Advertisement
Guest User

Yes File.exe fud Crypt Service C++, Automatic, 0/35, instant

a guest
Aug 13th, 2015
363
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.14 KB | None | 0 0
  1. Yes File.exe fud Crypt Service
  2. C++, Automatic, 0/35, instant buy Result
  3.  
  4. -----------------------------------
  5. Crypt Service
  6. -----------------------------------
  7.  
  8. We are an online automatic crypting service which offers high quality crypts any time of the day and any day of the week. All payments are made through bitcoin, and are usually processed instantly.
  9.  
  10. Jabber support is available,support to do manual crypting. All crypts must be done. We work best with natively coded bots (coded in C++, C, ASM, etc).
  11.  
  12. Scan can be viewed before you buy, so you know exactly what you are getting. Crypter is usually 0/35 (how to client also make and refud crypt to client)
  13.  
  14. -----------------------------------
  15. Features
  16. -----------------------------------
  17.  
  18. - Low stub size, 60-70kb
  19. - Coded in C++
  20. - Good execution rate, works on windows all systems 2000 xp/vista/win7/8- windows 10 inclusive
  21. - instantly available any time of the day
  22. - Anonymous
  23. - Works with; smoke loader, andromeda, madness ddos, betabot, zeus, neutrino, citadel, and many others
  24. -----------------------------------
  25. Price and payment
  26. -----------------------------------
  27.  
  28. All payments are made through PerfectMoney and BITCOIN (BTC).
  29.  
  30. Price is 0.044 = dollars = 8$ bitcoin per crypt.
  31.  
  32. ten crypt prices = 0.3 BTC = 73.11 $ dollars
  33.  
  34. BUY AT:
  35.  
  36. -----------------------------------
  37. Support = icq and jabber
  38. -----------------------------------
  39.  
  40. Subscription crypt service is available contact support for prices
  41.  
  42. ICQ = 687268202
  43. Jabber: monetization2015@exploit.im
  44.  
  45.  
  46. ======================================================================
  47. ======================================================================
  48. ======================================================================
  49.  
  50. http://s7.hostingkartinok.com/uploads/images/2015/06/9d7269c1d4e601eb7daec1c0dfeaeb8a.jpg
  51.  
  52. Exploit kit RIG v3.0
  53.  
  54. We are glad to introduce you to a bunch of exploits kit
  55. Are pleased our exploits Pack RIG v3.0
  56.  
  57. -Work On all WindowsOS 32 / 64bit
  58.  
  59. -Bypass UAC on exploits
  60.  
  61. -Frequent cleaning + cleaning on request
  62.  
  63. -High load support
  64.  
  65. -Always our clean and trust domains with automatic check
  66.  
  67. Each account has a 1 stream and can ship 1 different exe
  68.  
  69.  
  70. API with automatic generate link
  71.  
  72. Текущие сплоиты:
  73. Current exploits:
  74.  
  75. IE7-8-9-10: CVE and new updates
  76. Flash: CVE-2015 - CVE updates
  77. Windows: CVE- updates
  78.  
  79. An average sample rate - 25-35%
  80.  
  81. Exploit rate depends on traffic source
  82.  
  83. Price Rent/Cost:
  84.  
  85. /Day - 30 usd
  86. /Week - 150 usd
  87. /Month - 300 usd
  88.  
  89. complect builder pack and source code scripts price = 800$
  90.  
  91. *OTR Accept
  92.  
  93. We Accept English Speaking Users,
  94.  
  95. You can Pay PerfectMoney And Bitcoin
  96.  
  97. icq = 687268202
  98. Jabber: monetization2015@exploit.im
  99.  
  100.  
  101.  
  102. =======================================================
  103. =======================================================
  104. =======================================================
  105.  
  106.  
  107. http://s7.hostingkartinok.com/uploads/images/2015/06/ea8c603a69828b3aaf894368def85d36.png
  108.  
  109. Microsoft Office Word Exploits
  110. universal .doc exploit-pack
  111.  
  112.  
  113.  
  114. MICROSOFT WORD INTRUDER (MWI)
  115.  
  116. MWI - professional "means of delivery", the exploit pack on the basis of a number of the most urgent one-day vulnerabilities in the products of Microsoft Office Word. Document generated MWI may contain exploits with up to 4 at once:
  117.  
  118. 1. CVE-2010-3333
  119. 2. CVE-2012-0158
  120. 3. CVE-2013-3906
  121. 4. CVE-2014-1761
  122.  
  123. And updates private exploits to clients
  124.  
  125. Executable .exe file may be contained in the body of the document itself, and extend the link to the web-server. What distinguishes this exploit from all other solutions:
  126.  
  127. Uniqueness MWI - this is the only solution on the market .doc exploits,
  128. which represents multieksployt and attack multiple vulnerabilities simultaneously.
  129. This approach increases the chances of success and allows to attack two vectors update:
  130. Operating system and Office suite of applications itself.VersatilityMWI covers almost the whole
  131. range of versions of Microsoft Office: Word XP, Word 2003, Word 2007, Word 2010. Each exploit
  132. is implemented to be able to attack as much as possible the vulnerable versions
  133. and operating systems. Coverage of vulnerable systems MWI favorably with all alternatives.
  134.  
  135. Exploit the most independent of all sorts of conditions for a successful attack: whether the version of the software installed in the system or certain defenses OS. Each stage of exploit careful attention to detail.Bypass protectionExploit the most complicates their detection: each element is protected from the exploit detected by a complex of means: from the banal to the polymorphism of obfuscation and encryption. Each generated exploit has its own unique signature, maximum randomized structure and data. In addition to the counter signature methods exploit uses a variety of methods to bypass proactive (behavioral) detection equipment. In particular, the launch .exe-file made from a trusted system process context.Support and continuous developmentMWI for a wide audience was introduced to the market, although its first versions were created and used in a rather narrow circle of people. The project progressively refine and improve, acquiring new exploits and modules vkontse fully formed to exploit the whole pack with a flexible, modular architecture. The project is constantly evolving and not static. We regularly release updates that make cleaning supplement exploit pack new exploits and modules. We are committed to long-term cooperation.
  136.  
  137. innovation
  138.  
  139. Additional Information:
  140.  
  141. CVE-2010-3333: RTF pFragments Stack Buffer Overwrite Remote Code Execution Exploit [MS10-087]
  142.  
  143. EXPLOITABLE WORD VERSIONS:
  144. Word 2003 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  145. Word 2007 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  146. Word 2010 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  147.  
  148. VULNERABLE MODULE PATHS:
  149. Word 2003 C:\Program Files\Common Files\Microsoft Shared\office11\mso.dll
  150. Word 2007 C:\Program Files\Common Files\Microsoft Shared\office12\mso.dll
  151. Word 2010 C:\Program Files\Common Files\Microsoft Shared\office14\mso.dll
  152.  
  153. PATCHES:
  154. Word 2003 mso.dll 11.0.8329.0000
  155. Word 2007 mso.dll 12.0.6545.5004
  156. Word 2010 mso.dll 14.0.5128.5000
  157.  
  158. alternative solutions: Complete versatility and reliability, the only universal and real working solution
  159.  
  160. CVE-2012-0158: MSCOMCTL.OCX ListView Stack Buffer Overwrite Remote Code Execution Exploit [MS12-027]
  161. EXPLOITABLE WORD VERSIONS:
  162. Word 2003 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  163. Word 2007 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  164. Word 2010 32-bit XP, Vista, Win7, Win8 32 & 64 bit
  165.  
  166. VULNERABLE MODULE PATHS:
  167. C:\WINDOWS\system32\MSCOMCTL.OCX
  168. C:\Windows\SysWOW64\MSCOMCTL.OCX
  169.  
  170. EXPLOITABLE VERSIONS:
  171. MSCOMCTL.OCX 6.01.9545
  172. MSCOMCTL.OCX 6.01.9782
  173. MSCOMCTL.OCX 6.01.9786
  174. MSCOMCTL.OCX 6.01.9813
  175. MSCOMCTL.OCX 6.01.9816
  176. MSCOMCTL.OCX 6.01.9818
  177.  
  178. PATCHES:
  179. MSCOMCTL.OCX 6.01.9833
  180. MSCOMCTL.OCX 6.01.9834
  181.  
  182. * the vulnerability is not present in some assemblies MSOffice, do not support ActiveX, such as Office 2010 Starter, and various pirate assemblies, where the module MSCOMCTL.OCX just missing.
  183.  
  184.  
  185. CVE-2013-3906: TIFF Heap Overflow via Integer Overflow [MS13-096]
  186. EXPLOITABLE WORD VERSIONS:
  187. Word 2007 32-bit XP, Vista, Win7 32 & 64 bit
  188. Word 2010 32-bit XP 32 bit
  189.  
  190. *the exploit is based on technology heap-spray
  191.  
  192. 1. EXPLOITATION OF OGL.DLL (Office 2007)
  193.  
  194. VULNERABLE MODULE PATHS:
  195. C:\Program Files\Common Files\Microsoft Shared\OFFICE12\OGL.DLL
  196.  
  197. EXPLOITABLE:
  198. OGL.DLL 12.0.6509.5000
  199. OGL.DLL 12.0.6420.1000
  200. OGL.DLL 12.0.6420.1000
  201. OGL.DLL 12.0.6415.1000
  202. and others
  203.  
  204. PATCHES:
  205. OGL.DLL 12.0.6700.5000
  206. OGL.DLL 12.0.6688.5000
  207. OGL.DLL 12.0.6679.5000
  208. OGL.DLL 12.0.6659.5000
  209. OGL.DLL 12.0.6604.1000
  210.  
  211. 2. EXPLOITABLE VERSIONS OF OGL.DLL (Office 2010 + XP)
  212.  
  213. VULNERABLE MODULE PATHS:
  214. C:\Program Files\Common Files\Microsoft Shared\OFFICE14\OGL.DLL
  215.  
  216. EXPLOITABLE:
  217. OGL.DLL 4.0.7577.4098
  218. OGL.DLL 4.0.7577.4392
  219. and others
  220.  
  221. PATCHES:
  222. OGL.DLL 4.0.7577.4415
  223.  
  224. difference ga me from all the alternative solutions: - speed heap-spray - Universality (the attack immediately to the office2007 + office2010) - Universal ROP once for the two versions MSCOMCTL.OCX 983x - Opportunities for further cleansing and exploit obfuscation - Minimum detectable exploit (exploit only in RTF)
  225.  
  226. CVE-2014-1761: RTF ListOverrideCount Memory Corruption / Object Confusion [MS14-017]
  227. EXPLOITABLE WORD VERSIONS:
  228. Word 2010 32-bit Win7, Win8
  229.  
  230. VULNERABLE MODULE PATHS:
  231. C:\Program Files\Microsoft Office\Office14\wwlib.dll
  232.  
  233. EXPLOITABLE:
  234. wwlib.dll 14.0.4762.1000
  235. and others
  236.  
  237. PATCHES:
  238. wwlib.dll 14.0.7121.5004
  239.  
  240. alternative solutions: - Support for windows 8/10 - Undetectable exploit
  241.  
  242. MWISTAT 2.0: statistic Web-server statistics mwistat allows to conduct complete statistics of exploit, from logging when and how much was open document or booted .exe-file from any IP-address and some other information, such as User-Agent.Menu:FILES - downloadable .exe-fileLOGS - logsSTATS - StatisticsTOOLS - ext. Tools (IP-whois)Section FILES is a table with the following columns:FILE_ID - file identifier (8 digits)FILE_NAME - the name of the .exe fileFILE_DATE - date file downloadFILE_STAT_URL - so-called "stat" for a link to this file (specified in bildere)FILE_LOGS - buttons to see logs / statistics on the file (LOGS | STATS)ACTION - a button to download, edit (reupload), delete the file (GET | EDIT | DEL)ADD NEW FILE button allows you to download .exe-file to the server.Section LOGS is a table with the following columns:DATE_TIME - date and time of the request (when you are sorted by time in reverse order)FILE_ID - file identifier (8 digits)IP_ADDRESS - IP-addressIP_INFO - the country, the flag (when pressed displays all IP-whois information)ACTION - is of three kinds:   1. OPEN - opening a document.   2. LOAD - the download .exe file. if marked with failed - .exe-file has been deleted from the server and was not loaded.   3. SUSP or SUSPICIOUS - a suspicious request. it may be hacking attempts or other activities of hackers, antivirus companies, researchers and other undesirables.USER_AGENT - Field HTTP-package User-AgentGET_DATA - GET parameters passed to id and act HTTP-requestCLEAN STATS button allows you to clear all the logs and statistics.Section STATS - several tables.Statistics on requests:TOTAL REQUESTS - all received requests to the serverOPENED - of these requests is openLOADED - loadedSUSPICIOUS - suspicious requestsStatistics on the unique IP-addresses:TOTAL IPs - all unique IP-addressesOPENED - openLOADED - loadedSUSPICIOUS - suspicious requestsTOTAL% - the percentage of punchingStatistics on the unique IP-addresses (extended list attacked IP)IP-ADDRESS - IP-address (when pressed - to view all the requests from this IP)IP-INFO - the country, the flag (when pressed displays all IP-whois information)OPENED - of these requests is openLOADED - loadedSUSPICIOUS - suspicious requestsCLEAN STATS button also allows you to clear all the logs and statistics.TOOLS section contains IP-whois service - enter the IP, and click whois obtain the required information.
  243.  
  244. Estimated price for the builder: $ 300
  245. there are more budget options (trimmed assembly) standart price $ 50
  246.  
  247. Multi Pack Price = 300$
  248.  
  249. on technical matters, if you already have a product developer if you want to purchase the product and have questions, please write here:
  250.  
  251. Accept PerfectMoney and BTC Bitcoin
  252.  
  253. icq = 687268202
  254. jabber = monetization2015@exploit.im
  255.  
  256. ===========================================================
  257. ===========================================================
  258. ===========================================================
  259.  
  260. Selling Mix Loads File.exe,AndSpecific US,CA,FR,AU,NL,EU.MX.BR.TR,KR
  261. Mix and GEO loads in bulk
  262.  
  263. Hello,
  264.  
  265. i have and i now want to offer my bot service to the community. i can provide 10-400k mixed world loads on a daily basis. Also please keep in mind, these are not LQ mixes, they are real mixed loads from across the world.
  266.  
  267. US, CA, FR, AU, TR, KR, CN, HK, IN, BE, DE, NL are also all available in bulk orders.
  268. Current Traffic Package: 300k IE Daily ($10 per 1000) Prices
  269.  
  270.  
  271. 1k Mix Loads your File.exe = 30$
  272.  
  273. 10k = 300$
  274.  
  275. Usa = 150$
  276.  
  277. Ca = 150$
  278.  
  279. Uk 300$
  280.  
  281. ask about prices
  282.  
  283. Accept BTC Perfectmoney and Bitcoin
  284.  
  285. Contact me on jabber; i am ready to help you
  286.  
  287. ICQ = 687268202
  288. Jabber: monetization2015@exploit.im
  289.  
  290.  
  291. ===========================================================
  292. ===========================================================
  293. ===========================================================
  294.  
  295.  
  296. Selling Geo targeted loads - UK,CA,DE,FR, BR,MX,EU
  297. Huge amount of world mix loads
  298.  
  299.  
  300. Selling geo targeted loads any country - UK,CA,Usa,CZ,AU,FR,DE,MX,BR,TR and many more
  301.  
  302. World mix loads available in bulk price per 1k 30$, Big discounts for bulk orders
  303.  
  304. You can do a test on small amount first to check the quality of the loads
  305.  
  306.  
  307. Accept PerfectMoney and BTC Bitcoin
  308.  
  309. icq 687268202
  310. add me on jabber monetization2015@exploit.im
  311.  
  312.  
  313.  
  314.  
  315.  
  316. ===========================================================
  317. ===========================================================
  318. ===========================================================
  319.  
  320.  
  321.  
  322. http://s7.hostingkartinok.com/uploads/images/2015/06/843f03f54ebfafad8a8b8dce2cc857af.jpg
  323.  
  324.  
  325.  
  326. http://s7.hostingkartinok.com/uploads/images/2015/06/3a4bfa4068678dc076013d2d46bdcf86.jpg
  327.  
  328.  
  329. Professional FTP iframer
  330. FTP Administrator v3
  331.  
  332.  
  333. Offered to your attention FTP administrator. - Works on all Win-NT systems. User-friendly interface. - Ckrytny operation on Dedikov. the ability to clock processing. - Control of the links VPN, support for the fourth and fifth socks. - Configuration limit the use of one Sox (bypassing the ban on 1
  334.  
  335.  
  336. - Several modes: cheking, contamination, cleaning, searching, pinger, test PR, gluing exe. - Configurable multi-threading. competent distribution FTP servers flows. - The configuration of timeouts. - Work with all standard list format akkov, unlimited in volume. - Ability to pick akkov to external URL-links, where they are updated. - Filtering duplicate and anonymous ftp when loading / updating the sheet. - Specifying the domain zones of different countries to ignore. - Export proven both on the status of accounts, and in PR.
  337.  
  338.  
  339. - Comfortable frame editor for various treatments. Collecting found frames competitors. - Ability to control that only your frames stood on the servers. - Is recognized as a common JS-frames, and on every encoded. - There is a little-known method of encoding a frame and install it. - Possibility to install the update via redirect .htaccess.
  340.  
  341.  
  342. - Support for all standard CMS, multiple file extensions pages. - Infection of consecutive pages, or only specified. - Search pages in the specified folder or all the installation depth of the search. - Limiting the number of folders, where their number tends to infinity. - Configuration pages to ignore a certain text. - Ability to rename / replace / delete files by masks. - The ability to replace text on your pages. - Ability to backup infected files.
  343.  
  344.  
  345. - Collection prignasitelnyh banners ftp servers with their versions.- Availability of domains by ip in ftp akkov (reverse-DNS).- Ability to replace the rights to the file command CHMOD.- Ability to download the required files to your server next to infected websites.- Search mode files: both extensions and the title.- Ping mode to filter the database of millions of domains fast speeds.- Bonding with your exe found exe-file, checking the integrity of the resulting file.- Ability to use Joyner for personal use from the command line.- Limiting the maximum size of the binary file for the infection.- Detailed statistics and debug for all types of work.- Sessions. The ability to export and import.- The ability to autosave sessions every few seconds.
  346.  
  347.  
  348. Provided readme starting in PDF.
  349.  
  350. Basic License 30 $ (updates surcharge) VIP License 80$ WMZ PerfectMoney/ BTC (without binding, updates are free of charge)
  351. Possible extension of the base to the VIP.
  352.  
  353. Accept PerfectMoney And BTC Bitcoin
  354.  
  355. Price = 30 $
  356.  
  357. jabber monetization2015@exploit.im
  358.  
  359. icq = 687268202
  360.  
  361. ===========================================================
  362. ===========================================================
  363. ===========================================================
  364.  
  365. Zeus Citadel Botnet Service Form Grabber 2015 Selling Materials
  366.  
  367. Country mix
  368.  
  369. Us,Ca,Uk,Cz,Fr,De,IT,SP,Etc... ask in jabber
  370.  
  371. also i parsing filter specific parametrs botnet to your links and give you results
  372. logins+passwords to diffirents sites you must ask me jabber i put your link my panel and give you results
  373.  
  374. Prices 100 megabits logs = 100$
  375.  
  376. 500 Megabit = 500$
  377.  
  378. Who buy more Gigabit i make discounts
  379.  
  380. Total size about 40 GB
  381.  
  382. Who interest buy some
  383. difirents ask me inside jabber
  384.  
  385. Accept PerfectMoney and BTC Bitcoin
  386.  
  387. ICQ = 687268202
  388. Jabber: monetization2015@exploit.im
  389.  
  390. =================================================================
  391.  
  392.  
  393. Make Citadel Zeus Configuration 50$ Price
  394.  
  395. Zeus = 50 $
  396. Citadel = 100 $
  397.  
  398. include hosting and crypt
  399. rebuild and recrypt to my clients free i make
  400.  
  401. show you real-time procedure give you acces to my botnet
  402. i am give to test and demonstration to you!
  403.  
  404. Accept Method Payment
  405.  
  406. PerfectMoney and BTC Bitcoin
  407.  
  408. ICQ = 687268202
  409. Jabber: monetization2015@exploit.im
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement