malware

  1. TROXStealer

    [TROX Stealer] - Revolutionary stealer designed to steal data and transfer securely and seamlessly

    TROX Stealer Introducing our revolutionary stealer designed to steal data and transfer securely and seamlessly! - Bypass anti-viruses undetected scantime & runtime - Steal Cookie, Password, History, Autofill, Bookmark, Credit Card information - Steal Discord token information - Steal...
  2. Twixx

    #1 PRIVATE CRYPT ON THE MARKET - FUD - CHEAP - Ev Certificate included

    Hi all! Detection rate: FUD Works for all Rats/stealers/loaders EXE WITH EV CERTIFICATE INCLUDED! Contact my telegram or PM me 25% for the first 10 buyers here!
  3. Z

    Ultimate Botnet Creator Tools Pack

    The 'Ultimate Botnet Creator Tools Pack,' featuring a curated selection of cutting-edge botnet frameworks for unparalleled digital domination. Introducing the "Ultimate Botnet Creator Tools Pack" – your complete solution for building powerful botnets, meticulously curated for crackers and cyber...
  4. Z

    Malwarebytes Anti-Exploit Premium and Keygen

    Secure Browsers and Apps with Malwarebytes Anti-Exploit Premium! Popular software programs are comprised of millions of lines of code, which cybercriminals exploit to deliver malware. Malwarebytes Anti-Exploit provides robust security by wrapping three layers of protection around browsers and...
  5. J

    PDF FUD EXPLOIT SOURCE CODE GITHUB

    New found exploit of the winrar vulnerability, which allows you to create an archive, place a pdf in it and when opened, any of your malicious files will be executed at will and the victim will not know anything, I leave a link to the source code here, leave me a good comment, I think it’s a...
  6. J

    PDF FUD EXPLOIT SOURCE CODE GITHUB

    New found exploit of the winrar vulnerability, which allows you to create an archive, place a pdf in it and when opened, any of your malicious files will be executed at will and the victim will not know anything, I leave a link to the source code here, leave me a good comment, I think it’s a...
  7. M

    Paid Botnet Course

    -> Paid BotNet Course -> ️ #course #hacking ➖➖➖➖➖➖➖➖➖➖ ❓Features of This Course - ◾ Centos 6 VPS Setup (video) ◾ Virutal Machine Setup (video) ◾ Disable Windows Defender (video) ◾ Domain Setup ◾ Betabot 1.8.0 Botnet Setup (video) ◾ Zyklon 1.3 Botnet Setup (keylogger) (video) ◾ Azorult 3.1...
  8. XEV1L

    CraxsRAT 7.2

    Craxsrat v7.2 fully cracked Latest version ✅New features✅ -------------------------------------------------------- Faster one-click unlocking (just reinstall the apk once) used) ☄️Cancel display of fingerprint or face unlock phone ☄️Bypass all phone power permissions (MiUI, HarmonyOS, OPPO...
  9. WhiteSnake

    WhiteSnake - Stealer for APT attacks

    Windows stub features File loader. Leaves no trace. Strong log encryption. No server/ports needed. (All infrastructure works over tor network) Fast execution in memory. You able to install beacon into victim PC for remote access. Functionality can be extended by editing grabber commands tab...
  10. XEV1L

    S500 G3 RAT ✅️

    Features : Home ======= ⭐️Connected clients ⭐️Volume of sending data ⭐️Volume of received data ⭐️Logs ⭐️Clients Panel ⭐️Active Systems ⭐️Windows XP/7 ⭐️Windows 8/8.1 ⭐️Windows 10 ⭐️Windows 11 ⭐️Map ⭐️Statistic from clients ⭐️Miners ⭐️Cuttency Grabber ⭐️Passwords -------------- Miners Panel...
  11. XEV1L

    XWorm-RAT V5

    It is the latest version of private RAT called Xworm. ⭐️ COMPILING: Download all source files, launch builder and fill in all gaps New Features: ✅Drag And Drop Files [File Manager - Monitor - HVNC] ✅Run HVNC In Memory ✅Copy / Paste Text [HVNC] ✅Extract Video Thumbnail [File manager]...
  12. LummaStealer

    LummaC2 - universal stealer, a malware for professionals.

    LummaC2 is a new generation stealer, average knock 75-85%, works even on clean systems, no dependencies (AT ALL), log decryption on the server, build weight 150-300KB, steals Chromium and Mozilla based browsers, steals ~70 browser cryptocurrency and 2FA extensions, has a new method of bypassing...
  13. R

    How To Steal Cryptocurrency From Victims Free Download

    How To Steal Cryptocurrency From Victims Free Download A step-by-step guide teach you how you can Steal BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, DASH From Victims Including all tools you need Like Thread Download Hidden content Join Telegram Channel
  14. Elcastro

    OV Code Signature for your malware

    Offer good tool for your malware project Prevents the display "unsigned” warnings from operating systems Verifies the publisher's identity (EU Companies) Allows you to make as many code signatures as needed Supports .exe, .dat, .cab, .xpi, .dll, .ocx, etc. No Phys. token required Only TRUSTED...
  15. T

    Selling FUD Crypter (Cheap)

    Hey there! I´ve been working on a little Crypter/Stub for a bit now! It still has a shit GUI since i havent really spent time on that, but ill probably update that. Ill also Update it if it gets detected again ofc^^ It looks kinda shit and stuff so i decided to sell it for a pretty cheap price...
  16. R

    [WORLD EXCLUISE] ETERNITY STEALER (RUSSIAN WEB BASED STEALER)

    Eternity Stealer |---> BROWSERS COLLECTION (Passwords, CreditCards, Cookies, AutoFill, Tokens, History, Bookmarks): Working with: " Chrome, Firefox, Edge, Opera, Chromium, Vivaldi, IE and +20 more ". |---> EMAIL CLIENTS AND MESSENGERS « Thunderbird, Outlook, FoxMail. Telegram, Discord...