Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked 100% fud payload generator !!! no metasploit !!!


dEEpEst

Recommended Posts

 

ps-framework

100% fud payload generator !!! no metasploit !!!

     ____   ___  ____  _____ ___ ____   ___  _   _ 
    |  _ \ / _ \/ ___|| ____|_ _|  _ \ / _ \| \ | |
    | |_) | | | \___ \|  _|  | || | | | | | |  \| |
    | |__/| |_| |___) | |___ | || |_| | |_| | |\  |
    |_|    \___/|____/|_____|___|____/ \___/|_| \_|
                                           
     _____ ____      _    __  __ _______        _____  ____  _  __
    |  ___|  _ \    / \  |  \/  | ____\ \      / / _ \|  _ \| |/ /
    | |_  | |_) |  / _ \ | |\/| |  _|  \ \ /\ / / | | | |_) | ' / 
    |  _| |  _ <  / ___ \| |  | | |___  \ V  V /| |_| |  _ <| . \ 
    |_|   |_| \_\/_/   \_\_|  |_|_____|  \_/\_/  \___/|_| \_\_|\_       

--------------disclamer------------

this program is for authorised penetration testing with written concent only!!! 
the creators and distributors of this program are not responseble for anny misuse of this program. 
!!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united    states, 
and is generaly severely punished arround the world

--------------discription-------------

              (linux only)(must be run as root)
              ! no dependancys or files required !
              payloads have 2 layers of encryption and are compiled to exe format
              ! all connections are encrypted with aes !
              installer builds the program into a binary file, then copies it to /usr/bin/
              payloads are basicly reverse_shells

------------instructions-------------

This is the hidden content, please

----------sample--------------

     ____   ___  ____  _____ ___ ____   ___  _   _ 
    |  _ \ / _ \/ ___|| ____|_ _|  _ \ / _ \| \ | |
    | |_) | | | \___ \|  _|  | || | | | | | |  \| |
    |  __/| |_| |___) | |___ | || |_| | |_| | |\  |
    |_|    \___/|____/|_____|___|____/ \___/|_| \_|
                                           
     _____ ____      _    __  __ _______        _____  ____  _  __
    |  ___|  _ \    / \  |  \/  | ____\ \      / / _ \|  _ \| |/ /
    | |_  | |_) |  / _ \ | |\/| |  _|  \ \ /\ / / | | | |_) | ' / 
    |  _| |  _ <  / ___ \| |  | | |___  \ V  V /| |_| |  _ <| . \ 
    |_|   |_| \_\/_/   \_\_|  |_|_____|  \_/\_/  \___/|_| \_\_|\_                                                              




    this program is for authorised penetration testing with written concent only!!! 
    the creators and distributors of this program are not responseble for anny misuse of this program. 
    !!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united    states, 
    and is generaly severely punished arround the world




    [B]BUILDER [L]LISTENER [E]EXIT
    [B,L,E] :
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.