| Welcome, Guest |
You have to register before you can post on our site.
|
| Online Users |
There are currently 285 online users. » 182 Member(s) | 103 Guest(s) 0xSpill, 123Dex, 1inamillyy, alex321, alex_alx_goat, ALISONBURGER, alixdders, alla1234po, Allosha, alorgan171, alphaaxd, Amiskou , AresFibi, BeaR, Bestcombo, bzsi100, C0mb088, C3POx2, CagaGirando, canwresty, carloswender22, carloswender22s, carzehos, CasualCas, Charaf_CR, chichi, cloudkaraoke, cmbb, Crackings , Crazypc, crystal1337, crystalys, danoo, DARK , darkmessian3, david164775, DengMajok, densel, Devil, didou066666, digidi, duongconno2, EarlHickey, eccencia, Eemun, fafezf, fireflame, Flariu, FlashCloud, flk, Francevip , g57600, Gaara, Gdapra, getety, gfsdfx, Glitch, GOAT , Governer, Guskaa, hbb, hirzonil, Hoodrat666, HqComboSpace, HQHits , Huehuecoyotl, Hw13, HybridTheories, imlitty111, inmydreams, islamou, jannatmirz93, jasuss2, Java931, jenkinsgod, Jerry, johnjones17, Jyxl, kamarhershel, kartiksi1234, Khosein69, Kinder, Kirekare, KiwiShio, LeakZero, Lipens, liuliuya , Lmaocetung, LSF4758, m4don_Avb, Mailcrafter, MaitreSearch, manga95, ManyLogs, marllon2200, MasterCloudz, meruslan, Mexico_Passports, minecraftwork, mrchick, MrCOMBOROBOA, mysticthereal, Nadim353971, Naosepreocupemais, narco, NIB108, Niko, nobelox875, noobra, nothmmm , NotSellerXd, NovaCloudx, Nulled07, ONEMILI, Panda, PatchedCloud, Patolus, Pexoo, Pokemons2025, polos1234, Premium, ravencloudowner68, RedCloud , RedHat29, rinxsgaming, riwkwas, Roronoa044, RuaTzi, RussianDoge, Rww1510, SagaSMS, SaintOTPBOT, samoraysa, Seaborg, Serggik00, sinunlocker, skollpolar, SocNet , Soul_Service, Spiral01, st3lla, Stark, Stevejobsxd, sunball, supch1k1, Swiftproxy, SYCOSUNNY, Tahhhdx, taking0ver, TerraVie89, Test012123, thebeast1997, TheOlympus, Thien, trap, vent, veron1205, VitVit, vn5socksnet, wesly, Windexal, Winnetou, winsnod, WishingGod, Wizard1017, XenoLogs, Xenoo, xrisky, yagizvercetti, yahbro, yerlanov, yippeeeeeee, z7ekai, Zeron
|
|
|
| MaîtreSearch.🔍 - nº1 LOGS SEARCH TOOL | DAILY NEW LOGS | PRICE STARTING AT $0.5 |
|
Posted by: MaitreSearch - 12-09-2025, 12:24 AM - Forum: Secondary Sellers
- Replies (7)
|
 |
MaîtreSearch, is a tool designed to OSINT enthusiasts,
allowing you to explore the unimaginable.
• AI -
│
└ An AI integrated to manage the DataBase with multiple functions.
│
├ Will NEVER receive same data.
│
├ Find your results in seconds.
│
└ New data while you search.
• DATABASE -
│
└ We call our DataBase as "semi-private". We get Data from ALL SOURCES, public and private.
• SEARCHES -
│
├ Search for FREE before pay, to ensure the Data that you are looking for we have in our DataBase
│
└ Search any type of data: URL's/Domains, Keywords, @mail Domains, Passwords, Usernames or E-mails.
• TOOLS -
│
├ Line formatter: format your lines to specific formats. Accept all common logs format.
│
├ Validators: PhpMyAdmin, WordPress, Instagram (NFA) ... +more
│
└ Password Editor: edit passwords with 20+ different modules.
│
├ Target edits: HOTMAIL, GAMING, GMX/WEB.DE, NETFLIX, ...+more
│
└ Secret edits: secret edits to increase your HITS.
• PROFILE -
│
├ Search history: Find all searches from the last 30 days, in case you lost.
│
├ Referral program: Invite new users with your link and receive 10% commission for each deposit made by it.
│
└ Add credits: Add credits with BTC, ETH, LTC, USDT, BNB or SOL with special discounts!
└ Cretids has 30 days validity.
• ANONYMITY -
│
├ External download: No data remains in the BOT chat, ensuring that no data will be linked to your TG user account.
│
└ Anonymous Support: We won't know who you are and you won't who we are.
When sending a support message, we'll call you as 'USER #XX', no TG ID, name, nothing about you.
|
|
|
| XWorm RAT v6.5 |
|
Posted by: bigdog2025 - 12-08-2025, 09:36 PM - Forum: Cracked Programs
- No Replies
|
 |
![[Image: Screenshot_1.png]](https://blackhatrussia.com/wp-content/uploads/2025/12/Screenshot_1.png)
XWorm RAT v6.5
Introduction
In the ever-evolving landscape of cybersecurity threats, XWorm RAT v6.5 stands out as a sophisticated remote access trojan (RAT) that has captured the attention of security researchers and threat actors alike. First emerging in 2022, XWorm has undergone multiple iterations, with version 6.5 representing one of the latest developments in its modular architecture. This article delves into the key features, infection mechanisms, and implications of XWorm RAT v6.5, providing valuable insights for IT professionals, cybersecurity enthusiasts, and organizations looking to bolster their defenses.
![[Image: Screenshot_2-1-1024x897.png]](https://blackhatrussia.com/wp-content/uploads/2025/12/Screenshot_2-1-1024x897.png)
As a commodity malware available in underground forums, XWorm RAT v6.5 exemplifies the growing trend of malware-as-a-service (MaaS), where even novice cybercriminals can deploy powerful tools for espionage, data exfiltration, and financial gain. Understanding this threat is crucial for proactive protection.
What is XWorm RAT v6.5?
XWorm RAT v6.5 is an advanced variant of the XWorm family, a remote access trojan designed for unauthorized control over infected systems. Unlike earlier versions, v6.5 incorporates enhancements for stealth, modularity, and resilience, building on the resurrection of v6.0 in mid-2025 after a brief hiatus in development.
![[Image: Screenshot_3.png]](https://blackhatrussia.com/wp-content/uploads/2025/12/Screenshot_3.png)
At its core, XWorm generates a unique client ID based on system hardware and software details, such as processor count, username, and OS version. This ID facilitates encrypted communication with command-and-control (C2) servers, often using ports like 4411 and default encryption keys. The malware’s modular design allows operators to load plugins dynamically, expanding its functionality without redeploying the core payload.
Key characteristics include:
Modular Plugins: Over 35 plugins for tasks like remote desktop access, file management, and information stealing.
Persistence Mechanisms: Techniques to survive reboots and even system resets, using registry keys, scheduled tasks, and logon scripts.
Multi-Stage Infection: Typically starts with phishing emails or malicious downloads, leading to PowerShell scripts that disable security features like AMSI (Anti-Malware Scan Interface).
This version addresses vulnerabilities from prior releases, such as remote code execution flaws in v5.6, making it more robust against detection and exploitation.
![[Image: Screenshot_4-1024x838.png]](https://blackhatrussia.com/wp-content/uploads/2025/12/Screenshot_4-1024x838.png)
Ransomware Integration
One of the most alarming features is the Ransomware.dll plugin, which encrypts files across the system (excluding critical directories) and drops a ransom note demanding payment in Bitcoin. This shares code with older ransomware like NoCry, highlighting XWorm’s hybrid capabilities as both a RAT and a ransomware tool.
https://www.virustotal.com/gui/file/1294...96c904d985
https://www.mediafire.com/file/1z4ramf4l...U.zip/file
|
|
|
|