Jump to content

[Ultimate Hacking Experience 2008 (AIO)]


GrisoM

Recommended Posts

B4 you do something stupid, i recommend you to read many guides about troyans - virus - Keyloggers (this ones are the most dangerous)

 

Even if this AIO have tuts, you must be really carefull.

 

2i1mvsx.jpg

 

This AIO includes:

 

Trojan Horses

- Yuri RAT v1.2

- MofoTro v1.7 BETA

- Charon

- Beast v2.0.7

- Omerta v1.3

- Theef v2.10

- Combined Forces R.A.T

- MoSucker v3.0

- ProRat v1.9 Fix2

 

Keyloggers

- Elite Keylogger v1.0

- SKL v0.1

- KeySpy v2.0

- A++++- Curiosity

- Keylogger

- KeyCopy

 

Binders

- Daemon Crypt Public v2

- NT Packer v2.1

- EES binder v1.0

- File Injector v3

- Bytes Adder

- FreshBind v2.01

- YAB v2.01

- NakedBind v1.0

- Amok Joiner

 

WebHacks/WordLists

 

Brute Forcers

- Munga Bunga 's Official

- Brutus

- Authentication Engine Test 2

- wwwHack v1.946

- FTP Brute Hacker

- FTP Brute Forcer.tar.gz

- Unix- Wbrute.tar.gz

- Unix- Shadow Scanner

-Brute Forcer

- Hackers Utility v1.5

- POP3 brute forcer.tar.gz

- Unix

 

CGI-Bug Scanners

- NStealth HTTP Security Scanner v5.8

- Attack Toolkit v4.1 & source code included

- Scanarator- Legion NetBios Scanner v2.1

- NetView v1.0

- CGI Vulnerability Scan

- CGI Scanner v4.0

- VoidEye CGI scanner

 

Viruses

- Hippi virus

- Sasser- W32. Blaster .Worm

- Midnight Massacre

- 00001

- Nimda

- Loveletter virus

- Happy '99

- MXZ

 

Virus Builders

- DR VBS

- VBSwg 2 beta

- Virus builder

- p0ke's WormGen 2.0

- RESIDUO

- DoS Virus

 

MSN Hacks & Bots

- HoaX Toolbox 1.1

- MSN Extreme 3.0

- MessenPass v1.06

- Advanced Blood Scroller

- Nudge Madness

- Advanced Instant Messengers Password Recovery

- Contact Spy

- Msn Explosion

- Encrypted Messenger

 

Port & IP Scanners

- Blues Port Scanner

- ProPort v2.2

- SuperScan v3.0

- Net Scan Tools v4.2

- LanSpy v2.0

- ~censored~ Threads v3.1

- Trojan Hunter v1.5

- SuperScan v4.0

- Neotrace PRO v3.25 trial&crack

 

Nukers And Flooders

- Rocket v1.0

- RPCNuke v1.0

- Panther Mode1

- 56k

- Panther Mode2

- ISDN +

- Final Fortune v2.4

- Battle Pong

- Technophoria

- Assault v1.0

- ICMP Nuker

- CLICK v2.2

 

EXTRA!

- Telnet Tutorial

 

 

Use it at your own Risk

 

Link to comment
Share on other sites

Np Mike, i will only use the Brute Forcers/Port & IP Scanners

 

I think the other ones are way too -beep-ed up (especially since i dont know much about them :|)

Link to comment
Share on other sites

Do you know if with this hack u can connect to others PC and take snapshots of thier screen ? Or can u open their DVDR ?

 

I'm reading some tuts atm to understand what does some of this programs do.

 

I guess that if you make the keyloggers work, you could connect to other person PC.

 

Look, now i got it:

 

You need the right troyan-keylogger and then a Binder this binder will put together .exe files and its capable of changing the stubs.

Example.........

click add item... = your virus ot troyan .exe file,and click the execute option

click again on add item,and choose another .exe file such as games,flash movies ect.

Then you click on create using custom stub,and change the .exe for whatever you want,but i recommend you have a nice "icons" folder.

I can even send a video file with the .exe file to run "hidden" and use a .mp3 or .mpeg

 

By the way,when using a keylogger or a trojan,opt for the "ftp" delivery feature,is more secure.

 

Stealth or DragonHunter am i right?

Link to comment
Share on other sites

Nice but in Flooders you should add DDosv5 Anihillation Edition and HttpDos :P.

Anyway really nice share again.

 

PS: Check my avatar :P

Link to comment
Share on other sites

Nice but in Flooders you should add DDosv5 Anihillation Edition and HttpDos :P.

Anyway really nice share again.

 

ok, i just edited the last post, am i right stealth?

 

PS: Check my avatar :P

 

I saw it long time ago ;P

Link to comment
Share on other sites

By the way,when using a keylogger or a trojan,opt for the "ftp" delivery feature,is more secure.

Stealth or DragonHunter am i right?

 

It normally is more safe , but in advanced trojans there's encryption between the server and the client so that you dont need to use the opt for ftp.

 

ok, i just edited the last post, am i right stealth?

I saw it long time ago ;P

 

So you are right , because it is not easy for the user to know if a trojan uses encryption or not , then it is better to use ftp.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...