• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

malware

  1. ZoeWillow22

    CosaNostra v1.2 – HTTP BotNet with Full Tutorial Download Latest Version

    HTTP-Based Command & Control Uses HTTP/S for all communication to blend with normal web traffic Compatible with shared hosting, PHP panels, and basic web servers Hardcoded or dynamic callback URLs for flexible control Supports custom modules (stealers, keyloggers, miners) Easily injects and...
  2. del1ja500

    Hello world

    Hi everyone, looking forward to sharing my experience with everyone
  3. dEEpEst

    Detecting Attacks in Real-Time

    Threat Hunting: Detecting Attacks in Real-Time with Splunk and ELK Table of Contents Introduction to Threat Hunting in Enterprise Environments The Role of Splunk and ELK in Threat Detection Setting Up Splunk and ELK for Threat Hunting Threat Hunting Techniques and Queries 4.1. Anomaly-Based...
  4. dEEpEst

    RED TEAM Operator: Malware Development Essentials Course 8 GB 2025

    RED TEAM Operator: Malware Development Essentials Course 32 Lessons 365-day access LIFE TIME $199 FREE A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows. Welcome to Malware Development Essentials course! Are...
  5. dEEpEst

    Mandiant – Essentials of Malware Analysis 2025 70 GB 2025

    Malware Analysis Basics Overview This 16-hour on-demand course provides a hands-on, virtual beginner's introduction to the tools and methodologies used to perform malware analysis on executable files found on Windows systems. The course introduces students to the field of disassembly, including...
  6. dEEpEst

    Source Code GimmeShelter - highlight opportunities for hiding/running malware from unusual modules

    Introducing GimmeShelter a situational awareness Python script to help you find where to put your beacons GimmeShelter is a lightweight Python script which will help you get a good view of what a Windows environment looks like, and highlight opportunities for hiding/running malware from unusual...
  7. dEEpEst

    Courses DOCGuard

    DOCGuard • What should you do if you have a document of dubious origin? The answer is simple: check the file using certain tools or upload it to specialized resources. One such resource is DOCGuard, which will check the document for known vulnerabilities, suspicious scripts, and links to...
  8. dEEpEst

    Comprehensive Guide to Malware Types

    Comprehensive Guide to Malware Types: Understanding and Defending Against Cyber Threats Introduction Malware is one of the most persistent threats in cybersecurity, and it continues to evolve in complexity. With new strains and attack methods constantly emerging, understanding the types of...
  9. haxbin

    RAT Offence RAT v2.5

    Offence RAT v2.5       PREVIEW           DOWNLOAD   upload.ee: Hidden content       kosred: sadly theres no more kosred.com such an wonderful file hosting, R.I.P :(  :cry:
  10. haxbin

    RAT Dark-wOrm v0.3.2

    Dark-wOrm v0.3.2       Preview         Download:   kosred: Hidden content       upload.ee: Hidden content  
  11. haxbin

    RAT Bozok RAT 1.5.1

    BOZOK RAT 1.5.1   PREVIEW     DOWNLOAD   kosred: Hidden content   upload.ee: Hidden content
  12. haxbin

    RAT ZerØDay2 RAT v1.8 Crack

    ZerØDay2 RAT Crack   PREVIEW   *you can put anything for username and password^       DOWNLOAD   upload.ee Hidden content   kosred Hidden content   fileditch Hidden content   filebox Hidden content
  13. haxbin

    RAT Subbus RAT + Source Code

    SUBBUS RAT ORIGINAL .EXE CRACKED .EXE + SOURCE CODE, THEME SOURCE CODE   PREVIEW     DOWNLOAD   upload.ee Hidden content   kosred Hidden content   fileditch Hidden content   filebox Hidden content
  14. A

    SpyNote 6.4 RAT Download [ 2023 ] Hack Android Mobiles Remotely

    ABOUT SPYNOTE V6 RAT It is an advanced version of android rat which is used for mobile phone hacking. Spy Note 6 client is made in Visual Basic.Net programming language and their server is written in Java programming language. Spynote 6 rat is a paid and very expensive android rat tool but...
  15. itsMe

    IObit Malware Fighter Pro 10.2.0.1023

    IObit Malware Fighter Pro – is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique “Dual-Core” engine and the...
  16. itsMe

    Glary Malware Hunter Pro 1.165.0.782

    Glary Malware Hunter Pro – is an anti-virus scanner from Glarysoft for detecting and removing active threats on a Windows system using the Avira engine. Allows you to perform a quick, complete and selective anti-virus scan, as well as scan selected folders and files through the context menu of...
  17. itsMe

    Malware Scanner v2.1 - Malicious Code Detector

    Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. https://codecanyon.net/item/shell-scanner/5609275 Hidden content
  18. itsMe

    Qu1cksc0pe - All-in-One Malware Analysis Tool

    All-in-One malware analysis tool for analyze Windows, Linux, OSX binaries, Document files and APK files. You can get:     What DLL files are used.     Functions and APIs.     Sections and segments.     URLs, IP addresses and emails.     Android permissions.     File extensions and their...
  19. dEEpEst

    Cuckoo VM for Malware Analysis By binaryzone

    Cuckoo VM for Malware Analysis By binaryzone If you do not want to put some time in installing your own Cuckoo Sandbox for different reasons, then you could just download the Virtual Machine (VM) that I have prepared. What I’ve done is get Cuckoo to run in a VM, so you might be asking what...
  20. itsMe

    PortexAnalyzerGUI: Portable Executable and Malware Analysis Library

    Graphical interface for PortEx, a Portable Executable and Malware Analysis Library. PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala and targeted at Java...
Back
Top