![[Image: image.png]](https://i.ibb.co/0pPj4wfy/image.png)
I disclaim any responsibility for any illegal use.
This program cannot be distributed as it is protected by our privacy policy. You open it on your device, but you cannot distribute it.
The program cannot be used if you are not a premium member.
I will upload a video soon explaining how to use it.
If you have Trojan Payload exe, you must convert it from
VIP CHECKR & TOOLS
After converting it to VBS, go to
VIP CHECKR & TOOLS
You will merge the VBS file with an image, and the result will be a .bat file.
After that, upload a .bat file with another image other than the one you merged into the VBS file.
The program will give you a file containing two images that must be in the same folder for the injected image to work.
Download Cmiami Exploit inside jpg
VIP CHECKR & TOOLS
Download njrat It Create VBS OUTPUT AND TEST IT WORK[USE IT IN RDP OR VM ]
Download Cmiami Exploit inside jpg
VIP CHECKR & TOOLS
Download njrat It Create VBS OUTPUT AND TEST IT WORK[USE IT IN RDP OR VM ]
VIP CHECKR & TOOLS