Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Dr0p1t Framework 1.3 || FUD Dropper

      Recommended Posts

      On Windows:

      Hidden Content

        Give reaction to this post to see the hidden content.


      On Linux:

      Hidden Content

        Give reaction to this post to see the hidden content.


      In essence this is simply a multi-platform downloader with a lot of features.


      • Generated executable properties:
      • The executable size is smaller compared to other droppers generated the same way.
      • Download executable on target system and execute it silently..
      • Self destruct function so that the dropper will kill and delete itself after finishing it work
      • Escape disk forensics by making all the files dropper create and dropper also cleans its content before deletion
      • Clear event log after finishing.



      + Modules:

      • Find and kill antivirus before running the malware.
      • The ability to disable UAC.
      • The ability to run your malware as admin.
      • Full spoof by spoofing the file icon and extension to any thing you want.
      • ZIP files support so now you can compress your executable to zip file before uploading.
      • Running a custom ( batch|powershell|vbs ) file you have chosen before running the executable
      • In running powershell scripts it can bypass execution policy
      • Using UPX to compress the dropper after creating it


      +Persistence modules:


      • Adding executable after downloading it to startup.
      • Adding executable after downloading it to task scheduler ( UAC not matters ).
      • Adding your file to powershell user profile so your file will be downloaded and ran every time powershell.exe run if it doesn't exist.

      Download Link:




      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this