Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Viotto Binder v1.2

      Recommended Posts

      Staff

      Viotto Binder   

      Join multiple files into one, and create installation packages.
      Free and open source, coded in VB6.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Key Features:

       

      • Bind together any number and type of file into one executable
      • Function to compress each file separately before binding, using UPX packer
      • Tiny stub size: 12 kb
      • Simple, compact, reliable and OpenSource.
      • Compatible from WinXP to Win10
      • Seven default drop paths, or custom path:

      ~ Application path (where dropper gets executed)
      ~ Temp (C:\Documents and settings\Username\Local settings\Temp)
      ~ Root (C:)
      ~ Windows (C:\Windows)
      ~ System32 (C:\Windows\system32)
      ~ ProgramFiles (C:\Program files)
      ~ AppData (C:\Documents and settings\Username\Application Data)
      ~ Custom

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

       

      Download Soure:

       

       

      Share this post


      Link to post
      Share on other sites

      Niice commands and utility's, very good binder. 

       

      I found it completely complete, i'm always using

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This tool allows to statically analysis windows, Linux, osx, executables, and also APK files.
          You can get:
              What DLL files are used.
              Functions and API.
              Sections and segments.
              URLs, IP addresses, and emails.
              Android permissions.
              File extensions and their names.
              And so on…

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. --------------------[ Features ]--------------------
          Keylogger
          Clipper
          Screenshot
          Stealer Files (Photos , Docs , TXT)
          Download and Execute (Loader)
          Get information Device [PC Name , Operating System , Firewall , Memory (RAM) , Anti Virus , Processor  ]
          Get location and address
          Clear Cookies and Session from 20 Browsers like [ Google Chrome , Mozilla Firefox , Opera , Yandex etc...]
          Anti-Sandbox like [ wireshark , Process Hacker , TCPVIEW , virtualBox , sandboxie etc... ]
          ----------------[ WebPanel Features ]----------------
          # dynamic Pages
          # Responsive pages [You can use it from a phone]
          # Home page you can see all bots and counters like [Total Bots , Keylogger Reports , Screenshot ]
          and info like [HWID , Country IP , Stat ( online or offline), Last Seen ]
          # Settings Page
          from this page You can set a convenient time for you. You can also activate the file stealing a feature from the victim device
          # Tasks Page you can add task Download and Execute or delete tasks
          # User Page you can Change User information

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Server Scan

          Hidden Content
          Give reaction to this post to see the hidden content. https://kleenscan.com/scan_result/07e95b9b4412d9f87652ca9c43b5ecdfa5548dcb4d31162371af6372ac88091c
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A free silent (hidden) open-source native file binder.
          Main Features
              Native (C) - Builds the final executable as a native (C) 32-bit file, has basically no run requirements
              Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one
              Multiple files - Supports binding any amount of files
              Compatible - Supports all tested Windows version (Windows 7 to Windows 10) and all file types
              Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files
              Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file

          UnamBinder 1.2.1
              Changed Icon path and Assembly Data to now literalize escape characters
              Added check for Assembly Version to ensure that it contains only numbers

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Hyara is IDA Plugin that provides convenience when writing yard rules.
          You can designate the start and end addresses to automatically create rules.
          It was created based on GUI, and adding features and improvements are currently underway.
          Features
          Hyara start screen and 2 options
              When you run Hyara, it aligns to the right like the below picture and the output window is aligned to the left.
              Select/Exit button uses IDAViewWrapper api to get the clicked address in IDA View. After done, you have to press it again to finish.
              After specifying the address, press the “Make” button to show the specified hexadecimal or strings as a result.
              When you click “Save”, those results will be saved in the table below.
              Press “Export Yara Rule” to finally create the yararule using variables stored in the previous step.
              The comment option on the upper right side annotates the assemblies nicely.
              The wildcard option works but further development are still ongoing.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Go365
          Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use. When queried with an email address and password, the endpoint responds with an Azure AD Authentication and Authorization code. This code is then processed by Go365 and the result is printed to a screen or an output file.
          * User enumeration is performed in conjunction with a password guess attempt. Thus, there is no specific flag or functionality to perform only user enumeration. Instead, conduct your first password guessing attack, then parse the results for valid users.
          Read these three bullets!
              This tool might not work on all domains that utilize o365. Tests show that it works with most federated domains. Some domains will only report valid users even if a valid password is also provided. Your results may vary!
              The domains this tool was tested on showed that it did not actually lock out accounts after multiple password failures. Your results may vary!
              This tool is intended to be used by security professionals that are authorized to “attack” the target organization’s o365 instance.
          Changelog v1.4
              Updated Go365 to include the MS “graph” api through the URL login.microsoft.com/common/oauth2/token.
              Specify -endpoint graph to use this new endpoint.

          Hidden Content
          Give reaction to this post to see the hidden content.