Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 37633

Ancalog Exploit Builder v16.8.19

by benjaminstrike - 05 May, 2019 - 10:18 PM
This post is by a banned member (z111y) - Unhide
z111y  
Registered
7
Posts
0
Threads
1 Year of service
[font][font]гр[/font][/font]
This post is by a banned member (toineangdw) - Unhide
135
Posts
0
Threads
1 Year of service
thanks nice share quality
This post is by a banned member (tombstone5) - Unhide
This post is by a banned member (fedy1121) - Unhide
fedy1121  
Registered
46
Posts
0
Threads
5 Years of service
good joob man
This post is by a banned member (Kryptik7) - Unhide
Kryptik7  
Registered
104
Posts
0
Threads
1 Year of service
[font]nice[/font]
This post is by a banned member (tahatuzcuxd) - Unhide
15
Posts
0
Threads
1 Year of service
tytyty
This post is by a banned member (ppsigns) - Unhide
ppsigns  
Registered
155
Posts
0
Threads
2 Years of service
(05 May, 2019 - 10:18 PM)benjaminstrike Wrote: Show More
Ancalog Multi Exploit Builder
The exploit builder generates malicious documents, such as Word and PDF documents, Excel workbooks, CHM - compiled help files, and HTML pages. Most of them serve as downloaders, with the final payload stored at a website which is then downloaded and executed by the malicious code. In a few cases the generated document stores the entire payload file within. As a result, there is no need to reach out to an external web location as the malicious content is extracted from the document and executed from there.

Exploit: PDF, DOC, HTML

Contents: https://gyazo.com/1b0c46a8c4f324fa747066e1400b029e
Builder: https://gyazo.com/7fad4c65b90c1e7a2f8c378ff4620a39

Download


Virustotal: https://www.virustotal.com/#/file/916150.../detection


DON'T BE A LEECHER!

tnk
This post is by a banned member (BIG_Jingle) - Unhide
56
Posts
0
Threads
1 Year of service
(05 May, 2019 - 10:18 PM)benjaminstrike Wrote: Show More
Ancalog Multi Exploit Builder
The exploit builder generates malicious documents, such as Word and PDF documents, Excel workbooks, CHM - compiled help files, and HTML pages. Most of them serve as downloaders, with the final payload stored at a website which is then downloaded and executed by the malicious code. In a few cases the generated document stores the entire payload file within. As a result, there is no need to reach out to an external web location as the malicious content is extracted from the document and executed from there.

Exploit: PDF, DOC, HTML

Contents: https://gyazo.com/1b0c46a8c4f324fa747066e1400b029e
Builder: https://gyazo.com/7fad4c65b90c1e7a2f8c378ff4620a39

Download


Virustotal: https://www.virustotal.com/#/file/916150.../detection


DON'T BE A LEECHER!

bbb

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)