(19 February, 2021 - 05:12 AM)Snyke Wrote: Show MoreUse on
RDP Only.
Crack use level:
Intermediate
This crack requires additional software to use.
Instructions:
Show ContentSpoiler:
Boot up HiveRAT Cracked.exe
Enter ANYTHING in the license key.
Click Activate.
Creating BUILD
(Default it's on 127.0.0.1, port 6969 Password: AESPassword )
1. Download
DnSpy https://github.com/dnSpy/dnSpy
2. Unpack Archive.
3. Upload
rat.exe to
DnSpy
4. Click on '-'
3. Find
Connection Class
4. Scroll down to start function
5. Edit method to change IP and port to
your VPS IP
6. Click on Connection.Read function
7. Find
array2 = EncryptionFunctions.XORBytes(array2, "AESPassword");
8. Right click "
Edit IL Instructions"
9. Double click on "
AESPassword"
10. Change to whatever password you want and click ok
11. If you wanna change settings click above on
Connection.encryptedconnection
RAT SSL:
Working
Hidden Browser:
Working
XMR Miner:
Working
hVNC:
Semi-Working
Password Recovery:
Working
Kill Regedit:
Not working
Process Protection:
Working
Keylogger:
Working
Extension Spoof:
Not working
Features that do not work is not because of the crack.
If you need the features this RAT attempted to rip off to try and compete with, check my signature.
Port forwarding instructions;
Show ContentSpoiler:
Step 1)
Control Panel > Firewall and Network > Allow an App through Firewall
> Select “VenomRemote cracked.exe”
Step 2)
Control Panel > Windows Defender Firewall > Advanced Settings
Step 3)
a) Inbound Rules > New Rule > Port > TCP > Specific Port you want
b) Inbound Rules > New Rule > Port > UDP > Specific Port you want
c) Outbound Rules > New Rule > Port > TCP > Specific Port you want
d) Outbound Rules > New Rule > Port > UDP > Specific Port you want
Step 4)
Build your server with your port and your VPS IP address or DNS.
Stub Scan:
You will need a good crypter with this software.
Use this software ONLY with an RDP.
Never your personal device.
Special thanks to Donald.
Leave a LIKE and post to unlock.
I'm a new user here, nice to meet.
(19 February, 2021 - 05:12 AM)Snyke Wrote: Show MoreUse on
RDP Only.
Crack use level:
Intermediate
This crack requires additional software to use.
Instructions:
Show ContentSpoiler:
Boot up HiveRAT Cracked.exe
Enter ANYTHING in the license key.
Click Activate.
Creating BUILD
(Default it's on 127.0.0.1, port 6969 Password: AESPassword )
1. Download
DnSpy https://github.com/dnSpy/dnSpy
2. Unpack Archive.
3. Upload
rat.exe to
DnSpy
4. Click on '-'
3. Find
Connection Class
4. Scroll down to start function
5. Edit method to change IP and port to
your VPS IP
6. Click on Connection.Read function
7. Find
array2 = EncryptionFunctions.XORBytes(array2, "AESPassword");
8. Right click "
Edit IL Instructions"
9. Double click on "
AESPassword"
10. Change to whatever password you want and click ok
11. If you wanna change settings click above on
Connection.encryptedconnection
RAT SSL:
Working
Hidden Browser:
Working
XMR Miner:
Working
hVNC:
Semi-Working
Password Recovery:
Working
Kill Regedit:
Not working
Process Protection:
Working
Keylogger:
Working
Extension Spoof:
Not working
Features that do not work is not because of the crack.
If you need the features this RAT attempted to rip off to try and compete with, check my signature.
Port forwarding instructions;
Show ContentSpoiler:
Step 1)
Control Panel > Firewall and Network > Allow an App through Firewall
> Select “VenomRemote cracked.exe”
Step 2)
Control Panel > Windows Defender Firewall > Advanced Settings
Step 3)
a) Inbound Rules > New Rule > Port > TCP > Specific Port you want
b) Inbound Rules > New Rule > Port > UDP > Specific Port you want
c) Outbound Rules > New Rule > Port > TCP > Specific Port you want
d) Outbound Rules > New Rule > Port > UDP > Specific Port you want
Step 4)
Build your server with your port and your VPS IP address or DNS.
Stub Scan:
You will need a good crypter with this software.
Use this software ONLY with an RDP.
Never your personal device.
Special thanks to Donald.
Leave a LIKE and post to unlock.
Doesn't even work, dnSpy method clearly won't.
The type 'TcpClient' exists in both 'System.Net.Sockets, bla blaa...
With four of those similar errors, clearly doesn't.