• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Recent content by balty

  1. B

    Some of the Nasa tools originally leaked by the Shadow brokers ) also used in WannaCry ransomware attack

    I have the official selection which I got straight from their auction website,  now these vulnerabilities have already been patched on most but windows 10 and windows server 2016 was also effected. If you do manage to find a device on Shodan that still runs on the old server block. You will find...
  2. B

    Live Malware Repository (warning install as follows and read the instructions)

    This project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way...
  3. B

    RAT DogeRat

    Dige rat is a android based rat which you can manage from your telegram. I might have a cracked full version but it not that hard to crack I could possibly in the near future when I have time. There should be a tutorial on YouTube on how to set it up if you don't know or have issues. Happy...
  4. B

    SilentCryptoMiner v3.4.0 - Miner for ETC, RVN, XMR, RTM & many more

    -Native C++ - Miner installer/injector and watchdog coded fully in C++ with no run requirements except a 64-bit OS -Injection (Silent/Hidden) - Hide miner inside another process like conhost.exe, explorer.exe, svchost.exe and others -Idle Mining - Can be configured to mine at different CPU and...
  5. B

    njRAT-0.8.0-LIME-EDITION

    njRAT has been around since at least 2013 and is one of the most prevalent malware families. Built in .NET Framework, the malware provides attackers with remote control over the infected systems, utilizes dynamic DNS for command-and-control (C&C), and uses a custom TCP protocol over a...
  6. B

    Cracking Brute L4 DDOS Tool Python

    Brute is the best L4 DoS tool in Python3. (could find the right subsection) It will flood the victim's router with UDP packets, so even if there are no ports opened, the router will still be overwhelmed and slowed down. Brute allows you to DoS Fivem, Minecraft (it can but I hope everyone has...
  7. B

    Ransomware Ryuk file Cryptor | Ransomware

    This tool encrypts the victims data. There is a ready prompt to great the victim and ask for ransom. This tool has have been used since early 2018 in large profile attacks and myself have had a lot of success stories. Below is a slightly older version, hope you find it useful and also find your...
Back
Top