• Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today!
    Read the detailed thread here

Source Code XWORM 6.5 Source code

Currently reading:
 Source Code XWORM 6.5 Source code

Adl22

Member
LV
0
Joined
Oct 21, 2024
Threads
7
Likes
1
Awards
1
Credits
381©
Cash
0$


Link:

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
 

shccrew

Member
LV
1
Joined
Apr 14, 2023
Threads
24
Likes
98
Awards
5
Credits
17,289©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
thnx bro
 

HenryGX

Member
LV
2
Joined
Mar 5, 2023
Threads
52
Likes
72
Awards
6
Credits
10,793©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
lets see
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom