Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Crypter dEEpEst v21 (3/26) - [C++ RunTime Update 24/05/2020]

      Recommended Posts

      crypterlvl21.png

      Result Scanner:

      File Name:  Stub.exe
      Scan Date:  2020-05-24 12:35
      MD5:  417c73d81f6493bc35294b5cefad589f
      Filesize:  117.05 KB
      Detection:  3 / 26
      Link:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Scanned with CyberScan.org (No distribute scanner) 

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      HEUR/AGEN.1127758

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Win32/Injector.AVKS trojan

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      HEUR:Trojan.Win32.Inject.vho

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

      Hidden Content

        Give reaction to this post to see the hidden content.
      Clean

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      Password by private message Only for Users PRIV8

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encryption | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted evil code
          This Crypter is written in python 3, which can be used obfusticate, encrypt the python source code to bypass AntiVirus. Also Capable to Bypass VM such as VirtualBox, VMware, Sandboxie.
          Uses AES-256 bit Encryption & Base64 Encoding to Encrypt the Source Code for Twice.
          3 Powerfull Methods to Detect whether running on VM or real machine
          Disclaimer
          This project was created only for good purposes and personal use.
          THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.
          Features
              OS Independent
              Can Encrypt Python Source Codes with AES 256 bit Encryption & Base64 Encoding
              3 Powerfull Methods to Bypass VM (such as VirtualBox, VMware, Sandboxie)
          Virtual Machine Bypass Methods Includes Registry Check Processes and Files Check MAC Adderess Check
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A Ransomware and Ransomware Builder for Windows written purely in Python
          Created for security researchers, enthusiasts and educators, Crypter allows you to experience ransomware first hand. The newly released v3.0 is a complete overhaul that drastically simplifies setup and brings the package up-to-date to work with Python 3.6 and above.
          Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
          What's New? (v3.0)
              Decryption key validation check before attempting decryption     Overhaul to support Python 3.6 and above     Drastically simplified dependency installation
          Crypter - 3.4
          Released this on 6 May
          Numerous fixes and improvements


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Proton Crypter - Hidden Startup | Native & NET Support | Source Code

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. New Update Bug fixes - Stealer with sending logs to Telegram bot
          Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets

          Stealer Functionality
              All based browsers Chromium, Edge, Gecko (Mozilla Firefox)
              Clipboard data
              Discord Session
              Telegram Session
              Outlook
              Grabber files with saving path directories and scanning subdirectories
              FileZilla
              Total Commander
              Pidgin
              Psi, Psi+
              Screenshot
              PCinfo
              NordVPN
              OpenVPN
              ProtonVPN
          Crypto Wallets
              Armory
              Atomic Wallet
              Bitcoin Core
              Bytecoin
              Dash Core
              Electrum
              Ethereum
              Exodus
              Jaxx
              Litecoin Core
              Monero
              Zcash
          Additionally
              All ways to collect logs are random
              Self-removal after sending the log
              Log Resubmission Protection
              Written exclusively for educational purposes! I am not responsible for the use of this project and any of its parts code.

          Hidden Content
          Give reaction to this post to see the hidden content. Download:

          Hidden Content
          Give reaction to this post to see the hidden content. Server Scan

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.  ### Features:
          1. Custom icon support
          2. Encryption key generator
          3. Abilty to hide file
          4. Add to startup
          5. Storage as *. Native Resource *. Managed Resource

          Hidden Content
          Give reaction to this post to see the hidden content.