Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      dEEpEst

      Atmos Botnet v1.01

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Edited by dEEpEst
      Password repair

      Share this post


      Link to post
      Share on other sites

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Bad password

      Share this post


      Link to post
      Share on other sites
      Staff
      On 9/6/2018 at 23:25, DooMik dijo:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Bad password

      @DooMik password repair, the password is level23hacktools.com

      Share this post


      Link to post
      Share on other sites

      in my experience, it didn't grab logs from chrome, opera, firefox isn't it? only from explorer. how does it work on your side? Please, would share experience on it

      Share this post


      Link to post
      Share on other sites

      Atmos was the shit in its time. Now atmos works with outdated systems due to patches made in Windows and web browsers.. not making any compliant. I know for sure it is a 1000 miles ahead of the Citadel bot.

      Share this post


      Link to post
      Share on other sites
      On 7/19/2018 at 11:41 AM, 1mh4ck3d said:

      Atmos was the shit in its time. Now atmos works with outdated systems due to patches made in Windows and web browsers.. not making any compliant. I know for sure it is a 1000 miles ahead of the Citadel bot.

      What bots do you currently run?

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Learn C# for Ethical Hacking
              Enhance Coding skills in Pentesting Tools
              Make Undetectable Botnet
              Make a UI based Asynchronous Socket Server So everyone can use easily
              Send and Receive Files over the Tcp Network
              Learn how to make Custom Events in C#.
              Learn How to Command Multiple Machines Simultaneously
              Learn C# Networking Programming
              Learn how Multithreading application works
              Aysnc and Await Keywords
              Learn how to Develop Asynchronous Client/Server Application
          Requirements
              Basic Knowledge of C#
              A Working PC
              Visual Studio
          Description
          Welcome to this outstanding course.If you are a pentester or developer and want to enhance your skills in making Pentesting tools so this course is for you. In this course, we can make an Asynchronous TCP client/Server applications .you can use async/await keywords in socket programming scenarios, (multi) threading is used to create a responsive server or client. You will learn how hackers make their own tools and retrieve information and execute any file or any Keylogger etc. In this course, you will learn how to TCP  socket server send files and client socket receive these files.
          You will also learn the concept of remote access. You will work with Winforms, make custom events, and make this application user friendly so you can use it easily.
          This course is only based on Practical just some theory of TCP sockets but it's optional if you have already known about sockets. At the end of this course, you have Botnet Client/Server Application and you also become a Junior Pentester Tool Developer.
          Who this course is for:
              For those who wants to develop their own Hack Tool
              For .Net Developers who wants to create Pentesting Tools
              For those who wants to learn ethical hacking / penetration testing
              For those who wants to learn how hackers access their systems
              For those who wants to developed client/server application
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A cloud based remote android managment suite, powered by NodeJS
          Features
              GPS Logging
              Microphone Recording
              View Contacts
              SMS Logs
              Send SMS
              Call Logs
              View Installed Apps
              View Stub Permissions
              Live Clipboard Logging
              Live Notification Logging
              View WiFi Networks (logs previously seen)
              File Explorer & Downloader
              Command Queuing
              Built In APK Builder
              Auto Allow Permission
              Admin Permission
              Accessibility Feature
              Persistent


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Brutus is a Botnet, written entirely in Python targeting Windows machines.
          It gives the attacker control over the victim's machine and enables him to:
              Stream images over the victim's webcam
              Stream audio over the victim's microphone
              Take screenshots of the victim's desktop
              Run batch commands & receive the output of those
              Automatically create a backdoor after execution
              Get the victim's location through the IPv4 address
          The Command Line Interface / CLI of Brutus had to be developed manually
          because in Python the "input()" - function disables the script from
          printing output to the regular CLI when awaiting user input.
          The PYQT Framework is used for the creation of the GUI.
          Asynchronous TCP-Socket connections are used to transfer data.
          It's efficient and enables the script to receive output from infected devices
          and send input/commands to those devices at the same time.
          Connected users are given an individual ID-Number
          over which they can be adressed in the CLI.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
          Generator Features
              Encrypt Source Code Using AES 256 Bit Encryption
              Encrypt Source Code Using Base64 Encryption
              Packing Evil Exe Using UPX Packer
              Interactive Mode [Generator Ask Required Parameter]
              Debug Mode [Can Be Used In Debugging Payload]
              Persistence Payload
              3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
              Built-in File Binder
              Useful Icons Inside icon Folder
          Virtual Machine Bypass Methods Includes
          Registry Check
          Processes and Files Check
          MAC Adderess Check
          Disclaimer
          💻 This project was created only for good purposes and personal use.
          THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Def4lt

          Hidden Content
          Give reaction to this post to see the hidden content.  
          Gold Alduin-botnet  
          ImgSearch all disc.
          USBSpread,
          Tor Communication,
          Multi-language,
          Attacks:
          SlowLoris,
          ARME,
          Hulk,
          RUDY,
            TCP and UDP,
          ICMP,
          HTTPBandWidth,
          TORLoris.
          Monero minning,
          Execute file
          Open website
          ScreenShots
          Get Computer All hardware and deatils
          Send Message
          Seed Torrent
          Support fallback panel
          SourceCode/Git grabber
          FireFox, Chrome, FileZilla account grabber
          CMD executter
          Host file editor
          Process show and kill
          Ads miner
          Show attack speed
            Hidden Content
          Give reaction to this post to see the hidden content.