Python Perl PHP and C script hacking mega pack

Python
XSS SQLi LFI RFI cmd scanner
xparadox’s_uk_sms_bomber
wifite
v3n0m-v.0.1
V3n0MScanner-smartd0rk3r
tumblr
togel
suram
SQLi
shellfinder
scriptfinder
recipe-473869-1
python_sql,rfi,lfi
python_flash_card_quizzer
python_elmasry_mail_sender
python___secure_password_generator
pyomegle2_v2pyflood_dos_flooder_(syn_tcp_udp)
WebAdminLoginFinder v2.1
pycrack_md5_hash_cracker_(python_3.3.2)
pycrack_md5_hash_cracker_(python_2.7.5)
pyagent_user_agent_generator
Proxy_finder
portscan
PHPbb Bruteforcer

patator_v0.5
pastebin_upload
pastebin_python
password_generator_-_python
main
jce_scanner
jce
hulk
help
findmyhash
findip
facebook
Email Spoofing
Dequiem2.0
ddos
com_user
com_user server scanner
Bing LFI-RFI Searcher
adminfinder
adm_pagefinder
tor
tool
ShellDetect
r-u-dead-yet
pysqli-master
pylunch
PyInstaller-2.1
PACK-0.0.3
ntpdos-master
GooDork-master
faraday-master
ARPwner-master

Perl
zone-h mass poster
Web-Sorrow_v1.5.0FINAL(patched_version)
web-sites-on-web-server-scanner
Viper Lfi Scanner Ver. 4.0
udpflood
synflood
Sqli scanner script by int3
SQL Injection Vulnerability Dork Scanner
slowris
slowloris
slap
script_ddos_perl
port scanner
pixel

Perl Collection
Paranoic Scan 0.9
multiple cms hash cracker
md6_cracker
md5_cracker
md5 checksum
LFI scan
joomscan_2
ICF SQLI CRAWLER
Google tool
Google Hacks
fb
dos script
dork
ddos

cpanel_password_brute_forcer
CiscoDosExploits
b374k Shell Checker
Proxy Scanner
PHP-Shells finder
GMail brute
Email Extractor
Email grabber
Cpanel Brute forcer
Skype Bruteforcer

PHP ShellsPython
XSS SQLi LFI RFI cmd scanner
xparadox’s_uk_sms_bomber
wifite
v3n0m-v.0.1
V3n0MScanner-smartd0rk3r
tumblr
togel
suram
SQLi
shellfinder
scriptfinder
recipe-473869-1
python_sql,rfi,lfi
python_flash_card_quizzer
python_elmasry_mail_sender
python___secure_password_generator
pyomegle2_v2pyflood_dos_flooder_(syn_tcp_udp)
WebAdminLoginFinder v2.1
pycrack_md5_hash_cracker_(python_3.3.2)
pycrack_md5_hash_cracker_(python_2.7.5)
pyagent_user_agent_generator
Proxy_finder
portscan
PHPbb Bruteforcer

patator_v0.5
pastebin_upload
pastebin_python
password_generator_-_python
main
jce_scanner
jce
hulk
help
findmyhash
findip
facebook
Email Spoofing
Dequiem2.0
ddos
com_user
com_user server scanner
Bing LFI-RFI Searcher
adminfinder
adm_pagefinder
tor
tool
ShellDetect
r-u-dead-yet
pysqli-master
pylunch
PyInstaller-2.1
PACK-0.0.3
ntpdos-master
GooDork-master
faraday-master
ARPwner-master

Perl
zone-h mass poster
Web-Sorrow_v1.5.0FINAL(patched_version)
web-sites-on-web-server-scanner
Viper Lfi Scanner Ver. 4.0
udpflood
synflood
Sqli scanner script by int3
SQL Injection Vulnerability Dork Scanner
slowris
slowloris
slap
script_ddos_perl
port scanner
pixel

Perl Collection
Paranoic Scan 0.9
multiple cms hash cracker
md6_cracker
md5_cracker
md5 checksum
LFI scan
joomscan_2
ICF SQLI CRAWLER
Google tool
Google Hacks
fb
dos script
dork
ddos

cpanel_password_brute_forcer
CiscoDosExploits
b374k Shell Checker
Proxy Scanner
PHP-Shells finder
GMail brute
Email Extractor
Email grabber
Cpanel Brute forcer
Skype Bruteforcer

PHP Shells
Download link

15 Likes

Is this really safe? because I checked with virus total and got 40 detection in this pack…

This is total full of virus…

1 Like

We know some of the crack is a fake file to crash you computer or stealing some private information, but most of them is able to making the software running in full version and the virus alert is false positive.

Crack tools are detected as malware or viruses because, by definition, they are. Their specific purpose is to modify programs and files so that they don’t work as designed. They delete verification files, modify registration status and do whatever they can to make their target not work as intended.

Even though the crack allows you, the user, to use the program for free (ie you are achieving your goal with the program and making it work as you intend it to), AV doesn’t care about that. If some program wants to edit another one (or edit system files), it fits the definition of malware.

Try to run the software in sandbox and or use some online service like FireAMP to analyze what file, registry are created but usually there is nothing suspicious.

5 Likes

Lets hope PHP shells are not backdoored .

If you think so, don’t use anything in your real PC… Use in your VM, RDP or sandbox. Even if anything is backdoored nothing will cause problems to your real PC.