Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      dEEpEst

      Anti Globalizacion RAT

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. 

      Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder.
      Enjoy!
       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      Em 09/09/2018 em 18:28, dEEpEst disse:

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

       

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

       

      Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. 

      Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder.
      Enjoy!
       

      Download:

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      nice work 

      Share this post


      Link to post
      Share on other sites
      Staff
      hace 10 horas, cupado dijo:

      thanks very good

      Read Rules .... No Spam of thanks or banned

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. LMT Anti Logger
          A software helps protect you from malware. Detect unknown threats, stay protected
          The great features of the software
          LMT Anti Logger has a wide range of free features well-suited for use that covers both the usual and unusual cyber threats.
          Real-time protection
          Protect your computer from viruses / malware / trojans / keyloggers in real time
          Prevent Keylogger
          With LMT Anti Logger, keyloggers will be difficult to steal your data
          Artificial Intelligence
          Thanks to Artificial Intelligence, LMT Anti Logger can detect the latest threats
          Web Protection
          Prevents you from accidentally connecting to harmful websites.
          Data protection
          Don't be a victim of ransomware, LMT Anti Logger will help protect your data from unauthorized access.
          Multiple Cloud AV
          Using databases from Virustotal, increasing the detection rate of malicious software
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Android RAT
          You can access the source code of my RAT project I started on Android Server.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By J0k3rj0k3r

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Unpack archive.
          Launch Warzone Cracked.exe
          Unpack archive.
          Launch Warzone Cracked.exe
          Port forwarding instructions:
          Step 1)
          Control Panel > Firewall and Network > Allow an App through Firewall
          > Select “WARZONE RAT 2.70.exe”
          Step 2)
          Control Panel > Windows Defender Firewall > Advanced Settings
          Step 3)
          a) Inbound Rules > New Rule > Port > TCP > Specific Port you want
          b) Inbound Rules > New Rule > Port > UDP > Specific Port you want
          c) Outbound Rules > New Rule > Port > TCP > Specific Port you want
          d) Outbound Rules > New Rule > Port > UDP > Specific Port you want
          Step 4)
          Build your server with your port and your VPS IP address or DNS.
          Download:

          Hidden Content
          Give reaction to this post to see the hidden content.  
           
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. SharpCore is a C#.NET Remote Administration Tool (RAT) Framework

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By J0k3rj0k3r

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Keep in mind, you are downloading a malware client. Heuristic detections because of Quasar RAT base.
          For your safety, run and use on RDP/VPS ONLY.

          Hidden Content
          Give reaction to this post to see the hidden content.