Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 1720

[UNDETECTED] KEMATIAN GRABBER [OPEN SOURCE] [FREE]

by xxOpenxx - 30 June, 2024 - 08:13 PM
This post is by a banned member (encod3d) - Unhide
encod3d  
Infinity
70
Posts
0
Threads
2 Years of service
#9
Still undetected by most AVs.
[Image: hackerman_xmas.gif] 4c 6f 6f 6b 20 62 65 68 69 6e 64 20 79 6f 75 20 3a 28 [Image: hackerman_xmas.gif]
This post is by a banned member (SendalJepit1) - Unhide
59
Posts
0
Threads
#10
(30 June, 2024 - 08:13 PM)xxOpenxx Wrote: Show More
Kematian Stealer is a PowerShell-based tool designed to effortlessly infiltrate and exfiltrate data from Windows systems. All information collected is transmitted via TCP to your C2 server, where everything is decrypted



rhx
This post is by a banned member (prad1z) - Unhide
prad1z  
Supreme
95
Posts
2
Threads
#11
thx bro [Image: riot2.gif]
This post is by a banned member (NDexRex) - Unhide
NDexRex  
Registered
75
Posts
0
Threads
#12
gg
This post is by a banned member (udiabo) - Unhide
udiabo  
Registered
165
Posts
0
Threads
#13
(30 June, 2024 - 08:13 PM)xxOpenxx Wrote: Show More
Kematian Stealer is a PowerShell-based tool designed to effortlessly infiltrate and exfiltrate data from Windows systems. All information collected is transmitted via TCP to your C2 server, where everything is decrypted



ty
This post is by a banned member (LucasBeatZzZ) - Unhide
This post is by a banned member (ARIMADEV727) - Unhide
5
Posts
0
Threads
#15
(30 June, 2024 - 08:13 PM)xxOpenxx Wrote: Show More
Kematian Stealer is a PowerShell-based tool designed to effortlessly infiltrate and exfiltrate data from Windows systems. All information collected is transmitted via TCP to your C2 server, where everything is decrypted


fsdafsdaafsdasfdsd
This post is by a banned member (amkenzo) - Unhide
amkenzo  
Registered
120
Posts
0
Threads
1 Year of service
#16
(30 June, 2024 - 08:13 PM)xxOpenxx Wrote: Show More
Kematian Stealer is a PowerShell-based tool designed to effortlessly infiltrate and exfiltrate data from Windows systems. All information collected is transmitted via TCP to your C2 server, where everything is decrypted





Nice one... great

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 3 Guest(s)