Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Question

      1 answer to this question

      Recommended Posts

      • 1

      It all depends on how your server works for example if using Bifrost then you will need a Crypter that has EOF Support as the Bifrost Server stores all user settings at the END OF FILE (EOF)  and of course the Undetection Rate of Crypter would help.

       

      Hope this helps

      Regards

      Need

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Features
              Native resources storage method
              Managed resources storage method (CodeDom)
              Simple AES encryption
              RunPE Injection (injects to vbc.exe)
              Add file to startup
              Hide file from the file explorer
              Change the stub's icon using CodeDom
              Commented in the most critical parts

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Content:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A File .NET Crypter
          You will need to install the krypton component system into VS, but if not, the files are already created for you to use the .NET Crypter. If you decide to edit the program and build the solution it will pop out the exe and a dll file. If you want it to only have the exe file, you will need an external program called ILMerge which will allow you to bind the exe and dll files together. The krypton pack is here https://github.com/ComponentFactory/Krypton and the ILMerge Program is here https://wvd-vegt.bitbucket.io/ilmergegui.html

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. auth_analyzer
          The Burp extension helps you to find authorization bugs. Just navigate through the web application with a high privileged user and let the Auth Analyzer repeat your requests for any defined non-privileged user. With the possibility to define Parameters the Auth Analyzer is able to extract and replace parameter values automatically. With this for instance, CSRF tokens or even whole session characteristics can be auto extracted from responses and replaced in further requests. Each response will be analyzed and tagged on its bypass status.
          Why should I use Auth Analyzer?
          There are other existing Burp Extensions doing basically similar stuff. However, the force of the parameter feature and automatic value extraction is the main reason for choosing Auth Analyzer. With this, you don’t have to know the content of the data which must be exchanged. You can easily define your parameters and cookies and Auth Analyzer will catch on the fly the values needed. The Auth Analyzer does not perform any preflight requests. It does basically just the same thing as your web app. With your defined user roles/sessions.
          GUI Overview
          (1) Create or Clone a Session for every user you want to test.
          (2) Save and load session setup
          (3) Specify the session characteristics (Header(s) and / or Parameter(s) to replace)
          (4) Set Filters if needed
          (5) Start / Stop and Pause Auth Analyzer
          (6) Specify table filter
          (7) Navigate through Web App with another user and track results of the repeated requests
          (8) Export table data to XML or HTML
          (9) Manually analyze original and repeated requests/responses
          Features
              Session Creation for each user role
              Renaming and Removing a Session
              Clone a Session
              Set any amount of Headers to replace/add
              Set Headers to remove
              Set any amount of parameters to replace
              Define how the parameter value will be discovered (automatic, static, prompt for input, from to string)
              Remove a specified parameter
              Detailed Filter Rules
              Detailed Status Panel for each Session
              Pause each Session separately
              Renew Auto Extracted Parameter Value automatically
              Repeat Request by context menu
              Table Data Filter
              Table Data Export Functionality
              Start / Stop / Pause the “Auth Analyzer”
              Pause each Session separately
              Restrict session to defined scope
              Filter Requests with same header(s)
              Drop Original Request functionality
              Detailed view of all processed Requests and Responses
              Send Header(s) and/or Parameter(s) directly to Auth Analyzer by Context Menu
              Autosave current configuration
              Save to file and load from file current configuration

          Hidden Content
          Give reaction to this post to see the hidden content.