Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

Important Notice:

✅UPGRADE YOUR ACCOUNT TODAY TO ACCESS ALL OFF-SHORE FORUMS✅

[New]Telegram Channel

In case our domain name changes, we advise you to subscribe to our new TG channel to always be aware of all events and updates -
https://t.me/rtmsechannel

OFF-SHORE Staff Announcement: 30% Bonus on ALL Wallet Deposit this week


For example, if you deposit $1000, your RTM Advertising Balance will be $1300 that can be used to purchase eligible products and service on forums or request withdrawal. The limit deposit to get the 30% bonus is $10,000 for a $3000 Marketplace wallet balance Bonus.

Deposit Now and claim 30% more balance ! - BTC/LTC/XMR


Always use a Mixer to keep Maximum anonimity ! - BTC to BTC or BTC to XMR

Stitch RAT

⚠️Always Remember to keep your identity safe by using a Zero-KYC Zero-AML like https://coinshift.money⚠️

Gold

Clumsy

Clumsy but Smart
USDT(TRC-20)
$750.0
1703549923233
This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on.

Features​

Cross Platform Support​

  • Command and file auto-completion
  • Antivirus detection
  • Able to turn off/on display monitors
  • Hide/unhide files and directories
  • View/edit the hosts file
  • View all the systems environment variables
  • Keylogger with options to view status, start, stop and dump the logs onto your host system
  • View the location and other information of the target machine
  • Execute custom python scripts which return whatever you print to screen
  • Screenshots
  • Virtual machine detection
  • Download/Upload files to and from the target system
  • Attempt to dump the systems password hashes
  • Payloads' properties are "disguised" as other known programs

Windows Specific​


  • Display a user/password dialog box to obtain user password
  • Dump passwords saved via Chrome
  • Clear the System, Security, and Application logs
  • Enable/Disable services such as RDP,UAC, and Windows Defender
  • Edit the accessed, created, and modified properties of files
  • Create a custom popup box
  • View connected webcam and take snapshots
  • View past connected wifi connections along with their passwords
  • View information about drives connected
  • View summary of registry values such as DEP

Mac OSX Specific​


  • Display a user/password dialog box to obtain user password
  • Change the login text at the user's login screen
  • Webcam snapshots

Mac OSX/Linux Specific​


  • SSH from the target machine into another host
  • Run sudo commands
  • Attempt to bruteforce the user's password using the passwords list found in Tools/
  • Webcam snapshots? (untested on Linux)

Implemented Transports​


All communication between the host and target is AES encrypted. Every Stitch program generates an AES key which is then put into all payloads. To access a payload the AES keys must match. To connect from a different system running Stitch you must add the key by using the showkey command from the original system and the addkey command on the new system.


Implemented Payload Installers​


The "stitchgen" command gives the user the option to create NSIS installers on Windows and Makeself installers on posix machines. For Windows, the installer packages the payload and an elevation exe ,which prevents the firewall prompt and adds persistence, and places the payload on the system. For Mac OSX and Linux, the installer places the payload and attempts to add persistence. To create NSIS installers you must download and install NSIS.

How To Run​

python main.py
or
./main.py

Download​



More Screenshots​

1703550041769
1703550054303
1703550076536
 
View attachment 124
This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on.

Features​

Cross Platform Support​

  • Command and file auto-completion
  • Antivirus detection
  • Able to turn off/on display monitors
  • Hide/unhide files and directories
  • View/edit the hosts file
  • View all the systems environment variables
  • Keylogger with options to view status, start, stop and dump the logs onto your host system
  • View the location and other information of the target machine
  • Execute custom python scripts which return whatever you print to screen
  • Screenshots
  • Virtual machine detection
  • Download/Upload files to and from the target system
  • Attempt to dump the systems password hashes
  • Payloads' properties are "disguised" as other known programs

Windows Specific​


  • Display a user/password dialog box to obtain user password
  • Dump passwords saved via Chrome
  • Clear the System, Security, and Application logs
  • Enable/Disable services such as RDP,UAC, and Windows Defender
  • Edit the accessed, created, and modified properties of files
  • Create a custom popup box
  • View connected webcam and take snapshots
  • View past connected wifi connections along with their passwords
  • View information about drives connected
  • View summary of registry values such as DEP

Mac OSX Specific​


  • Display a user/password dialog box to obtain user password
  • Change the login text at the user's login screen
  • Webcam snapshots

Mac OSX/Linux Specific​


  • SSH from the target machine into another host
  • Run sudo commands
  • Attempt to bruteforce the user's password using the passwords list found in Tools/
  • Webcam snapshots? (untested on Linux)

Implemented Transports​


All communication between the host and target is AES encrypted. Every Stitch program generates an AES key which is then put into all payloads. To access a payload the AES keys must match. To connect from a different system running Stitch you must add the key by using the showkey command from the original system and the addkey command on the new system.


Implemented Payload Installers​


The "stitchgen" command gives the user the option to create NSIS installers on Windows and Makeself installers on posix machines. For Windows, the installer packages the payload and an elevation exe ,which prevents the firewall prompt and adds persistence, and places the payload on the system. For Mac OSX and Linux, the installer places the payload and attempts to add persistence. To create NSIS installers you must download and install NSIS.

How To Run​

python main.py
or
./main.py

Download​


*** Hidden text: cannot be quoted. ***


More Screenshots​

View attachment 125
View attachment 126
View attachment 127
Thanks
 
View attachment 124
Il s'agit d'un framework Python multiplateforme qui vous permet également de créer des charges utiles personnalisées pour Windows, Mac OSX et Linux. Vous pouvez choisir si la charge utile se lie à une adresse IP et un port spécifiques, écouter une connexion sur un port, option pour envoyer un e-mail d'informations système au démarrage du système et option pour démarrer l'enregistreur de frappe au démarrage. Les charges utiles créées ne peuvent s'exécuter que sur le système d'exploitation sur lequel elles ont été créées.

Caractéristiques​

Prise en charge multiplateforme​

  • Complétion automatique des commandes et des fichiers
  • Détection antivirus
  • Capable d'éteindre/allumer les moniteurs d'affichage
  • Masquer/afficher les fichiers et répertoires
  • Afficher/modifier le fichier hosts
  • Afficher toutes les variables d'environnement système
  • Keylogger avec des options pour afficher l'état, démarrer, arrêter et vider les journaux sur votre système hôte
  • Afficher l'emplacement et d'autres informations de la machine cible
  • Exécutez des scripts Python personnalisés qui renvoient tout ce que vous imprimez à l'écran
  • Captures d'écran
  • Détection de machine virtuelle
  • Télécharger/Télécharger des fichiers vers et depuis le système cible
  • Tentative de vidage des hachages de mot de passe du système
  • Les propriétés des charges utiles sont "déguisées" en celles d'autres programmes connus

Spécifique à Windows​


  • Afficher une boîte de dialogue utilisateur/mot de passe pour obtenir le mot de passe utilisateur
  • Vider les mots de passe enregistrés via Chrome
  • Effacer les journaux système, de sécurité et d'application
  • Activer/Désactiver des services tels que RDP, UAC et Windows Defender
  • Modifier les propriétés des fichiers consultés, créés et modifiés
  • Créer une boîte contextuelle personnalisée
  • Afficher la webcam connectée et prendre des instantanés
  • Afficher les connexions Wi-Fi connectées passées ainsi que leurs mots de passe
  • Afficher des informations sur les lecteurs connectés
  • Afficher le résumé des valeurs de registre telles que DEP

Spécifique à Mac OSX​


  • Afficher une boîte de dialogue utilisateur/mot de passe pour obtenir le mot de passe utilisateur
  • Modifier le texte de connexion sur l'écran de connexion de l'utilisateur
  • Instantanés de webcam

Spécifique à Mac OSX/Linux​


  • SSH depuis la machine cible vers un autre hôte
  • Exécutez les commandes sudo
  • Essayez de forcer brutalement le mot de passe de l'utilisateur en utilisant la liste des mots de passe trouvée dans Outils/
  • Des instantanés de webcam ? (non testé sous Linux)

Transports mis en œuvre​


Toutes les communications entre l'hôte et la cible sont cryptées AES. Chaque programme Stitch génère une clé AES qui est ensuite insérée dans toutes les charges utiles. Pour accéder à une charge utile, les clés AES doivent correspondre. Pour vous connecter à partir d'un autre système exécutant Stitch, vous devez ajouter la clé en utilisant la commande showkey du système d'origine et la commande addkey sur le nouveau système.


Installateurs de charge utile implémentés​


La commande "stitchgen" donne à l'utilisateur la possibilité de créer des installateurs NSIS sur Windows et des installateurs Makeself sur les machines Posix. Pour Windows, le programme d'installation regroupe la charge utile et un exe d'élévation, qui empêche l'invite du pare-feu et ajoute de la persistance, et place la charge utile sur le système. Pour Mac OSX et Linux, le programme d'installation place la charge utile et tente d'ajouter de la persistance. Pour créer des programmes d'installation NSIS, vous devez télécharger et installer NSIS.

Comment courir​

python main.py
ou
./main.py

Télécharger​


*** Texte masqué : ne peut être cité. ***


Plus de captures d'écran​

View attachment 125
View attachment 126
View attachment 127
vraiment utile bro
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top