User Controls

Sophie's Bag o' Lulz.

  1. #21
    Kafka sweaty
    Originally posted by maddie This is implied in what I originally said, and it makes complete sense to someone with any technical knowledge.

    But since you're in a thread that you don't belong in due to your lack of any technical knowledge I will explain to you one time. Now: since this thread is 8 years old, I have 8 years worth of Botnets, DDos, Exploits, Keyloggers, Ransomware, RAT, Worms, and More!

    Fucking idiot. I swear.

    The thread being 8 years old doesn't logically conclude that you have 8 years worth of items.
  2. #22
    Instigator blumped dis here tred, at least living up to the name.
  3. #23
    Kafka sweaty
    She has to be trolling, no one can really be that illogical unless they're senile.
  4. #24
    maddie Tuskegee Airman
    Originally posted by Kafka She has to be trolling, no one can really be that illogical unless they're senile.

    Or perhaps you are the only one who has the issue of understanding me.

    That would be a clear sign that you are the known difference, which then concludes that you are in fact the actual problem and not me.
  5. #25
    Kafka sweaty
    https://www.amazon.co.uk/gp/aw/d/0198811705
  6. #26
    maddie Tuskegee Airman
    Also you don't even understand anything said in this original thread post by Sophie, why are you even here? besides just to clutter a tech thread that you don't belong in?
  7. #27
    Kafka sweaty
    Originally posted by maddie Or perhaps you are the only one who has the issue of understanding me.

    That would be a clear sign that you are the known difference, which then concludes that you are in fact the actual problem and not me.

    My pointing out your errors doesn't logically conclude that I'm the only person who's having trouble understanding you. If you really are this way and not trolling you need help.
  8. #28
    maddie Tuskegee Airman
    Since keyloggers seem to be a popular topic I have these available:

    Anonymous Keylogger
    Aux Logger v3
    Digital Keylogger v3.3
    Dracula Logger
    Hooker
    Instalador2
    Perfect Keylogger
    PoisonLogger
    Project Neptune v2
    RapZo Logger v1.5
    RinLogger
    Silent Keylogger v1.6
    SysLogger
    UltimateLogger
    VulcanLogger
  9. #29
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]
    Sophies bag O tricks
  10. #30
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]
    His bag of treats was child sex abuse material
  11. #31
    Kafka sweaty
    Also, one person finding an error that a majority misses doesn't mean the error isn't there.
  12. #32
    Best way is to get a very old RAT and alter the code in such a way that the scanners no longer detect it (FUD), then bind an ICQ pager to it, then convert the entire executable to shellcode, then obfuscate it, then set up an http server and merge the shellcode to the home page, so that anyone visiting the URL gets injected with the RAT on a preselected port, which cries home with the IP.
  13. #33
    maddie Tuskegee Airman
    Originally posted by ⠀⠀⠀⠀⠀⠀ Best way is to get a very old RAT and alter the code in such a way that the scanners no longer detect it (FUD), then bind an ICQ pager to it, then convert the entire executable to shellcode, then obfuscate it, then set up an http server and merge the shellcode to the home page, so that anyone visiting the URL gets injected with the RAT on a preselected port, which cries home with the IP.

    I have 55 RATS (majority old) if you want them you can have them.
  14. #34
    Kafka sweaty
    If you don't want my moth wings to flutter by you should try to improve; Aspies can't resist correcting flawed logic.
  15. #35
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]
    just run an uncensored GPT and ask it to spin up a keylogger in whatever language you choose instead of downloading some sketchy files that are probably backdoored so they actually keylog you

    Sophie is no longer needed, we have AI to generate anything welcome to the future, if sophie were still alive he would be having a field day

  16. #36
    maddie Tuskegee Airman
    Originally posted by the man who put it in my hood just run an uncensored GPT and ask it to spin up a keylogger in whatever language you choose instead of downloading some sketchy files that are probably backdoored so they actually keylog you

    Sophie is no longer needed, we have AI to generate anything welcome to the future, if sophie were still alive he would be having a field day


    Have you tried having AI create a keylogger that wont be detected? Please share with me on one that wont get detected?
  17. #37
    maddie Tuskegee Airman
    Originally posted by Kafka If you don't want my moth wings to flutter by you should try to improve; Aspies can't resist correcting flawed logic.

    Kafka, love..

    Until you are able to offer knowledge pertaining to topics in this forum, I and ignoring you, as your messages are just a waste of time for me to read, and they are completely irrelevant to the topic in hand.

    Have a good day!
  18. #38
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]


    Originally posted by maddie Kafka, love..

    omg they are in lesbians with one another!!!! (づ๑•ᴗ•๑)づ୧⍤⃝💐 brought together by a love of sophie
  19. #39
    maddie Tuskegee Airman
    Originally posted by the man who put it in my hood



    omg they are in lesbians with one another!!!! (づ๑•ᴗ•๑)づ୧⍤⃝💐 brought together by a love of sophie

    That has admin perms..

    Give me one that doesn't already have admin perms.
  20. #40
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]
    Originally posted by maddie Have you tried having AI create a keylogger that wont be detected? Please share with me on one that wont get detected?

    I can't even get my non malicious software to run without my windows retardwall flipping out and trying to delete necessary files. I tried to package it as an .exe but I think I need it to have some sort of certificate if I want to distribute it "legit"



    I imagine that's half the trick of any decent malware is being able to get past security in the first place and do enough that someone cleaning their system can't just scan and remove your malware easily.

    Fuck security certificates I will just make all my code polymorphic so the anti virus leaves it alone.

    Originally posted by scuffed jim carrey from what I understand modern anti viruses are keeping up and instead of looking for something specific in code because of polymorphic viruses now they look for system patterns.

    it's an arms race so now they gotta make scan proof malware

Jump to Top