Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Search results

  1. B

    Suggestions required

    Цена - Контакты - del
  2. B

    Some basic tools that can be used for malware analysis

    THESE ARE SOME BASIC TOOLS, THOUGH NOWADAYS MALWARES/RANSOMWARE/STEALERS HAVE THE ABILITY TO BYPASS EVERYTHING. Static Analysis tools: PEview => http://wjradburn.com/software/ CFF Explorer => http://www.ntcore.com/exsuite.php PEinsider => http://cerbero.io/peinsider/ ILspy => http://ilspy.net/...
  3. B

    TeamPhisher - a tool for testing phishing messages

    Hello mate, are you guys aware of this new open-source tool in your phishing engagement?
  4. B

    STRINGS

    Strings are ASCII and Unicode-printable sequences of characters embedded within a file. Extracting strings can give clues about the program functionality and indicators associated with a suspect binary. For example, if a malware creates a file, the filenameis stored as a string in the binary...
  5. B

    VIDAR STEALER - Отстук 80-90% , обходим Google Auth !

    Vidar is one of the best infostealer out in the market. I have used it personally. I would love to know what new features are coming!!
  6. B

    Spoofing email

    Implement SPF (Sender Policy Framework):SPF is an email authentication protocol that helps prevent email spoofing by allowing domain owners to specify which IP addresses are authorized to send emails on behalf of their domain. By publishing SPF records in DNS, domain owners can indicate which...
  7. B

    Post Initial Access

    Here's a methodology you might consider after gaining access to VPNs: Initial Reconnaissance: Gather information about the network infrastructure, systems, and services available. Identify potential targets of interest within the network. Privilege Escalation: Exploit vulnerabilities in systems...
  8. B

    Mobile malware

    Not yet. Im working on whitehat apps. Will see how it goes.
  9. B

    Need bulletproof hosting for my work

    Привет всем, Хочу перекинуть свои новые проекты на буллетпруф-хостинг. Какие варианты посоветуете, где безопасность на высшем уровне, кроме Yalishanda, потому что про него уже всё знаю? For En---- hi members i want to move new projects to bulletproof hosting. what are some of the good ones...
  10. B

    фишинг на доступы существует?

    solomonfinik Yes, phishing attacks can occur even in environments where employees are physically close to each other, such as within the same building or neighboring ones. Attackers can use various tactics to exploit vulnerabilities and trick individuals providing access to systems. One common...
  11. B

    Mobile malware

    For Play store you need 20 testers now. It takes 2 weeks to test any app you want to publish. Obviously you can't include anything bad at first because it's being reviewed by humans. Probably by Indian guys / womans You must show Google that the app is serious and clean. The rules have...
  12. B

    Mobile malware

    Hello. I already have a malware and few RAT's that I will be buying from developers. I want suggestions on how to put it on Play Store / ios store
  13. B

    Mobile malware

    Phishing, APK markets, Ads, social media,....
  14. B

    Mobile malware

    How do you plan to initially access or attack mobile devices using malware? What are the best ways to deliver them in modern android phones?
  15. B

    CC каких стран пользуются спросом?

    Планирую начать работу со сниффом, интересует CC каких стран помимо ЮСЫ и Европы пользуются спросом в шопах? Скупают ли картон стран Южной Америки/Азии или он лежит мертвым грузом в шопах и вообще невостребован? Если кто-то знает какие страны из этих континентов пользуются спросом напишите...
Top