[UD 4/33] Grieve Logger V4 [Binder At Last][Many Features][Awesome GUI][Stable]


Grieve Logger V4


Here We Go Again...


Screenshot: 




Features:
  • UD - 4/33
  • Use Any E-Mail Provider For Your KeyLogs
  • Add To Start Up
  • Kill Task Manager
  • Hide File After Execution
  • Disable System Restore
  • Block AntiVirus Sites
  • Disable Registry Editing
  • Protect Keylogger Process - Stops slave From Ending Your Keylogger's Process
  • Antis
  • Obfuscate Output
  • Anti-Reflector - Stops slave Decompiling Your Server And Finding Your E-Mail Address/Password
  • Icon Changer
  • Binder
  • Fake Error Message
  • Custom Sending Interval
Scans:
Builder:

File Info

Report date: 2011-05-30.
Scan Occured: [Image: result_time.php?t=i&w=NTIzNjI=]
Link to scan: http://myavscan.com/result.php?scan=NTIzNjI=
File name: Grieve_Logger_Public_V4.exe
File size: 2610688 bytes
MD5 Hash: 1cf34b70e46f1758e9cb5f6da48e044f
SHA1 Hash: 34320232e8abbe66cd0d715d904a900756ed8f7c
Detection rate: 0 out of 33
Status: CLEAN

Detections

AVG - Clean.
Acavir - Clean.
Avast 5 -Clean.
Avast -Clean.
Avira -Clean.
BitDefender -Clean.
VirusBuster Internet Security -Clean.
Clam Antivirus -Clean.
COMODO Internet Security -Clean.
DrWeb -Clean.
eTrust-Vet -Clean.
F-PROT Antivirus -Clean.
F-Secure Internet Security -Clean.
G Data -Clean.
IKARUS Security-Clean.
Kaspersky Antivirus -Clean.
McAfee -Clean.
MS Security Essentials -Clean.
ESET NOD32 -Clean.
Norman -Clean.
Norton -Clean.
Panda Security -Clean.
A-Squared Security -Clean.
Quick Heal Antivirus -Clean.
Rising Antivirus -Clean.
Solo Antivirus -Clean.
Sophos -Clean.
Trend Micro Internet Security -Clean.
VBA32 Antivirus -Clean.
Vexira Antivirus -Clean.
Webroot Internet Security -Clean.
Zoner AntiVirus -Clean.
AhnLab V3 Internet Security -Clean.

Scan report generated by
MyAvScan.com

Stub:
File Info

Report date: 2011-05-30.
Scan Occured: [Image: result_time.php?t=i&w=NTIzNTU=]
Link to scan: http://myavscan.com/result.php?scan=NTIzNTU=
File name: Stub.exe
File size: 119296 bytes
MD5 Hash: 8fe5ec235c9a64d9bc5a4303ed22ade6
SHA1 Hash: d28a5fbc4a208ee5e8db2db3c2c5e21ae65fdb6e
Detection rate: 4 out of 33
Status: INFECTED

Detections

AVG - Clean.
Acavir - Clean.
Avast 5 -Clean.
Avast -Clean.
Avira -TR/Dropper.Gen.
BitDefender -Clean.
VirusBuster Internet Security -Clean.
Clam Antivirus -Clean.
COMODO Internet Security -Clean.
DrWeb -Clean.
eTrust-Vet -Clean.
F-PROT Antivirus -Clean.
F-Secure Internet Security -Clean.
G Data -Clean.
IKARUS Security-Worm.MSIL.
Kaspersky Antivirus -Clean.
McAfee -Clean.
MS Security Essentials -Clean.
ESET NOD32 -Clean.
Norman -Clean.
Norton -Clean.
Panda Security -Clean.
A-Squared Security -Worm.MSIL!IK.
Quick Heal Antivirus -Clean.
Rising Antivirus -Clean.
Solo Antivirus -Clean.
Sophos -Clean.
Trend Micro Internet Security -Clean.
VBA32 Antivirus -Clean.
Vexira Antivirus -Clean.
Webroot Internet Security -Clean.
Zoner AntiVirus -INFECTED [Dropper.Generic2.MMJ].
AhnLab V3 Internet Security -Clean.

Scan report generated by
MyAvScan.com

Built Server:
File Info

Report date: 2011-05-30.
Scan Occured: [Image: result_time.php?t=i&w=NTIzNTk=]
Link to scan: http://myavscan.com/result.php?scan=NTIzNTk=
File name: Server_30th_May.exe
File size: 510976 bytes
MD5 Hash: bdc75f205b166153af3c2f1156a10760
SHA1 Hash: b037cd0146717c7b4ad2a3eff00d43ed4e44d483
Detection rate: 4 out of 33
Status: INFECTED

Detections

AVG - Clean.
Acavir - Clean.
Avast 5 -Clean.
Avast -Clean.
Avira -TR/Dropper.Gen.
BitDefender -Clean.
VirusBuster Internet Security -Clean.
Clam Antivirus -Clean.
COMODO Internet Security -Clean.
DrWeb -Clean.
eTrust-Vet -Clean.
F-PROT Antivirus -Clean.
F-Secure Internet Security -Clean.
G Data -Clean.
IKARUS Security-Worm.MSIL.
Kaspersky Antivirus -Clean.
McAfee -Clean.
MS Security Essentials -Clean.
ESET NOD32 -Clean.
Norman -Clean.
Norton -Clean.
Panda Security -Clean.
A-Squared Security -Worm.MSIL!IK.
Quick Heal Antivirus -Clean.
Rising Antivirus -Clean.
Solo Antivirus -Clean.
Sophos -Clean.
Trend Micro Internet Security -Clean.
VBA32 Antivirus -Clean.
Vexira Antivirus -Clean.
Webroot Internet Security -Clean.
Zoner AntiVirus -INFECTED [Dropper.Generic2.MMJ].
AhnLab V3 Internet Security -Clean.

Scan report generated by
MyAvScan.com

Download Link:
http://adf.ly/49qMj

Code:
vjvhNT8nvDLmvjLlvz8hvzAg6zBBvTAovjAjvDQpNz0kNjQpvTAg6zBBvjvhvDwjNT5oNjvnvjQkNTwg ​ 6zBBvj0hvDAkNzQjvjwovDUkvTAg6zBBvjvovDqgvD0nvTqkNTUmNTwg6zBBvTAovjAjvzQoNzqjOz0m ​ vzLg6zBBvj0gNDUpNjUiNTvnvj8hvTAg6zBBvj8gNzqhNDqkvjwhNz8gvTwg6zBBvjvnOz0pOzQjOD8m ​ vTApvDAg6zBBvTAovjAiODUhNTvmND0lvTvg6zBBvj5kNz0ovTwgNj8gNj5iNTAg6zBBvj8gvjQkNjwm ​ NTAnODwmvjwg6zBBvjvhNT0hNjviODqoND5mvjAg6zBBvTAovj5nOD5pvjwmNzvivzvg6zBBvjqhNzQn ​ NzLjNjUmNzLlvT0g6zBBvjvhNz5jvDQlOzAhvjLiOzwg6zBBvjvnOzvkvz0lNzvjNT5pvjAg6zBBvTAo ​ vj5nNjvgvjQnvjLlvTAg6zBBvjLpOz0mvD0lNDUmNz5kNTAg6zBBvjqoNzAhNTwiOD8kNzwpvzAg6zBB ​ vjvnOzQlvjqnND5iOz0jODLg6zBBvTAovjAjvzQoNzqjOz0mvzLg6zBBvjqovD8iOD0iODAkvDLgNDAg ​ 6zBBvjLjOz0gvD5lNjvkNT8jNjAg6zBBvjvhNTAgNjLoODwnNDvlODwg6zBBvTAovjAjvzQoNzqjOz0m ​ vzLg6zBBvjwkvDqkNDAkNT8gNjApvDAg6zBBvjLkvzAivD5nvDqlvzwiNDLg6zBBvjvhNT8nNDLivTAh ​ ODvpvDAg6zBBvTAovjAjvDQpNz0kNjQpvTAg6zBBvj0gNDUpNjUiNTvnvj8hvTAg6zBBvjLkvD8mNTUj ​ NDLovjUnNjAg6zBBvjvhNT8nvDLmvjLlvz8hvzAg6zBBvTAovjAjvDQpNz0kNjQpvTAg6zBBvjqhNzQn ​ NDLkODvnvjUovjAg6zBBvj8gNzLivDQhNDvlvD0pOzAg6zBBvjvovDqgND0jvD0hvjLkNzwg6zBBvTAo ​ vjAjvzQoNzqjOz0mvzLg6zBBvjLjND8gNzLoNz8gNTUlNz0g6zBBvjLjOz8lvj0pvTQhNDqoNzLg6zBB ​ vjvnOz0pOzQjOD8mvTApvDAg6zBBvTAovj5nNjvgvjQnvjLlvTAg6zBBuz0ivzwjNz5ivz0lvDwnvCon ​Nw//





Encrypted With:
PlainText -> FERON-74 -> BASE-64 -> ZARA-128 -> OKTO3 -> ESAB-46

L33T's And UB3R's Can PM Me For The Password

Credits:
  • Classical
  • pr0t0typ3
  • .bLaZeD
  • Deathader


 


20 comments:

A Ultimate Beginners Guide to Keylogging!

A BEGINNERS GUIDE TO KEY-LOGGING 
Welcome to a Beginner's Guide to Keyloggers! In this guide I will go through all the common topics that you may need to know. When you finish reading this topic you will know everything you will ever need to get started keylogging. I cover every topic related to keyloggers as well as cover terminology and definitions. I'll explain how a keylogger works and how to even get started making your own! So let's get started!

TABLE OF CONTENTS
  • What is a keylogger?
  • Learning the lingo and definitions.
  • Common features keyloggers have.
  • How do I use a keylogger?
  • What is a "stub"?
  • What is the "server"?
  • What is crypting?
  • What is the difference between a stealer and a keylogger?
  • What is .net framework and why do I care?
  • What are some good keyloggers?
  • What are some upsides to keyloggers?
  • What are some downsides to keyloggers?
  • I want to make my own keylogger. Where do I start?
  • I think I've been infected with a keylogger! What do I do?
  • Conclusion
 WHAT IS A KEYLOGGER?

 A keylogger is a program that logs a keyboards keystrokes. It can be used for several purposes, both black hat and white hat. The most common use is black hat. A keylogger functions by grabbing a keystroke, triggered by when the slave presses a key on their keyboard, and saving it to a variable. This process is called "keyboard hooking". It then will take this long variable and send it via a SMTP or FTP server. You can then view these logs and use it for whatever your intention may be. Keyloggers have several different features that I will go into in a later section. The most basic ones only include keyboard hooking and a way to send the logs.
 LEARNING THE LINGO 
One of the most confusing things about starting something new is not understanding the lingo. If you don't understand the lingo, how will you know what people are talking about? In this section I'll be explaining the common terms people use concerning keyloggers. I'll be going over some other more general things as well.


  • Logger
    • Slang term for keylogger. See the "What is a keylogger" section.
  • Hooks
    • Slang term for keyboard hooks. These are also explained in the "What is a keylogger section"
  • Keystrokes
    • Section of code that is triggered when the slave types something on the keyboard.
  • Logs
    • Compiliation of all the keystrokes over a period of time.
  • FTP
    • A webhost that stores files that allows the user to connect and retrieve said files. Files in this case are logs.
  • SMTP
    • A way that logs are sent via email. Example, MSN, Gmail, Yahoo, etc.

  • FUD
    • Full Un-Detected. This means that antiviruses will not detect your file as a virus. This will be further explained in the "What is crypting section".
  • UD
    • Undetected. This means that some antiviruses will not detect your files as a virus, while others will.
  • Server
    • A server is the output of your keylogger. I will take this in-depth in the "What is a server?" section.
  • Crypter
    • A crypter crypts your file removing detections. I'll take this in-depth in the "What is crypting" section.
  • Detection
    • A detection is a term used when an antivirus detects, or thinks your file is a virus. You always want to have the least amount of detections possible to increase your success rate and to reduce errors.
  • Black hat
    • A black hat is someone who uses their knowledge of computers and security for malicious reasons.
  • White hat
    • A white hat is someone who uses their knowledge of computers and security for helpful reasons. They help disinfect and improve others security to combat black hat hackers.
  • Grey hat
    • A grey hat is a mixture between a black and white hat. They will infect innocent people and then help them get rid of it, for free or a price (the latter being more common).
  • Backdoored
    • When a file is backdoored it has a virus binded to it. This means that the file will act normally and the user will be infected without their knowledge. This has become extremely common in the keylogger section. Always be wary of new releases.
     

COMMON FEATURES


As I've said before, most keyloggers have two basic settings. Keyboard hooking and log sending (by FTP or SMTP). Most keylogger developers (myself included) like to include more settings to help ease the user experience. Below is a list of common settings you may find, and what they do:

  • Icon Changers
    • This will change your viruses icon without corrupting it like some third party programs can do.
  • MuteX
    • MuteX is a unique string that you generate. It helps prevent multiple logs from being sent.
  • Add to Startup
    • This will add a registry (or other ways) that will cause your virus to start when the computer is turned on.
  • Antis
    • Antis are a feature that help keep your virus on the slaves computer for as long as possible. They disable or stop certain white hat programs such as antiviruses, sandboxie, and keyscramblers from running or removing your file.
  • Disable CMD/Taskmanager/Registry
    • This feature will change the registry value for each of these system tools to disable them.
  • Logging interval
    • This allows the user to chose how often logs are sent.
  • Fake Error Message
    • This will cause a fake error message to pop up, making it seem less suspicious.
  • File pumper
    • This will add to the size of your virus. This helps making it seem less suspicious as a game won't be a few kilobytes.
  • Assembly Editing
    • This allows you to change things found in the properties menu when right clicking a file. This helps it seem more like a real file rather than a virus.
  • Encrypted user information
    • This encrtyps your information so that others cannot steal it by decompiling your virus.
  • Test connection
    • This will test your credentials that you've entered to make sure they are correct.


     HOW DO I USE IT?

 Using a keylogger is a lot easier than it sounds. All you need to do is find one that you want to use, download it, and then chose your settings. Once you have entered all your information and chosen your settings, click the build button. The builder will create your server. This is what you give to people. Give them this file and when they run it they will be infected and you will start receiving logs. Pretty self explanitory. If you ever have a question contact the creator and they should be able to help you.

WHAT IS A "STUB"

 A stub is a separate binary that contains special code that is required for the keylogger to function. There are usually two things in a keylogger. The builder and the stub. Some keyloggers will have a stub built in. A builder takes the information and settings you've chosen and merges it with a stub. The stub contains keyhooks and the workings of each feature. These two merge to create your virus, containing all of the information. I'll cover this file in the next section.



WHAT IS THE "SERVER"

A server is the ouptput of your keylogging builder. It takes your user information (the builder) and the actual malicious code (the stub) and merges the two (via either CodeDOM which I'll explain later in this section, or by filesplitting, which I will also cover) to make one bad ass file. There are several ways that this is accomplished, and both ways have their ups and downs. The server is also what you distribute to infect people. It is your "virus"

CodeDom is a type of building that generates the code during runtime. This allows the user to only have to download one file (just a builder). After inputting your information, the builder will take this and combine it with the malicious code (already inside the builder). This helps lower detection rates, but overall is harder to do, and is harder to reFUD (you have to re distribute the entire builder, instead of just providing another stub).

Filesplitting is the old school way to do things. It requries taking your information (the builder) and combining it with a separate file that contains the malicious code. While this makes it easier to detect, it's easier to update as you can simply give your users another file (same thing, just with less detections). 


 WHAT IS CRYPTING ?

 Crypting can be very complex, though it isn't necessary for you to know all of this information. So for this section I'll keep things to what you need to know. Crypting involves taking a stub (sometimes it's CodeDOM) and using that to FUD (or lower your detection rate) your file. The entire process can get a bit confusing, and I won't bother getting into it. What you do need to know is that crypting can easily corrupt your keylogging sever making it no longer work. A corrupt keylogger may not be detected (the crypter at least did it's job) but it will not send logs making it useless. Because of this you should chose your crypters carefully and it may take a while to find one that works (for free) with your keylogging server. If you are buying a crypter (which I recommend) then be sure to ask the seller to either test or verify your server. In short, crypting is used to lower detection rate, and raise execution rates. That's all you need to know.

9 comments:

[Guide] Close any Facebook account in 24 hours.

Close FaceBook account(s)



Just Follow the steps:
Step 1 - Go to this url:
http://www.facebook.com/help/contact.php...m=deceased

So this is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).

Step 2 - Complete the Fields:

Explain:
Full Name: Your Victims Full name(Name last name)
Date of birth: Go at his profile and click at Info tab and get his date of birth.
Account Email Addresses: Do the same thing, go to his profile and click on info tab and get his email addresses.
Networks: Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.
Web address of profile you would like to report: Just go to his profile and copy the link in the address bar.
Relationship to this person: To make more believable select Immediate Family.
Requested Action: Remove Profile
Proof Of Death: This is the hardest part of this form. Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". It doesn't matters from what country you are, just use this Italian certificate and open up photoshop or whatever Image
Editor and just write in a blank field:
Annunciamo il morte di [name goes here]. Save your image to desktop and upload it in one of the Image
Free Hosting like: http://imageshack.us
And it's done ;)... Italian Death Certificate:
Additional Information: Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.

Step 3 - Click on Submit and then a message will appear:
Your injury was submitted at Facebook Team .. So the meaning is that one of the mod's of Facebook will review your report and will do the right decision. It works in most of the times. I closed a few ones.

5 comments:

[HOT] PolyDex v3 Gmail Cracker [Free]

Improvements
  • Dual threads (Twice as fast as v2)
  • No character set restrictions (set your own)
  • Console application (more light weight)

Features
  • Free
  • Popular (old thread had 6k + views)
  • No captcha to deal with (SMTP attack)
  • Easy to use
  • Clean
Download


2 comments:

Ultimate Collection Of MAKE MAGAZINE Vol 1 -11

The first magazine devoted entirely to DIY technology projects, MAKE Magazine unites, inspires and informs a growing community of resourceful people who undertake amazing projects in their backyards, basements, and garages.


[Image: f_make01m_7be3fc0.jpg]

[align=center]Make Magazine Vol 01


The first magazine devoted to digital projects, hardware hacks, and D.I.Y. inspiration.


[Image: f_make02m_c62e72c.jpg]

Make Magazine Vol 02

Building your own high definition video recorder, how to podcast, making a robot from an old computer mouse, reconditioning an old amplifier.


[Image: f_make03m_419071e.jpg]

Make Magazine Vol 03

Includes Mod Your Rod: a collection of car hacks and mods. Plus make cool special effects and animatronics for your garage haunted house!



Make Magazine Vol 04

Cool holiday kit reviews, build a cigar box guitar, circuit bending, high-speed flash photography, coffee hacks, and lots of DIY music projects.


[Image: f_make05m_df41a54.jpg]

Make Magazine Vol 05

Homemade electric vehicles, high-powered water rockets, electricity-generating windmill, jet engine in a jam jar, and a backyard zip line!


[Image: f_make06m_6ab1860.jpg]

Make Magazine Vol 06

Build a pair of electronic insects. LED throwies. Rodent-powered nightlight. Floating tower structure. Bug Sucker.


[Image: f_make07m_94f5ede.jpg]

Make Magazine Vol 07

Hack your plants, extract your DNA, 70's soapbox saga, build a videocam rocket, and head-mounted water cannon.

[Image: f_make08m_5e8b2df.jpg]


Make Magazine Vol 08

A secret history of Myst, resurrecting a neglected pinball machine, making an asteroid mining colony on your kitchen table, creating robotic desk toys, building a rubber band ornithopter, making a toy gun controlled alarm clock, and a special primer on mold making by Mythbuster's Adam Savage

[Image: f_make09m_7722bff.jpg]


Make Magazine Vol 09

We leave no stone unturned in our quest for the bizarre in Volume 09, the Fringe issue. Behold such wonders as the cosmic ray cloud chamber, high-voltage levitation, and the amazing vortex tube. Plus, learn how to make almost anything with carbon fiber, photograph the luminous auras around everything, and build a $5 guitar amp. Explore the fringes of technology with projects and articles that push the boundaries of physics and reason.


[Image: f_make10m_2a40c90.jpg]

Make Magazine Vol 10

MAKE Volume 10 explores the world of Home Electronics. From a mobile drive-in theater to a sound and light machine to fine-tune your brain, this issue is chock full of circuits and devices that will entertain, educate, and illuminate.


[Image: f_make11m_df0e12d.jpg]

Make Magazine Vol 11

Includes a special "DIY Wheels" section, with plans for making a mobile drive-in movie theater, a cool chopper out of an old bicycle, and a pedal powered iPod charger. We'll also show you how to make a remote control bird feeder to take amazing photos of birds, a vintage- style remote control race car out of sheet-metal, and a vacuum-former that lets you create molded 3D parts out of plastic.



Download Links:
MAKE Magazine: volume 1 - 23 Torrent  Checked 100% Virus Free!

2 comments: