ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Pony 2.2 HTTP Botnet [LOADER, STEALER & GRABBER][PANEL+BUILDER]


  • Please log in to reply
Pony 2.2 HTTP Botnet [LOADER, STEALER & GRABBER][PANEL+BUILDER]

#21

ContjeJr
ContjeJr
    Offline
    327
    Rep
    2131
    Likes

    I Just Wanna Get Rich. Roll Thoink's Get Lit.

Posts: 1772
Threads: 214
Joined: Apr 19, 2017
Credits: 0

Six years registered
#21

Pm me for an offer if you wan't. I don't do it free. Have more things to do :D

 

pls who can host this for me


  • 0

Posted ImagePosted Image


#22

pruned_16591499
pruned_16591499
    Offline
    1
    Rep
    -2
    Likes

    Addicted

  • PipPipPipPipPip
Posts: 164
Threads: 7
Joined: Mar 17, 2016
Credits: 0
Eight years registered
#22

Pm me for an offer if you wan't. I don't do it free. Have more things to do :D

Lol i've just done that. But i see this error

"gmp" extension installed - FAIL!


 


  • 0

#23

ContjeJr
ContjeJr
    Offline
    327
    Rep
    2131
    Likes

    I Just Wanna Get Rich. Roll Thoink's Get Lit.

Posts: 1772
Threads: 214
Joined: Apr 19, 2017
Credits: 0

Six years registered
#23

Lol i've just done that. But i see this error

"gmp" extension installed - FAIL!


 

Lemme pm ya with my skype :D


  • 0

Posted ImagePosted Image


#24

costikh
costikh
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 14
Threads: 0
Joined: Jan 20, 2017
Credits: 0
Seven years registered
#24

thanks let me test it


  • 0

#25

pruned_73565102
pruned_73565102
    Offline
    0
    Rep
    0
    Likes

    Lurker

  • Pip
Posts: 3
Threads: 0
Joined: Mar 03, 2017
Credits: 0
Seven years registered
#25

i will wanna see this work


  • 0

#26

sharkwhite
sharkwhite
    Offline
    0
    Rep
    14
    Likes

    Member

  • PipPipPip
Posts: 66
Threads: 14
Joined: Jan 23, 2017
Credits: 10

Seven years registered
#26

first It is better to install it on a Russian or Ukrainian server and domain

Which is already compatible with Russian
Or it will be a finger in her ass to configure her
On a server that has not enabled the Russian language
 
Second always check the files before using them
Many security researchers
They put a shell or other shit and tease it
So the poor bumblebees are arrested
 
Third pays the server and the domain with bitcoin or some prepaid card
Not headed for your name
 
oh ja security researchers scan net every day 24h24 To search for servers
c & c Then destroy and change servers frequently
 
Malware Hunter is a tool for finding command and control servers
Shodan and Recorded Future launched yesterday a search engine to discover command and control servers that are behind the malware to create botnets. Called Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering connected devices on the Internet.
 
Malware Hunter is based on search bots that crawl the Internet to find computers that serve as a command and control server for a botnet. In its intention to deceive the command and control server to show its location, the search bot uses several predefined requests that pretend to impersonate an infected computer to report to the command and control server. If the scanned computer responds, Malware Hunter registers the IP and makes it available from the Shodan interface.
Each of the two companies behind Malware Hunter plays a role. While Shodan offers the ability to demonstrate each Internet IP address quickly and efficiently, Recorded Future is contributing the technical information needed to mimic infected computers (malware bots).
 
"This methodology is the first one used by Shodan to locate Remote Access Trojans (RAT) controllers before the malware samples are found," said Levi Gundert, vice president of Intelligence and Strategy at Recorded Future. "Doing it this way, performing signature scans for the RAT IP address controller, observing malware through our API and correlating across a variety of sources, we are able to locate RAT drivers before the associated malware starts. Scatter or compromise the target victims, "he continued.
 

Please Login or Register to see this Hidden Content

The technical details of what is behind the search and identification process of the command and control servers can be consulted through this 15 page report published by Recorded Future.
 
MALWARE HUNTER ALREADY IDENTIFIES A LARGE AMOUNT OF CONTROLS AND RAT CONTROL
The Malware Hunter engine already comes with support for identifying a variety of command and control servers used for RATs, such as Dark Comet, njRAT, Poison Ivy and Ghost RAT, plus others.
 
In the future, the Malware Hunter search engine is expected to be able to discover other types of malware related to botnets, such as backdoor Trojans, cybersquatting malware, cryptominers, and malware to perform DDoS attacks.

Edited by sharkwhite, 08 May 2017 - 07:31 AM.

  • 0

#27

AleCole16
AleCole16
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 14
Threads: 0
Joined: May 08, 2017
Credits: 0
Six years registered
#27
Figa

  • 0

#28

zjfischer
zjfischer
    Offline
    0
    Rep
    16
    Likes

    Professional Penis Toucher

Posts: 159
Threads: 3
Joined: Mar 31, 2017
Credits: 0
Seven years registered
#28

Thanks! But... This or Loki... Dunno...


  • 0

#29

pruned_18795979
pruned_18795979
    Offline
    0
    Rep
    1
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 99
Threads: 3
Joined: Dec 08, 2016
Credits: 0
Seven years registered
#29

keep it up


  • 0

#30

pruned_45228936
pruned_45228936
    Offline
    0
    Rep
    1
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 76
Threads: 1
Joined: Apr 29, 2017
Credits: 0
Six years registered
#30

ty


  • 0


 Users browsing this thread: