Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. BigTree CMS version 4.4.10 suffers from a remote code execution vulnerability. View the full article
      3. Anchor CMS version 0.12.7 suffers from a persistent cross site scripting vulnerability. View the full article
      4. Today
      5. itsMe


        Report Accounts and Videos [hide][Hidden Content]]
      6. itsMe


        Generates Steam Random Key [hide][Hidden Content]]
      7. itsMe


        Finds Combolists From Throwbin.io !!Don't use vpn when you are scraping! [hide][Hidden Content]]
      8. itsMe

        exe2py - pyinstxtractor

        Decompile exe to py compiled pyinstaller [hide][Hidden Content]]
      9. itsMe


        This program created for educational purposes only... I am not responsible for anything... You can check combolists for NordVpn. [hide][Hidden Content]]
      10. Retriver: Recovering accounts from valid mail Cleaning mail after recovery Not picky about the proxy, because before sending the request, the mail is checked for validity Extensive IMAP database, with the addition of new settings when checking If the IMAP setting is not found in the local database, the setting is searched for in the Mozila ThunderBird cloud Brute: Checking accounts for games Sort by games and platforms Demanding on a proxy, but if you load the result only from Retriver, you can check without a proxy in 1 thread (there will be no blocking) [hide][Hidden Content]]
      11. Advanced Web Design for Everyone Do you want to create totally stellar websites? If yes, then consider the HTML Editor your new best friend. Feel empowered with handy tag references, intuitive tools like code completion, website components that update instantly across all pages, live previews, and dozens of other extraordinary tools and features. [Hidden Content] [hide][Hidden Content]]
      12. itsMe


        Scrapes active gleam.io giveaways for you, using YouTube's API. Information This tool was developed to demonstrate how you could easily profit by developing a simple scraper like this, as it would be inefficient and time consumable to do the process manually. It filters the most recent YouTube videos with gleam.io URLs in their descriptions, and saves them with additional information to the giveaways. You can then enter the giveaways — the more you enter, the higher chance you have of winning, obviously. [hide][Hidden Content]]
      13. xeca is a project that creates encrypted PowerShell payloads for offensive purposes. Creating position independent shellcode from DLL files is also possible. How It Works Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt” The key to decrypt the payload is saved to a file named “safe.txt” Execute “launch.txt” on a remote host The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt” Decrypt the payload in memory Execute the intended payload in memory Changelog v0.3 ETW and Script Block Logging bypass added to all payloads. The bypasses can be disabled with –disable-etw and –disable-script-logging. [hide][Hidden Content]]
      14. Yesterday
      15. itsMe

        Metasploit: 6.0.8

        Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [hide][Hidden Content]]
      16. Malwarebytes Anti-Exploit Is now part of the premium version of Malwarebytes, your complete defense against advanced threats. Malwarebytes Anti-Exploit beta Malwarebytes will continue to test cutting-edge anti-exploit technology in a free beta version of Malwarebytes Anti-Exploit. Want to be part of the beta program? Go to our forums to sign up and learn more. [Hidden Content] [hide][Hidden Content]]
      17. Simple Online Food Ordering System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
      18. itsMe

        Text Editor Pro 10.1.0

        Powerful text editing tool with syntax highlighting support for programming languages and scripts, multi-caret and synchronized editing, code/text folding, over 100 options for customizing, over 100 ready made skins, character map, numerical unit convert tool, text compare, JSON/SQL/XML formatter, and support for multiple directories and search results. Version 10.1.0 (September 24, 2020) - Added highlighter for AutoHotkey - Added highlighter for NSIS - Fixed EXE installer - Fixed favorites menu skinning - Fixed language files [hide][Hidden Content]]
      19. Bimber is a viral magazine theme, that lets you launch a fully functional viral site in no more than 24 hours. It comes with powerful sharing buttons; popular, hot, trending listings and multiple ad locations. Everything in a lightweight and easy-to-use package. Just start today and go viral today! [Hidden Content] [hide][Hidden Content]]
      20. Introducing The Most Advanced and Intuitive WordPress Theme Ever. Design and features never seen before with unparalleled attention to detail. Unleash the power of WordPress today with Essentials️ Build stunning and powerful websites without writing a single line of code! [Hidden Content] [hide][Hidden Content]]
      21. itsMe

        IDM UltraEdit + x64

        UltraEdit: The world's best text editor Our 4+ million power users all agree – UltraEdit is the most flexible, powerful, and secure text editor out there. Download a free, full-feature trial to see why. Available for Windows, Mac, and Linux. [Hidden Content] [hide][Hidden Content]]
      22. itsMe

        Hex Workshop v6.8.0.541 + Patch

        The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. [Hidden Content] [hide][Hidden Content]]
      23. EmEditor is a fast, lightweight, yet extensible, easy-to-use text editor for Windows. Both native 64-bit and 32-bit builds are available, and moreover, the 64-bit includes separate builds for SSE2 (128-bit), AVX-2 (256-bit), and AVX-512 (512-bit) instruction sets. EmEditor v20.1.2 released! September 23, 2020/in EmEditor Core /by Yutaka Emura Today, we are releasing EmEditor v20.1.2. Updates from v20.1.1 include bug fixes found while developing v20.2 beta and stability/speed improvements. Please see EmEditor v20.1 New Features for details and screenshots. If you use the Desktop Installer version, you can select Check for Updates on the Help to download the newest version. If you use the Desktop portable version, you can go to the Download page to download the newest version. The Store App versions can be updated through Microsoft Store (64-bit or 32-bit) after a few days. Thank you for using EmEditor! [Hidden Content] [hide][Hidden Content]]
      24. itsMe

        Malwares and trojans

        Loaris Trojan Remover or Glarysoft Malware Hunter PRO [Hidden Content]
      25. ZeroDayF34r


        Por cierto, probaste el crypter?
      26. ZeroDayF34r


        El xenocode y el Networkmanager son programas que utilizaba hace años, ahora hay otros, no suelo andar en estos temas ahora mismo, estoy en otras cosas por estudio, pero aquí hay gente muy buena que puede ayudarte, si formulas bien tus preguntas y muestras el respeto que se merecen, que no digo que no lo hagas. Un Saludo.
      27. QUE CORREO ES MAS SEGURO PARA VOSOTROS? Sabeis que cifrado tiene cada correo, o si tiene cifrado o................etc etc. Yo diré los que yo considero en el siguiente post, pues es algo que estoy estudiando ahora y me ha llamado la atención, pues la gente no sabe si lleva un cifrado pgp o un cifrado de extremo a extremo, o si es anónimo o ...........) Sorprenderme. Gracias y un saludo Señ[email protected]
      28. Last week
      29. lk.hc2010

        Malwares and trojans

        What better program to monitor there is malware and trojans on my pc?
      1. Load more activity