NOTE: I AM NOT ENCOURAGING THE DISEMINATION OF RATs and BOTNETS. My services are provided for the benefit of pentesters and security professionals only, or those interested for educational reasons. By contacting me, you agree that you are absolutely a security professional or merely a lover of knowledge, and you're contacting me for educational or vocational purposes. If you use my advice to access servers that dont belong to you, I take no liability. It's your dumb fault.
My only contact is over telegram (@hi_sexbot). I will only respond to PMs on this forum to confirm my identity. If you have XMPP, ask me for it over telegram. I do prefer its security protocols. I only accept crypto. I don't take kindly to fuckers. I'm new on this forum because this forum has an absolute death of functional cryptography, malware resources, and so on, though not a dearth of people trying to RAT STUFF!!!! I am the only infosec consultant who has worked with big outfits, for both the good guys and the bad guys.
I have been a developer, project manager, and director of training and operations for companies working to incorporate remote systems administration--aka RATs, botnets, the like--into their greater operations, and, early on, I was a pentester, before I realized that the pentesters were losing. In the last phase of my career, I've been working as a consultant, usually, but not exclusively, for the bad guys. My specialty is in helping practitioners to monetize their ideas, perfect their systems, and instruction. Oh, and traffic. Everyone fucks up traffic.
I am not cheap, but I am extremely good at what i do. If you have ever struggled to get a remote server online or to populate it with clients. I can advise you as to how to proceed. If you have an isolated problem identified in your workflow, I can help you correct it. If you want me to build you a system from scratch, I can do that too. Prices begin at $300, with an initial outlay of $500 recommended at minimum. I encourage clients to approach remote systems as a second income--and it can be lucrative--once they already have a study revenue stream. If you have found yourself looking for an investment opportunity, this can be a curious one.
I have no menu of prices. All work is done to order, based on my client's specifications. All of the software I recommend, and all of the systems that I use, are private, which is to say, they are things that I have developed over the course of years of trial and error. You can't google me, or most of the exploits and tools that i am familiar with, and I like it that way. What you get with me is a software implementation built around your needs, nothing more, nothing less. If you need custom exploitational frameworks, consulting, etc, if you want to actually create a system that works, and continues to work, please get in touch.
Here are my areas of specialization:
0. APK crypting, binding, traffic: I can neither confirm nor deny that...oh wait, it's an open secret. the Google Play Store is full of infected apps. Perhaps your clients require this sort of pentesting. It's pretty cool.
1. Hosting: I know where to host your project, and it's not on a so-called bulletproof server. I know the best domain to purchase.
2. Software: I recommend exclusively private software, because public options are not of great use. Regardless, I know what's out there in the field, whether we're talking about loaders, stealers, clippers, hidden VNC and RDP banking bots (not currently), Android solutions, and the like.
3. Exploits and vulnerabilities: For payload dissemination, i know what exploitational vectors are currently popular and available, and how to best use them. Whether you want to send google ads traffic to a fake website, send a file via redirect link through spam mail, or just know you need more clients, I can help you find them. Want to infect through redirects?
4. Cryptography: There are a lot of current misconceptions about crypting. I don't aim at making your file FUD. FUD is a dumb term. I aim at making your file do what you need it to without being detected. The highlight of my cryptographic arsenal is a backdoored clean application. You can hold bots using this tool for months on end. Also, I can deploy your payload without dropping your file on disk. I can embed your shit in a photo, or in a couple other things. Anyone trying to glue shit for you is probably going to rob you. If you're paying less than 1000, they are DEFINITELY trying to rob you. I don't want to rob you.
5. Teaching. If you want to learn it, I can teach it, and well. I offer a comprehensive introduction to malware and malware protection. It can be adjusted based on your particular aims and interests.
I know my shit. If you think you might need my services, drop a line.
My only contact is over telegram (@hi_sexbot). I will only respond to PMs on this forum to confirm my identity. If you have XMPP, ask me for it over telegram. I do prefer its security protocols. I only accept crypto. I don't take kindly to fuckers. I'm new on this forum because this forum has an absolute death of functional cryptography, malware resources, and so on, though not a dearth of people trying to RAT STUFF!!!! I am the only infosec consultant who has worked with big outfits, for both the good guys and the bad guys.
I have been a developer, project manager, and director of training and operations for companies working to incorporate remote systems administration--aka RATs, botnets, the like--into their greater operations, and, early on, I was a pentester, before I realized that the pentesters were losing. In the last phase of my career, I've been working as a consultant, usually, but not exclusively, for the bad guys. My specialty is in helping practitioners to monetize their ideas, perfect their systems, and instruction. Oh, and traffic. Everyone fucks up traffic.
I am not cheap, but I am extremely good at what i do. If you have ever struggled to get a remote server online or to populate it with clients. I can advise you as to how to proceed. If you have an isolated problem identified in your workflow, I can help you correct it. If you want me to build you a system from scratch, I can do that too. Prices begin at $300, with an initial outlay of $500 recommended at minimum. I encourage clients to approach remote systems as a second income--and it can be lucrative--once they already have a study revenue stream. If you have found yourself looking for an investment opportunity, this can be a curious one.
I have no menu of prices. All work is done to order, based on my client's specifications. All of the software I recommend, and all of the systems that I use, are private, which is to say, they are things that I have developed over the course of years of trial and error. You can't google me, or most of the exploits and tools that i am familiar with, and I like it that way. What you get with me is a software implementation built around your needs, nothing more, nothing less. If you need custom exploitational frameworks, consulting, etc, if you want to actually create a system that works, and continues to work, please get in touch.
Here are my areas of specialization:
0. APK crypting, binding, traffic: I can neither confirm nor deny that...oh wait, it's an open secret. the Google Play Store is full of infected apps. Perhaps your clients require this sort of pentesting. It's pretty cool.
1. Hosting: I know where to host your project, and it's not on a so-called bulletproof server. I know the best domain to purchase.
2. Software: I recommend exclusively private software, because public options are not of great use. Regardless, I know what's out there in the field, whether we're talking about loaders, stealers, clippers, hidden VNC and RDP banking bots (not currently), Android solutions, and the like.
3. Exploits and vulnerabilities: For payload dissemination, i know what exploitational vectors are currently popular and available, and how to best use them. Whether you want to send google ads traffic to a fake website, send a file via redirect link through spam mail, or just know you need more clients, I can help you find them. Want to infect through redirects?
4. Cryptography: There are a lot of current misconceptions about crypting. I don't aim at making your file FUD. FUD is a dumb term. I aim at making your file do what you need it to without being detected. The highlight of my cryptographic arsenal is a backdoored clean application. You can hold bots using this tool for months on end. Also, I can deploy your payload without dropping your file on disk. I can embed your shit in a photo, or in a couple other things. Anyone trying to glue shit for you is probably going to rob you. If you're paying less than 1000, they are DEFINITELY trying to rob you. I don't want to rob you.
5. Teaching. If you want to learn it, I can teach it, and well. I offer a comprehensive introduction to malware and malware protection. It can be adjusted based on your particular aims and interests.
I know my shit. If you think you might need my services, drop a line.