Full Infos(ccs etc)
Demon Hunter Exploit Kit 1.0 (01.11.2014)
Oracle Java SE Remote Java Runtime Environment Vulnerability (CVE-2013-2460)
Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2013-2551)
How to install?its really easy!
1) go and change www.evildomain.com/demonhunter/config.php file (base user password ,login,password etc)
2) go to www.evildomain.com/demonhunter/install and install datebase to u host
3) go to www.evildomain.com/demonhunter/statistics/statistics.php and login up
4)change payload.exe to ur exe file and call ir “payload.exe”
Link for traff is www.evildomain.com/demonhunter/index.php
% of payload mix is 7-11%,ru is 5-7%,usa is 7-10%,for start it is very nice….
Will continue to work!
HTTP Post Flood
HTTP Get Flood
Download to Location
Download to Location and Execute
Download And Execute
Download And Execute (use commandline args)
Download and Inject
Download and Inject (to specific process)
Download and Inject (use commandline args)
Update (confirm MD5 hash)
Start Reverse Socks5 Proxy
Visit Webpage Visibly
Visit Webpage Hiddenly
Set Homepages (Chrome, Firefox, IE)
Submit Shell Command
Private Spotify Scam page 2019 | 22+ language
Over 22 Language ⭐
Anti bot servers
Source code encryption
VBV/3D All country [ ON/OFF ]
Country Lock [ ON/OFF ]
Silent Java drive by Script(Exploit)
Bowser Silent Exploitation (2018) POC:
Since 2010 I was following the browser exploits of (Silent Java drive by) methods and techniques, and after 2016 I’ve never heard of another “silent drive by” on the Markets, but another critical thing came through Browser Local storage.
as an example, to show how an attacker could force any PC system to download a executable file onto the system just directing the victim to visit a webpage no clicks needed.
Unlike the old Java Drive by methods which have been patched for many years, which used jar applets to allow VBS to execute on the local systems browser TMP folder.
This exploit works by using the browser Local Storage abilities, 90% of web browsers have built in Local Storage cache abilities which allow the them to store files onto the system and reference to these files later when re visiting the website. This allows the browser to reload images and video / SWF content of the website faster than it would normally load the content on the webpage by download.
Blockchain Scam/Phishing Page 2018
Blockchain Scam / Phishing Page 2018
Logs via FTP / Mail
without admin panel