Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
CRYPTOCURRENCIES
The Ultimate Guide To Creating Viruses - Create, Crypt 'n' Go [Tutorial]
Message
<blockquote data-quote="Greenhost" data-source="post: 664" data-attributes="member: 20"><p>Hello and Welcome, To The Ultimate Guide To Creating Viruses!</p><p>So lately I have started to be a little more active that I used to be, focusing on different variety's and types of hacking and buying bits and pieces of software around the forum. After years of learning, I have finally decided to execute my experience and use it here on HF to help others! I've been looking around and there are plenty of guides and TuT's teaching you about Viruses such as Rats and Keyloggers (which are the two types of tools I'll be teaching you about in this TuT) though none have had the amount of context and detail as the one I am about to provide you!</p><p></p><p></p><p>If you are a newbie to Viruses and being on the other end for once, here is your chance to learn!</p><p></p><p></p><p>[Image: 9WdF3lx.png]</p><p></p><p></p><p>Disclaimer: I do not take any sort of responsibility for misuse of tools provided by members Hack Forums nor do I encourage any sort of illegal actions. I also do not endorse or promote any of the software listed in this thread. Everything that is posted here is for educational purposes only.</p><p></p><p></p><p>What will this TuT include:</p><p>- The Right Software - Keyloggers, RATs, FUD crypters etc.</p><p>- Setting up - Planning and Executing!</p><p>- Spreading - Distributing Your Virus.</p><p>- Analyzing - Reading information PROPERLY from your virus.</p><p></p><p></p><p>Of course you can experiment with other software and tools around the forum, though as far as success goes, these programs are by far my favorites! Predator used to be awesome before stealer logs were changed which now is an extreme disappointment, therefor I've changed to Limitless and that is working perfectly!</p><p></p><p></p><p>Let's Get Started!</p><p></p><p></p><p>[Image: 9WdF3lx.png]</p><p></p><p></p><p>Chapter 1: The Right Software - Keyloggers, RAT's and Crypters...</p><p>The right virus creation software is KEY if you want to be a successful and undetectable virus creator. Below are two types of programs along with some of my own personal suggestions as to which pieces of software to use and what type may suite your needs.</p><p></p><p></p><p>For RAT's...DarkComet is the best option for remote control over another computer. Since v5 and up, the versions were extremely cut down and almost useless...and when I say useless I mean like trying to use TeamViewer as a Rat. SO, your going to need to find version 4 and up for you to start working with a Rat.</p><p>I personally do not recommend RAT's unless your interested in slaving computers. RAT's are very hard to setup as there is a lot involved, such as Port Forwarding (which can be a pain if you have a dynamic IP), setting up monitoring settings etc. I recommend KeyLoggers to do your dirty work for finding account details and monitoring users actions!</p><p></p><p></p><p>For Keyloggers...Limitless Logger is currently the best tool for logging users information. Predator Pain is another great choice and is also another great piece of software that allows you to record serial keys and various logins along with it. Both of these loggers take minutes to create a KeyLogger and becomes even more efficient better when it comes to compatibility with crypting and distributing.</p><p></p><p></p><p>Next we need to find a Crypter for the creation and distribution of our future keyloggers and rats.</p><p>CryptMe is definitely the best tool for this job. CryptMe allows you to crypt files making them FUD (Fully undetectable), change icons, bind files and more. It is by far the best tool on the market for crypting, though I do warn you the customer service is pretty bad.</p><p></p><p></p><p>Total cost:</p><p>For RAT's: $25/mo (DarkComet is free)</p><p>For Keyloggers: $25 + $25/mo</p><p></p><p></p><p>[Image: 9WdF3lx.png]</p><p></p><p></p><p>Chapter 2: Setting Up - Planning and Executing!</p><p>This is where the real work starts happening. Here you'll setup what you want to be monitered, where logs will be sent, the type of file you'll be creating and crypting your file.</p><p></p><p></p><p>For those looking to use a RAT:</p><p>I will not cover the whole run through of setting up a RAT, though I do know a YouTuber who setup a 7 part series of how to setup a RAT with DarkComet. He also provided a link to DarkComet 4.x in his description so there is a very useful tool. I am not sure whether he is a HF member, though I am pretty sure he is.</p><p>In the spoiler there is the 7 part series for you to learn about setting up your RAT.</p><p>Spoiler (Click to View)</p><p></p><p></p><p>Now for KeyLoggers:</p><p>For those of you who are interested in keylogging, here is where everything gets interesting.</p><p>No matter what programs you use, you want to make your keylogger as no where near suspicious as you can. So, when you click on 'options' in Predator Logger or Limitless Logger, you DO NOT want to Disable UAC, Task Manager, RegEdit, MSConfig etc. This will instantly make the user suspicious of being keylogged.</p><p></p><p></p><p>You want to enable all resources you can get, so, keystroke recorder, stealer, screenshots, etc. Of course there are many options as to what type of account .dat files you can recover such as bitcoin, minecraft etc. If you want to sell those accounts or use them yourself, enable those options.</p><p></p><p></p><p>After that is all done, setup a fake message. The best fake message would be something like this application error:</p><p>[Image: octave_exe_Application_Error.png]</p><p>Just put those two fields (replace program name with your file name) and that should look legitimate enough. If you are a little more technical or want to make something even more believable, go for your life!</p><p>Simple and effective, just tell your victim (if they even ask) that their framework is out of date or their OS is not supported. Simple excuse and still keeps the logger on their computer without any suspicions.</p><p></p><p></p><p>So, we've setup what we are getting and what will come up once the program has been opened, now just confirm everything else is correct and some minor things that aren't needed to explain such as:</p><p>- Mutex (enabled)</p><p>- Delay Runtime (disabled, we will use this option in the crypter)</p><p>- Use registry/place in registry (this is not required though does help your logger harder to get rid of.</p><p>- Confirm your Email/FTP info is CORRECT! (Email is recommended)</p><p>- If you are using Limitless Logger, use the Web Panel option in case you accidentally stuff up your Email details so you still have the main logs.</p><p>DO NOT use functions just for the sake of using them...if you are unsure of a feature, look up what it does! Most functions I have not listed are not required on the keylogger side of things. The rest of setting up is fairly easy to do on your own, though if you need any clarification post and I'll give you a hand!!</p></blockquote><p></p>
[QUOTE="Greenhost, post: 664, member: 20"] Hello and Welcome, To The Ultimate Guide To Creating Viruses! So lately I have started to be a little more active that I used to be, focusing on different variety's and types of hacking and buying bits and pieces of software around the forum. After years of learning, I have finally decided to execute my experience and use it here on HF to help others! I've been looking around and there are plenty of guides and TuT's teaching you about Viruses such as Rats and Keyloggers (which are the two types of tools I'll be teaching you about in this TuT) though none have had the amount of context and detail as the one I am about to provide you! If you are a newbie to Viruses and being on the other end for once, here is your chance to learn! [Image: 9WdF3lx.png] Disclaimer: I do not take any sort of responsibility for misuse of tools provided by members Hack Forums nor do I encourage any sort of illegal actions. I also do not endorse or promote any of the software listed in this thread. Everything that is posted here is for educational purposes only. What will this TuT include: - The Right Software - Keyloggers, RATs, FUD crypters etc. - Setting up - Planning and Executing! - Spreading - Distributing Your Virus. - Analyzing - Reading information PROPERLY from your virus. Of course you can experiment with other software and tools around the forum, though as far as success goes, these programs are by far my favorites! Predator used to be awesome before stealer logs were changed which now is an extreme disappointment, therefor I've changed to Limitless and that is working perfectly! Let's Get Started! [Image: 9WdF3lx.png] Chapter 1: The Right Software - Keyloggers, RAT's and Crypters... The right virus creation software is KEY if you want to be a successful and undetectable virus creator. Below are two types of programs along with some of my own personal suggestions as to which pieces of software to use and what type may suite your needs. For RAT's...DarkComet is the best option for remote control over another computer. Since v5 and up, the versions were extremely cut down and almost useless...and when I say useless I mean like trying to use TeamViewer as a Rat. SO, your going to need to find version 4 and up for you to start working with a Rat. I personally do not recommend RAT's unless your interested in slaving computers. RAT's are very hard to setup as there is a lot involved, such as Port Forwarding (which can be a pain if you have a dynamic IP), setting up monitoring settings etc. I recommend KeyLoggers to do your dirty work for finding account details and monitoring users actions! For Keyloggers...Limitless Logger is currently the best tool for logging users information. Predator Pain is another great choice and is also another great piece of software that allows you to record serial keys and various logins along with it. Both of these loggers take minutes to create a KeyLogger and becomes even more efficient better when it comes to compatibility with crypting and distributing. Next we need to find a Crypter for the creation and distribution of our future keyloggers and rats. CryptMe is definitely the best tool for this job. CryptMe allows you to crypt files making them FUD (Fully undetectable), change icons, bind files and more. It is by far the best tool on the market for crypting, though I do warn you the customer service is pretty bad. Total cost: For RAT's: $25/mo (DarkComet is free) For Keyloggers: $25 + $25/mo [Image: 9WdF3lx.png] Chapter 2: Setting Up - Planning and Executing! This is where the real work starts happening. Here you'll setup what you want to be monitered, where logs will be sent, the type of file you'll be creating and crypting your file. For those looking to use a RAT: I will not cover the whole run through of setting up a RAT, though I do know a YouTuber who setup a 7 part series of how to setup a RAT with DarkComet. He also provided a link to DarkComet 4.x in his description so there is a very useful tool. I am not sure whether he is a HF member, though I am pretty sure he is. In the spoiler there is the 7 part series for you to learn about setting up your RAT. Spoiler (Click to View) Now for KeyLoggers: For those of you who are interested in keylogging, here is where everything gets interesting. No matter what programs you use, you want to make your keylogger as no where near suspicious as you can. So, when you click on 'options' in Predator Logger or Limitless Logger, you DO NOT want to Disable UAC, Task Manager, RegEdit, MSConfig etc. This will instantly make the user suspicious of being keylogged. You want to enable all resources you can get, so, keystroke recorder, stealer, screenshots, etc. Of course there are many options as to what type of account .dat files you can recover such as bitcoin, minecraft etc. If you want to sell those accounts or use them yourself, enable those options. After that is all done, setup a fake message. The best fake message would be something like this application error: [Image: octave_exe_Application_Error.png] Just put those two fields (replace program name with your file name) and that should look legitimate enough. If you are a little more technical or want to make something even more believable, go for your life! Simple and effective, just tell your victim (if they even ask) that their framework is out of date or their OS is not supported. Simple excuse and still keeps the logger on their computer without any suspicions. So, we've setup what we are getting and what will come up once the program has been opened, now just confirm everything else is correct and some minor things that aren't needed to explain such as: - Mutex (enabled) - Delay Runtime (disabled, we will use this option in the crypter) - Use registry/place in registry (this is not required though does help your logger harder to get rid of. - Confirm your Email/FTP info is CORRECT! (Email is recommended) - If you are using Limitless Logger, use the Web Panel option in case you accidentally stuff up your Email details so you still have the main logs. DO NOT use functions just for the sake of using them...if you are unsure of a feature, look up what it does! Most functions I have not listed are not required on the keylogger side of things. The rest of setting up is fairly easy to do on your own, though if you need any clarification post and I'll give you a hand!! [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
CRYPTOCURRENCIES
The Ultimate Guide To Creating Viruses - Create, Crypt 'n' Go [Tutorial]
Top