This post is by a banned member (JoseCmanXDII) - Unhide
OP 15 June, 2022 - 09:15 PM
(This post was last modified: 26 June, 2022 - 03:11 AM by JoseCmanXDII. Edited 1 time in total.)
Reply
i'll try provide here everything u need to know
how to make it fully undetected + ready to spread
don't get me wrong but i was about to sell it but then i thought i would help ppls here trying to make money.
remember blackhat ppls isn't criminals :)
i will list the features and how to use and will leave some instruction and notes at the end
⍟ Features ⍟
• adds itself to windows defender exclusion (admin permission)
• mutex ( only one process at a time )
• delayed startup
• creating your own certificate
• hiding techniques
//download links
Hidden Content
You must
register or
login to view this content.
⍟ How To Use ⍟
• Everything included in the pack so you can easily Re-Fud it open "PNG" and select the same options. will be undetected through all antiviruses.
• best directory to choose for your payload drop is appdata since it supports and works on every windows
• if it got detected through windows defender then u have poor assembly info better to use HQ assembly set which i provided here
Mega.nz Assembly Set use anyone u like.
⍟ Spreading Methods ⍟
you can buy malvertising at https://exploit.in/
remember targeting is more important than just spamming your sht xD
will i keep updating it?
• yes i will. if in anyway it got detected ill update it or give another re-fud method
if this thread didn't get deleted somehow.
is it detected?
• no its fully undetected since i posted this and it will remain for a good time i think
if you are facing detection with WD then you are doing something wrong i do private crypts for 10$
• when u spread your payload may get distributed always re-fud it with my method and with different assembly info
how to know if it got distributed? always scan through https://antiscan.me
If any issues or questions Telegram @JoseCmanXD
you can ask down below regarding anything and ill answer.
This post is by a banned member (WIkson2) - Unhide
15 June, 2022 - 09:42 PM
Reply
(15 June, 2022 - 09:15 PM)JoseCmanXDII Wrote: Show Morei'll try provide here everything u need to know
how to make it fully undetected + ready to spread
don't get me wrong but i was about to sell it but then i thought i would help ppls here trying to make money.
remember blackhat ppls isn't criminals :)
i will list the features and how to use and will leave some instruction and notes at the end
⍟ Features ⍟
• adds itself to windows defender exclusion (admin permission)
• mutex ( only one process at a time )
• delayed startup
• creating your own certificate
• hiding techniques
//download links
⍟ How To Use ⍟
• Everything included in the pack so you can easily Re-Fud it open "PNG" and select the same options. will be undetected through all antiviruses.
• best directory to choose for your payload drop is appdata since it supports and works on every windows
• if it got detected through windows defender then u have poor assembly info better to use HQ assembly set which i provided here
Mega.nz Assembly Set use anyone u like.
⍟ Spreading Methods ⍟
you can buy malvertising at https://exploit.in/
or you can do something like roobet crash predictor on youtube
or dig into nfts
remember targeting is more important than just spamming your sht xD
will i keep updating it?
• yes i will. if in anyway it got detected ill update it or give another re-fud method
if this thread didn't get deleted somehow.
is it detected?
• no its fully undetected since i posted this and it will remain for a good time i think
if you are facing detection with WD then you are doing something wrong i do private crypts for 10$
• when u spread your payload may get distributed always re-fud it with my method and with different assembly info
how to know if it got distributed? always scan through https://antiscan.me
If any issues or questions Telegram @JoseCmanXD
you can ask down below regarding anything and ill answer.
thanks man
This post is by a banned member (tapnnnn) - Unhide
26 June, 2022 - 05:41 AM
Reply
(15 June, 2022 - 09:15 PM)JoseCmanXDII Wrote: Show Morei'll try provide here everything u need to know
how to make it fully undetected + ready to spread
don't get me wrong but i was about to sell it but then i thought i would help ppls here trying to make money.
remember blackhat ppls isn't criminals :)
i will list the features and how to use and will leave some instruction and notes at the end
⍟ Features ⍟
• adds itself to windows defender exclusion (admin permission)
• mutex ( only one process at a time )
• delayed startup
• creating your own certificate
• hiding techniques
//download links
⍟ How To Use ⍟
• Everything included in the pack so you can easily Re-Fud it open "PNG" and select the same options. will be undetected through all antiviruses.
• best directory to choose for your payload drop is appdata since it supports and works on every windows
• if it got detected through windows defender then u have poor assembly info better to use HQ assembly set which i provided here
Mega.nz Assembly Set use anyone u like.
⍟ Spreading Methods ⍟
you can buy malvertising at https://exploit.in/
remember targeting is more important than just spamming your sht xD
will i keep updating it?
• yes i will. if in anyway it got detected ill update it or give another re-fud method
if this thread didn't get deleted somehow.
is it detected?
• no its fully undetected since i posted this and it will remain for a good time i think
if you are facing detection with WD then you are doing something wrong i do private crypts for 10$
• when u spread your payload may get distributed always re-fud it with my method and with different assembly info
how to know if it got distributed? always scan through https://antiscan.me
If any issues or questions Telegram @JoseCmanXD
you can ask down below regarding anything and ill answer.
ty
This post is by a banned member (csslll) - Unhide
26 June, 2022 - 02:57 PM
Reply
great share. really HQ stuff
This post is by a banned member (SigmaDictator) - Unhide
26 June, 2022 - 02:58 PM
Reply
This post is by a banned member (MaliciousWizard) - Unhide
27 June, 2022 - 10:35 AM
Reply
(15 June, 2022 - 09:15 PM)JoseCmanXDII Wrote: Show Morei'll try provide here everything u need to know
how to make it fully undetected + ready to spread
don't get me wrong but i was about to sell it but then i thought i would help ppls here trying to make money.
remember blackhat ppls isn't criminals :)
i will list the features and how to use and will leave some instruction and notes at the end
⍟ Features ⍟
• adds itself to windows defender exclusion (admin permission)
• mutex ( only one process at a time )
• delayed startup
• creating your own certificate
• hiding techniques
//download links
⍟ How To Use ⍟
• Everything included in the pack so you can easily Re-Fud it open "PNG" and select the same options. will be undetected through all antiviruses.
• best directory to choose for your payload drop is appdata since it supports and works on every windows
• if it got detected through windows defender then u have poor assembly info better to use HQ assembly set which i provided here
Mega.nz Assembly Set use anyone u like.
⍟ Spreading Methods ⍟
you can buy malvertising at https://exploit.in/
remember targeting is more important than just spamming your sht xD
will i keep updating it?
• yes i will. if in anyway it got detected ill update it or give another re-fud method
if this thread didn't get deleted somehow.
is it detected?
• no its fully undetected since i posted this and it will remain for a good time i think
if you are facing detection with WD then you are doing something wrong i do private crypts for 10$
• when u spread your payload may get distributed always re-fud it with my method and with different assembly info
how to know if it got distributed? always scan through https://antiscan.me
If any issues or questions Telegram @JoseCmanXD
you can ask down below regarding anything and ill answer.
thanks
This post is by a banned member (ralphh) - Unhide
27 June, 2022 - 04:53 PM
Reply
This post is by a banned member (Zluos) - Unhide
27 June, 2022 - 04:56 PM
Reply