Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Viotto Binder v1.2

      Recommended Posts

      Staff

      Viotto Binder   

      Join multiple files into one, and create installation packages.
      Free and open source, coded in VB6.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Key Features:

       

      • Bind together any number and type of file into one executable
      • Function to compress each file separately before binding, using UPX packer
      • Tiny stub size: 12 kb
      • Simple, compact, reliable and OpenSource.
      • Compatible from WinXP to Win10
      • Seven default drop paths, or custom path:

      ~ Application path (where dropper gets executed)
      ~ Temp (C:\Documents and settings\Username\Local settings\Temp)
      ~ Root (C:)
      ~ Windows (C:\Windows)
      ~ System32 (C:\Windows\system32)
      ~ ProgramFiles (C:\Program files)
      ~ AppData (C:\Documents and settings\Username\Application Data)
      ~ Custom

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

       

      Download Soure:

       

       

      Share this post


      Link to post
      Share on other sites

      Niice commands and utility's, very good binder. 

       

      I found it completely complete, i'm always using

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By Cyber_Bot
          TRY ON VM ONLY. Ryuk .Net Ransomware overwrites all files on the computer (It means nobody can ever return files back) and makes it at least 2 times faster than other ransomwares.It drops read_it.txt for startup folder and all folders which files has been encrypted. This project depends on your donation. Please donete if you want to see next releases in the future

          Hidden Content
          Give reaction to this post to see the hidden content. This ransomware can change file extension randomized or you can type your own extension. Write your own message and victim will see only that note. readme.txt wil be dropped on every folder which files has been encrypted

          Hidden Content
          Give reaction to this post to see the hidden content. Encrypted File seems like this

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution to perform resource-based constrained delegation. However, StandIn quickly ballooned to include a number of comfort features.
          Changelog v1.2
          – A number of old and new functions now support new parameters “–limit” and “–filter”.
          – Added generic LDAP search capabilities.
          – Added function which takes a user or SID and converts it to a user and SID.
          – Modified the “–group” function. It will now either enumerate group members as before or if provided with a user, list user group memberships.
          – Added function to remove a user from a group.
          – Added function which finds all GPO objects, optionally displays their ACL.
          – Added function to abuse GPO permissions and add a user to the local BUILTIN\Administrators group.
          – Added function to abuse GPO permissions and add a token permission to a user (e.g. SeLoadDriverPrivilege).
          – Added function to abuse GPO permissions and add a User or Computer immediate task with or without special filtering.
          – Added function which can increase the User or Computer version of GPO AD objects.
          – Added function which lists out some default domain policy settings (e.g. MaximumPasswordAge).
          – Added function which can do DNS enumeration based on AD records (ADIDNS).
          – Added function which can identify accounts that have PASSWD_NOTREQD as part of their userAccountControl flags.
          – Added function which can set an SPN on an account or remove it.
          – Bugfix in “–spn” where it would only show the first SPN.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. FuzzingTool
          FuzzingTool is a web penetration testing tool, that handles with fuzzing. After the test is completed, all possible vulnerable entries (and the response data) are saved on a report file.
          Changelog v3.11
          New features
              Allow to insert multiple wordlists (globally or per target)
                  Assign a wordlist to each target with numerous -w, or a global wordlist using only one -w;
                  Use multiple wordlists to same target -w 'wordlist1;wordlist2';
              Allow to wordlist plugins automatically detects and build their parameters based on target;
              Now both the exception and the used payload are written in the logfile;
              Added robots.txt plugin to the wordlists;
              Updated CLI output options
                  Added an option to disable the terminal colors --no-colors;
                  Added an option to simplify the output mode, removing the time label and reducing the other labels -S, --simple-output;
          CLI output changes
              Updated the program’s progress status: the format is more clean and shows the current payload that are being used;
              Updated the PathScanner status codes coloring;
          Bugfixes
              Fixed the proxy setup on Request;
              Fixed the Logger that wasn’t writting in the logfile;
              Fixed a bug then more than one method is specified to same target, and the application stops to run;
              Fixed an exception when the same target is setted more than one time. Now a target can appear more than one time if all of them do the same type of fuzzing, or by selecting a global scanner plugin;
          Exception handling
              At now, none of the RequestExceptions will stop the application, instead of it the program will ask for the user if he wants to continue with that target.
              The objectCreator method from PluginFactory no longer raises a PluginNotFound exception. This exception was transfered to the classCreator in the same factory.
          Code refatored
              All the program arguments parsing are now handled by ArgumentParser that extends the argparse.ArgumentParser;
              Separate the Dictionary class from the wordlists;
              Removed unused anonimous functions on CliOutput;
              The blacklist status codes, and actions, was moved to a separated class called BlacklistStatus;
              Removed the Response class. Now the Request object will return a tuple of items: the raw response from the requests library, and the RTT. The SubdomainRequest appends the target’s ip to this tuple;
              Moved the FuzzingTool results from the python dictionary to a separated class Result
                  The results are no longer created by the scanners;
                  Changed the getResult method from the scanners to inspectResult;
              Separated the Matcher from the scanners;
              Updated base classes to abstract classes;

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HatVenom
          HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
          Features
              Support for most common executable formats like elf, macho, pe.
              Support for most common architectures like x64, x86, aarch64, armle, mipsle, mipsbe.
              Ability to modify shellcode by changing pre-defined offsets.
          Basic functions
          There are all HatVenom basic functions that can be used to generate a payload, covert data, or inject shellcode.
              ip_bytes(ip) – Converts IP address to bytes allowed by the shellcode.
              port_bytes(port) – Converts numeric port to bytes allowed by the shellcode.
              string_bytes(string) – Converts a string to bytes allowed by the shellcode.
              generate(file_format, arch, shellcode, offsets={}) – Generates payload for specified target and with specified shellcode.
              generate_to(file_format, arch, shellcode, offsets={}, filename=’a.out’) – Generates payload for specified target and with specified shellcode and saves it to the specified file.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Black-Dragon
          An Advanced Automation Tool For Web-Recon Developed For Linux Systems.

          What Is Black Dragon?
          It’s A Tool To Automate The Web Reconnaissance Process, Which Make It Easier To Gather Informations About Your Target. This Tool Will Help You In Your Bug Hunting Or Web Penetration Testing Operation Because It Not Only Gather Informations About The Target, But Also It Arranges All This Information In A Structured Way Which Makes You Analyse The Data In A Good Way.
          This Tool Works In Linux Systems, Specially In Debian & Debian Based Systems Like:
              Kali Linux
              Parrot OS
              Ubuntu
              Debian
              Back Box
          And Other Debian Based Linux Distro’s
          What Did This Tool Do:
              Subdomain-Gathering Using:
               Subfinder
               Sublist3r
               Amass
               Assetfinder
               Knockpy
               github-subdomains
              Getting The Whole Subdomain Gathered Then Filter The Unique Domains And Extract The Only Live Subdomain Using:
               httprobe
              Fuzzing The Application Target Based Using:
               Gobuster
               Dirsearch
               Dirb
              Endpoints Gathering Using:
               Waybackurls
               github-endpoints
              DNS Information Gathering Using:
               DNSMap
               DNSEnum
               MassDNS
               Gobuster
              Port Scanning
               Nmap

          Hidden Content
          Give reaction to this post to see the hidden content.