Description
The Amadey project, well-known within the Exploit community, is a sophisticated loader and control panel solution designed for advanced operational needs. For those unfamiliar, Amadey is a custom-built loader and control panel, both developed from scratch in C++ and PHP, respectively. It is not a modification of existing software but a unique, standalone solution.
Amadey’s ability to hold and manage a huge number of bots makes it a powerful tool for advanced operations, ensuring stability, efficiency, and scalability.
Key Features:
Compatibility: Fully compatible with all versions of the Windows NT family, including Windows 7 through Windows 11/Server 2022, supporting both 32-bit and 64-bit architectures.
Task Management: Includes advanced task management features such as country selection, download limits, and real-time statistics reporting to the Command and Control (CC) server. The system supports up to 3 retries in case of failure and provides detailed progress and success metrics.
Execution Control: Supports execution of DLLs via rundll32 and offers startup control for files post-reboot. Users can either rely on Amadey’s autorun functionality or use their own file execution methods.
OS Detection: Accurately detects the OS version, including minor/major versions and bit architecture.
Custom Tasks: Allows for personalized tasks to be assigned to individual units.
Antivirus Evasion: Detects 12 major antivirus solutions (with plans to expand this list) and includes mechanisms to avoid detection.
Geolocation Restrictions: Functionality is restricted in certain regions, including Russia and allied countries, with limited operational capabilities in these areas.
Security: All internal constants are encrypted using DES, with a unique encryption key generated for each build.
Ease of Deployment: The CC panel is easy to deploy, with automatic table creation and database integration directly from the interface.
Plugins:
Reverse Proxy: Enables secure communication between the loader and the CC server.
Clipper: Targets cryptocurrency wallets (BTC, ETH, LTC, DGC, Monero, etc.) to intercept and manipulate transactions.
Stealer: Extracts sensitive data from a wide range of applications, including:
Browsers (Chrome, Firefox, Tor)
Email Clients (Outlook, Thunderbird)
FTP Clients (WinSCP, FileZilla)
Cryptocurrency Wallets (Exodus, Electrum, Armory, etc.)
Messaging Applications (Telegram, Pidgin, Gajim, Psi+)
Desktop files and other sensitive data.
Detection Evasion:
Regular code updates are performed to minimize detections, with a particular focus on evading Windows Defender.
License Agreement:
The software is provided “as is,” with no warranties beyond the stated features. File size and detection rates may change over time and are not grounds for claims.
The buyer assumes full responsibility for the use of the software, and the seller is not liable for any outcomes resulting from its use.
Resale or redistribution of the license, files, or scripts is strictly prohibited.
In the event of software malfunctions or vulnerabilities, the seller is obligated to address these issues promptly or terminate the agreement with a refund.
Disputes are resolved by a forum arbitrator in accordance with established rules and regulations.
Payment constitutes acceptance of these terms.
System Requirements for CC Installation:
PHP: Version 7 or higher.
SQL: Required for database integration.
Operating System: Unix-based OS (e.g., Linux) is recommended.
Supports fast flux domain for maximum security.
Reviews
There are no reviews yet.