Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Malware Analysis | WSHRAT Visual Basic RAT (C2 Replication)

      Recommended Posts

      Malware Analysis | WSHRAT Visual Basic RAT (C2 Replication)

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe
          Commands and examples:

          Hidden Content
          Give reaction to this post to see the hidden content. Information
              Developed by: SebastianEPH
              Product name: RAT Telegram Spy Bot
              Type software: Remote Administration Tool
              File version: 1.0
              Architecture: x86 bits || x64 bits
              State: No verificado [Posible Fallos]
              Size: 400KB aprox
              Undetectable: Not Tester << No Verificado
              Plataform: Windows 7, 8.1, 10
              Programming language: C#.net Framework - Console
              Licence: MIT
              IDE or text editor: Visual Studio Comunity 2019
              Documentation date: 20/05/2020
              Description: Remote access Trojan, spies and obtains information from the infected pc, controlled by telegram commands.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Complete Basic Course Of Kali Linux

          Course Topics

          Introduction To Hacking
          Create a Virtual machine Environment
          Use Kali Linux & Network Security
          Updating Repositories and Installing Virtualbox addition Tools
          Installing Kali in VMWARE Workstation + Google advance Searching
          Find people online and learn Kali Command
          What is Cookies Operating system and how to install VMware
          What is Keylogger and How To Use Linux Directories Terminals
          Use RAT by Kali Linux Commands
          Become Anonymous Online TOR VPN Proxy and Linux command
          Hack a website with Havji Using Kali Linux
          use Proxychains on Kali Linux
          Configure VPN And DNS
          MacChanger On Kali Linux Repeat Proxychains
          Use NMAP
          Use GeoIP
          Introduction to Wireless and Debian
          Sniff And Windows Tools Cain-and- Able
          Protocol Administration Tools RAT
          Learn about Wireless Terminology

          LINK-
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malware Hunter
                  Hyper scan makes you enjoy a faster scanning speed.         Detect and remove stubborn malware, against potential danger.         Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PHP malware scanner
          Traversing directories for files with php extensions and testing files against text or regexp rules, the rules-based on self-gathered samples and publicly available malwares/webshells. The goal is to find infected files and fight against kiddies, because too easy to bypass rules.
          Changelog v1.0.5
              Combined whitelist updated

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Bloqueo de amenazas en tiempo real
          Nuestro potente malware fighter protege tu ordenador contra cualquier tipo de amenazas de PC como virus, ransomware, troyanos, spyware, adware, gusanos, etc. Incluso te protege contra los últimos malware como pueden ser Ransom.Stop, Malware.Coronavirus, Trojan.nanocore y malware con temática coronavirus. Se ha añadido la nueva función Heurística Avanzada para detectar variantes de virus y más amenazas de forma inteligente. Además, el nuevo motor anti-malware ha sido mejorado, detectando un 100% más amenazas, ayudándote a hacer un escaneo rápido y comprehensivo de tu sistema. Con la colaboración del motor de Bitdefender y el motor anti-ransomware de IObit tendrás una protección multi-núcleo.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.