Фильтр публикаций


Unique Opportunity: Get Xworm or Venom RAT with Active Clients!

- XWorm: 500 infected clients - only $1000
- Venom RAT: 800 infected clients - only $1000

Offer Details:

After payment confirmation, you’ll receive the full WireGuard configuration, including IP and PORT, to access all clients directly on your Xworm or Venom.

Hurry:
This is a temporary offer! Take advantage while it lasts.


Репост из: Drainer Repo
Launch Your Own Crypto Exchange Today!

➖Get a fully functional exchange source code with a professional dashboard for just $300!

🟠 Secure & Reliable
🟠 Easy to Customize
🟠 Fast Deployment

🔥Limited-time offer—don’t miss out!

DM now to get started!




Репост из: Hook
Hook Botnet fully updated and fixed, with various improvements — 1000 USDT for just 300 USDT (70% OFF)

These files have never been leaked. Unlike the recently leaked Hook with similar but inferior updates, these files were updated by us at Threat.


Репост из: PEGASUS
Видео недоступно для предпросмотра
Смотреть в Telegram
PEGASUS by SKYNET

Licenses: Use on 2 PCs by default. Need more? Add additional devices for $200 each

Pricing:
$500: 1-month access (free monthly updates included)
$1000: 2-month access (free monthly updates included)
$3000: Lifetime license (free monthly updates included)


Репост из: PEGASUS
We are in the final stretch of our updates.
Soon, we will make our VNC PRO remote access available to everyone, the most sophisticated on the market.


Hello everyone! We were absent for a few days due to personal matters, and our bots were experiencing some issues. The bots are now back to normal. We kindly ask for your patience and cooperation as we respond and provide support one by one. Due to the backlog of requests, it may take up to 24 hours to get to you, so please don’t worry—just wait, and we will address each case individually.


Репост из: Threat


Репост из: Threat
GhostSpy C2 Panel: The domain https://storeappweb.com/ hosts a C2 control panel for GhostSpy.
Open Directory of APK Samples: On the same domain, there is an accessible directory at https://storeappweb.com/uploads/ with over 50 APK samples, likely all or mostly related to GhostSpy.

#Obfuscated #ELF: An ELF file was found that appears to be a variant of the #Mirai malware.
Malware URLs:
http://185.196.10.215:12234/mips.bin
http://185.196.10.215:12234/x86_64.bin

They made an attempt to hide by using port 12234 and the .bin file extension.


Репост из: Threat
FOFA as always supporting our threat intelligence work effectively:

1. GhostSpy operating in LATAM (Brazil) focused on banking fraud:

191.96.78.250
37.60.233.14:3000
mt2gm.org

GhostSpy revealed—it’s GoatRAT/FantasyMW.

Tools Used: Jadx, FOFA, ipinfo

FOFA Link




Репост из: Threat
certificado.apk detected from Spain:
Hash: e9f2f6e47e071ed2a0df5c75e787b2512ba8a601e55c91ab49ea837fd7a0fc85
Source:
https://app-aeat.com/tributaria/loading.php

https://app-aeat.com/tributaria/certificado.apk








Репост из: 安卓APP管理系统
安卓APP管理系统

安卓APP管理系统
应用下载

账号: AppMgmtSystem337
密码: AppMgmtSystem337


售后/商务洽谈:@AppMgmtSystem337_bot

Показано 16 последних публикаций.