CYBER OFFENSIVE

Rootkits

A rootkit is computer software that enables absolute control of a computer through root or administrative access. Removal and detection can be practically impossible, especially in cases where the rootkit resides in the kernel.

ROOTKIT INVENTORY

1. CompuTrace

  • BIOS-level rootkit pre-installed by most laptop vendors.
  • Takes advantage of a first-stage agent white-listed by several antivirus vendors.
  • Operating system(s) affected: Windows, Android, OS X.
  • Local and remote exploitations available.

INFECTIONS ($10 MILLION)


Infect any remote device.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($50 MILLION)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($100 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

2. SucKIT

  • Provides a password protected remote access connect-back shell.
  • Hides processes, files and connections.
  • Operating system(s) affected: Linux.
  • Loads through /dev/kmem (via kernels not supporting kernel modules).

INFECTIONS ($10 MILLION)


Infect any remote device.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($50 MILLION)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($100 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

3. Thunderstrike 2.5

  • Kernel-level rootkit capable of controlling voltage in the PSU.
  • Spread both via wired cables and the internet.
  • Operating system(s) affected: OS X.
  • Includes regular rootkit functions.

INFECTIONS ($10 MILLION)


Infect any remote device.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($50 MILLION)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($100 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

CHECK OUT

Bitcoin Payment Address:
COMPUTRACE Infection: $10,000,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $50,000,000
Soure Code: $100,000,000
No Purchase
SucKIT Infection: $10,000,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $50,000,000
Soure Code: $100,000,000
No Purchase
THUNDERSTRIKE 2.5 Infection: $10,000,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $50,000,000
Soure Code: $100,000,000
No Purchase

TOTAL

$0

* * * CLICK ON THE PURCHASE BUTTON ONLY AFTER YOU HAVE SENT THE PAYMENT THROUGH YOUR BITCOIN WALLET TO THE ADDRESS LISTED ABOVE
* * * YOU MAY ONLY PURCHASE ONE PRODUCT PER ROOTKIT AT A TIME