Malware Cloud / Malware Shop


Kanal geosi va tili: Rossiya, Ruscha


Everything is published for informational purposes only. All material you download at your own peril and risk. Use a sandbox and virtual machine.
News: @MalwareNews
Shop: @MalwareShopBot
Escrow: @MalwareEscrow
All Projects: @MalwareLinks

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Rossiya, Ruscha
Statistika
Postlar filtri


WebCrypt - CryptService

⚡️Price-List

Stub Public — 35$
Stub Semi-Private — 65$
Stub Private — 135$

⚙️Description

Bypass WindowsDefender
Bypass GoogleChrome
Support .net/native file [x32 х64]
Change Icon/version info
Stub C++
Polymorph Engine


🛡Change format file [exe to — scr, pif, com, bat, cmd, iso, js, lnk, msi, hta ]

🛠We support — LummaC2, Stelac, Meduza, Meta, Redline, Rhadamanthys, Phoenix, RisePro, Mystic, Vidar, WhiteShake, Raccoon, Agrat, Eternity and etc virus…

❗️Contact @web_crypter
❗️Сhannel Group @web_cryptor
❗️CHAT - @webcrypter_chat
⚙️TOX: 2C87DDCA50D6683CD5DF7864F0F839C359E951B2E13691BBEC9819D350D802465B43D595FCF2

escrow +


Ethereum & BinanceSmartChain Drainer

Supported Networks: Ethereum, BNB Smart Chain

For your convenience, the most flexible script settings are available.
Main coin withdrawal method: Signing/Transfer/Smart Contract
Token withdrawal method: Sign/Transfer/Approve/Allow/Allow2/Uniswap Multicall/Pancake Multicall/Sushiswap/QuickSwap

Minimum requirements and minimum settings instructions are inside the archive

Direct link to the product:
https://t.me/MalwareShopBot?start=t_bd4c9ab730f5513206b999ec0d90d1fb


Link update:
'https://t.me/addlist/4N6B0jwPTK04NmI0' rel='nofollow'>https://t.me/addlist/4N6B0jwPTK04NmI0


Malware Cloud / Malware Shop dan repost
@MalwareShopBot - is the only and first malware store on Telegram from the @MalwareForum project

Her
e you will find: botnet, stealer, RAT, clipper, loader, hidden miner, keylogger, worm, android/ios malware and much more.


YARA Malware Analysis and Threat Detection.zip
1.2Gb
YARA - Malware Analysis and Threat Detection

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
All Projects @MalwareLinks


YARA - Malware Analysis and Threat Detection

Unleash the power of YARA and enhance your malware analysis and threat hunting expertise.
Learn to write YARA rules based on real scenarios
Develop your own testing tools
Learn how to detect OS manipulation and network intelligence capabilities
Learn how to use YARA to identify covert channels and sensitive data leaks
Develop rules for detecting the presence of RAT and Malware
Use YARA to detect spyware, keyloggers and audio interceptors

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


Living off the land (LoTL) persistent reverse shell for windows

Fileless reverse shell written in JScript and Powershell. Runs every time windows boots and relies solely on the windows registry and environment variables to execute, without creating any files on the system...

https://github.com/Null-byte-00/LOTL

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


FUD LOADER + EV SIGN

● EXE in ZIP - 30$/day 210$/week
● EXE in ZIP + EV SIGN in ZIP - 70$/day 490$/week
● EXE + EV SIGN in ZIP - 150$/day 1050$/week
● SIGN YOUR FILE 400$/1.EXE - Sign only FUD loaders/droppers
● SALE EV SIGN 3500$ Full transation

Automatic order:
https://t.me/D3Fuck_Loader_bot

Topic:
https://xss.is/threads/108097/
https://forum.exploit.in/topic/236790/


Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process

https://github.com/Maldev-Academy/RemoteTLSCallbackInjection

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


AtlasLdr

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

https://github.com/Krypteria/AtlasLdr

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


Keres a is Powershell rev-shell backdoor with persistence for windows and linux (pwsh)

it generates a PE exe that spawns a powershell process that starts a powershell rev-shell with persistence (if process stops an other one is spawned , if process is running don t spawn new process)

https://github.com/ELMERIKH/Keres

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum




maldev_guide.pdf
23.1Mb
"MalDev Academy Guide", 2023.

A comprehensive module-based malware development course providing fundamental to advanced level knowledge

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum






Kaspersky - Targeted Malware Reverse Engineering

Password - zero2024


Info - https://xtraining.kaspersky.com/courses/targeted-malware-reverse-engineering/

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum






Kaspersky - Advanced malware analysis techniques

Password - zero2024


Info - https://xtraining.kaspersky.com/courses/advanced-malware-analysis-techniques/

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum


Linux rootkit

Tested on
:
Debian 9: 4.9.0-8-amd64
Debian 10: 4.19.0-8-amd64
Ubuntu 18.04.1 LTS: 4.15.0-38-generic
Kali Linux: 4.18.0-kali2-amd64
Centos 6.10: 2.6.32-754.6.3.el6.x86_64
Centos 7: 3.10.0-862.3.2.el7.x86_64
Centos 8: 4.18.0-147.5.1.el8_1.x86_64


Features:
Give root to unprivileged users
Hide files and directories
Hide processes
Hide himself
Hide TCP/UDP connections
Hidden boot persistence
File content tampering
Some obfuscation techniques
ICMP/UDP/TCP port-knocking backdoor
Full TTY/PTY shell with file transfer
Client to handle Reptile Shell
Shell connect back each X times (not default)


https://github.com/f0rb1dd3n/Reptile/

Private: @MalwareCloudBot
Магазин вредоно
сных ПО - @MalwareShopBot
Project @MalwareForum

20 ta oxirgi post ko‘rsatilgan.