Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Today
      2. itsMe

        PoW Shield V1.3.4

        Description PoW Shield provides DDoS protection on OSI application layer by acting as a proxy that utilizes proof of work between the backend service and the end user. This project aims to provide an alternative to general captcha methods such as Google's ReCaptcha that has always been a pain to solve. Accessing a web service protected by PoW Shield has never been easier, simply go to the url, and your browser will do the rest of the verification automatically for you. PoW Shield aims to provide the following services bundled in a single webapp / docker image: proof of work authentication ratelimiting and ip blacklisting web application firewall Features Web Service Structure Proxy Functionality PoW Implementation Dockerization IP Blacklisting Ratelimiting Unit Testing WAF Implementation Multi-Instance Syncing (Redis) [hide][Hidden Content]]
      3. itsMe


        Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux, and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed analysis reports. [Hidden Content]
      4. Yesterday
      5. Hello guys, I have a question. e.g I have a rat and I created a payload then binded it with pdf file with the help of silent exploit but it is not fud. How can I obsfucate the binded virus? Is it possible or not?
      6. itsMe

        x7 IPTV mytv.fun

        [Hidden Content]
      7. itsMe

        x13 IPTV skyhd-iptv.com

        [Hidden Content]
      8. Backdoor.Win32.Wollf.16 malware suffers from a hardcoded credential vulnerability. View the full article
      9. Backdoor.Win32.Wollf.16 malware suffers from an authentication bypass vulnerability. View the full article
      10. jadx – Dex to Java decompiler Command line and GUI tools for produce Java source code from Android Dex and Apk files Changelog v1.3.2 Core Use Kotlin intrinsic methods for variables rename (#1207) Improve anonymous class inline (#523) Correct literal negate for double and float (#1334) Add explicit type for non-int constants (#1336) Simplify cascading casts (#1336) Wrap negative literals before cast (#1327) Handle method override with several bases (#1234) Precalculate class deps for inline methods (#1339) Skip input file name checks by zip name validator (#1310) Use secure XML parser for process manifest GUI Processing threads spinner initialization (#1331)(PR #1332) Correct handling for tree row click (#1324) Reduce tree focus switching Use relative file paths in .jadx project file (#1312) (PR #1313) For Smali debugger: support multiple main <action> and <activity-alias> tags (#1322)(PR #1323) [hide][Hidden Content]]
      11. Banco Guayaquil for iOS version 8.0.0 suffers from a script insertion vulnerability where a user can insert malicious code into their own name and could possibly be leveraged for attacks upstream. View the full article
      12. Online Project Time Management version 1.0 suffers from a remote SQL injection vulnerability. View the full article
      13. Description Hi there, Welcome to my Linux for Beginners: Linux Basics Course! Linux For Beginners covers Linux basics. You will learn Linux fundamental skills; Command line, Linux Administration In this course, you will learn Kali Linux fundamentals, how to use basic commands, how Linux File hierarchy is, how to set the network of Linux, how to install packages from package managers and source code, how to manage services, processes and monitoring. Linux is available in a range of different distributions that are tailored to the needs and skills of its users. Simple distributions, like openSUSE, are great for personal computing, while Linux Ubuntu is ideal for network admins and computer scientists. Linux has a somewhat inaccurate reputation as being a much more technical and complex alternative to mainstay operating systems like Windows and MacOS. In reality, Linux is an approachable, open-source, and customizable OS that’s designed to address huge deficiencies in commercial operating systems. Our student says that: I loved this course and it taught me so many things, that now I am very competent in a terminal that has a UNIX background. Almost all of what is taught was transferable to the Mac terminal, and thanks to this course, I can even make my own scripting programs to make my life easier. What is Linux and why should I use it? Linux is an operating system (OS), which is the primary software that a computer uses to execute tasks and communicate directions to its hardware. The operating system that competes the most with Linux is Windows. Linux is a popular and widely-used OS because it is open-source, meaning that it is free to the public, and anyone can modify and customize Linux software as they wish. The reasons to use Linux can vary from developing an app or building a video game to learning how to hack computer systems. As Linux is one of the most popular operating systems, many developers use it to develop their web applications and software programs. This means knowledge of Linux is important for anyone working with computers and software in general. Learning how to work with Linux is a necessary skill for anyone pursuing a career in ethical hacking or penetration testing Why do hackers use Linux? Both ethical (white hat) hackers and malicious (black hat) hackers often prefer to use the Linux operating system (OS) over Windows OS. The biggest reason hackers turn to Linux is because it is far more accessible to a wider range of people than Windows OS offers. Linux is free, open-source, and provides a well-integrated command-line interface for users to customize the OS. This means anyone can modify Linux to create their own programs and software. Malicious hackers often opt for Linux because it gives them more control when using Linux, and ethical hackers need to be well-versed in Linux because it’s so popular among black hat hackers. Ethical hackers also often prefer using Linux as it has better existing security measures than Windows and doesn’t usually require third-party antivirus software. How long will it take to learn Linux and how can I teach it to myself? The time it takes to learn Linux can vary, depending on whether you have existing background knowledge of other operating systems and how deep of an understanding you want to gain. For beginners learning Linux to pursue a career in IT or software administration, you may only need a basic understanding of how to navigate and execute functions using Linux and how applications built on Linux behave. If you plan to become an ethical hacker, or pentester, you may need a more in-depth knowledge of Linux security procedures and a skill in manipulating Linux programs. You can learn Linux on your own time by seeking out video tutorials and online courses. There are plenty of courses available on Udemy that teach the fundamentals of Linux and more advanced Linux skills. What careers use Linux? Many jobs in IT, software development, and cybersecurity rely on Linux skills and expertise. A career in app development generally requires a deep understanding of Linux, as many app developers use Linux as a basis for their applications. Software-focused career paths that frequently use Linux include developer and software engineering roles for Python, Java, and Linux systems. Nearly any role in cybersecurity, such as a penetration tester or ethical hacker, requires a strong knowledge of Linux. With Linux expertise and skills, you could work as a system administrator, IT professional, system architect, or database administrator. You may even work in website development, maintenance, or security, as people in those roles build a majority of their web applications on Linux. What is the core of the Linux operating system? The core component of any operating system is called the kernel. Linux’s core is simply referred to as the Linux kernel. The Linux kernel is a single program that manages crucial tasks such as allocating memory, communicating software functions to the computer’s CPU, and comprehending all of the input and output from the computer’s hardware. The kernel is the most important part of an OS and often runs in a separate area from the rest of a computer’s software. The kernel is just one part of a full operating system, which includes a combination of components such as the bootloader, init system, graphical server, desktop environment, and more. The name “Linux” can refer to both the kernel itself (the Linux kernel) and an operating system built around that kernel. For example, the Android OS and the Ubuntu distribution are both made using the Linux kernel. What are the best Linux distributions for beginners? There is a wide range of Linux distributions to choose from when learning and working with Linux. When you are first learning Linux, the distribution you choose to learn may depend on how you plan to apply your Linux skills. If you are pursuing a career in cybersecurity, you may select a different Linux distribution to start with than someone pursuing a career in game development, for instance. Online courses are some of the best resources for beginners to Linux, as they will give guidance on which Linux distribution is a good fit for the intended application of Linux. For beginners, a few of the most highly recommended Linux distributions include Elementary OS, Ubuntu Linux, and Ubuntu Budgie. Other distributions that are considered easy to learn and master are Linux Mint, Zorin OS, Nitrux, Kodachi, Rescatux, and Parrot Security. This course is for beginner level. You will learn step-by-step with hands-on demonstrations. At the end of the course you will learn; What is Linux Distributions Pieces of Linux Shells Linux Signs $,#,% Desktop Environments Linux GUI Command Parameters List Files – “ls” Command Print Working Directory – “pwd” Command Show Manuel – “man” Command Change Directory – “cd” Command Concatenate Files – “cat” Command Display Output – “echo” Command View the File with “more” Command View the File with “less” Command Print First Lines with “head” Command Print Last Lines with “tail” Command Global Regular Expression Print – “grep” Command Output Redirections Linux File Hierarchy File Permissions Make Directory – “mkdir” Command Create File & Modify Date – “touch” Command Remove Files or Directories – “rm” Command Copy and Move Files or Directories – “cp” & “mv” Command Find Files and Directories – “find” Command Cut Parts of Lines – “cut” Command Change Ownership of a Given File – “chown” Command Network Settings Display Network Status – “ifconfig” Command Leasing New IP from DHCP Server Services User Management in Linux Important Files – “passwd” and “shadow” Adding a New User Change the Group and Delete a User Process Management Monitoring Running Processes – “ps” and “top” Commands Killing Processes Package Management Foremost Linux Package Managers Repository APT Package Manager Install From Source Code System Monitoring Monitoring – “df”, “top”, “vmstat”, “netstat” CommandsUsing Linux Using linux, kali linux, linux administration, linux command line, kali Using Linux, Linux Certification, Linux Administration, Linux Security, Linux Kernel, Linux Command Line, Kali Linux, Embedded Linux, Comand Line, Bash Shell Using colt steele, rhcsa, ubuntu, red hat, shell script, redhat Using linux system administration, linux server administration, linux server, ubuntu Using Unix, bash, bash script, emacs Using kali linux, oscp, kali, linux, ceh, everything about kali linux os, kali linux tutorial, penetration testing, ethical hacking. ubuntu linux server, ubuntu server, ubuntu linux, server, linux server, linux administration, linux basics, nagios linux ubuntu linux for beginners ubuntu linux linux basics for beginners linux ubuntu linux for beginers libre office linux beginner linux basics for beginners linux basics ubuntu desktop linux for begineers linux 2021 intro to linux linux basic for beginners libreoffice linux beginners linux academy oak academy linux basics for beginers beginner linux learn linux linux full course linux begineer linux for beginners linux beginer linux basics for beginners ubuntu 20.04 ubuntu for beginners ubuntu course learn ubuntu libre linux course linux linux administration linux administration free linux beginers No prior knowledge is needed! It doesn’t need any prior knowledge to learn Linux! This course starts with very basics. First, you will learn how to install Linux, some terminology. Then the show will start and you will learn everything with hands-on practices. I’ll also teach you the best practices and shortcuts. Step-by-Step Way, Simple and Easy With Exercises By the end of the course, you’ll have a firm understanding of the Linux system and you’ll also be very confident in using Linux commands and managing Linux system services and processes and hungry to learn more. You’ll also get: Lifetime Access to The Course Fast & Friendly Support in the Q&A section Udemy Certificate of Completion Ready for Download Dive in now to my “Linux for Beginners: Linux Basics“ Course. Who this course is for: Anyone who want to learn Linux Anyone who want deep dive into Linux world Those looking for alternatives to Microsoft operating systems. Anyone who wants to learn how new operating systems work by improving their existing computer knowledge and skills Employees of organizations planning to change Microsoft operating systems. Anyone who want to learn Linux Anyone who want deep dive into Linux world Requirements 4 GB (Gigabytes) of RAM or higher (8 GB recommended) 64-bit system processor is mandatory 10 GB or more disk space Enable virtualization technology on BIOS settings, such as “Intel-VTx” All items referenced in this course are Free A strong work ethic, willingness to learn Linux Environments Nothing else! It’s just you, your computer and your ambition to get started today Curiosity for Linux, Linux Administration, Linux Command Line [Hidden Content] [hide][Hidden Content]]
      14. La plataforma de de criptotransacciones Crypto.com ha reconocido finalmente, con varios días de demora, que el pasado lunes 17 de enero sufrió un ataque informático que se saldó con el robo de 34 millones de dólares en criptodivisas. Los hackers se llevaron 4.836,26 ethereum por valor de 15,3 millones de dólares, 443,93 bitcoin por valor de 18,6 millones de dólares y aproximadamente 66.200 dólares en otras criptomonedas de alrededor de 483 carteras digitales. El ataque informático obligó a la plataforma a frenar cualquier tipo de retirada de fondos durante el lunes. El parón en el servicio se dilató durante 14 horas, una horquilla de tiempo que los usuarios tuvieron que utilizar para cambiar sus credenciales de acceso. Los usuarios no perderán su dinero y se aumentará la seguridad Los usuarios que se hayan visto afectados por el robo no perderán su dinero. La compañía ha emitido un comunicado en el que asegura que en la mayoría de los casos se evitó la retirada no autorizada mientras que en el resto de casos se reembolsó a los clientes la cantidad robada. Parece increíble que, tras el robo a Coinbase, haya podido completarse otro ciberataque de este tipo. Los piratas informáticos, además, no habrían tenido que rascarse demasiado la cabeza: pudieron ingresar a las cuentas sin la necesidad de autenticación de dos factores, aunque se desconoce cómo lo hicieron. Ante este ataque, además de cambiar contraseñas, también se ha tenido que renovar el programa de autenticación de dos factores de Crypto.com y se han revocado todos los tokens 2FA existentes. También se han contratado empresas externas de seguridad y se ha incluido un retraso de 24 horas para las transacciones. De esta manera, habrá un margen de tiempo para echar para atrás la transacción si se realiza de forma ilícita. De forma paralela, la plataforma de criptotransacciones ha anunciado que incorporará un programa de seguro llamado Programa mundial de protección de cuentas. Es similar al WAPP y permite reclamar hasta 250.000 dólares en caso de que las carteras digitales hayan sido pirateadas.
      15. Last week
      16. This Metasploit module exploits a command injection vulnerability in Grandstream GXV3175 IP multimedia phones. The settimezone action does not validate input in the timezone parameter allowing injection of arbitrary commands. A buffer overflow in the phonecookie cookie parsing allows authentication to be bypassed by providing an alphanumeric cookie 93 characters in length. This module was tested successfully on Grandstream GXV3175v2 hardware revision V2.6A with firmware version View the full article
      17. VMware vCenter Server is affected by the Log4Shell vulnerability whereby a JNDI string can be sent to the server that will cause it to connect to the attacker and deserialize a malicious Java object. This results in OS command execution in the context of the root user in the case of the Linux virtual appliance and SYSTEM on Windows. This Metasploit module will start an LDAP server that the target will need to connect to. This exploit uses the logon page vector. View the full article
      18. Ransomware Builder Babuk malware suffers from an insecure permissions vulnerability. View the full article
      19. Backdoor.Win32.Wisell malware suffers from a remote command execution vulnerability. View the full article
      20. The panel for Collector Stealer malware version 2.0.0 suffers from a man-in-the-middle vulnerability. View the full article
      21. The panel for Collector Stealer malware version 2.0.0 stores the login credentials in plaintext in its MySQL database. Third-party attackers who gain access to the system can read the database username passwords without having to crack them offline. View the full article
      22. VulturiBuilder malware suffers from an insecure permissions vulnerability. View the full article
      23. Video Pro X Edición de Video Intuitiva para Usuarios Avanzados Edición de vídeo intuitiva y profesional Video Pro X significa: creación de películas profesionales al alcance de todos. Su interfaz clara y funcionalidad intuitiva hacen que sea mucho más fácil empezar a trabajar con Video Pro X que con cualquier otro software de edición profesional. Ofrece una edición de vídeo de última generación: gracias al nuevo INFUSION Engine 3, la reproducción y la edición se ejecutan con fluidez y en tiempo real, incluso con grabaciones de alta resolución 8K UltraHD. Crea vídeos de forma gratuita con Video Pro X y consigue unos resultados profesionales: ideal para videocreadores semiprofesionales, editores avanzados o cineastas exigentes. [Hidden Content] [hide][Hidden Content]]
      24. Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v2.1 New: Option -nfs (not first step) to pass the first recon steps Fixed: Any bug with the download file and bypass forbidden when differents options New: Google cse search (buckets…) New: Add LICENSE & PyPI version and stats [hide][Hidden Content]]
      25. itsMe

        Resource Tuner 2.22

        Visual Resource Editor Resource Tuner lets you view, extract, replace, edit, and delete the embedded resources of executable files: icons, strings, images, sounds, dialogs, menus - all that make up the visual part of your Windows programs. Resource Editor screenshotsIn fact, it allows you to add your own custom branding to an application, change dialog messages, customize toolbar actions, and so on without having access to the actual source code. Resource Tuner offers exciting possibilities even if you aren't a programmer. It's perfect for translators, tweakers, and anyone else who wants a different look and feel for an application. Resource Tuner is about the only tool you would probably trust to modify resources in a PE executable. Discover the unique features of this Resource Editor, including how to open problem executable files and edit the hidden data which the other editors simply cannot see, wide range of supported resource types, UPX unpacker, and more. You will learn the industry standard program for translating and customizing the user interface. [Hidden Content] [hide][Hidden Content]]
      26. itsMe

        HDCleaner 2.013

        HDCleaner – is designed for complete cleaning of your Windows PC including registry and backup, encrypting data, splitting files, removing traces, and more. HDCleaner offers a comprehensive toolkit for system maintenance under Windows. Whether you clean the hard disk or the registry, encrypt data, split files, remove traces of use, backup the registry, defragment or search and replace registry keys, values and data with super fast search algorithm – in the clear Toolbox you will always find the right tool to speed up your PC and optimize. Features • Plugin Cleaner – deleting Internet traces, Windows tracks and program traces. Support for over 700 plugins. • 1-Click Maintenance and Automatic Maintenance – can be with the “Auto Maintenance” and “1-Click Maintenance” multiple optimization steps run automatically, to ensure a tidy, reliable and fast operating system • Registry Cleaner – Cleans registry, eliminates errors and optimizes the performance of the computer. NOTE: The settings made are applied to the “1-Click Maintenance and Automatic Maintenance” • Make room on your PC – Remove Unnecessary Files • Optimize services – Disabling unnecessary services lowers the background activities, win system resources and shoveling memory free, which can be used for other programs • Find Duplicate Files – In time duplicates of all kinds accumulate on the hard drive, which needlessly take up space and can down the entire system • AntiSpy – disable settings in Windows, which will autonomously contact the Internet. • DiskDoctor-lists and corrects errors on the disk • Defragment Registry- Analyze and optimize the registry database • DirToHTML – output contents of a selected directory as an HTML file • Backup & Restore – complete backup and restore the registry .. • DLL Cleaner-Frees the system from unnecessary and old DLL files • Hive backup backup and restore the registry • Browse registry – Browse the registry in turbo mode • Creating and Editing System Restore Points • Wipe files and folders, wipe free disk space, wipe complete partitions or complete drives with Pseudorandom Data, US DoD 5220.22-M (8-306. / E), US DoD 5220.22-M (8-306. / E, C and E), Schneier’s 7 pass or Gutmann 35 passes. [Hidden Content] [hide][Hidden Content]]
      1. Load more activity