FAQ
Frequently Asked Questions
// General
Absolutely NOT. We are not malware authors, and we do not sell, distribute, or provide malicious software, pre-weaponized exploits, or viruses. We act strictly as a neutral packaging and compilation service. You provide your own files, authorized assessment beacons, or configurations, and we simply wrap/compile them into requested legal file formats (MSC, EXE, LNK, etc.) to test your delivery mechanisms. The intent and nature of the provided payload are 100% the responsibility of the user.
You are purchasing a Single-Build Compilation Service. We take the parameters you provide (such as your payload URL, shellcode, or C2 listener) and embed them into our proprietary Initial Access Loaders (e.g., MSC, EXE, LNK, CHM). You receive one (1) compiled file tailored to your specified configuration. We do not sell the builder software or source code.
No. On this site, we operate strictly on a pay-per-build model to maintain the integrity and stealth of our loaders. Allowing public access to our builder or source code results in rapid signature tracking by EDRs. If you want to bypass per-build fees and purchase the full stand-alone Builder Application, please visit our dedicated enterprise platform at https://quimatrow.app/.
Yes, but strictly Point-in-Time. Every loader is compiled dynamically and tested against non-distributing scanners before delivery. 0 detections on standard definitions. However, cybersecurity is a continuous cat-and-mouse game. Once the file is delivered, its operational lifespan depends on your OpSec. Submitting the loader to VirusTotal or similar public sandboxes will immediately "burn" it.
Absolutely NOT. All sales are final. We guarantee the loader is functional and bypassing standard AV/EDR at the exact moment of delivery. How you deploy it, which dynamic heuristics catch your specific C2 traffic, and how quickly the endpoint updates its signatures are beyond our control. You are paying for the compilation process, not an eternal warranty.
Our loaders are designed to fetch, decode, and execute the most common Red Team frameworks. This includes raw shellcode variants (Cobalt Strike, Sliver, Havoc, Metasploit) or direct executable execution, depending on the loader format. We handle the delivery and bypass layer; you handle the payload execution.
NO. You are legally bound to use our loaders strictly for Authorized Security Assessments, Academic Research, and Red Team engagements where explicit written permission has been granted by the network owner. Malicious use, deployment against critical infrastructure, or distribution of ransomware will result in immediate service bans, reporting, and zero refunds.
Depending on the format, the process may be automated through our payment gateway (Sell.app) or delivered directly to your provided secure email address within a few hours of the transaction clearing. Make sure you provide accurate parameters during the checkout process.
You can reach us through our secure Telegram channel or PGP-encrypted email listed on the Contact page. Do not send live target information or illicit requests; we will ignore them.
SILENT