Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      Need4Weed

      No Hips Crypter Mod by Need4Weed

      Recommended Posts

       

      I Fucking hate Nod32 :aggressive:

       

       

      DarkCommet No Hips Bypass Crypter by harmmy - Mod Need4Weed (2/30)

       

      2v2fc6p.png

       

      File Name: HipsDC.exe
      Scan Date: 2018-09-04 21:30:57
      Detected by: 2/30

      SHA256: c866c52626eb95944fa54f22ac3efc....313756fc8f7bcd8637bd8e8925052c
      Checked by AntiScan.Me

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      HEUR/AGEN.1020235

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      a variant of Win32/Injector.DTEV trojan

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

       

      Password :

      Hidden Content

        Give reaction to this post to see the hidden content.

      Dycrypt 

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Download :

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

       

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By scrack
          perdi mi tiempo en este shit y escuseme por la palabra
           
          Mod Anubis 2.5 from 10.01.2020 and Anubis Loader (loader_maza)
          I merge the source codes of the Maza loader and also merge the Anubis mod, which was sold at Expo for $ 5k and is now trying all kinds of dolby .. to sell.
          The loader is normal, nothing unusual, the package name needs to be encrypted in md5
          Bankbot functionality:
          - admin rights
          - sending SMS
          - SMS interception / hidden SMS interception
          - get all SMS on the phone
          - get all installed applications
          - USSD
          - show message
          - push
          - auto push
          - geolocation
          - web injections including cryptocurrency, work on 4-9 versions
          - grabber cards (5 types)
          - start injection (grabber) in the interval
          - get all contacts
          - spam on all contacts of the bot or on your database of numbers
          - access to the file system (rat) downloading photos, audio recordings, text formats.
          - screen stream (rat) - from version 5.0 and higher
          - stream of sound (rat)
          - open url in browser
          - open url in bot activity
          - call forwarding
          - cryptoclocker
          - remote launch of installed applications
          - search for files by signature
          - sound recording (2 types)
          - keylogger (does not apply to browser)
          - Socks5 module - from version 5.0 and higher
          - get IP bot
          - Automatically disabling Google Protect, works after the update 01/13/2020
          - Fixed a problem with falling asleep bots
          - Automatic removal of the bot (no confirmation on the side of the bot is needed), no traces remain.
          - Display the model of mobile phone.
          - Step-by-step receipt of data from the injection (everything falls in turn, login, pass,
          card number, then date, then color). In cases where online access is by card, card
          you get it now almost certainly, the holder is usually afraid to inject CVV.
          - All permissions are taken 1 time and quietly, unlike the old version with 5 windows.
          - Removing applications from the phone on command from the admin panel.
          - Auto-delete applications on a schedule. Pour links on antiviruses, bot cleans
          phone from them after the specified time after installation.
          - Scheduled keylogger activation.
          - Launching injections on schedule. After the specified time, applications are searched,
          the right one is launched.
          - Advanced panel for sorting, searching for bots.
          - Panel in Russian
          - Blocking push messages of any applications
          I write to all lovers of freebies that I don’t need to ask for a personal one in the topic or about drugs, I give only to those who have a little lack of hyde, the rest are asked not to write.
          Hyde is done in order to see and download could be active users who benefit the forum in its development.
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Usage
          1. change ip and port in backdoor.py and server.py
          2. Run: python backdoor.py on target system
          3. Run. python server.py in your local machine

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. PEunion
          PEunion bundles multiple executables (or any other file type) into a single file. Each file can be configured individually to be compressed, encrypted, etc. In addition, an URL can be provided for a download to be executed.
          The resulting binary is compiled from dynamically generated C# code. No resources are exposed that can be harvested using tools like Resource Hacker. PEunion does not use managed resources either. Files are stored in byte[] code definitions and when encryption and compression is applied, files become as obscure as they can get.
          And on top of that, obfuscation is applied to a maximal extent! Variable names are obfuscated using barely distinguishable Unicode characters. String literals for both strings that you provide, as well as constant string literals are encrypted.
          PEunion can be either used as a binder for multiple files, as a crypter for a single file, or as a downloader.
          Features
          This is the application interface. First, you add the files to your project.
          Each file can be configured individually. Default settings already include obfuscation, compression and encryption. Relevant settings are primarily: Where to drop the file, using what name and whether or not to execute it and so on...
          The project can be saved into a .peu file, which includes all project information. Paths to your files are relative if they are located in the same directory or a sub directory.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Clippy is a script I made to study how Bitcoin Clippers worked. The project is really simple and, as of today, is undetected by the most common anti-viruses ( Kaspersky, Avira, Avast, AVG, etc... )

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Hellasida
          Here is the source code for the crypt
          Gui:

          Hidden Content
          Give reaction to this post to see the hidden content. Stub:

          Hidden Content
          Give reaction to this post to see the hidden content. More info:

          Hidden Content
          Give reaction to this post to see the hidden content.