cracked.miami
Cmiami Worm Builder V1.3 - Printable Version

+- cracked.miami (https://cracked.miami)
+-- Forum: Hacking (https://cracked.miami/Forum-Hacking)
+--- Forum: General Hacking (https://cracked.miami/Forum-General-Hacking)
+--- Thread: Cmiami Worm Builder V1.3 (/Thread-Cmiami-Worm-Builder-V1-3)



Cmiami Worm Builder V1.3 - Cmiami - 06-15-2025

I disclaim any responsibility for any harmful use.
First Download Link
how use it 
Download pythion and after that download pip install pyinstaller


[Image: image.png]
Graphical User Interface (GUI)
What it does: A user-friendly window to convert VBS files into EXE files.
Features:
Upload a VBS script.
Preview the code before converting.
Add extra features (like disabling antivirus, spreading over a network).
Choose a custom icon for the output EXE.
2. Anti-Analysis (Anti-Debugging & Anti-Sandbox)
What it does: Tricks security tools to avoid detection.
Checks for:
Virtual machines (like VMware, VirtualBox).
Debuggers (used by analysts to study malware).
Sandbox environments (where security tools test suspicious files).
Low system resources (common in virtual labs).
3. Polymorphic Encryption
What it does: Makes the malware look different every time it runs.
How:
Encrypts the VBS script with a random key.
Changes the encryption key on each build.
Uses XOR encryption (simple but effective).
4. Windows Defender Bypass
What it does: Turns off Windows Defender to avoid being blocked.
Methods:
Modifies registry keys (disables real-time protection).
Runs PowerShell commands to weaken security.
Hides malicious actions.
5. Extra Malware Features
What they do: Adds harmful functions to the malware.
Options:
Disable Firewall: Opens the system to attacks.
Disable UAC: Bypasses Windows security prompts.
Self-Replication: Copies itself to other folders.
Startup Persistence: Runs automatically when the PC boots.
Network Spread: Infects other computers on the same network.
SSH Spread: Uses hacked credentials to spread via SSH.
6. Obfuscation (Hiding the Code)
What it does: Makes the code hard to detect and analyze.
Techniques:
Base64 encoding (hides the real script).
Random variable names.
Fake "junk code" (to confuse analysts).
Delays execution (avoids sandbox detection).
7. EXE Conversion (PyInstaller)
What it does: Wraps the VBS script into a standalone EXE file.
How:
Uses PyInstaller (a Python tool to make EXEs).
Compresses the file with UPX (makes it smaller).
Can add a custom icon (to look legitimate).
8. Self-Destruction & Cleanup
What it does: Tries to hide traces after running.



RE: Cmiami Worm Builder V1.3 - vvvzeex - 06-16-2025

thnxxxxx


RE: Cmiami Worm Builder V1.3 - dripop - 06-17-2025

(06-15-2025, 02:45 PM)Cmiami Wrote:
I disclaim any responsibility for any harmful use.
First Download Link
#lcjxk-WyCTdCNDFEKWsjBBJ9Nmd9IUyqunLMu9dVvpQ
how use it 
Download pythion and after that download pip install pyinstaller


[Image: image.png]
Graphical User Interface (GUI)
What it does: A user-friendly window to convert VBS files into EXE files.
Features:
Upload a VBS script.
Preview the code before converting.
Add extra features (like disabling antivirus, spreading over a network).
Choose a custom icon for the output EXE.
2. Anti-Analysis (Anti-Debugging & Anti-Sandbox)
What it does: Tricks security tools to avoid detection.
Checks for:
Virtual machines (like VMware, VirtualBox).
Debuggers (used by analysts to study malware).
Sandbox environments (where security tools test suspicious files).
Low system resources (common in virtual labs).
3. Polymorphic Encryption
What it does: Makes the malware look different every time it runs.
How:
Encrypts the VBS script with a random key.
Changes the encryption key on each build.
Uses XOR encryption (simple but effective).
4. Windows Defender Bypass
What it does: Turns off Windows Defender to avoid being blocked.
Methods:
Modifies registry keys (disables real-time protection).
Runs PowerShell commands to weaken security.
Hides malicious actions.
5. Extra Malware Features
What they do: Adds harmful functions to the malware.
Options:
Disable Firewall: Opens the system to attacks.
Disable UAC: Bypasses Windows security prompts.
Self-Replication: Copies itself to other folders.
Startup Persistence: Runs automatically when the PC boots.
Network Spread: Infects other computers on the same network.
SSH Spread: Uses hacked credentials to spread via SSH.
6. Obfuscation (Hiding the Code)
What it does: Makes the code hard to detect and analyze.
Techniques:
Base64 encoding (hides the real script).
Random variable names.
Fake "junk code" (to confuse analysts).
Delays execution (avoids sandbox detection).
7. EXE Conversion (PyInstaller)
What it does: Wraps the VBS script into a standalone EXE file.
How:
Uses PyInstaller (a Python tool to make EXEs).
Compresses the file with UPX (makes it smaller).
Can add a custom icon (to look legitimate).
8. Self-Destruction & Cleanup
What it does: Tries to hide traces after running.



RE: Cmiami Worm Builder V1.3 - mikeoxlong777 - 06-18-2025

(06-15-2025, 02:45 PM)Cmiami Wrote:
I disclaim any responsibility for any harmful use.
First Download Link
#lcjxk-WyCTdCNDFEKWsjBBJ9Nmd9IUyqunLMu9dVvpQ
how use it 
Download pythion and after that download pip install pyinstaller


[Image: image.png]
Graphical User Interface (GUI)
What it does: A user-friendly window to convert VBS files into EXE files.
Features:
Upload a VBS script.
Preview the code before converting.
Add extra features (like disabling antivirus, spreading over a network).
Choose a custom icon for the output EXE.
2. Anti-Analysis (Anti-Debugging & Anti-Sandbox)
What it does: Tricks security tools to avoid detection.
Checks for:
Virtual machines (like VMware, VirtualBox).
Debuggers (used by analysts to study malware).
Sandbox environments (where security tools test suspicious files).
Low system resources (common in virtual labs).
3. Polymorphic Encryption
What it does: Makes the malware look different every time it runs.
How:
Encrypts the VBS script with a random key.
Changes the encryption key on each build.
Uses XOR encryption (simple but effective).
4. Windows Defender Bypass
What it does: Turns off Windows Defender to avoid being blocked.
Methods:
Modifies registry keys (disables real-time protection).
Runs PowerShell commands to weaken security.
Hides malicious actions.
5. Extra Malware Features
What they do: Adds harmful functions to the malware.
Options:
Disable Firewall: Opens the system to attacks.
Disable UAC: Bypasses Windows security prompts.
Self-Replication: Copies itself to other folders.
Startup Persistence: Runs automatically when the PC boots.
Network Spread: Infects other computers on the same network.
SSH Spread: Uses hacked credentials to spread via SSH.
6. Obfuscation (Hiding the Code)
What it does: Makes the code hard to detect and analyze.
Techniques:
Base64 encoding (hides the real script).
Random variable names.
Fake "junk code" (to confuse analysts).
Delays execution (avoids sandbox detection).
7. EXE Conversion (PyInstaller)
What it does: Wraps the VBS script into a standalone EXE file.
How:
Uses PyInstaller (a Python tool to make EXEs).
Compresses the file with UPX (makes it smaller).
Can add a custom icon (to look legitimate).
8. Self-Destruction & Cleanup
What it does: Tries to hide traces after running.
tyktyktykt j j rjrt jrt jrtjrj  rj


RE: Cmiami Worm Builder V1.3 - Mendax - 06-23-2025

thanks for your work boss


RE: Cmiami Worm Builder V1.3 - supremegod26 - 06-29-2025

Heart
(06-15-2025, 02:45 PM)Cmiami Wrote:
I disclaim any responsibility for any harmful use.
First Download Link
#lcjxk-WyCTdCNDFEKWsjBBJ9Nmd9IUyqunLMu9dVvpQ
how use it 
Download pythion and after that download pip install pyinstaller


[Image: image.png]
Graphical User Interface (GUI)
What it does: A user-friendly window to convert VBS files into EXE files.
Features:
Upload a VBS script.
Preview the code before converting.
Add extra features (like disabling antivirus, spreading over a network).
Choose a custom icon for the output EXE.
2. Anti-Analysis (Anti-Debugging & Anti-Sandbox)
What it does: Tricks security tools to avoid detection.
Checks for:
Virtual machines (like VMware, VirtualBox).
Debuggers (used by analysts to study malware).
Sandbox environments (where security tools test suspicious files).
Low system resources (common in virtual labs).
3. Polymorphic Encryption
What it does: Makes the malware look different every time it runs.
How:
Encrypts the VBS script with a random key.
Changes the encryption key on each build.
Uses XOR encryption (simple but effective).
4. Windows Defender Bypass
What it does: Turns off Windows Defender to avoid being blocked.
Methods:
Modifies registry keys (disables real-time protection).
Runs PowerShell commands to weaken security.
Hides malicious actions.
5. Extra Malware Features
What they do: Adds harmful functions to the malware.
Options:
Disable Firewall: Opens the system to attacks.
Disable UAC: Bypasses Windows security prompts.
Self-Replication: Copies itself to other folders.
Startup Persistence: Runs automatically when the PC boots.
Network Spread: Infects other computers on the same network.
SSH Spread: Uses hacked credentials to spread via SSH.
6. Obfuscation (Hiding the Code)
What it does: Makes the code hard to detect and analyze.
Techniques:
Base64 encoding (hides the real script).
Random variable names.
Fake "junk code" (to confuse analysts).
Delays execution (avoids sandbox detection).
7. EXE Conversion (PyInstaller)
What it does: Wraps the VBS script into a standalone EXE file.
How:
Uses PyInstaller (a Python tool to make EXEs).
Compresses the file with UPX (makes it smaller).
Can add a custom icon (to look legitimate).
8. Self-Destruction & Cleanup
What it does: Tries to hide traces after running.

thanks


RE: Cmiami Worm Builder V1.3 - turkcoder - 06-30-2025

(06-15-2025, 02:45 PM)Cmiami Belediyesi Wrote:
Herhangi bir zararlı kullanım için herhangi bir sorumluluk kabul etmiyorum.
İlk İndirme Linki
#lcjxk-WyCTdCNDFEKWsjBBJ9Nmd9IUyqunLMu9dVvpQ
Nasıl kullanılır?
Pythion'u indirin ve bundan sonra pip install pyinstaller'ı indirin


[Image: image.png]
Grafik Kullanıcı Arayüzü (GUI)
Ne yapar: VBS dosyalarını EXE dosyalarına dönüştürmek için kullanıcı dostu bir pencere.
Özellik:
Bir VBS komut dosyası yükleyin.
Dönüştürmeden önce kodu önizleyin.
Ekstra özellikler ekleyin (antivirüsü devre dışı bırakma, ağ üzerinden yayma gibi).
Çıkış EXE'si için özel bir simge seçin.
2. Anti-Analiz (Anti-Hata Ayıklama ve Anti-Sandbox)
Ne yapar: Tespit edilmekten kaçınmak için güvenlik araçlarını kandırır.
Şunlar için kontroller:
Sanal makineler (VMware, VirtualBox gibi).
Hata ayıklayıcılar (analistler tarafından kötü amaçlı yazılımları incelemek için kullanılır).
Korumalı alan ortamları (güvenlik araçlarının şüpheli dosyaları test ettiği yer).
Düşük sistem kaynakları (sanal laboratuvarlarda yaygındır).
3. Polimorfik Şifreleme
Ne yapar: Kötü amaçlı yazılımın her çalıştığında farklı görünmesini sağlar.
Nasıl:
VBS komut dosyasını rastgele bir anahtarla şifreler.
Her yapıda şifreleme anahtarını değiştirir.
XOR şifrelemesi kullanır (basit ama etkili).
4. Windows Defender Atlama
Ne işe yarar: Engellenmeyi önlemek için Windows Defender'ı kapatır.
Yöntemler:
Kayıt defteri anahtarlarını değiştirir (gerçek zamanlı korumayı devre dışı bırakır).
Güvenliği zayıflatmak için PowerShell komutlarını çalıştırır.
Kötü amaçlı eylemleri gizler.
5. Ekstra Kötü Amaçlı Yazılım Özellikleri
Ne yaparlar: Kötü amaçlı yazılıma zararlı işlevler ekler.
Seçenekler:
Güvenlik Duvarını Devre Dışı Bırak: Sistemi saldırılara açar.
UAC'yi Devre Dışı Bırak: Windows güvenlik istemlerini atlar.
Kendi Kendini Çoğaltma: Kendini diğer klasörlere kopyalar.
Başlatma Kalıcılığı: PC önyüklendiğinde otomatik olarak çalışır.
Ağ Yayılımı: Aynı ağdaki diğer bilgisayarlara bulaşır.
SSH Yayılması: SSH aracılığıyla yayılmak için saldırıya uğramış kimlik bilgilerini kullanır.
6. Gizleme (Kodu Gizleme)
Ne yapar: Kodun algılanmasını ve analiz edilmesini zorlaştırır.
Teknik:
Base64 kodlaması (gerçek komut dosyasını gizler).
Rasgele değişken adları.
Sahte "önemsiz kod" (analistlerin kafasını karıştırmak için).
Yürütmeyi geciktirir (korumalı alan algılamasını önler).
7. EXE Dönüştürme (PyInstaller)
Ne yapar: VBS komut dosyasını bağımsız bir EXE dosyasına sarar.
Nasıl:
PyInstaller (EXE'ler oluşturmak için bir Python aracı) kullanır.
Dosyayı UPX ile sıkıştırır (küçültür).
Özel bir simge ekleyebilir (meşru görünmek için).
8. Kendini Yok Etme ve Temizleme
Ne yapar: Çalıştırdıktan sonra izleri gizlemeye çalışır.
ok