• XSS.stack #1 – первый литературный журнал от юзеров форума

[HTA] HTML Web page stealth execution [Zero click] Works on Windows and Linux [HTA]

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

BRUMERS

HDD-drive
Пользователь
Регистрация
07.12.2022
Сообщения
32
Реакции
11
Features:
  • Fully Server side.
  • Coded in PHP, HTML, CSS, Javascript.
  • Instant execution or through a Deploy system.
  • Average time of elaboration: 15 seconds/max.
  • Silent execution: zero pop-up or sandboxie.
  • Compatible with any browser except Yandex.
  • Running perfectly from Windows to Linux.
  • Capability to edit totally the landing page.
  • Obfuscated and encrypted advanced code.
  • Completely Fully Undetectable from any AMSI.
Price:
  1. Package Lite: x5 full web vectors page: 125$.
  2. Package Neon: x10 full web vectors page: 250$.
Contact:
XMPP: brumers@thesecure.at
First contact through a private message.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Отзывы на соседних бордах есть? Или может депозит внесёте? Я бы приобрел у вас ваш продукт
 
Списались с этим "товарищем" в жабе, договорились что возьму потестировать, оплачу через гаранта. Он согласился. Через сутки захожу в жабу чтобы ему написать - он не в сети. Сегодня захожу, смотрю, а он меня удалил. Пишу ему в личку, что он видимо случайно меня удалил и я отправил повторный запрос, на что он мне в ответ скинул фото надгробия Буковски....
Не понял что он этим хотел сказать и вообще поведение странное, будьте внимательны, без гаранта точно не стоит ему ничего оплачивать.
А еще лучше сразу внести ТСу депозит Quake3 Guron_18 Pernat1y kerberos admin
 
Отзывы на соседних бордах есть? Или может депозит внесёте? Я бы приобрел у вас ваш продукт
Not regarding this latter service.
I could make a deposit after the first three successfull transaction. No problem.

If you are equally interested, please write me through a private message.
I can offer you a sample Test in order to verify mine reliability. Thanks.
Списались с этим "товарищем" в жабе, договорились что возьму потестировать, оплачу через гаранта. Он согласился. Через сутки захожу в жабу чтобы ему написать - он не в сети. Сегодня захожу, смотрю, а он меня удалил. Пишу ему в личку, что он видимо случайно меня удалил и я отправил повторный запрос, на что он мне в ответ скинул фото надгробия Буковски....
Не понял что он этим хотел сказать и вообще поведение странное, будьте внимательны, без гаранта точно не стоит ему ничего оплачивать.
А еще лучше сразу внести ТСу депозит Quake3 Guron_18 Pernat1y kerberos admin
Hi. I was simply trying to preserve my security, and if you are honest you might admit.
I have been out Business for few days, where is the issue? I received many messages, I can't recall each one subject.
Send me your Session ID, please: and we could have a deal. Thanks.
Да вы серьезно (Zero click) за пару соток баксов Посмотреть вложение 48137
You are free to believe what you want.
Even despite, my price presumably: it's too much low.
Thanks for the suggestion, I'll think about it better.
bante pidorasa
Sorry?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
.
If you are equally interested, please write me through a private message.
I can offer you a sample Test in order to verify mine reliability. Thanks.
Ok , I am wrote you in jabber , GO test.
 
Ok , I am wrote you in jabber , GO test.
I concluded my job.
The user received his sample.
Result: 1/26 Scantime: [Might be presumably a false positive]. Third states encryption
and downgrade advanced memory attack are almost impossible to be detected, currently.
WzKSYhoEaZTn.png

Full package including the HTML with triple encoding and encryption has been sent out.
Everything fileless and flawlessly: fully working in the RAM. I offer a further sample Test to
a reliable member, in charge of a feedback about the service. Best regards.

BRUMERS.
 
I concluded my job.
The user received his sample.
Result: 1/26 Scantime: [Might be presumably a false positive]. Third states encryption
and downgrade advanced memory attack are almost impossible to be detected, currently.
WzKSYhoEaZTn.png

Full package including the HTML with triple encoding and encryption has been sent out.
Everything fileless and flawlessly: fully working in the RAM. I offer a further sample Test to
a reliable member, in charge of a feedback about the service. Best regards.

BRUMERS.
show demo video
 
show demo video
Okay.
I made several furthers improvements to the algorithms.
I'm almost sure that the detection is just a false positive;
since this time I enlarged the array of the encryptions. So.

Soon, the demo video.
y1DymxAdtAfJ.png
 
Последнее редактирование:
I concluded my job.
The user received his sample.
Result: 1/26 Scantime: [Might be presumably a false positive]. Third states encryption
and downgrade advanced memory attack are almost impossible to be detected, currently.
WzKSYhoEaZTn.png

Full package including the HTML with triple encoding and encryption has been sent out.
Everything fileless and flawlessly: fully working in the RAM. I offer a further sample Test to
a reliable member, in charge of a feedback about the service. Best regards.

BRUMERS.
Go test
 
Пожалуйста, обратите внимание, что пользователь заблокирован
WoW! Is this for real even?

Have not seen any working Web-Based Silent Execution since the good old Java Drive-By times. If you can convince me this is actually real, I am very interested.
 
WoW! Is this for real even?

Have not seen any working Web-Based Silent Execution since the good old Java Drive-By times. If you can convince me this is actually real, I am very interested.
If you are interested contact me through a private message, and prove your legitimagy.
I can guarantee the Exploit is silent, thanks to my divergents ideas. It works well on any
public Browser/Application/System: expecting from advanced protected ones, like Yandex.
What it does isn't a news, given Silent Zero Click exploit's exist from more than a decade.

In fact, I'm evaluating to raise almost for surely its price: and probably building an Exploit Kit
using its variants, and more exploits; on the contrary of selling builds. For me it's much more
profitable, and for the users it's easier the managment. Eventually, leave your comments.
Might be much appreciated for the development.
 
[Updates]: 21/12/2022.
Tested everything in a real context using the calculator, and it works perfectly silent.
OS: Windows 10. [Latest Build].
Edge: bypassed. [Latest release].
Chrome: bypassed. [Latest release].
Defender: bypassed. [Updated].
ASLR: bypassed. [Latest update].

Number of the files to upload: two.
An HTML index landing page, and the executable HTA encoded together several scripts.
I'll code a fully Private EK inserting several furthers exploit's: so, be fast to purchase until I'm not ready.
The price for the renting will be: 250$/weekly | 900$/monthly. Calculated probability of knock: 85% with average traffic.
URL of the page regarding the calculator dropper exclusively to highly trusted members. I won't see leaked the files.
Then, the video it's not needed: I just recorded it, but basically it shows the persistence of the browsers process; and
every nearest Windows services running trying to be a proactive defense. Please note: it bypass also Outlook, and can be
converted in an XLL deploy executable format; if prefereed. Best regards.

BRUMERS.
 
Статус
Закрыто для дальнейших ответов.
Верх