Advertisement
Guest User

Untitled

a guest
Jan 1st, 2017
582
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.49 KB | None | 0 0
  1. Hello all. Today I would like to alert the community about a crypter that is "developed" by someone who doesn't know how a crypter works, and rip codes from other people.
  2. This investigation was conducted by a few people, without whose help it would have not been possible.
  3.  
  4. User profile: https://hackforums.net/member.php?action=profile&uid=3079662
  5. Sales thread: https://hackforums.net/showthread.php?tid=5509950
  6.  
  7. For those who aren't aware btw, this is the guy who sold Terror exploit kit and some other craps.
  8.  
  9. First screenshot: [spoiler]
  10. [img]https://i.gyazo.com/cec591e2731e1bda5ee849a1edc7f284.png[/img][/spoiler]
  11. Here, we see Bug Bunny admitting to rip code, as well as saying thing that are plainly not correct. Having multiple randomly selected runpe changes nothing.
  12.  
  13. Second screenshot: [spoiler]
  14. [img]https://i.gyazo.com/0c028b5cc6f7ab73510a93b49c3ab05e.png[/img][/spoiler]
  15. Here, we see Bug Bunny lying about his product. It DOES NOT support x64 payloads. As shown here: https://hackforums.net/showthread.php?tid=5224742&page=4 Wardow's shellcode only supports 32 bit payloads.
  16.  
  17. Third screenshot:[spoiler]
  18. [img]https://i.gyazo.com/6d8fa1698d5de8f8516f371dc33ce2fc.png[/img]
  19. [/spoiler]
  20. Here we see Bug Bunny admitting to rip even MORE code.
  21.  
  22. Proof it is Bug's skype:
  23. [spoiler]
  24. [img]https://i.gyazo.com/ccde4066aefb5b818d56bb17839798bc.png[/img]
  25. [img]https://i.gyazo.com/3e910bfee384c0cbacc3f434285290d3.png[/img]
  26. [/spoiler]
  27.  
  28. I strongly advise against dealing with Bug Bunny at all cost.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement