projects Book Description Machine learning allows systems to learn things without being explicitly programmed to do so. Python is one of the most popular languages used to develop machine learning applications, which take advantage of its extensive library support. This third edition of Building Machine Learning Systems with Python addresses recent developments in the field by covering the most-used datasets and libraries to help you build practical machine learning systems. Using machine learning to gain deeper insights from data is a key skill required by modern application developers and analysts alike. Python, being a dynamic language, allows for fast exploration and experimentation. This book shows you exactly how to find patterns in your raw data. You will start by brushing up on your Python machine learning knowledge and being introduced to libraries. You'll quickly get to grips with serious, real-world projects on datasets, using modeling and creating recommendation systems. With Building Machine Learning Systems with Python, you'll gain the tools and understanding required to build your own systems, all tailored to solve real-world data analysis problems. By the end of this book, you will be able to build machine learning systems using techniques and methodologies such as classification, sentiment analysis, computer vision, reinforcement learning, and neural networks. What you will learn Build a classification system that can be applied to text, images, and sound Employ Amazon Web Services (AWS) to run analysis on the cloud Solve problems related to regression using scikit-learn and TensorFlow Recommend products to users based on their past purchases Understand different ways to apply deep neural networks on structured data Address recent developments in the field of computer vision and reinforcement learning Who this book is for Building Machine Learning Systems with Python is for data scientists, machine learning developers, and Python developers who want to learn how to build increasingly complex machine learning systems. You will use Python's machine learning capabilities to develop effective solutions. Prior knowledge of Python programming is expected. Table of Contents Getting Started with Python Machine Learning Classifying with Real-world Examples Regression Classification I – Detecting Poor Answers Dimensionality Reduction Clustering – Finding Related Posts Recommendations Artificial neural Networks & Deep Learning Classification II – Sentiment Analysis Topic Modeling Classification III – Music Genre Classification Computer Vision Reinforcement Learning Bigger Data [hide][Hidden Content]]
  20. Debugging iOS Applications with IDA Pro Tutorial We have updated our iOS Debugging Tutorial. It has some new sections that should be of particular interest: “Debugging the DYLD Shared Cache” discusses how to combine IDA’s incremental dyldcache loading functionality with the iOS Debugger. “Debugging System Applications” is a concrete example of how to use IDA to debug an iOS system daemon on a jailbroken device. We hope you will find these new examples engaging and useful! [hide][Hidden Content]]
  21. English | 2020 | ISBN: 9781492057093 | 107 pages | EPUB | 13.5 MB Learn how to build a serverless real-world application in the cloud that’s reliable, secure, maintainable, and can handle millions of users. If you have experience building traditional web applications, this practical guide shows you how to get started with serverless. Cloud engineer Wietse Venema takes you through the steps necessary to build serverless applications with Cloud Run, a container-based serverless platform on Google Cloud. Through the course of the book, you’ll learn how to become productive with serverless technology. You will build and explore several example applications that highlight different parts of the serverless stack, using (light) frontend technology and Go on the back end. You can also follow the lessons in the book using your own project on Google Cloud Platform. You’ll learn how to: Build a serverless application with Google’s Cloud Run and Firestore Approach testing and development Handle user management and authentication Combine serverless with a traditional relational database Run and monitor production services Integrate your application with external APIs [Hidden Content] [hide][Hidden Content]]
  22. itsMe

    EBooks Of Hacking With Python

    Contains: Black Hat Python – Python Programming For Hackers And Pentesters Gray Hat Python – Python Programming For Hackers And Reverse Hacking – Hacking Practical Guide For Beginners (Hacking With Python) Hacking With Python – The Ultimate Beginners Guide [hide][Hidden Content]]
  23. Do you want to learn Python Programming well and fast? Are you looking for the best Python for Data Analysis and Analytics course? Do you want to learn Data Science and how to leverage Python for it? Do want to learn Python Machine Learning and start implementing models? If yes, then this Python for Beginners Crash Course is for you. This is the most complete Python guide with 4 Manuscripts in 1 book: 1-Python Programming 2-Python for Data Analysis & Analytics 3-Python for Data Science 4-Python Machine Learning A great opportunity: Simplicity, Best Order and Selection of topics to Learn Fast and Selected Practice Exercises and Examples. In Manuscript 1 “Python Programming” you'll learn: - What is Python - How to install Python and what is the best distribution - What are data types and variables - How to work with numbers in Python - What operators there are in Python and when to use them - How to manipulate Strings - How to implement Program Flow Controls - How to implement loops in Python - What are Python lists, Tuples, Sets and Fictionaries and how to use them - How to create modules and functions - How to program according to the Object Oriented paradigm - How to create classes - What are and how to use Inheritance, Polymorphism, Abstraction and Encapsulation And much more... In Manuscript 2 “Python for Data Analysis & Analytics” you'll learn: - What Data Analysis is and why it is important - What are the different types of Data Analysis - What are the 6 key steps of the Data Analysis process that you should follow - What are the applications of Data Analysis and Analytics - How to set up the Python environment for Data Analysis - What are and how to use Python Data Structures - How to work with IPython/Jupyter Notebook - How to work with NumPy - How to visualize data with Matplotlib - What other visualization libraries are out there - Why is Big Data important and how to get the best out of it - How to leverage Neural Networks for Data Analysis And much more… In Manuscript 3 “Python for Data Science” you'll learn: - What is Data Science and what does it encompass - What are the 5 key steps of the Data Science process that you should follow - How to set up the Python environment for Data Science - How to work with Seaborn data visualization module - How run scientific analysis with SciPy - How to do Data Mining - What are the most important Machine Learning Algorithms - How to leverage the Scikit-Learn module for Machine Learning - How to leverage Data Science in the Cloud - What are the most important application of Data Science And much more… In Manuscript 4 “Python Machine Learning” you’ll learn - What is Machine Learning and what does it encompass - What are the 7 Steps of the Machine Learning Process - What are the different Machine Learning types - How is Machine Learning applied to the real world - What are the main Data Mining techniques - How to do Data Mining - How to best set up the Python environment for Machine Learning - What are the most important Python libraries for Machine Learning - How to leverage Tensorflow for Deep Learning - How to work with Keras for Deep Learning - How to leverage PyTorch for Recurrent Neural Networks And much more… [Hidden Content] [hide][Hidden Content]]
  24. BetterBackdoor A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’. Appends a text file containing the server’s IPv4 address to ‘run.jar’. If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment. To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.13.1 Updated documentation Changed package name Fixed a bug with removing files [hide][Hidden Content]]
  25. Make your own Private Cloud with VueFileManager client powered by Laravel and Vue. [Hidden Content] [hide][Hidden Content]]