http://pathfndrgdglzss5yjapnuzltuscm72e42wh4spskgrqb7m2gsc4yvyd.onion
The payload will bypass all anti-virus software protection, easily creating a session between the attacker and the target; doing so you will take full control of the device. The software consists of two parts: Server side web-based desktop application (control panel) Client side device application (backdoor) Infiltrator Real-Time Tracking System The Infiltrator Real-Time Tracking System is an innovative tool for governmental and security organizations that...