[ Leaked ] 💀💚EternalBlue Exploit Toolkit Auto Spread | EXE DLL PS Supported💚💀

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

Eternalblue was developed by National Security Agency and
It was leaked by the Shadow Brokers of hacker group on April 14, 2017.
Eternalblue was public and many programmers try to develop into new version of this exploit.
Exploit was target smb (Server Message Block) with port 445

View attachment 178

View attachment 176


Here's new coder was reborn it again with Python27 Enternal scanner and Auto exploit.
we have decompile for make you safe for work also both file

View attachment 177

EBEKv2.0 Feature List :
Multi-Threading fixed and optimized.
Scan from IP text list. (Optimized for masscan use.)
Added payload option for PS1.
New scan mode added to continually scan and repeat list.
Scan is much faster.


EternalBlue_EK
EternalBlue
EternalSynergy
EternalRomance
EternalChampion


CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148

Windows XP SP3 x86
Windows XP SP2 x64
Windows 7 SP1 x86
Windows 7 SP1 x64
Windows 8.1 x86
Windows 8.1 x64
Windows 10 Pro Build 10240 x64
Windows Server 2000 SP4 x86
Windows Server 2003 SP2 x86
Windows Server 2003 R2 SP2 x64
Windows Server 2008 SP1 x86
Windows Server 2008 SP1 x64
Windows Server 2008 R2 SP1 x64
Windows Server 2012 R2 x64
Windows Server 2016 x64

Powershell Reverse Shell
Download & Execute
VNC Injector
Add Remote Desktop User


Python 2.7
Pip Build-Essential Libssl-dev
Libffi-dev
Python-dev
Impacket
Pycrypto
Clint
Pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

pip install impacket pycrypto clint ipaddress pyasn1



python auto_mode.py 192.0.0.0/8

Any Valid CIDR Range may be supplied.
Please, Log in or Register to view URLs content!

Example: 192.168.1.0/24 = 256 IP's 192.168.0.0/16 = 64K IP's 192.0.0.0/8 = 16M IP's 0.0.0.0/0 = 4096M IP's

EXE or DLL Supported.
All executions with SYSTEM privileges.
drcrypter.ru

Download LINK HERE :
Please, Log in or Register to view URLs content!

Download LINK mirror #1 :
Please, Log in or Register to view URLs content!

Download LINK mirror #2 :
Please, Log in or Register to view URLs content!

Download LINK mirror #3 :
Please, Log in or Register to view URLs content!

Download LINK mirror #4 :
Please, Log in or Register to view URLs content!

Download LINK mirror #5 :
Please, Log in or Register to view URLs content!
kk
 
Eternalblue was developed by National Security Agency and
It was leaked by the Shadow Brokers of hacker group on April 14, 2017.
Eternalblue was public and many programmers try to develop into new version of this exploit.
Exploit was target smb (Server Message Block) with port 445

View attachment 178

View attachment 176


Here's new coder was reborn it again with Python27 Enternal scanner and Auto exploit.
we have decompile for make you safe for work also both file

View attachment 177

EBEKv2.0 Feature List :
Multi-Threading fixed and optimized.
Scan from IP text list. (Optimized for masscan use.)
Added payload option for PS1.
New scan mode added to continually scan and repeat list.
Scan is much faster.


EternalBlue_EK
EternalBlue
EternalSynergy
EternalRomance
EternalChampion


CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148

Windows XP SP3 x86
Windows XP SP2 x64
Windows 7 SP1 x86
Windows 7 SP1 x64
Windows 8.1 x86
Windows 8.1 x64
Windows 10 Pro Build 10240 x64
Windows Server 2000 SP4 x86
Windows Server 2003 SP2 x86
Windows Server 2003 R2 SP2 x64
Windows Server 2008 SP1 x86
Windows Server 2008 SP1 x64
Windows Server 2008 R2 SP1 x64
Windows Server 2012 R2 x64
Windows Server 2016 x64

Powershell Reverse Shell
Download & Execute
VNC Injector
Add Remote Desktop User


Python 2.7
Pip Build-Essential Libssl-dev
Libffi-dev
Python-dev
Impacket
Pycrypto
Clint
Pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

pip install impacket pycrypto clint ipaddress pyasn1



python auto_mode.py 192.0.0.0/8

Any Valid CIDR Range may be supplied.
Please, Log in or Register to view URLs content!

Example: 192.168.1.0/24 = 256 IP's 192.168.0.0/16 = 64K IP's 192.0.0.0/8 = 16M IP's 0.0.0.0/0 = 4096M IP's

EXE or DLL Supported.
All executions with SYSTEM privileges.
drcrypter.ru

Download LINK HERE :
Please, Log in or Register to view URLs content!

Download LINK mirror #1 :
Please, Log in or Register to view URLs content!

Download LINK mirror #2 :
Please, Log in or Register to view URLs content!

Download LINK mirror #3 :
Please, Log in or Register to view URLs content!

Download LINK mirror #4 :
Please, Log in or Register to view URLs content!

Download LINK mirror #5 :
Please, Log in or Register to view URLs content!
great
 
Eternalblue was developed by National Security Agency and
It was leaked by the Shadow Brokers of hacker group on April 14, 2017.
Eternalblue was public and many programmers try to develop into new version of this exploit.
Exploit was target smb (Server Message Block) with port 445

View attachment 178

View attachment 176


Here's new coder was reborn it again with Python27 Enternal scanner and Auto exploit.
we have decompile for make you safe for work also both file

View attachment 177

EBEKv2.0 Feature List :
Multi-Threading fixed and optimized.
Scan from IP text list. (Optimized for masscan use.)
Added payload option for PS1.
New scan mode added to continually scan and repeat list.
Scan is much faster.


EternalBlue_EK
EternalBlue
EternalSynergy
EternalRomance
EternalChampion


CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148

Windows XP SP3 x86
Windows XP SP2 x64
Windows 7 SP1 x86
Windows 7 SP1 x64
Windows 8.1 x86
Windows 8.1 x64
Windows 10 Pro Build 10240 x64
Windows Server 2000 SP4 x86
Windows Server 2003 SP2 x86
Windows Server 2003 R2 SP2 x64
Windows Server 2008 SP1 x86
Windows Server 2008 SP1 x64
Windows Server 2008 R2 SP1 x64
Windows Server 2012 R2 x64
Windows Server 2016 x64

Powershell Reverse Shell
Download & Execute
VNC Injector
Add Remote Desktop User


Python 2.7
Pip Build-Essential Libssl-dev
Libffi-dev
Python-dev
Impacket
Pycrypto
Clint
Pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

apt-get install python python-pip build-essential libssl-dev libffi-dev python-dev
pip install impacket pycrypto clint ipaddress pyasn1

pip install impacket pycrypto clint ipaddress pyasn1



python auto_mode.py 192.0.0.0/8

Any Valid CIDR Range may be supplied.
Please, Log in or Register to view URLs content!

Example: 192.168.1.0/24 = 256 IP's 192.168.0.0/16 = 64K IP's 192.0.0.0/8 = 16M IP's 0.0.0.0/0 = 4096M IP's

EXE or DLL Supported.
All executions with SYSTEM privileges.
drcrypter.ru

Download LINK HERE :
Please, Log in or Register to view URLs content!

Download LINK mirror #1 :
Please, Log in or Register to view URLs content!

Download LINK mirror #2 :
Please, Log in or Register to view URLs content!

Download LINK mirror #3 :
Please, Log in or Register to view URLs content!

Download LINK mirror #4 :
Please, Log in or Register to view URLs content!

Download LINK mirror #5 :
Please, Log in or Register to view URLs content!
thx bro!
 

Forum statistics

Threads
1,772
Messages
35,711
Members
7,791
Latest member
Davien
Member time online
596d 5h 44m
Reputation(s)
25