November 4, 2022 at 10:23 PM
Pitraix Tor üzərindən peer-to-peer botnetidir.
It cannot be taken down or traced
Comes with it's own advanced crypter
it's cross-platform, free & open-source!
Features:
1. Peer to Peer
2. Uses Tor to hide traffic
3. Open-source & completely free!
4. Cross-platform! works on windows and linux
3. Built-in crypter
4. Built-in auto spreading
5. Can extract Passwords, Emails, Usernames, Credit Cards, Cookies, Addresses, Phone numbers and History from ALL popular browsers (Microsoft Edge, Chrome, Brave, Opera, Yandex, Firefox)
6. Built-in RDP over TOR (works on linux too!)
7. Built-in modules system that allows you to make your own custom features
8. Has many 0-days built-in
9. Built-in ransomware that is fast
10. Built-in decrypter for ransomware
11. Can privilege escalate on Windows and Linux!
12. Advanced Anti-VM and Anti-Debugging
13. Low system requirements
14. Can hide from ALL system monitoring tools on Linux! (uses LD_PRELOAD)
15. Built-in keylogger
16. Ability to hijack crypto addresses in clipboard
17. ZERO read/write to registry, thus lower detection
18. Dynamic behaviour
19. Auto disable backup like Volume Shadow Copy, OneDrive and Windows Backup
Link:
It cannot be taken down or traced
Comes with it's own advanced crypter
it's cross-platform, free & open-source!
Features:
1. Peer to Peer
2. Uses Tor to hide traffic
3. Open-source & completely free!
4. Cross-platform! works on windows and linux
3. Built-in crypter
4. Built-in auto spreading
5. Can extract Passwords, Emails, Usernames, Credit Cards, Cookies, Addresses, Phone numbers and History from ALL popular browsers (Microsoft Edge, Chrome, Brave, Opera, Yandex, Firefox)
6. Built-in RDP over TOR (works on linux too!)
7. Built-in modules system that allows you to make your own custom features
8. Has many 0-days built-in
9. Built-in ransomware that is fast
10. Built-in decrypter for ransomware
11. Can privilege escalate on Windows and Linux!
12. Advanced Anti-VM and Anti-Debugging
13. Low system requirements
14. Can hide from ALL system monitoring tools on Linux! (uses LD_PRELOAD)
15. Built-in keylogger
16. Ability to hijack crypto addresses in clipboard
17. ZERO read/write to registry, thus lower detection
18. Dynamic behaviour
19. Auto disable backup like Volume Shadow Copy, OneDrive and Windows Backup
Link:



