Jump to content

Registrations are Open Only for Limited Period !

After Registration's Clossed Only invite system will work

Registration of this forum is open for limited time to collect the Great Team for Cracking.

Don't be late to be the part of this community Soon the registration will be closed and invite system will work for registration

Only staff will get invite access to invite more peoples
and only users who buy Vip or Super user rank will get invite code for registration.

Staff Required

Staff Required


If you are  a Cracker Config maker Developer's or Exploiter show your Cracking Skills and get chance to be the staff team of CrackingCrew.

Complete the formalities and then submit your application for staff.

Read all the rules and follow the rules 

Good News LetsBruteit 2018 V.1.7.1.1 Updated By HNB

 

- Bug on in

version 1.7.1.1 (11/06/2018)

- 'no user agent' added in user agent list. If you do not have it, just add it. Useful in some configs
  where you don't need to send user agent in request.

valid chars corrected (some filters were not accurate)
- Parsing function added to additionals redirect stage <<RS1VAR>> <<RS2VAR>>...<<RS7VAR>>
  These vars can be used in all successive stages.
- [ADV][empty] function added in SOURCE keys to intercept an Empty Source (with good header)
- When exporting config, Source FK on Login Stage were not exported! Corrected!
- Thanks to @klean from crackingcrew.com for the new Logo! ^^
- Protected config function added! You can now send a config as tool. The config can not be edited!
  When Bruteit loads it you can just add combo and/or proxies and bruteforce.

Recommended Posts

Revenge RAT V 0.2 + Tutorial
Revenge-Rat 0.2 is a program with automatic, hidden installation, used to remotely control computers and covertly monitor users of captured systems.

Screenshot_3-752x440.png

Functional: 

– Surveillance through a web-camera, wiretapping of the premises through a microphone;
– Built-in keylogger with clipboard capture and password styler;
– Editing the hosts file (you can redirect the victim to fake sites);
– A file loader with the Trojan update function, as well as downloading and launching additional software;
– Remote access to the command line and much more.

Hidden Content

    Reply to this topic to see the hidden content.

or 

Hidden Content

    Reply to this topic to see the hidden content.

or 

Hidden Content

    Reply to this topic to see the hidden content.

Link to post
Share on other sites
×
×
  • Create New...

Important Information