𝗛𝗔𝗖𝗞𝗜𝗡𝗚 𝗧𝗢𝗢𝗟𝗦™️


Гео и язык канала: Весь мир, Английский
Категория: Технологии


Get all type of hacking tools here.....
Part of = @CIDINT
All the content is only for educational purpose .

Связанные каналы

Гео и язык канала
Весь мир, Английский
Категория
Технологии
Статистика
Фильтр публикаций


Cooked Grabber 2024.zip
8.1Мб
🍪Cookie Grabber🍪

Web cookies are small text files stored on a user's device by web browsers. They contain information such as:


1. Session IDs
2. Authentication tokens
3. User preferences
4. Tracking information

Web Cookie Grabber Features:

🧇Cookie Sniffing:Intercepting and extracting cookies from HTTP requests.


🧇Session Hijacking: Stealing session IDs to gain unauthorized access.


🧇Cookie Injection: Injecting malicious cookies into a user's browser.


🧇Cookie Logging: Storing stolen cookies for later use.


🧇Cookie Analyzing: Examining cookies for sensitive information.


🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.


❄️ Pass:
@Cidint


Orion Keylogger.zip
2.2Мб
📋Orion Keylogger📋

A Keylogger with which captures things such as desktop screenshots,System information ,Saved logins and much more.

⚗Features⚗

📣SMTP Delivery


📣ClipBoard Logger


📣Ftp Delivery


📣Fake Message Box


📣Ip Logger


📣Change File Assembly


📣Icon Changer


📣Log installed Program


📣Many More


🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.


❄️ Pass:
@Cidint


Sharp Eye Rat.zip
1.1Мб
🧿Sharp EyeRat 2024🧿

Sharp Eye is a Remote Access Trojan, meaning the Server and Client run on all operating systems (e.g. Windows, Linux, Mac).


⚗Features⚗

🛎Screen capture


🛎Webcam capture


🛎Keylogger


🛎Filer manager


🛎File search


🛎Clip keyboard & Mouse


🛎Windows color and resolutions


🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.


❄️ Pass:
@cidint


Proton RAT.zip
2.2Мб
🛟Proton Rat🛟

The malware in native Objective C, the advantage is that the malware does not require any dependencies. The author also claims the app is fully-undetected by any existing MAC OS anti-viruses currently in the market


🪼Features🪼

📝Upload files to remote machine


📝Download files from remote machine


📝Connect directly via SSH/VNC to remote machine


📝Get screenshots/webcam shots


📝Develop your own panel/program, bundle with our extensive API.


📝Many other features


🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.


❄️ Pass:
@cidint


J Spy Rat 2024.zip
1.6Мб
🤡JSpy Rat🤡

JSpy functionality revolves around espionage and control. It allows attackers to peer into the infected device, potentially stealing sensitive data like passwords, financial information, and personal files.

☠Features☠

👾Downloads, uploads, deletes, and rename files
👾Destroys hardware by overclocking
👾Drop viruses and worms
Edit Registry
👾Use your internet connection to perform denial of service attacks (DoS)
👾Format drives, Steal passwords, etc

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

❄️ Pass:
@cidint


Android Test RAT.zip
22.6Мб
🧮Android Test RAT🧮

Android Test RAT is a basic remote access tool to extract user info via payloads.

📍Features📍

📡File Manager
📡SMS Manager
📡Call Manager
📡Contacts Manager
📡Location Manager
📡Account Manager
📡Camera Manager
📡Shell Terminal
📡Applications
📡Microphone
📡Keylogger

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

❄️ Pass:
@cidint


Golden Eye RAT + Tutorial.zip
117.8Мб
🦹‍♀️Golden Eye RAT🦹‍♀️

The GoldenEye Rat, also known as “GoldenEye” or “Eye of the Hydra,” is a type of malware designed to facilitate unauthorized remote access to a victim’s computer system.

❤️Features❤️

🎁Remote Access and Control
🎁File Manager
🎁Remote Chat
🎁Execute file
🎁File Searcher
🎁Visit Website
🎁Windows Manager
🎁Enable disable CMD
🎁Disable UAC
🎁Message BOX
🎁Keylogger
🎁UAC Panel
🎁Many More .

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

❄️ Pass: @Cidint


Kraken RAT.zip
33.3Мб
🍎Kraken RAT🍎

Remote administration tools like Kraken RAT can be used for nefarious activities, including unauthorized access, data theft, surveillance, and even controlling compromised devices as part of a botnet.

👌Features👌

✔️Send SMS - send SMS with the specified text to the number specified in the command.

✔️Start USSD - execute a USSD request.

✔️Start Application - launch the application specified in the command.

✔️Replace URL Admin Panel / Forwarding - change the address of the managing server.

✔️Get All SMS - send copies of SMS stored on the device to the managing server.

✔️Get All Installed Applications - get information about installed applications.

✔️Get All Permissions - check the availability of additional permissions to work

✔️Get Logs Keylogger - start intercepting keystrokes


🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

Pass: @Cidint


Scrcpy 2024.zip
5.8Мб
❄️Scrcpy 2024❄️

This application mirrors Android devices (video and audio) connected via USB or over TCP/IP, and allows to control the device with the keyboard and the mouse of the computer. It does not require any root access. It works on Linux, Windows and macOS.

🙂Its features include🙂

😌Audio forwarding (Android 11+)

😌Mirroring with Android device screen off

😌Copy-paste in both directions

😌Configurable quality
camera mirroring (Android 12+)
mirroring as a webcam (V4L2) (Linux-only)

😌Physical keyboard/mouse simulation (HID)

😌OTG mode

😌and more…

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

🎲 Pass:
@cidint


MOBILedit Forensic Express Pro.zip
285.5Мб
🔥MOBILedit Forensic🔥

MOBILedit Forensic Express Pro  for Windows is the world’s most trusted phone investigation tool.

🗂Features🗂

❄️Analyze phones via Bluetooth, IrDA or cable connection.

❄️Direct SIM analyzer through SIM readers

❄️Reads deleted messages from the SIM card

❄️Reports Generator based on your templates

❄️Reports generated in any language

❄️Make backup now and reports when needed

❄️Manual investigation mode
Secure and tamper-proof using MD5 hash

❄️Compliant with Word or any other RTF editor

❄️View formatted reports in browser including original pictures

❄️Exports to Word, Excel/XLS, browser, XML/XSL

❄️Hex dump viewer

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

🎲 Pass:
@cidint


Technitium Tool + Tutorial.zip
12.0Мб
Technitium MAC changer

Technitium MAC Address Changer allows you to change Media Access Control Address of your Network Interface Card irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.

❤️Features❤️

➡️Works on Windows 10, 8 & 7 for both 32-bit and 64-bit.

➡️Enhanced network configuration presets with IPv6 support allow you to quickly switch between network configurations.

➡️Allows complete configuration of any network adapter.

➡️Command line options with entire software functionality available. You can select a preset from specified preset file to apply directly.

➡️Update network card vendors list feature allows you to download latest vendor data (OUI) from IEEE.org.

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

🎲 Pass:
@Cidint


XpertRAT.zip
2.0Мб
Xpert Rat

XpertRAT 3 is a remote access trojan (RAT) that has been making headlines in the cybersecurity community due to its advanced capabilities and sophisticated design. XpertRAT 3 is a type of malware that is designed to provide hackers with remote access to an infected computer or network, allowing them to control it and steal sensitive information.

🇬🇧Features🇬🇧

🔒Fast network serialization (Protocol Buffers)

🔒Encrypted communication (TLS)

🔒UPnP Support (automatic port forwarding)

🔒Remote Desktop

🔒Remote Execution

🔒System Power Commands (Restart, Shutdown, Standby)

🔒Keylogger (Unicode Support)

🔒Password Recovery (Common Browsers and FTP Clients)

🖱Note🖱
It's only for educational pu
rpose, must use it in rdp or virtual machines . May be it also contains some backdoor files so be careful while testing it.

🎲 Pass: @cidint


Elcomsoft Phone Forensics.zip
87.3Мб
🤴Elcomsoft Phone Forensics🤴

Elcomsoft Phone Breaker is the only tool on the market to access, extract and decrypt iCloud Keychain, Apple's cloud-based system for storing and syncing passwords, credit card data, and other susceptible information across devices. 

🔒Features of Elcomsoft🔒

🔒Phone Breaker Forensic Edition
🔒Recover Password-Protected 🔒Apple iTunes Backups
🔒Retrieve Cloud Data: Apple iCloud and Microsoft Account
🔒Two-Step Verification and Two-Factor Authentication
🔒Access iCloud without Login and Password
🔒Decrypt FileVault 2 Volumes
🔒Extract Synced Data
ICloud Files
🔒Access Photos in iCloud Photo Library
🔒Recover Passwords to Apple iTunes Backups

👉Instruction👈

1⃣Run Setup file
Elcomsoft Phone Forensics.msi

2⃣Replace "wbxml2.dll" installed folder ("C:\Program Files (x86)\Elcomsoft Password Recovery\Elcomsoft Phone Password Breaker") with "wbxml2.dll" provide on  folder.

3⃣Run the Application

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

✅Pass: @Cidint


Pestudio Pro.zip
1.2Мб
✔️Peststudio Pro✔️

Pestudio Pro is a software application that provides advanced analysis and investigation of executable files. It is designed to assist users in identifying and understanding potential threats, suspicious behavior, and vulnerabilities within executable files. Here are some of its notable features:

➡️1. Malware Analysis

➡️2. Behavior Analysis: The software 

➡️3. Digital Signature Verification:  

➡️4. Anomalies Detection

➡️5. Import and Export Capabilities

➡️6. Graphical Visualization

➡️7. Integration with Other Tools

➡️8. Many More

🖱Note🖱
It's only for educational purpose, must use
it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

✅Pass: @Cidint


AIRAVAT.zip
13.6Мб
🐘AIRAVAT RAT🐘

A multifunctional Android RAT with GUI based Web Panel without port forwarding.

🔥Features🔥

✅Read all the files of Internal Storage

✅Download Any Media to your Device from Vic
tims Device

Get all the system information of Victim Device

✅Retrieve the List of Installed Applications, SMS, Call Logs, Contacts

✅G
ets all the Notifications

✅K
eylogger with Admin Permission

✅Show Phishing Pages to steal credentials through notification.

✅Many other
.

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual
machines .Tutorial Given in Readme file.

🎲 Pass: @cidint


PDF Exploit Tool.zip
22.6Мб
☀️Pdf Exploit 2023☀️

🍁Tool + Tutorial 🍁

Portable Document Format (PDF) documents that try to take advantage of vulnerabilities in the famous Adobe Acrobat Reader program. Security packages use accepted detections that seem to be for wide patterns of code or conduct to perceive comparable applications or files.

🍀How do hackers use PDF files?

Opening a malicious PDF can launch malware that will begin up anything system the hacker has in mind. That is, by way of clicking on and opening a PDF or different file, a consumer additionally unknowingly begins up a predator program. Such assaults are technically feasible today, however much less common.

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines .

🎲 Pass:
@Cidint


Sorillus Rat.zip
88.7Мб
🟦Sorillus Rat🟥

Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

🟢Features🟢

•⚡️Screenshot: Capture screenshots of the victim's screen.

•⚡️Remote desktop: View and control the victim's desktop remotely.

•⚡️Remote
cam: Access and view the victim's webcam remotely.

•⚡️Remote microphone:
Listen to audio from the victim's microphone remotely.

•⚡
️Key logger: Record and monitor keystrokes on the victim's system.

⚡️Many more.

🔩Installation🔩

•✍️Add Autostart: Add payload to
the auto start folder so it will automatically start with startup apps.
•✍️Update Client: Update the vict
im's payload to the latest version.
•✍️Uninstall & Disconnect: Remove the cl
ient software and disconnect from the system.

🖱
Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

✅Pass: @Cidint


Doge RAT.zip
27.9Мб
😘Doge Rat😘

Doge RAT, is a software program designed for remote administration and control of computer systems.

👩‍💻Features👩‍💻

👏Custom web view
👏Notification reader
👏Notification sender (send custom notifica
tion that apper on target device with custom click link)
👏S
how toast message on target device (Toasts are messages that appear in a box at the bottom of the device)
👏Receiv
e information about simcard provider
👏Vibrate target device
👏Receive device location
👏Receive all target
message
👏Send sms with target device to any number
👏Many More.

🖱Note
🖱
It's only for educationa
l purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

✅Pass: @Cidi
nt


Email Extractors.zip
52.5Мб
⭐️Email Extractors⭐️

It is a light-weight and effective utility designed to extract electronic mail addresses, smartphone numbers, skype and any customized gadgets from a number sources: websites, search engines, e mail money owed and neighborhood files.

✅Keyfeatures✅

👍Search Engines: search by way of key-word in Google, Bing, Yahoo, etc.

👍Website: scan all pages of the designated website

👍Email Accounts: Gmail, Yahoo, Hotmail - scan emails by using POP3 and IMAP

👍Computer: any n
eighborhood file, folder, pressure or clipboard. Supports Word, Excel and Pdf files

👍We
bsite Owners Info: extract area owner's data

👍Url List: scan listing o
f targeted internet pages.

🖱Note🖱
It's only for e
ducational purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

📱Pass: @Cidint


Luxury Shield Crypter 2023.zip
7.6Мб
✔️Luxury Shield Crypter✔️

LUXURY SHIELD IS A CRYPTER. THE FINAL GOAL IS TO MAKE ALMOST ANY .EXE FILE UNDETECTABLE FROM MOST ANTI-VIRUS USING A DAILY UPDATED STUB.

➡️Features➡️

➡️Asm (6113-25kb) custom stub

➡️Anti memory scan

➡️Anti vmware

➡️Code complexity

➡️Multi storage methods

➡️Bypass proact
ive

➡️Ass
embly changer

➡️Icon changer

➡️Digital signature

➡️Persis
tence (x86, x64)

➡️Wind
ows Defender Bypass Runtime (x86, x64)

🖱Note🖱
It's only for educational purpose, must use it in rdp or virtual machines . May be it contains some backdoor files so be careful while testing it.

📱Pass: @Cidint

Показано 20 последних публикаций.