Malware Cloud / Malware Shop


Channel's geo and language: Russia, Russian
Category: Other


Everything is published for informational purposes only. All material you download at your own peril and risk. Use a sandbox and virtual machine.
News: @MalwareNews
Shop: @MalwareShopBot
Escrow: @MalwareEscrow
All Projects: @MalwareLinks

Related channels  |  Similar channels

Channel's geo and language
Russia, Russian
Category
Other
Statistics
Posts filter


LummaC2 is a new generation stealer, average knock 75-85%, support 24/7, works even on clean systems, no dependencies (AT ALL), log decryption on the server, build weight 150-300KB, steals Chromium and Mozilla based browsers, steals ~70 browser cryptocurrency and 2FA extensions, Discord tokens, has GoogleAccount cookies restore function, non-resident Loader, low-level adaptive file grabber, integrated Reverse proxy, AI to detect bots in the panel, and the latest unique development - MORFER.
LummaC2 is updated literally every two hours, add your specific browser or your specific extension - 2 clicks!

Contacts:
Purchase a subscription -
@lummaseller126
Channel - @Lum
maC2Stealer
Chat - @LummaC2Team




🧙🏼‍♂️Welcome to Wizard Channel, our team has been in the Malware industry for over 3 years and here is a small list of our products🪄

All product names are clickable and lead to the post in the channel


⚡️ Crypt: public | private | personal
⚡️ Crypt APK: public | private | personal
⚡️ Loader: standart | disable WinDef I disable 26 av from avcheck
⚡️ Windows HVNC
⚡️ Android RATs
⚡️ Cloaking panel for your software and websites
⚡️ EV Certificates
⚡️ Deep Fake video
⚡️ Twitter and TikTok ads

🧙🏼‍♂️Any questions: @Wizard_CEO
🧙🏼‍♂️Adm
ins: @Wizard_Admin_1 | @Wizard_Admin_2

📢 Channe
l: https://t.me/+L-lewdd4nIZhOTFi
📰 News: https://t.me/+-auMRmlMe3UzYWMy


🍭DroidSmsEye

Functionality:

1. Intercept incoming SMS.
2. Intercept all SMS received on the device.
3. Detection of services running on the SIM card, for example: (VK,VIBER,DISCORD,BANKSMS,TELEGRAM,GOOGLE etc.). If the required service is not detected, please inform us.
4. Cross-platform panel - Windows, Linux, Termux - with the ability to customize according to your preferences.
And et
c..

💠FUD 0/66 - Google Bypass / one build $90.

Flexible terms and customization to suit your needs.

❗️Contact: @znz_crypt

❗️ Detailed information can be found in our channel: https://t.me/droid_eye


Промокод: Promo2024
Процент скидки: 20 %
Активаций промокода: 0 раз
Максимум активаций: 3
Прямая ссылка: https://t.me/MalwareShopBot?start=promoPromo2024


Ethereum & BinanceSmartChain Drainer

Supported Networks: Ethereum, BNB Smart Chain

For your convenience, the most flexible script settings are available.
Main coin withdrawal method: Signing/Transfer/Smart Contract
Token withdrawal method: Sign/Transfer/Approve/Allow/Allow2/Uniswap Multicall/Pancake Multicall/Sushiswap/QuickSwap

Minimum requirements and minimum settings instructions are inside the archive

Direct link to the product:
https://t.me/MalwareShopBot?start=t_bd4c9ab730f5513206b999ec0d90d1fb


Link update:
'https://t.me/addlist/4N6B0jwPTK04NmI0' rel='nofollow'>https://t.me/addlist/4N6B0jwPTK04NmI0


Forward from: Malware Cloud / Malware Shop
@MalwareShopBot - is the only and first malware store on Telegram from the @MalwareForum project

Her
e you will find: botnet, stealer, RAT, clipper, loader, hidden miner, keylogger, worm, android/ios malware and much more.


YARA Malware Analysis and Threat Detection.zip
1.2Gb
YARA - Malware Analysis and Threat Detection

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
All Projects @MalwareLinks


YARA - Malware Analysis and Threat Detection

Unleash the power of YARA and enhance your malware analysis and threat hunting expertise.
Learn to write YARA rules based on real scenarios
Develop your own testing tools
Learn how to detect OS manipulation and network intelligence capabilities
Learn how to use YARA to identify covert channels and sensitive data leaks
Develop rules for detecting the presence of RAT and Malware
Use YARA to detect spyware, keyloggers and audio interceptors

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


Living off the land (LoTL) persistent reverse shell for windows

Fileless reverse shell written in JScript and Powershell. Runs every time windows boots and relies solely on the windows registry and environment variables to execute, without creating any files on the system...

https://github.com/Null-byte-00/LOTL

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


FUD LOADER + EV SIGN

● EXE in ZIP - 30$/day 210$/week
● EXE in ZIP + EV SIGN in ZIP - 70$/day 490$/week
● EXE + EV SIGN in ZIP - 150$/day 1050$/week
● SIGN YOUR FILE 400$/1.EXE - Sign only FUD loaders/droppers
● SALE EV SIGN 3500$ Full transation

Automatic order:
https://t.me/D3Fuck_Loader_bot

Topic:
https://xss.is/threads/108097/
https://forum.exploit.in/topic/236790/


Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process

https://github.com/Maldev-Academy/RemoteTLSCallbackInjection

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


AtlasLdr

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

https://github.com/Krypteria/AtlasLdr

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


Keres a is Powershell rev-shell backdoor with persistence for windows and linux (pwsh)

it generates a PE exe that spawns a powershell process that starts a powershell rev-shell with persistence (if process stops an other one is spawned , if process is running don t spawn new process)

https://github.com/ELMERIKH/Keres

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum




maldev_guide.pdf
23.1Mb
"MalDev Academy Guide", 2023.

A comprehensive module-based malware development course providing fundamental to advanced level knowledge

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum






Kaspersky - Targeted Malware Reverse Engineering

Password - zero2024


Info - https://xtraining.kaspersky.com/courses/targeted-malware-reverse-engineering/

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum

20 last posts shown.