Welcome to The Forum
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to
existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile
and so much more. This message will be removed once you have signed in.
Hacker from all countries join this community to share their knowledge and their hacking tools
You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.
Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.
Give reaction to this post to see the hidden content. The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use.
The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc.
Remote Hacker Probe Core is open source and constantly improved. and is no longer being updated or worked on.
Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows.
The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here.
Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program.
Server Features :
Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes.
Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up.
The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE).
High Speed File Upload / Download.
Main Features :
Probe Client :
The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer.
Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL)
Download, Upload, Delete and browse the entire file System.
Reverse Shell, Full Access to the command line.
Scan Remote Network for hosts.
Port scan hosts in the Target Network.
Scan Remote Network for hosts vulerable to Eternal Blue
Get Process Information by Process name.
Geolocate Client using IP Address.
Shutdown / Restart the Remote PC.
Grab screenshot of the Remote PC.
Record Microphone input.
Add to Startup Persistence on command.
Display Message box.
Open URLS in the default browser.
Active Window logging.
UAC Status shown in main table.
Client Path shown in main table.
Vault & IE.
Remote Hacker Probe Pro V.2
This is the final release of Remote Hacker Probe. I am no longer going to update this.
The professional (paid) version is now open source and is merged into this repository.
Give reaction to this post to see the hidden content.
Give reaction to this post to see the hidden content. What is DNSStager?
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
DNSStager will create a malicious DNS server that handles DNS requests to your domain and return your payload as a response to specific record requests such as AAAA or TXT records after splitting it into chunks and encoding the payload using different algorithms.
It can generate a custom agent written in C or GoLang that will resolve a sequence of domains, retrieve the payload, decode it and finally inject it into the memory based on any technique you want.
You can edit the code of the DNSStager agent as you wish, and build it using your own custom execution techniques.
The main goal of using DNSStager is to help red teamers/pentesters to deliver their payloads in the stealthy channel using DNS.
How does it work?
Based on your DNS resolution option, DNSStager will split your payload into chunks and save each chunk of the payload as a response for a subdomain.
For example, if you choose IPV6 as your option to retrieve the payload, the DNS response will be something like:
cloud-srv-1.test.mydnsserver.live. 300 IN AAAA 5648:31d2:6548:8b52:6048:8b52:1848:8b52
Where 5648:31d2:6548:8b52:6048:8b52:1848:8b52 is a part of your payload?
So, the agent will resolve some domains to retrieve the payload and then decode it and finally inject it into memory.
Currently, DNSStager only supports two records, AAAA and TXT. You can encode your payload using XOR for the AAAA record and by default, it will be encoded as base64 if you choose TXT record.
DNSStager key features:
DNSStager has some key features such as:
Hide and Resolve your payload in IPV6 records.
Hide and Resolve your payload in TXT records.
XOR encoder to encode your payload.
Base64 encoder to encode your payload (only for TXT records).
Pure agent wrote in C with the ability to customise it.
Pure agent wrote in GoLang with the ability to customise it.
The ability to use sleep between each DNS request.
AND MUCH MORE TO COME!
Give reaction to this post to see the hidden content.