Supported Systems (To Be Hacked):
- Hacking calls
- Hacking Messages (Mail, Sms, Chat)
- Hacking (Skype, whatsapp ...etc)
- Hacking File And Photos
- Getting Screetshots
- Getting The Target Position and every move
- Getting Contacts & Calendar
- Getting Visited Websites History
- You Can Program The Agent without Any Previous Experiences
- Silent Installer:
Silent Installer let you create an executable which does nothing but installing the agent.
- Melted Application:
You can provide an already existing application and it will be melted with the agent. When the resulting application is executed the agent is installed as well.
- Offline Installer:
You can use this bootable device to install the agent on systems that are switched off. The same media can be used on both OSX or Windows.
The agent will be installed in the UEFI of the target machine and will survive HD formatting and OS reinstallation
- U3 Installation:
When the U3 key is inserted into the target system, it will execute the U3Launcher as usual but the agent will be installed (autorun required).
Exploits are powerful installation vectors since they allow you to embed the agent inside common documents. Once the document is opened the agent will be installed.
- Network Injection:
The network injector enables you to replace or inject files while the target is downloading files from the internet.
Edited by ashrof, 16 April 2016 - 02:54 AM.