• XSS.stack #1 – первый литературный журнал от юзеров форума

Private EXE binder (Merger) FUD Scantime & Runtime |Bypass WD+WD Cloud| Memory execution [Coded in RUST]

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

Evild34d

(L3) cache
Забанен
Регистрация
18.05.2021
Сообщения
297
Реакции
29
Гарант сделки
2
Пожалуйста, обратите внимание, что пользователь заблокирован
Цена
500
Контакты
evild34d
Hi,

Did you ever think about protect your Payload/Malware along with bind it with a legit windows programs (example bind or hide your malware with Office software or an Installer..etc) but you haven't found a strong and real Runtime FUD solution! now you are in the right place.

* Coded in Rust, CLI and Stub
* Unlimited EXE size bind (doesn't matter the legit software is 100Mb or 1GB)
* FUD Scantime & Runtime Stub
*Very small size stub
* Bind up to 4 EXE files at once in 4 clicks
* Support execution in memory for Native EXE [C/C++/ASM/Delphi]
* compatible support for non-Native Malwares
* Very long FUD time for the stub due to the nature Rust language and the Implementation.

Selling only 3 copies to keep it private and clean for long time.
Price 500$ per copy. (in case of future detection cleaning is free)

Note1: Your Payload/Malware must be FUD (or Semi FUD) to get best result
Note2 : If your Payload is not clean, I provide cleaning for extra charge
Note2: I work through XSS guarantor!!


Contact via PM or TG: evild34d, Test in live available to show you this amazing tool in action


Scan result of two merged EXE's (Malware Payload bind with an Installer): https://scanner.to/result/yKASyMzPdQcQ

Screenshot 2024-03-01 231431.jpg

Screenshot 2024-03-01 231951.png
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello,

Through my service, with my private FUD binder (EXE merger) I bind your payload with any Windows Installer/Program you want, despite the size with no limitation upto 1GB program size and send you back in zip.

* Best for spammers
* For traffics / landing pages
* Malware delivery task
* Protect your payload from direct scan

* FUD Scantime & Runtime Stub (rust)
* Memory Execution for x64 payloads
* Bypass WD + WD Cloud
* Bypass AVs 1-2/21 Runtime
* Icon change on the output
* Assembly and version details change
* Ability to bind upto 4 EXE in one EXE

For best results your payload must be FUD. My binder stub is fully clean.

Price per bind is 50$

Note : If your Payload is not clean, I provide cleaning for extra charge, FUD scantime & runtime

Note: I work through XSS guarantor or through PM

TG contact: evild34d


Scan of the output after bind 1/21 in Runtime

https://scanner.to/result/TBjPfAUhNgcNhttps://scanner.to/result/TBjPfAUhNgcN
Screenshot_20240303_142216.jpg
 
Последнее редактирование:
Статус
Закрыто для дальнейших ответов.
Верх