#rat #windows #malware
Please open Telegram to view this post
VIEW IN TELEGRAM
is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework
#Rat #Malware #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2
BugCod3
#Rat #Malware
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤1
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3#Rat #Malware #Remote #Access
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡1❤1
Rust for Malware Development
💬
Hello Nerds, This Repo is about using Rust for malware development and for low level stuffs.
👁🗨 Basics:
To Learn Rust -> Rust Book
Windows API [old]-(winapi)-> WinAPI
Windows API (by Official Microsoft) -> WinAPI
ntapi Crate -> NtAPI
Windows Internels -> Link
RedTeam Notes -> Link
WinAPI Imports to Test and Execute these Codes..
Tips for Rust Beginner: save this dependencies in Cargo.toml File.
😸 Github
⬇️ Download
🔒
#Rust #Malware #Dev
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Hello Nerds, This Repo is about using Rust for malware development and for low level stuffs.
To Learn Rust -> Rust Book
Windows API [old]-(winapi)-> WinAPI
Windows API (by Official Microsoft) -> WinAPI
ntapi Crate -> NtAPI
Windows Internels -> Link
RedTeam Notes -> Link
WinAPI Imports to Test and Execute these Codes..
[dependencies]
winapi = { version = "0.3", features = ["winuser", "debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
ntapi = "0.4.1"
user32-sys = "0.2.0"
Tips for Rust Beginner: save this dependencies in Cargo.toml File.
BugCod3#Rust #Malware #Dev
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥2❤1
MultCheck is a malware-analysis tool that can be used to test the detection of a file by multiple AV engines.
It is designed to be easy to use, and to be able to test multiple AV engines. It is also designed to be easy to extend, and to be able to add custom AV engines.
Run
go build under the root directory of the project.OR
cd src
# Build for Windows
## 64-bit
GOOS=windows GOARCH=amd64 go build -o ../bin/multcheck_x64.exe main.go
## 32-bit
GOOS=windows GOARCH=386 go build -o ../bin/multcheck_x32.exe main.go
MultCheck accepts a target file as an argument:
./multcheck <target_file>Different built-in scanners can be used by specifying the
-scanner flag: ./multcheck -scanner <scanner_name> <target_file>Custom scanners can be added by creating a configuration file and providing the path to the file through the
-scanner flag: ./multcheck -scanner <path_to_config_file> <target_file>BugCod3#GO #Malware #Analysis #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡2🔥2
Experts warn of a new ATM malware family that is advertised in the cybercrime underground, it was developed to target Europe.
🌎 Blog
#ATM #Malware #News
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
#ATM #Malware #News
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1