Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 1736

SMS Spoofer [Worldwide] Uses Twilio|Token Included|Custom SID =text as SMS sender

by WagwanAnon - 12 August, 2024 - 01:28 PM
This post is by a banned member (knzz0) - Unhide
knzz0  
Supreme
175
Posts
13
Threads
1 Year of service
#9
(12 August, 2024 - 01:28 PM)WagwanAnon Wrote: Show More
Working as of today. Tested with US and UK mobile numbers. Sender name works.

WARNING! THIS IS A RAT.

telegram bot your info is sent to: https://t.me/XWBTGbot  | https://api.telegram.org/bot6872620743:A...6231354707{"ok":true,"result":{"message_id":1467,"from":{"id":6872620743,"is_bot":true,"first_name":"XWBTG","username":"XWBTGbot"},"chat":{"id":6231354707,"first_name":"Alex","last_name":"He that is I","username":"richaiguy","type":"private"},"date":1723773730,"text":"\u2620 [XWorm V5.6]\n\nNew Clinet : \n16C0AFDBD518F2641677\n\nUserName : WALKER\nOSFullName : Microsoft Windows 7 Enterprise \nUSB : False\nCPU : Intel i7-8565U @ 1.80GHz\nGPU : Standard VGA Graphics Adapter \nRAM : 1.49 GB\nGroub : X"}}his telegram @:  @richaiguyns: http://alexthedns.com/ (on port 4444)
client he is using: QuasarRAT (free) + XWorm
ip traffic:
  • TCP 204.79.197.203:443
  • UDP 192.168.0.60:137
  • TCP 20.99.133.109:443
  • TCP 23.216.81.152:80 (www.microsoft.com)
  • UDP 8.8.8.8:53
  • TCP 3.14.113.26:21630
  • TCP 3.16.211.183:21630 (7.tcp.ngrok.io)
  • TCP 52.14.81.142:21630
pastebin for ngrok: https://pastebin.com/nAXieb7q

Once you run the code your passwords, history and cookies are instantly stolen.
IF you downloaded and opened this delete anything like:

Google Chrome.exe
XClient.exe
qdll.exe
Telegram.exe
rundll.exe
winrom.exe


you can spam his bot like this:
 
Code:
 
import requests
import time
def send_message():
    url = "https://api.telegram.org/bot6872620743:AAEFwfkZ1pLwK8-kGOHZsSj688zyN4HtN0w/sendMessage"
    data = {
        "chat_id": "6231354707",
        "text": "fuck you bruda. cracked.io/knzz0"
    }
    response = requests.post(url, data=data)
    print(response.text)
def main():
    num_messages = 1000000  
    for _ in range(num_messages):
        send_message()
if __name__ == "__main__":
    main()
knzz
This post is by a banned member (Saduzik) - Unhide
Saduzik  
Registered
140
Posts
0
Threads
1 Year of service
#10
Thank you i well try this Popcorn
This post is by a banned member (BonerHasli20) - Unhide
161
Posts
0
Threads
#11
Your perspective is invaluable, thank you!
This post is by a banned member (gebated7) - Unhide
gebated7  
98
Posts
0
Threads
#12
nojokok
This post is by a banned member (111supreme) - Unhide
37
Posts
0
Threads
#13
Legit?
This post is by a banned member (kalenberi) - Unhide
kalenberi  
Registered
112
Posts
0
Threads
1 Year of service
#14
Thanksyouu
This post is by a banned member (AlIIqbal) - Unhide
AlIIqbal  
Registered
61
Posts
0
Threads
#15
lemme check
This post is by a banned member (anonekpla) - Unhide
anonekpla  
Registered
65
Posts
0
Threads
#16
bro this shit is so illegall....

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)