Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Hello all. Today I would like to alert the community about a crypter that is "developed" by someone who doesn't know how a crypter works, and rip codes from other people.
- This investigation was conducted by a few people, without whose help it would have not been possible.
- User profile: https://hackforums.net/member.php?action=profile&uid=3079662
- Sales thread: https://hackforums.net/showthread.php?tid=5509950
- For those who aren't aware btw, this is the guy who sold Terror exploit kit and some other craps.
- First screenshot: [spoiler]
- [img]https://i.gyazo.com/cec591e2731e1bda5ee849a1edc7f284.png[/img][/spoiler]
- Here, we see Bug Bunny admitting to rip code, as well as saying thing that are plainly not correct. Having multiple randomly selected runpe changes nothing.
- Second screenshot: [spoiler]
- [img]https://i.gyazo.com/0c028b5cc6f7ab73510a93b49c3ab05e.png[/img][/spoiler]
- Here, we see Bug Bunny lying about his product. It DOES NOT support x64 payloads. As shown here: https://hackforums.net/showthread.php?tid=5224742&page=4 Wardow's shellcode only supports 32 bit payloads.
- Third screenshot:[spoiler]
- [img]https://i.gyazo.com/6d8fa1698d5de8f8516f371dc33ce2fc.png[/img]
- [/spoiler]
- Here we see Bug Bunny admitting to rip even MORE code.
- Proof it is Bug's skype:
- [spoiler]
- [img]https://i.gyazo.com/ccde4066aefb5b818d56bb17839798bc.png[/img]
- [img]https://i.gyazo.com/3e910bfee384c0cbacc3f434285290d3.png[/img]
- [/spoiler]
- I strongly advise against dealing with Bug Bunny at all cost.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement