Advertisement
Guest User

Rdp 2003/2008 = Shells = Mailers = cPanels = Smtp = Leads =

a guest
Aug 13th, 2015
883
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.56 KB | None | 0 0
  1. Rdp 2003/2008 = Shells = Mailers = cPanels = Smtp = Leads = E+P
  2.  
  3.  
  4. Welcome Guys
  5.  
  6. New Update " Cards " Tools " Accounts "
  7.  
  8. - Credit Cards
  9. Visa,Master,Amex,Discovery CARD VALID RATES: 90%
  10.  
  11. New update "All Stuff" and
  12. "All Accounts"
  13. - Shells Linux and Windows
  14. - SMTPs IP and Domain
  15. - Cpanels
  16. -
  17. Mailers
  18. - Leads
  19. - Webmails
  20. - Paypal
  21. - UPS
  22. - eBay
  23. - Fedex
  24. - Email &
  25. Password List
  26. - Match
  27. - Walmart
  28. - NewEgg
  29.  
  30. Yes File.exe fud Crypt Service
  31. C++, Automatic, 0/35, instant buy Result
  32.  
  33. -----------------------------------
  34. Crypt Service
  35. -----------------------------------
  36.  
  37. We are an online automatic crypting service which offers high quality crypts any time of the day and any day of the week. All payments are made through bitcoin, and are usually processed instantly.
  38.  
  39. Jabber support is available,support to do manual crypting. All crypts must be done. We work best with natively coded bots (coded in C++, C, ASM, etc).
  40.  
  41. Scan can be viewed before you buy, so you know exactly what you are getting. Crypter is usually 0/35 (how to client also make and refud crypt to client)
  42.  
  43. -----------------------------------
  44. Features
  45. -----------------------------------
  46.  
  47. - Low stub size, 60-70kb
  48. - Coded in C++
  49. - Good execution rate, works on windows all systems 2000 xp/vista/win7/8- windows 10 inclusive
  50. - instantly available any time of the day
  51. - Anonymous
  52. - Works with; smoke loader, andromeda, madness ddos, betabot, zeus, neutrino, citadel, and many others
  53. -----------------------------------
  54. Price and payment
  55. -----------------------------------
  56.  
  57. All payments are made through PerfectMoney and BITCOIN (BTC).
  58.  
  59. Price is 0.044 = dollars = 8$ bitcoin per crypt.
  60.  
  61. ten crypt prices = 0.3 BTC = 73.11 $ dollars
  62.  
  63. BUY AT:
  64.  
  65. -----------------------------------
  66. Support = icq and jabber
  67. -----------------------------------
  68.  
  69. Subscription crypt service is available contact support for prices
  70.  
  71. ICQ = 687268202
  72. Jabber: monetization2015@exploit.im
  73.  
  74.  
  75. ======================================================================
  76. ======================================================================
  77. ======================================================================
  78.  
  79. http://s7.hostingkartinok.com/uploads/images/2015/06/9d7269c1d4e601eb7daec1c0dfeaeb8a.jpg
  80.  
  81. Exploit kit RIG v3.0
  82.  
  83. We are glad to introduce you to a bunch of exploits kit
  84. Are pleased our exploits Pack RIG v3.0
  85.  
  86. -Work On all WindowsOS 32 / 64bit
  87.  
  88. -Bypass UAC on exploits
  89.  
  90. -Frequent cleaning + cleaning on request
  91.  
  92. -High load support
  93.  
  94. -Always our clean and trust domains with automatic check
  95.  
  96. Each account has a 1 stream and can ship 1 different exe
  97.  
  98.  
  99. API with automatic generate link
  100.  
  101. Текущие сплоиты:
  102. Current exploits:
  103.  
  104. IE7-8-9-10: CVE and new updates
  105. Flash: CVE-2015 - CVE updates
  106. Windows: CVE- updates
  107.  
  108. An average sample rate - 25-35%
  109.  
  110. Exploit rate depends on traffic source
  111.  
  112. Price Rent/Cost:
  113.  
  114. /Day - 30 usd
  115. /Week - 150 usd
  116. /Month - 300 usd
  117.  
  118. complect builder pack and source code scripts price = 800$
  119.  
  120. *OTR Accept
  121.  
  122. We Accept English Speaking Users,
  123.  
  124. You can Pay PerfectMoney And Bitcoin
  125.  
  126. icq = 687268202
  127. Jabber: monetization2015@exploit.im
  128.  
  129.  
  130.  
  131. =======================================================
  132. =======================================================
  133. =======================================================
  134.  
  135.  
  136. http://s7.hostingkartinok.com/uploads/images/2015/06/ea8c603a69828b3aaf894368def85d36.png
  137.  
  138. Microsoft Office Word Exploits
  139. universal .doc exploit-pack
  140.  
  141.  
  142.  
  143. MICROSOFT WORD INTRUDER (MWI)
  144.  
  145. MWI - professional "means of delivery", the exploit pack on the basis of a number of the most urgent one-day vulnerabilities in the products of Microsoft Office Word. Document generated MWI may contain exploits with up to 4 at once:
  146.  
  147. 1. CVE-2010-3333
  148. 2. CVE-2012-0158
  149. 3. CVE-2013-3906
  150. 4. CVE-2014-1761
  151.  
  152. And updates private exploits to clients
  153.  
  154. Executable .exe file may be contained in the body of the document itself, and extend the link to the web-server. What distinguishes this exploit from all other solutions:
  155.  
  156. Uniqueness MWI - this is the only solution on the market .doc exploits,
  157. which represents multieksployt and attack multiple vulnerabilities simultaneously.
  158. This approach increases the chances of success and allows to attack two vectors update:
  159. Operating system and Office suite of applications itself.VersatilityMWI covers almost the whole
  160. range of versions of Microsoft Office: Word XP, Word 2003, Word 2007, Word 2010. Each exploit
  161. is implemented to be able to attack as much as possible the vulnerable versions
  162. and operating systems. Coverage of vulnerable systems MWI favorably with all alternatives.
  163.  
  164. Exploit the most independent of all sorts of conditions for a successful attack: whether the version of the software installed in the system or certain defenses OS. Each stage of exploit careful attention to detail.Bypass protectionExploit the most complicates their detection: each element is protected from the exploit detected by a complex of means: from the banal to the polymorphism of obfuscation and encryption. Each generated exploit has its own unique signature, maximum randomized structure and data. In addition to the counter signature methods exploit uses a variety of methods to bypass proactive (behavioral) detection equipment. In particular, the launch .exe-file made from a trusted system process context.Support and continuous developmentMWI for a wide audience was introduced to the market, although its first versions were created and used in a rather narrow circle of people. The project progressively refine and improve, acquiring new exploits and modules vkontse fully formed to exploit the whole pack with a flexible, modular architecture. The project is constantly evolving and not static. We regularly release updates that make cleaning supplement exploit pack new exploits and modules. We are committed to long-term cooperation.
  165.  
  166. innovation
  167.  
  168. Additional Information:
  169.  
  170. CVE-2010-3333: RTF pFragments Stack Buffer Overwrite Remote Code Execution Exploit [MS10-087]
  171.  
  172. EXPLOITABLE WORD VERSIONS:
  173. Word 2003 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  174. Word 2007 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  175. Word 2010 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  176.  
  177. VULNERABLE MODULE PATHS:
  178. Word 2003 C:\Program Files\Common Files\Microsoft Shared\office11\mso.dll
  179. Word 2007 C:\Program Files\Common Files\Microsoft Shared\office12\mso.dll
  180. Word 2010 C:\Program Files\Common Files\Microsoft Shared\office14\mso.dll
  181.  
  182. PATCHES:
  183. Word 2003 mso.dll 11.0.8329.0000
  184. Word 2007 mso.dll 12.0.6545.5004
  185. Word 2010 mso.dll 14.0.5128.5000
  186.  
  187. alternative solutions: Complete versatility and reliability, the only universal and real working solution
  188.  
  189. CVE-2012-0158: MSCOMCTL.OCX ListView Stack Buffer Overwrite Remote Code Execution Exploit [MS12-027]
  190. EXPLOITABLE WORD VERSIONS:
  191. Word 2003 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  192. Word 2007 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  193. Word 2010 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  194.  
  195. VULNERABLE MODULE PATHS:
  196. C:\WINDOWS\system32\MSCOMCTL.OCX
  197. C:\Windows\SysWOW64\MSCOMCTL.OCX
  198.  
  199. EXPLOITABLE VERSIONS:
  200. MSCOMCTL.OCX 6.01.9545
  201. MSCOMCTL.OCX 6.01.9782
  202. MSCOMCTL.OCX 6.01.9786
  203. MSCOMCTL.OCX 6.01.9813
  204. MSCOMCTL.OCX 6.01.9816
  205. MSCOMCTL.OCX 6.01.9818
  206.  
  207. PATCHES:
  208. MSCOMCTL.OCX 6.01.9833
  209. MSCOMCTL.OCX 6.01.9834
  210.  
  211. * the vulnerability is not present in some assemblies MSOffice, do not support ActiveX, such as Office 2010 Starter, and various pirate assemblies, where the module MSCOMCTL.OCX just missing.
  212.  
  213.  
  214. CVE-2013-3906: TIFF Heap Overflow via Integer Overflow [MS13-096]
  215. EXPLOITABLE WORD VERSIONS:
  216. Word 2007 32-bit XP, Vista, Win7 32 & 64 bit
  217. Word 2010 32-bit XP 32 bit
  218.  
  219. *the exploit is based on technology heap-spray
  220.  
  221. 1. EXPLOITATION OF OGL.DLL (Office 2007)
  222.  
  223. VULNERABLE MODULE PATHS:
  224. C:\Program Files\Common Files\Microsoft Shared\OFFICE12\OGL.DLL
  225.  
  226. EXPLOITABLE:
  227. OGL.DLL 12.0.6509.5000
  228. OGL.DLL 12.0.6420.1000
  229. OGL.DLL 12.0.6420.1000
  230. OGL.DLL 12.0.6415.1000
  231. and others
  232.  
  233. PATCHES:
  234. OGL.DLL 12.0.6700.5000
  235. OGL.DLL 12.0.6688.5000
  236. OGL.DLL 12.0.6679.5000
  237. OGL.DLL 12.0.6659.5000
  238. OGL.DLL 12.0.6604.1000
  239.  
  240. 2. EXPLOITABLE VERSIONS OF OGL.DLL (Office 2010 + XP)
  241.  
  242. VULNERABLE MODULE PATHS:
  243. C:\Program Files\Common Files\Microsoft Shared\OFFICE14\OGL.DLL
  244.  
  245. EXPLOITABLE:
  246. OGL.DLL 4.0.7577.4098
  247. OGL.DLL 4.0.7577.4392
  248. and others
  249.  
  250. PATCHES:
  251. OGL.DLL 4.0.7577.4415
  252.  
  253. difference ga me from all the alternative solutions: - speed heap-spray - Universality (the attack immediately to the office2007 + office2010) - Universal ROP once for the two versions MSCOMCTL.OCX 983x - Opportunities for further cleansing and exploit obfuscation - Minimum detectable exploit (exploit only in RTF)
  254.  
  255. CVE-2014-1761: RTF ListOverrideCount Memory Corruption / Object Confusion [MS14-017]
  256. EXPLOITABLE WORD VERSIONS:
  257. Word 2010 32-bit Win7, Win8
  258.  
  259. VULNERABLE MODULE PATHS:
  260. C:\Program Files\Microsoft Office\Office14\wwlib.dll
  261.  
  262. EXPLOITABLE:
  263. wwlib.dll 14.0.4762.1000
  264. and others
  265.  
  266. PATCHES:
  267. wwlib.dll 14.0.7121.5004
  268.  
  269. alternative solutions: - Support for windows 8/10 - Undetectable exploit
  270.  
  271. MWISTAT 2.0: statistic Web-server statistics mwistat allows to conduct complete statistics of exploit, from logging when and how much was open document or booted .exe-file from any IP-address and some other information, such as User-Agent.Menu:FILES - downloadable .exe-fileLOGS - logsSTATS - StatisticsTOOLS - ext. Tools (IP-whois)Section FILES is a table with the following columns:FILE_ID - file identifier (8 digits)FILE_NAME - the name of the .exe fileFILE_DATE - date file downloadFILE_STAT_URL - so-called "stat" for a link to this file (specified in bildere)FILE_LOGS - buttons to see logs / statistics on the file (LOGS | STATS)ACTION - a button to download, edit (reupload), delete the file (GET | EDIT | DEL)ADD NEW FILE button allows you to download .exe-file to the server.Section LOGS is a table with the following columns:DATE_TIME - date and time of the request (when you are sorted by time in reverse order)FILE_ID - file identifier (8 digits)IP_ADDRESS - IP-addressIP_INFO - the country, the flag (when pressed displays all IP-whois information)ACTION - is of three kinds:   1. OPEN - opening a document.   2. LOAD - the download .exe file. if marked with failed - .exe-file has been deleted from the server and was not loaded.   3. SUSP or SUSPICIOUS - a suspicious request. it may be hacking attempts or other activities of hackers, antivirus companies, researchers and other undesirables.USER_AGENT - Field HTTP-package User-AgentGET_DATA - GET parameters passed to id and act HTTP-requestCLEAN STATS button allows you to clear all the logs and statistics.Section STATS - several tables.Statistics on requests:TOTAL REQUESTS - all received requests to the serverOPENED - of these requests is openLOADED - loadedSUSPICIOUS - suspicious requestsStatistics on the unique IP-addresses:TOTAL IPs - all unique IP-addressesOPENED - openLOADED - loadedSUSPICIOUS - suspicious requestsTOTAL% - the percentage of punchingStatistics on the unique IP-addresses (extended list attacked IP)IP-ADDRESS - IP-address (when pressed - to view all the requests from this IP)IP-INFO - the country, the flag (when pressed displays all IP-whois information)OPENED - of these requests is openLOADED - loadedSUSPICIOUS - suspicious requestsCLEAN STATS button also allows you to clear all the logs and statistics.TOOLS section contains IP-whois service - enter the IP, and click whois obtain the required information.
  272.  
  273. Estimated price for the builder: $ 300
  274. there are more budget options (trimmed assembly) standart price $ 50
  275.  
  276. Multi Pack Price = 300$
  277.  
  278. on technical matters, if you already have a product developer if you want to purchase the product and have questions, please write here:
  279.  
  280. Accept PerfectMoney and BTC Bitcoin
  281.  
  282. icq = 687268202
  283. jabber = monetization2015@exploit.im
  284.  
  285. ===========================================================
  286. ===========================================================
  287. ===========================================================
  288.  
  289. Selling Mix Loads File.exe,AndSpecific US,CA,FR,AU,NL,EU.MX.BR.TR,KR
  290. Mix and GEO loads in bulk
  291.  
  292. Hello,
  293.  
  294. i have and i now want to offer my bot service to the community. i can provide 10-400k mixed world loads on a daily basis. Also please keep in mind, these are not LQ mixes, they are real mixed loads from across the world.
  295.  
  296. US, CA, FR, AU, TR, KR, CN, HK, IN, BE, DE, NL are also all available in bulk orders.
  297. Current Traffic Package: 300k IE Daily ($10 per 1000) Prices
  298.  
  299.  
  300. 1k Mix Loads your File.exe = 30$
  301.  
  302. 10k = 300$
  303.  
  304. Usa = 150$
  305.  
  306. Ca = 150$
  307.  
  308. Uk 300$
  309.  
  310. ask about prices
  311.  
  312. Accept BTC Perfectmoney and Bitcoin
  313.  
  314. Contact me on jabber; i am ready to help you
  315.  
  316. ICQ = 687268202
  317. Jabber: monetization2015@exploit.im
  318.  
  319.  
  320. ===========================================================
  321. ===========================================================
  322. ===========================================================
  323.  
  324.  
  325. Selling Geo targeted loads - UK,CA,DE,FR, BR,MX,EU
  326. Huge amount of world mix loads
  327.  
  328.  
  329. Selling geo targeted loads any country - UK,CA,Usa,CZ,AU,FR,DE,MX,BR,TR and many more
  330.  
  331. World mix loads available in bulk price per 1k 30$, Big discounts for bulk orders
  332.  
  333. You can do a test on small amount first to check the quality of the loads
  334.  
  335.  
  336. Accept PerfectMoney and BTC Bitcoin
  337.  
  338. icq 687268202
  339. add me on jabber monetization2015@exploit.im
  340.  
  341.  
  342.  
  343.  
  344.  
  345. ===========================================================
  346. ===========================================================
  347. ===========================================================
  348.  
  349.  
  350.  
  351. http://s7.hostingkartinok.com/uploads/images/2015/06/843f03f54ebfafad8a8b8dce2cc857af.jpg
  352.  
  353.  
  354.  
  355. http://s7.hostingkartinok.com/uploads/images/2015/06/3a4bfa4068678dc076013d2d46bdcf86.jpg
  356.  
  357.  
  358. Professional FTP iframer
  359. FTP Administrator v3
  360.  
  361.  
  362. Offered to your attention FTP administrator. - Works on all Win-NT systems. User-friendly interface. - Ckrytny operation on Dedikov. the ability to clock processing. - Control of the links VPN, support for the fourth and fifth socks. - Configuration limit the use of one Sox (bypassing the ban on 1
  363.  
  364.  
  365. - Several modes: cheking, contamination, cleaning, searching, pinger, test PR, gluing exe. - Configurable multi-threading. competent distribution FTP servers flows. - The configuration of timeouts. - Work with all standard list format akkov, unlimited in volume. - Ability to pick akkov to external URL-links, where they are updated. - Filtering duplicate and anonymous ftp when loading / updating the sheet. - Specifying the domain zones of different countries to ignore. - Export proven both on the status of accounts, and in PR.
  366.  
  367.  
  368. - Comfortable frame editor for various treatments. Collecting found frames competitors. - Ability to control that only your frames stood on the servers. - Is recognized as a common JS-frames, and on every encoded. - There is a little-known method of encoding a frame and install it. - Possibility to install the update via redirect .htaccess.
  369.  
  370.  
  371. - Support for all standard CMS, multiple file extensions pages. - Infection of consecutive pages, or only specified. - Search pages in the specified folder or all the installation depth of the search. - Limiting the number of folders, where their number tends to infinity. - Configuration pages to ignore a certain text. - Ability to rename / replace / delete files by masks. - The ability to replace text on your pages. - Ability to backup infected files.
  372.  
  373.  
  374. - Collection prignasitelnyh banners ftp servers with their versions.- Availability of domains by ip in ftp akkov (reverse-DNS).- Ability to replace the rights to the file command CHMOD.- Ability to download the required files to your server next to infected websites.- Search mode files: both extensions and the title.- Ping mode to filter the database of millions of domains fast speeds.- Bonding with your exe found exe-file, checking the integrity of the resulting file.- Ability to use Joyner for personal use from the command line.- Limiting the maximum size of the binary file for the infection.- Detailed statistics and debug for all types of work.- Sessions. The ability to export and import.- The ability to autosave sessions every few seconds.
  375.  
  376.  
  377. Provided readme starting in PDF.
  378.  
  379. Basic License 30 $ (updates surcharge) VIP License 80$ WMZ PerfectMoney/ BTC (without binding, updates are free of charge)
  380. Possible extension of the base to the VIP.
  381.  
  382. Accept PerfectMoney And BTC Bitcoin
  383.  
  384. Price = 30 $
  385.  
  386. jabber monetization2015@exploit.im
  387.  
  388. icq = 687268202
  389.  
  390. ===========================================================
  391. ===========================================================
  392. ===========================================================
  393.  
  394. Zeus Citadel Botnet Service Form Grabber 2015 Selling Materials
  395.  
  396. Country mix
  397.  
  398. Us,Ca,Uk,Cz,Fr,De,IT,SP,Etc... ask in jabber
  399.  
  400. also i parsing filter specific parametrs botnet to your links and give you results
  401. logins+passwords to diffirents sites you must ask me jabber i put your link my panel and give you results
  402.  
  403. Prices 100 megabits logs = 100$
  404.  
  405. 500 Megabit = 500$
  406.  
  407. Who buy more Gigabit i make discounts
  408.  
  409. Total size about 40 GB
  410.  
  411. Who interest buy some
  412. difirents ask me inside jabber
  413.  
  414. Accept PerfectMoney and BTC Bitcoin
  415.  
  416. ICQ = 687268202
  417. Jabber: monetization2015@exploit.im
  418.  
  419. =================================================================
  420.  
  421.  
  422. Make Citadel Zeus Configuration 50$ Price
  423.  
  424. Zeus = 50 $
  425. Citadel = 100 $
  426.  
  427. include hosting and crypt
  428. rebuild and recrypt to my clients free i make
  429.  
  430. show you real-time procedure give you acces to my botnet
  431. i am give to test and demonstration to you!
  432.  
  433. Accept Method Payment
  434.  
  435. PerfectMoney and BTC Bitcoin
  436.  
  437. ICQ = 687268202
  438. Jabber: monetization2015@exploit.im
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement