MatrixTM / MHDDoS

Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
MIT License
12.49k stars 2.6k forks source link

[BUG Report]: Your program had a shell / trojan in it #517

Closed jigsawsec closed 9 months ago

jigsawsec commented 9 months ago

Version

2.4 (Default)

Which section is the problem?

L7 (DDoS Attack Layer 7)

Please complete the following information

All I'm going to say is you're advertising malicious software. It's a trick to get others to install your trojan that you packed into the DDoS tool. Nice try though.

What happened (Describe the bug) ?

Scanned the program, found that the Pip file included downloading a trojan / shell. This guy is a scammer and hacker.

Screenshots

http://thisisdumb.com

Please provide a link to a minimal reproduction of the bug

No response

Relevant log output

No response

Additional context

Stop trying to scam people and infect their computers.

Your code

No response

jigsawsec commented 9 months ago

Seriously screw off with that. Especially when others are hackers / researchers too >_>

mrzt721010 commented 9 months ago

OH YEAH? If you think so, then DON'T use it

jigsawsec commented 9 months ago

Well then don't be a scammer lol. This wasn't for you btw, this was so other people don't get scammed by you. Your virus programming sucks btw it was picked up by defender immediately, you probably should look at ways of obfuscation.

jigsawsec commented 9 months ago

You can build your own crypter you know instead of immediately getting your virus caught. Nice try though. But go off.

mrzt721010 commented 9 months ago

Any Proof?

jigsawsec commented 9 months ago

Yes. Also, you don't NEED proof because you already know it but here your proof is: 1120 0001

Really? A Trojan and a Reverse Shell. I develop my own stuff, I know exactly what you did. You made the program a Trojan Dropper (Python file). For one, Python is horrible to code malware in because it gets detected immediately via Windows Defender. If you had a brain cell in your hacker head you'd learn C/C++ and NASM and learn to obfuscate your malware instead of just pretending it's a DDOS tool and it be a really crappy made trojan that gets picked up right away >_> Pretty sure you made the shell so you could use anyone who was infected with your virus as a bot for your botnet.

mrzt721010 commented 9 months ago

Any proof in the code?

jigsawsec commented 9 months ago

Yes and how about I just report all the IPs I pulled off the callback of the shell to CISA and IC3 and turn them into Github too. Capture

Would that be okay, since you're doing nothing wrong? Hope none of these are yours. I'm done contacting you, but just know that I do have these IPs. I will report them. You don't have my IP, you don't have any information about me. Maybe don't make crappy python malware with IP callbacks next time. Bye now.

mrzt721010 commented 9 months ago

That's okay 👍🏻☺️