Sign in to follow this
Followers
0
-
Similar Content
-
By scrack
perdi mi tiempo en este shit y escuseme por la palabra
Mod Anubis 2.5 from 10.01.2020 and Anubis Loader (loader_maza)
I merge the source codes of the Maza loader and also merge the Anubis mod, which was sold at Expo for $ 5k and is now trying all kinds of dolby .. to sell.
The loader is normal, nothing unusual, the package name needs to be encrypted in md5
Bankbot functionality:
- admin rights
- sending SMS
- SMS interception / hidden SMS interception
- get all SMS on the phone
- get all installed applications
- USSD
- show message
- push
- auto push
- geolocation
- web injections including cryptocurrency, work on 4-9 versions
- grabber cards (5 types)
- start injection (grabber) in the interval
- get all contacts
- spam on all contacts of the bot or on your database of numbers
- access to the file system (rat) downloading photos, audio recordings, text formats.
- screen stream (rat) - from version 5.0 and higher
- stream of sound (rat)
- open url in browser
- open url in bot activity
- call forwarding
- cryptoclocker
- remote launch of installed applications
- search for files by signature
- sound recording (2 types)
- keylogger (does not apply to browser)
- Socks5 module - from version 5.0 and higher
- get IP bot
- Automatically disabling Google Protect, works after the update 01/13/2020
- Fixed a problem with falling asleep bots
- Automatic removal of the bot (no confirmation on the side of the bot is needed), no traces remain.
- Display the model of mobile phone.
- Step-by-step receipt of data from the injection (everything falls in turn, login, pass,
card number, then date, then color). In cases where online access is by card, card
you get it now almost certainly, the holder is usually afraid to inject CVV.
- All permissions are taken 1 time and quietly, unlike the old version with 5 windows.
- Removing applications from the phone on command from the admin panel.
- Auto-delete applications on a schedule. Pour links on antiviruses, bot cleans
phone from them after the specified time after installation.
- Scheduled keylogger activation.
- Launching injections on schedule. After the specified time, applications are searched,
the right one is launched.
- Advanced panel for sorting, searching for bots.
- Panel in Russian
- Blocking push messages of any applications
I write to all lovers of freebies that I don’t need to ask for a personal one in the topic or about drugs, I give only to those who have a little lack of hyde, the rest are asked not to write.
Hyde is done in order to see and download could be active users who benefit the forum in its development.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Usage
1. change ip and port in backdoor.py and server.py
2. Run: python backdoor.py on target system
3. Run. python server.py in your local machine
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. PEunion
PEunion bundles multiple executables (or any other file type) into a single file. Each file can be configured individually to be compressed, encrypted, etc. In addition, an URL can be provided for a download to be executed.
The resulting binary is compiled from dynamically generated C# code. No resources are exposed that can be harvested using tools like Resource Hacker. PEunion does not use managed resources either. Files are stored in byte[] code definitions and when encryption and compression is applied, files become as obscure as they can get.
And on top of that, obfuscation is applied to a maximal extent! Variable names are obfuscated using barely distinguishable Unicode characters. String literals for both strings that you provide, as well as constant string literals are encrypted.
PEunion can be either used as a binder for multiple files, as a crypter for a single file, or as a downloader.
Features
This is the application interface. First, you add the files to your project.
Each file can be configured individually. Default settings already include obfuscation, compression and encryption. Relevant settings are primarily: Where to drop the file, using what name and whether or not to execute it and so on...
The project can be saved into a .peu file, which includes all project information. Paths to your files are relative if they are located in the same directory or a sub directory.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Clippy is a script I made to study how Bitcoin Clippers worked. The project is really simple and, as of today, is undetected by the most common anti-viruses ( Kaspersky, Avira, Avast, AVG, etc... )
Hidden Content
Give reaction to this post to see the hidden content. -
By Hellasida
Here is the source code for the crypt
Gui:
Hidden Content
Give reaction to this post to see the hidden content. Stub:
Hidden Content
Give reaction to this post to see the hidden content. More info:
Hidden Content
Give reaction to this post to see the hidden content.
-