[ Leaked ] 🎉 Muddyc3 c2 Private Weapons ( Python ) 🎉

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

DRCrypter

Administrator
.
.
Jun 3, 2023
Threads
219
336
93
Credits
4,888
This lesson was written by Forums drcrypter.ru and Muddyc3, coded in Python version 2.7 with Powershell.
The required payload for the agent and part of the C2 code were missing, so no one published a working code, and it was forgotten until now, when it was fully leaked with 100% source code.Iranian-hacker.jpg
It's super interesting because it was developed by APT Iran hackers, and they have three APTs: 33, 34, and 35. According to the RecordedFuture website
another thing many tools by APT Iran powerfull used to Hack The World long time
We can call these special weapons and more tools soon by APT Iran.
I recommend you use CMDER in my file to run support color and make it easy on your eyes.



This is a working POC the leaked MuddyC3 C2 . its include below fetaures right now :
1) agent reconnect
2) load modules
3) send commands and recive results
4) create powershell payloads



As you can see if you have Experinced Powershell Empire or something about powershell in Veil evasion that easy to learn and fast understand

1.PNG

2.2.PNG

3.PNG

Here Old day it was tested by someone to proof but you can try reFUD with this again. Good luck and try playing with it.

old.png

drcrypter.ru
 
Last edited:
This lesson was written by Forums drcrypter.ru and Muddyc3, coded in Python version 2.7 with Powershell.
The required payload for the agent and part of the C2 code were missing, so no one published a working code, and it was forgotten until now, when it was fully leaked with 100% source code.View attachment 369
It's super interesting because it was developed by APT Iran hackers, and they have three APTs: 33, 34, and 35. According to the RecordedFuture website
another thing many tools by APT Iran powerfull used to Hack The World long time
We can call these special weapons and more tools soon by APT Iran.
I recommend you use CMDER in my file to run support color and make it easy on your eyes.



This is a working POC the leaked MuddyC3 C2 . its include below fetaures right now :
1) agent reconnect
2) load modules
3) send commands and recive results
4) create powershell payloads



As you can see if you have Experinced Powershell Empire or something about powershell in Veil evasion that easy to learn and fast understand

View attachment 370

View attachment 371

View attachment 372

Here Old day it was tested by someone to proof but you can try reFUD with this again. Good luck and try playing with it.

View attachment 373

drcrypter.ru
*** Hidden text: cannot be quoted. ***
This APT tool
Very nice dr thank you boss...
 
  • Like
Reactions: marcdelangen
This lesson was written by Forums drcrypter.ru and Muddyc3, coded in Python version 2.7 with Powershell.
The required payload for the agent and part of the C2 code were missing, so no one published a working code, and it was forgotten until now, when it was fully leaked with 100% source code.View attachment 369
It's super interesting because it was developed by APT Iran hackers, and they have three APTs: 33, 34, and 35. According to the RecordedFuture website
another thing many tools by APT Iran powerfull used to Hack The World long time
We can call these special weapons and more tools soon by APT Iran.
I recommend you use CMDER in my file to run support color and make it easy on your eyes.



This is a working POC the leaked MuddyC3 C2 . its include below fetaures right now :
1) agent reconnect
2) load modules
3) send commands and recive results
4) create powershell payloads



As you can see if you have Experinced Powershell Empire or something about powershell in Veil evasion that easy to learn and fast understand

View attachment 370

View attachment 371

View attachment 372

Here Old day it was tested by someone to proof but you can try reFUD with this again. Good luck and try playing with it.

View attachment 373

drcrypter.ru
*** Hidden text: cannot be quoted. ***
thanx man!
 
Esta lição foi escrita pelos fóruns drcrypter.ru e Muddyc3, codificada em Python versão 2.7 com Powershell.
Faltavam a carga útil necessária para o agente e parte do código C2, então ninguém publicou um código funcional, e ele foi esquecido até agora, quando vazou totalmente com código-fonte 100%.View attachment 369
É super interessante porque foi desenvolvido por hackers do APT Irã, e eles possuem três APTs: 33, 34 e 35. Segundo o site RecordedFuture
outra coisa que muitas ferramentas do APT Iran poderosamente usaram para hackear o mundo há muito tempo
Podemos chamar essas armas especiais e mais ferramentas em breve de APT Irã.
Eu recomendo que você use CMDER em meu arquivo para executar cores de suporte e facilitar seus olhos.



Este é um POC funcional, o MuddyC3 C2 que vazou. inclui os recursos abaixo agora:
1) reconexão do agente
2) carregar módulos
3) enviar comandos e receber resultados
4) criar cargas úteis do PowerShell



Como você pode ver, se você experimentou o Powershell Empire ou algo sobre o PowerShell na evasão do Veil, é fácil de aprender e entender rapidamente

View attachment 370

View attachment 371

View attachment 372

Aqui, antigamente, foi testado por alguém para comprovar, mas você pode tentar reFUD com isso novamente. Boa sorte e tente brincar com isso.

View attachment 373

drcrypter.ru
*** Texto oculto: não pode ser citado. ***
 

Forum statistics

Threads
1,775
Messages
35,463
Members
8,195
Latest member
lowdahhf
Member time online
651d 2h 31m
Reputation(s)
26