You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
⛓️💥 Notorious Smartphones Malware, for Remote Administration Which include Advanced Spyware functions. Penetrate iOS and Android, their Sandbox and SSL Security.
TFRv2 : Remote control Access and exploiting tool, used as a Deadly Backdoor (Generator) that bypass most Anti-Virus software. Penetrate a strong system such as Windows, MacOS, and Android.
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
reverse-TCP backdoor disguised within the netstat utility. It's designed to automatically exclude itself from the netstat output. (educational purposes only)
Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Thawne keeps checking if your File Exists on the System and is Running. If it's not running then Start it, If it does not exist or is removed Reinstall it.
Decompile, optimize, recompile, and integrate spyware and remote control features into APK and EXE files with LurkerX, the ultimate tool for security researchers, penetration testers, and ethical hackers.