SlithxTeam SkyWyder RAT | Bypass UAC | Hidden TeamViewer | & More


SUBMITTED BY: Guest

DATE: May 9, 2016, 1:07 p.m.

FORMAT: Text only

SIZE: 8.1 kB

HITS: 853

  1. SlithxTeam SkyWyder RAT | Bypass UAC | Hidden TeamViewer | & More
  2. --------------------------------------------------------------------------------------------------
  3. Conact:
  4. Jabber: silthx.@exploit.im
  5. Donations Welcome!
  6. 1Dizsnc3fGaRawqW3FaeXTx1zcxXLuFBpi
  7. --------------------------------------------------------------------------------------------------
  8. Other SlithxTeam Software:
  9. SlithxTeam C/Asm Cryptolocker (Ransomware) UAC Bypass, All Windows OS
  10. https://satoshibox.com/6puaqsbix76fh7gykqd62gyn
  11. {Note: Please. Only Contact Us If You Have Any Troubles With The Software, For Additional Questions, PM Us On 0day.su}
  12. -----------------------------------------------------------------------------------------------------------------------
  13. Price: $150 {0.33BTC}
  14. Download Link: https://satoshibox.com/ed34q8jsopxwr3r5xo4mod5s
  15. Proof:
  16. SkyWyder Part 1
  17. https://sendvid.com/kle64sbu
  18. In this video we will show:
  19. -GUI and builder (setting) -AV killer
  20. -Bypass UAC -BSOD
  21. -Teamviewer Hidden -Remote
  22. -Files manager (teamviewer + rat one) -Blackscreen (shutdown monitor)
  23. -Hidden startup
  24. SkyWyder Part 2:
  25. http://sendvid.com/ab3lbb02
  26. In this video we will show:
  27. -Recovery password -Formgrabber
  28. -Keylogger -Socks 5 reverse
  29. -Botkillers
  30. Screenshots:
  31. https://imgur.com/a/CM5JV
  32. -----------------------------------------------------------------------------------------------------------------------
  33. NEW Features: Teamviewer Hidden | Getting ID & Password Semi-Automaticly | Fully FUD & Hidden {05/16}
  34. -Hidden startup from Regedit and msconfig. Persistent installation
  35. -Cryptochange, replace automatly any Bitcoin address copied on the clipboard by your own one
  36. -SkyWyder Rat is able to bypass any Firewall
  37. -Multiple DNS connection, if one of your address is not reachable, the RAT will automatically connect to the next
  38. -----------------------------------------------------------------------------------------------------------------------
  39. Formgrabber:
  40. -Very easy to use, just enter a URL and that's it.
  41. -The Formgrabber take charge of recovering all the form data and will also take a screenshot for each login made and click on the url in question
  42. -Download screenshots and logs in a friendly menu
  43. -Capture date of screenshots
  44. -FULL URL of website captured
  45. -Intelligent keylogger, work only when you need it
  46. -You will be able to download only the screenshots you need
  47. -----------------------------------------------------------------------------------------------------------------------
  48. Botkiller:
  49. -Actually our RAT can kill this list of Malwares, include from memory.
  50. No matter if the file is crypted, the RAT will detect and kill it quickly without use any % of CPU.
  51. -Darkcomet -Citadel
  52. -LostDoor -Amiboide
  53. -Blackshades -SpyNet
  54. -Pandora -Pytho RAT
  55. -Betabot -Xtreme RAT
  56. -Cybergate -Zeus
  57. -Ardamax -AlienSpy
  58. -Coolvibes -Black Worm
  59. -Athena -MMBB (Zeus edit)
  60. -Archilaus -NGR Bot
  61. -Albertino RAT -DNA RAT
  62. -Safeloader -Torjan RAT
  63. -SpyEye -Andromeda
  64. -Bozok RAT -Jrat
  65. -Cerberus -Nanocore
  66. -SmokeLoader -Athena IRC
  67. -MonsterWorm -Carped Botnet
  68. -Iceberg Worm -Imminent Monitor
  69. -Gataka Botnet -Turkojan RAT
  70. -Pony Stealer -Indetectables RAT
  71. -Kraken HTTP bot -Babylon RAT
  72. -Knight Logger -Galaxy Logger
  73. -Agent Tesla -Carbon Grabber
  74. -Novalite
  75. Botkiller can be used in 4 different ways:
  76. -Analyze all running processes. -Analyze all running processes and then analyze each new process appear.
  77. -Analyze all process every (you choose) minutes. -Analyze each new process appear.
  78. -----------------------------------------------------------------------------------------------------------------------
  79. Keylogger:
  80. Keylogger is hooked in Ring3, so it's never miss any single data, the entire keyboard is hooked without any ms delay.
  81. -----------------------------------------------------------------------------------------------------------------------
  82. Disabler
  83. Disable the next programs (Without Administration rights!)
  84. -Regedit -Command Console (CMD)
  85. -MsConfig (Startup Manager) -Task Manager
  86. -Restore System
  87. -----------------------------------------------------------------------------------------------------------------------
  88. Antis (For block any user who try to check your file)
  89. -Anti VmWare -Anti Virtual PC
  90. -Anti Sandboxie -Anti Task Manager
  91. -Anti Virtual Box
  92. -----------------------------------------------------------------------------------------------------------------------
  93. BTC-E Code capture:
  94. Capture BTC-E Code in RealTime and send it to you very fast with sound notification.
  95. -----------------------------------------------------------------------------------------------------------------------
  96. Avkiller:
  97. With Administration Rights our RAT can kill this list of Anti Virus using a .SYS File from memory
  98. (You can also use the UAC bypass with this option)
  99. -AVG -NOD32
  100. -Kasperky -Comodo
  101. -Avira -Norton 360
  102. -Arcavir -Panda
  103. -Bitdefender -Malwarebytes
  104. -McAfee -Adware
  105. -G-Data -Avast
  106. -Zen0k -Asquared
  107. -Vipre -TrendMicro
  108. -Rising -Microsoft Essentials
  109. -Norman -DrWeb
  110. -Debank -Coranti
  111. -Ikarus -Gucup
  112. -F-Prot -Pctools
  113. All Windows version (32/64 Bits)
  114. -----------------------------------------------------------------------------------------------------------------------
  115. Fake Message:
  116. - You can configure Title, Message, Icon, Buttons of the fake message and also test it before.
  117. Secondary Keylogger (Optional):
  118. You can also get the logs via SMTP or FTP (Both too), options are customizable.
  119. Supporting SSL Protocol
  120. -----------------------------------------------------------------------------------------------------------------------
  121. Password Recovery:
  122. -Google Chrome all versions -Mozilla Firefox all versions
  123. -Internet Explorer all versions -FlashFXP
  124. -SmartFTP -Ipswitch
  125. -Miranda -Pocomailer
  126. -Filezilla -ThunderBird
  127. -DynDNS
  128. -----------------------------------------------------------------------------------------------------------------------
  129. Download And Execute:
  130. You can download and execute any executable file in all bots you want.
  131. -----------------------------------------------------------------------------------------------------------------------
  132. Update Bot:
  133. You can update your bot with any file.
  134. -----------------------------------------------------------------------------------------------------------------------
  135. Reverse Socks5:
  136. This feature create a socks5 server with the bot IP address. All informations are logged in a friendly menu.
  137. Delele Config:
  138. This feature delete every log/screenshot from the bot.
  139. -----------------------------------------------------------------------------------------------------------------------
  140. Special Settings:
  141. Bypass UAC:
  142. -Private Exploit for Bypass UAC, Working in: Windows Vista, 7, 8, 8.1, 10: 32 & 64 bits.
  143. Effect: Get executed directly with admin rights without ask nothing.
  144. Critical Process (BSOD):
  145. -When you execute the generated RAT file and you kill the process, Windows just crash in BlueScreen.
  146. Working in: Windows XP, Vista, 7, 8, 8.1, 10: 32 & 64 bits.
  147. File Size when you build it : 108kb! Fully functional with all configurations you want.

comments powered by Disqus