News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Draining or importing malware through a "link" in a website : hacking | Torhoo darknet markets

I am fairly new to hacking overall but I do know how malware and pyhton scripts exc.. works. The question is if you copy a website and host it online, can you run for example a phyton script on someones system if they press a button let's say "free money" that is inside the website? I think I would have a very good idea on running a script or malware through a website before you even realize something is wrong.

Let me know in the comments or if you want to hear more about this and share you're knowledge hit me up:)
/u/Crypto4Chickens
1 points
3 days ago
That would be too easy. The closest thing to what you're saying is that the button would download a file that the user would run, and then the malware would execute. You can read about fake Captchas
/u/Flowerofdeath1001 🍼
1 points
3 days ago
Its easy put drive by download the problem then will be if the victim browser will let it slip or not and then u will have to run it auto or use some social eng , its not easy its hard and not with python u need something that doesnt scream i m a malware javascript works fine , the website script will be run on the browser not on the victim pc you should know that if u want it to excute on the victim u gotta install it on the victim and after that u need privilleges and u will need to evade AV end EDR and u will need to steal the files and talk with cc server and ton of work start little by little first learn how malware works well then u wont even need this methods u will use automated scripts that look for vulnerabilities and inject it or phish the mother f to download a thing and run it while he is aware good luck brother .