Jump to content

Welcome to NulledBlog
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!
Photo

Trillium Security MultiSploit Tool v3


  • Please log in to reply
9 replies to this topic

#1
xuNsh1neV3

  • Offline
  • New Member

  • PipPip
  • Posts:
    16
    Reputation:
    1
    Joined:
    29 Apr, 2016

Options:
 
1. Build FUD silent *.chm (Help-File) Download & Execute Exploits
2. Build FUD silent *.vbs (Visual-Basic-Script) Download & Execute Exploits
3. Build FUD silent *.vbe (Encoded-Visual-Basic-Script) Download & Execute Exploits
4. Build FUD silent *.hta (HTML-Application) Download & Execute Exploits
5. Build FUD silent *.bat (Batch-File) Download & Execute Exploits
6. Build FUD silent *.cmd (Command-File) Download & Execute Exploits
7. Build FUD silent *.wsf (Windows-Script-File) Download & Execute Exploits
8. Build FUD silent Microsoft Office Word Download & Execute Macro Exploits
9. Build FUD silent Microsoft Office Excel Download & Execute Macro Exploits
10. You can choose Download Folder(%AppData%, %ProgramFiles%, %Windir%, %Temp%, %HomeDrive%)
11. You can choose any kind of Url
12. You can choose every File Type (*.exe,*.txt,*.jpg,*.Cert,*.rtf,.......)
13. It have a Build-In USG which generate every time when you press the "Compile" button 99% unique exploits
14. You can choose random UpperCase, random LowerCase and random Numbers for the USG
15. You can use a Custom String Encryption which will be 99% unique on every click on the "Compile" button too and it will Encrypt every String in the Exploit File with a unique password doesnt matter which kind of Exploit.
16. HTML-Application/Help-File Body Editor
17. They dont let UAC Pop up means they bypass it
 
New added in v1.5
 
18. Build FUD silent *.htm (HTML-File 1) Download & Execute Exploits
19. Build FUD silent *.html (HTML-File 2) Download & Execute Exploits
20. Compile Macros explicit for x64
 
New added in v.2
 
21. Build FUD silent *.ps1 (Powershell-File 1) Download & Execute Exploits
22. Build FUD silent *.psc1 (Powershell-File 2) Download & Execute Exploits
23. Build FUD silent *.exe (Executable-File) Download & Execute Exploits
24. Build FUD silent *.pif (Program Information-File) Download & Execute Exploits
25. Build FUD silent *.scr (Screensaver-File) Download & Execute Exploits
26. [0day] Build FUD silent *.lnk (Shortcut-File) Download & Execute Exploits - Include an Icon Changer with all Windows Icons for the Shortcut File
27. Windows Shortcut Exploits with File Converter/Make Your File to (*.txt, *.rtf, *.ini, *.gif, *.png, *.bmp, *.avi, *.mp3, *.dll, *.hlp, *.mid, *.jpg) and an Icon Changer with all Windows Icons is included too
28. Optimized the Macro Engine and added 2 New Macro Engines which you can select and both support Full Unicode and 32Bit & 64Bit and they are FUD
 
 
New added in v2.5
 
29. The *.htm/*.html exploit work now perfect and without any problems on 'Internet Explorer 5 - Edge'
30. Build FUD silent *.url (Internet Location File) Download & Execute Exploits
31. New stronger and better Unique Encryption
32. 6 New Types of Private Unique Macro Exploits
33. Macro Editor with that you can create your own Private Macro Exploits or modify them
34. Windows Shortcut Exploits with File Converter got this new extensions (*.pdf, *.doc, *.xls, *.pptx, *.rar, *.ppt, *.xml, *.jnt, *.zip, *.log, *.ico, *.ocx)
35. Some other small changes
 
 
New added in v3
 
36. Build FUD silent *.com (Command-File 2) Download & Execute Exploits
37. Added Base64 Encoding
38. Added 2 New Types of Private Unique Macro Exploits
39. Windows Shortcut Exploits with File Converter got this new extensions (*.php, *.cpl, *.msi, *.msp)
40. Some other small changes
 
 
Lifetime Package with Support: 300 $
 
 
 
Download:
Hidden Content
You'll be able to see the hidden content once you reply to this topic.
 
VT:

Please Login or Register to see this Hidden Content


  • 1

Leaks are copied from my Leakforums threads - please rate the leaks and don't just leech!

Some leaks are shown as infected on VT - thats normal - just run them in VM if you don't trust! This are just collected leaks on my HDD - there may be leaks from nulled - please delete them.


#2
Anunnaki

  • Offline
  • Addicted

  • Posts:
    162
    Reputation:
    4
    Joined:
    07 Jul, 2015

Anyone tested this?


  • 0

#3
ggill7828

  • Offline
  • Lurker

  • Posts:
    9
    Reputation:
    0
    Joined:
    05 May, 2016

does this really work??

 


  • 0

#4
DivergentSoul

  • Offline
  • New Member

  • Posts:
    21
    Reputation:
    0
    Joined:
    12 Aug, 2016

i hope it works


  • 0

#5
ninox

  • Offline
  • Member

  • Posts:
    74
    Reputation:
    0
    Joined:
    30 Aug, 2016

OK


  • 0

#6
laraflint4

  • Offline
  • New Member

  • Posts:
    23
    Reputation:
    0
    Joined:
    15 Sep, 2015

:ph34r:


  • 0

#7
pangelina270

  • Offline
  • Lurker

  • Posts:
    5
    Reputation:
    0
    Joined:
    13 Dec, 2016

really work??


  • 0

#8
landontut

  • Offline
  • Lurker

  • Posts:
    3
    Reputation:
    0
    Joined:
    16 Mar, 2017

thank you been needing 


  • 0

#9
hugokopf

  • Offline
  • Veteran

  • Posts:
    415
    Reputation:
    3
    Joined:
    11 Apr, 2017

Silent Pdf Exploit


  • 0

#10
alexangel29

  • Offline
  • Member

  • Posts:
    25
    Reputation:
    0
    Joined:
    29 Oct, 2015

thank yuo lets try this tool


  • 0


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users