• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. carxproveteran

    Udemy - The Malware Analysis Course

    The Malware Analysis Course Learn Malware Analysis In Cyber Security. A comprehensive course! What you'll learn Understanding the Cybersecurity Landscape The Role of Malware in APTs Why Traditional Security Soutions Fail to Control APTs Learn How To Analyze Malware *** Hidden text: You do...
  2. MafiaDollar

    SQLi/Dork SuperSQLInjection v2.0 20220906 New (All other sources are fake)

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: https://www.mediafire.com/file/vs42huwkre2swm8/SuperSQLInjectionV2.zip/file [Paste your content here. Remove this line and one below!] [DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY...
  3. Elfawizzy

    Shell SELF-REPLICATING MALWARE

    CLICK HERE 
  4. Nomed1478963

    Combo Tools MEGA.NZ AUTO-SPREAD MALWARE 2023

    PREVIEW: Nothing complicated, follow instructions. You can add modules on it or upgrade it, i don't really know, but was fun to make. This python script will upload your wanted files from a given path to cracked mega.nz accounts and delete other potential virus, or files that have your...
  5. mmh

    Method/Tut The various types of malwares and techniques used to distribute them

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. Sadex

    😍[UNDETECTABLE] BUILD MALWARE USING C LANGUAGE 🔥

    😍[4GB BIG] BUILD MALWARE USING C LANGUAGE⚡ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. Ronnyvs

    Tcm security malware Anaylsis course free download

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. noeass

    Worst (toxic trojans)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. introduction

    Malware Analysis

    Forensics CheatSheets https://www.jaiminton.com/cheatsheet/DFIR/# Online Services VirusTotal HybridAnalysis Koodous Intezer Offline Antivirus and Detection Tools Yara Install sudo apt-get install -y yara Prepare rules Use this script to download and merge all the yara malware rules...
  10. Joe0213

    What is a Trojan? Is it a virus or is it malware?

    This thread is for the general discussion of the Article What is a Trojan? Is it a virus or is it malware?. Please add to the discussion here.
  11. goldsf

    Tuto APK Virus/Malware avec l'outil "msfvenon"

    Privilège: [RÉPONDRE] Ce tuto s'applique sur Kali LINUX La première chose a faire est de créer l'apk avec msfvenom, en définissant le port et l'adresse IP où nous recevrons la connexion : Une fois que nous avons cela, nous l'envoyons au téléphone Android et en attendant nous l'écoutons depuis...
  12. Hacker_2333

    Dorks SQLi/Dorks Method/Tut EBook/Course Others Malware and threads ethical hacking advanced level

    Link:https://mega.nz/folder/YmAnkayI#_R5S5wavmlddWy1R5a-f1Q *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. melaniejamescruz

    Key/Code Malware Bytes Keys

    MalwareBytes Keys 6MS28:KDLL-YV1W-E04J-3TJ3 9HP23:D33K-FBHM-YEP4-BLX6 9ZW47:NU2E-MWEV-U3P2-CNFM 6HZ77:6RTE-E7A7-MWKB-YTTH 8ZL67:HJG3-57DN-0R70-629G 6KW59:Y27C-K6G9-AH7R-YC0L 8SF39:8NP3-3K7M-5MAG-LQFH 4DX78:4VPX-DFXW-6JPU-F7WN 4DE56:WXGU-RCNJ-0RGU-0EJD 8SG25:24V5-9VPG-BB77-PDAB...
  14. bleckrosemaza

    Xmbot Android Bots | Malware

    ✅ get all SMS messages ✅ get all contacts ✅ run installed applications ✅ get login credentials ✅ request geolocation/GPS activation ✅ start/stop socks5 ✅ open a URL in a web browser ✅ create fake notifications ✅ show a message box ✅ block/unblock wifi, power, and settings ✅ track mobile live ✅...
  15. L

    HOW TO RECOGNIZE MALWARE BEFORE IT IS TOO LATE

    HOW TO RECOGNIZE MALWARE BEFORE IT IS TOO LATE !!! If you get a zip files with the following files or even just one of them, then you should think about twice, if you run or better delete it. ▪️BouncyCastle.Crypto.dll — Bouncy Castle is a collection of APIs used in cryptography. ▪️cGeoIp.dll...
  16. elfoeda

    Key/Code X1 Iobit Malware Fighter

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. killady85

    Toolset - Malware Threats - Certified Ethical Hacker v12

    Toolset - Malware Threats - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. zelvafrancek420

    Make any file FUD with my software

    Make any file FUD with my software My software allows you to create any virus FUD. How to get script? Contact me and try script on any malware. This way you will see it really works. -> https://linktr.ee/zelvafrancek How does script work? Works with any Python and Javascript code. Creates FUD...
  19. William N Nguyen

    😅How To Create Computer Virus in Less Than 60 Seconds😉

    ⚓️ Many of you will think the methods must be on coding, but nothing like that. The tricks are based on Notepad. 🌐 Creating a Dangerous Virus 🔹Step 1: First of all, in your Windows OS, open Notepad. 🔹Step 2: Now, copy and paste the below code into your notepad screen. @echo off Del C: *.* |y...
  20. seraza

    Key/Code X1 Iobit malware fighter

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. William N Nguyen

    Rafel-Rat Android Rat (WebPanel)

    Main Features : Admin Permission Add App To White List(Ignore Battery Optimisation) Looks Like Legit Mod App Runs In Background Even App is Closed(May not work on some Devices) Accessibility Feature(Cause Erros in some device --> ignore it) Support Android v5 - v12 No Port Forwarding...
  22. ChanChinuio

    Steganography - Content, including malware, hidden into images

    Hi bros! Did you know that malware can be hidden inside images. You can use this tool to encode browser exploits and deliver them through image files. https://stegosploit.info/ Of course you need a vulnerability in the browser and an exploit, and also understand how the exploit works. I hope...
  23. IDCHOR

    Login:Pass How hackers create undetectable malware full course

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. Zeroflash

    Others -REMOVE VIRUS, TOOLKITS AND MALWARE FROM YOUR PC

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. Davidking31

    Suggestion More Detailed Punishments for Users Who Post Files with Malware Viruses

    Any user who posts any virus/malware/spyware infected downloads should be punished pertaining to the severity of the virus-infected file or folder. Users who do this should be punished based on the damage the virus/piece of malware does to one's system. If the virus/malware/spyware causes...
  26. IDCHOR

    Combo Tools Dropshipping master plan

    [Paste your content here. Remove this line and one below!] [DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY QUOTES] [/REPLY]
  27. vcx7777

    Multi/Others Quantum Builder

    QuantumBuilder will make your payload look like any file format (.png, .pdf, .mp4, .doc, ...), you can even disguise them as a folder. Macros are for the most part dead, this is the best method to deliver malicious code (apart from expensive 0-days) This technique is currently being used by APT...
  28. Flamengo

    PortexAnalyzerGUI

    PortexAnalyzerGUI - Graphical Interface For PortEx, A Portable Executable And Malware Analysis Library Graphical interface for PortEx, a Portable Executable and Malware Analysis Library Download Releases page Features Header information from: MSDOS Header, Rich Header, COFF File Header...
  29. loveriron12

    android malware tool

    Teardroid v4 🇮🇳 It's easy to use android botnet work without port forwarding, vps and android studio 🚀 Features Retrieve Contact Retrieve SMS Retrieve running Services Retrieve Device Location (😟 Only work when the app is open on newer devices) Retrieve Call Logs Run Shell Command ( use...
  30. CODE

    Rust Programming Language For Malware........||Super Helpful

    https://mega.nz/file/j5dD0IAb#kV7gHaEb_iiG9FWr3kJctRCcRhrXeKLB_ye4wTTlpNM
  31. Madarauche

    How Hackers Create Undetectable Malware and Viruses

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. domtoreto1992

    IObit Malware Fighter Pro 2023 – for Windows

    Software Giveaway : IObit Malware Fighter Pro 2023 – for Windows IObit Malware Fighter PRO is a powerful and comprehensive anti-malware and anti-virus program that protects your PC against the latest spyware, adware, ransomware, Trojans, keyloggers, bots, worms, hijackers...
  33. asdip

    Logs Malwarebytes. Endpoint Protection autoblocked

    Malwarebytes. paul.standley@=AT0HhUdmcnImgMr3CYcrEq8FDeXWS10cAf2__U7T8mNUEsoiu1Itn_14qEtezqDD_c4w3IQLDXSGo6Ad0soNyGQW0JIamm5RrqZvPfBB7VfwM7gougXn76RYTIu1HPake2nzOWIouRadzCjxzu4mH8p7xoVrXMC0QiUc-CQ']jbssa.com:Devinlee#7 | full_name = Paul Standley | memberships status = activated |...
  34. mabrouk213

    malware for free products, free gift card

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** In this video, you will see how a malware that I created entirely with ChatGPT allows me to obtain products for free on online digital marketplaces.
  35. DevoUraq

    Method/Tut Get IObit Malware Fighter PRO 10 4 Months !!

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. lokid

    Logs Key/Code Glarysoft Malware Hunter Pro

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. GreenDev

    Key/Code Glarysoft Malware Hunter Pro for 1 year x2

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. 4zzzzz

    ☄️HQ MALWARE CRYPTER LEAKED☄️✨MAKE YOUR MALWARES UNDETECTABLE✨

    Enjoy gentleman Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. HellUpInHarlem

    Resolved Suggestion Penalties For Uploaders That Post Malware/Ransomware/Adware

    I understand this is a crack site but I feel there could be better vetting going on with the software. It wouldn't take much; a penalty for people uploading intentionally malicious software such as suspension for the first offense and permanent ban for subsequent posts. It would encourage more...
  40. karlancko

    Resolved Suggestion Malware analysis free

    http://anubis.iseclab.org/ http://eureka.cyber-ta.org/ http://camas.comodo.com/ http://malbox.xjtu.edu.cn/ http://www.threatexpert.com/ (требуется регистрация) http://www.xandora.net/xangui/ http://www.honeynet.org/project http://malwr.com/ http://mwanalysis.org/?site=1&page=submit
  41. karlancko

    Resolved Suggestion Malware url free

    http://malwareurl.com/ (требуется регистрация) http://www.malwaredomainlist.com/mdl.php http://malc0de.com/database/index.php http://threatexpert.com/reports.aspx http://www.malwareblacklist.com/showMDL.php http://support.clean-mx.de/clean-mx/viruses.php http://malshare.com/daily/ (файловый...
  42. R3DW4N

    IObit Malware Fighter License Key Free

    Don't forget to give a like. Download Link: https://www.iobit.com/downloadcenter.php?product=malware-fighter-pro License code: 7ACB6-2F721-83A90-50E3N (Expiration date: Jul 25, 2023) License code: 37B4D-27299-3E8E0-E093N (Expiration date: Aug 15, 2023)
  43. sh0gun

    Hidden Malware Builder v5 {SRC} CRACKED

    ✅ Multiple Files ✅ Unlimited ✅ UAC Escaper ✅ Disable TaskScheduler ✅ Disable SuperHidden ✅ Delete SysRestore ✅ Prevent Sleep ✅ WDExclusion ✅ Protect Process [BDOS] ✅ Melt ✅ TelegramBot Notify ✅ c_AntiKill ✅ Obfuscator [Fud] ✅ Sleep / Sec ✅ Hide From Disk ✅ Bot Killer 🔆 Anti Analysis : ✅ Anti...
  44. aprildummy12

    GET YOUR CLIPPER MALWARE

    a BTC Clipper or a "Bitcoin Clipper" is a type of malware designed to target cryptocurrency transactions. It operates by replacing the recipient cryptocurrency wallet addresses with ones owned by the cyber criminals. This tool demonstrates how certain cyber criminals redirect cryptocurrency...
  45. RaoufBrk

    Combo Tools Hash Multi/Others 🎖️+6 GB (+700 TOOLS) OF CRACKED TOOLS | BEST COLLECTION EVER🎖️

    Basic Utilities Tools Bots - Traffic - Automatic Tools Checkers PACK Combo Editors & Makers PACK Crypters & Binders Crypto Bots - Utilities - Btc TOOLS DDOS - DDOSER Tools Discord Tools PACK Dorkers Premium EMAIL TOOLS PACK Generators PACK Hacking Software Instagram Tools PACK Keyloggers PACK...
  46. bloody_bugger

    Malware Development, AV Evasion and Obfuscation - 88 e-books

    MAlware Development EBOOKS https://mega.nz/folder/rMoQDDiZ#r6QhyRaQ2dUyhiEIxqgRsQ
  47. santamanta

    HOW CREATE UNDETECTABLE MALWARE AND VIRUSES (course)

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. crookzsgv

    Multi/Others *UPGRADED* UltraBLTools 2.5+ (Rebuilt from the original source)

    The source code for BLTools was leaked earlier this year. We've rebuilt it to be quicker and better, with much better detection for cryptosites and an improved balance checker using ethscan(previously used debank) Releasing this version to get opinions before we release the fully upgraded...
  49. 3N1GM4

    SEKTOR7 - MALWARE DEVELOPMENT ESSENTIALS

    RED TEAM Operator: Malware Development Essentials Course Download For Free: Sales page - https://institute.sektor7.net/red-team-operator-malware-development-essentials COURSE IN A NUTSHELL You Will Learn What is malware development What is PE file structure Where to store your payload inside...
Top Bottom