This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!
Depending on the operation, zero stage command and control frameworks could be used before dropping the HVNC or RAT, doing less noise and preserving the access.
Create your own stealer or hvnc is great too, but take a lot of time and effort, and doesn't looks like the people on this thread...
You're probably misunderstanding this thread, command and control frameworks are not RATs, they have a completely different usage (especially HVNCs)
Normally RATs are programmed using C# with uses CLR, it is totally fine have RWX memory maps, since it has a JIT engine and JIT engines uses RWX a...
Thank you guys! I downloaded yours Red3v1l. I cant believe its only 3 mb.
Pernat1y I tried searching the forum for both the ID and the name you provided but was unable to find it on XSS.
домкрат I have been looking for some good CS resources so I will def take a look at what you posted, and play...
Lol sorry, that number was a mistake.
Like I said, you can use extension spoofing method, you can create a crypto airdrop and your telegram/twitter would grow massively.
Also you can infect them using a torrent.
You can't just show the link inside the video maybe.
Spamming services can maybe...
Promote a fake Airdrop using that project or sharing that URL to 3 friends... Maybe it works for you. If not, you should get any youtub account and upload some content related to that medium