Malware Coding Series: Finishing our botnet

Previous Parts: 1.Intro 2.Building Botnet Hi Readers, Today i will show you how to make your python malware more persistent adding a new Anti TaskManager script to close it every time an user tries to check the processes.. You can find this script here: github This script can be included in our previous mlgbot project…Read more Malware Coding Series: Finishing our botnet

Malware Coding Series: Intro

Malware coding is such dark thing for so many programmers\people until they start doing it, if you think like an hacker everything will be much easier. I decided to start this series of tutorials to help anyone out there that want to learn how to make botnets,worms or any other type of viruses. The programming…Read more Malware Coding Series: Intro

Router Exploitation Toolkit – REXT

Router Exploitation Toolkit - REXT Small toolkit for easy creation and usage of various python scripts that work with embedded devices. core - contains most of toolkits basic functions databases - contains databases, like default credentials etc. interface - contains code that is being used for the creation and manipulation with interface modules - contains…Read more Router Exploitation Toolkit – REXT

How to create your Own Ransomware in 3 steps Using TOX

In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A new trend emerged from investigation by experts at McAfee is a sort of easy to use Ransomwarebuilder, this family of malware is becoming even more…Read more How to create your Own Ransomware in 3 steps Using TOX

HAVE YOU BEEN INFECTED BY A RAT,VIRUS,WORM OR KEYLOGGER HERE IS HOW TO BACKTRACE AND FIND THE SOURCE

Now all keyloggers and RATs are sending data to the hacker in regular intervals (usually every 5 to 10 minutes) by using one of the two methods below: 1. Using the Emails: where hacker configures his email ID and password while creating the server. Keylogger records the key strokes in a temp file and sends…Read more HAVE YOU BEEN INFECTED BY A RAT,VIRUS,WORM OR KEYLOGGER HERE IS HOW TO BACKTRACE AND FIND THE SOURCE