Docs
So Here You Can Make A Simple Multi Tool With our API! Just Follow The Instructions!
So First Your Going To Download The API's Zip File, Then Put The API's Folder into a folder called %cache% or a folder called bin then put this folder with the names above into your multi-tool's folder! then pull the shortcut out of the Zip file and put it with your main files. NOW YOUR READY :D
Simple Login System
@echo off
chcp 65001 >nul
mode 50,17
title Login [+] Logic_API
start api
timeout 50 >nul
rem The API is Now Loading!
:again
color 8
echo Welcome To TOOL-NAME, Login In!
Set logicObfuscationXD=0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~47,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~48,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~14,1% %logicObfuscationXD:~58,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~17,1% %logicObfuscationXD:~47,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~12,1%_%logicObfuscationXD:~36,1%%logicObfuscationXD:~51,1%%logicObfuscationXD:~44,1% %logicObfuscationXD:~31,1%%logicObfuscationXD:~2,1%.%logicObfuscationXD:~3,1%%logicObfuscationXD:~2,1%.%logicObfuscationXD:~6,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~5,1% >%logicObfuscationXD:~23,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~21,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~29,1% /%logicObfuscationXD:~25,1% %logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%=%logicObfuscationXD:~40,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~60,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~56,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~14,1% -
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~29,1% /%logicObfuscationXD:~25,1% %logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%=%logicObfuscationXD:~40,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~60,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~51,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~32,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~13,1% -
%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%% == %logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%% == %logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~16,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~22,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%
%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%% == %logicObfuscationXD:~36,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%% == %logicObfuscationXD:~36,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~16,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~22,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~58,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~16,1% %logicObfuscationXD:~44,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~23,1%, %logicObfuscationXD:~55,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~34,1% %logicObfuscationXD:~36,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%!
ping localhost -n 1 >nul
ping localhost -n 1 >nul
ping localhost -n 1 >nul
echo.
timeout 3 >nul
cls
goto again
rem Above we have 2 accounts [obfuscated to fit our api]
rem This is custom obfuscation.
rem the accounts are Admin, & root.
rem the passwords are the usernames.
pause
How To Interact With The Console UI
We use a custom UI module to make the UI as clean as possible for you and/or users experience! Get started by implementing this code into your current project! REMEMBER: You must add the API into your project! This code will be located after line 3 so put it their!
Set Console_UI=0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
%Console_UI:~22,1%%Console_UI:~24,1%%Console_UI:~13,1%%Console_UI:~14,1% %Console_UI:~8,1%%Console_UI:~9,1%, %Console_UI:~3,1%%Console_UI:~4,1%
Login That Uses Console UI
@echo off
Set Console_UI=0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
%Console_UI:~22,1%%Console_UI:~24,1%%Console_UI:~13,1%%Console_UI:~14,1% %Console_UI:~8,1%%Console_UI:~9,1%, %Console_UI:~3,1%%Console_UI:~4,1%
title Login [+] Logic_API
start api
timeout 50 >nul
rem The API is Now Loading!
:again
color 8
echo Welcome To TOOL-NAME, Login In!
Set logicObfuscationXD=0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~47,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~48,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~14,1% %logicObfuscationXD:~58,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~17,1% %logicObfuscationXD:~47,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~12,1%_%logicObfuscationXD:~36,1%%logicObfuscationXD:~51,1%%logicObfuscationXD:~44,1% %logicObfuscationXD:~31,1%%logicObfuscationXD:~2,1%.%logicObfuscationXD:~3,1%%logicObfuscationXD:~2,1%.%logicObfuscationXD:~6,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~5,1% >%logicObfuscationXD:~23,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~21,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~29,1% /%logicObfuscationXD:~25,1% %logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%=%logicObfuscationXD:~40,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~60,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~56,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~14,1% -
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~29,1% /%logicObfuscationXD:~25,1% %logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%=%logicObfuscationXD:~40,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~60,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~30,1%%logicObfuscationXD:~27,1% %logicObfuscationXD:~51,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~32,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~13,1% -
%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%% == %logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%% == %logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1% %logicObfuscationXD:~16,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~22,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%
%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~30,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~27,1%% == %logicObfuscationXD:~36,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1% %%logicObfuscationXD:~25,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~28,1%%logicObfuscationXD:~28,1%% == %logicObfuscationXD:~36,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~22,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1% %logicObfuscationXD:~16,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~22,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1%.
%logicObfuscationXD:~14,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~17,1%%logicObfuscationXD:~24,1% %logicObfuscationXD:~58,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~16,1% %logicObfuscationXD:~44,1%%logicObfuscationXD:~13,1%%logicObfuscationXD:~14,1%%logicObfuscationXD:~23,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~15,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~12,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~29,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~24,1%%logicObfuscationXD:~23,1%, %logicObfuscationXD:~55,1%%logicObfuscationXD:~27,1%%logicObfuscationXD:~34,1% %logicObfuscationXD:~36,1%%logicObfuscationXD:~16,1%%logicObfuscationXD:~10,1%%logicObfuscationXD:~18,1%%logicObfuscationXD:~23,1%!
ping localhost -n 1 >nul
ping localhost -n 1 >nul
ping localhost -n 1 >nul
echo.
timeout 3 >nul
cls
goto again
rem Above we have 2 accounts [obfuscated to fit our api]
rem This is custom obfuscation.
rem the accounts are Admin, & root.
rem the passwords are the usernames.
pause