Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provieded; ->Tries To Find Owner Of The Number ->Tries To Find Risk Level Of The Number ->Tries To Find Location,Time Zone Of The Number,Carrier ->Tries To Find Social Media Platforms That The Number Is Registered ->Tries To Find Links About Phone Number ->Tries To Find Comments About Phone Number ->Sends Sms To Phone Number With Amazon Aws [hide][Hidden Content]]
      3. itsMe

        MailWasher Pro 7.12.45

        MAILWASHER PRO STOPS SPAM BLOCK ALL SPAM BEFORE IT GETS TO YOUR COMPUTER Works with all email accounts and email programs The recycle bin ensures you never lose an important email Intelligent spam tools do the work for you Eliminate spam and viruses before they get to your pc Easy to use on your PC or Mobile Inspect every aspect of your email at the server [Hidden Content] [hide][Hidden Content]]
      4. ZTE WLAN router MF253V version 1.0.0B04 suffers from cross site request forgery, hardcoded password, outdated component, and cross site scripting vulnerabilities. View the full article
      5. This Metasploit module exploits an unauthenticated command injection vulnerability found in ZeroShell version 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options. View the full article
      6. Seowon 130-SLC router version 1.0.11 suffers from a remote code execution vulnerability. View the full article
      7. OpenCart version suffers from multiple persistent cross site scripting vulnerabilities. View the full article
      8. nopCommerce Store version 4.30 suffers from a persistent cross site scripting vulnerability. View the full article
      9. Apache OpenMeetings version 5.0.0 suffers from a denial of service vulnerability. View the full article
      10. itsMe

        System Ninja 3.2.8 - Repack

        System Ninja is a fast, powerful and effective system optimization solution for Windows. It’s designed to quickly remove junk files, improve system speed and fix problems. [Hidden Content] [hide][Hidden Content]]
      11. ProInvest is a fully functional web app for managing your high yield investment platform conveniently. It allows you to register users, take deposits, remit earnings and process both single and multi-level referral earnings. With ProInvest you’ll be able to setup your own platform as fast as possible.Major payment gateways and cryptocurrencies supported include Payeer, Stripe, Coinpayments (BTC, ETH, LTC, DASH, XRP and BCH), Paypal and Paystack. [Hidden Content] [hide][Hidden Content]]
      12. Malware Hunter Hyper scan makes you enjoy a faster scanning speed. Detect and remove stubborn malware, against potential danger. Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Virus Scan Fast hyper scans, detect and remove stubborn malware, against potential danger. Automatic updates Automatic updates provides real-time protection so that your PC is always up to date and secure. Process Protection Aimed at the process, our protection can ensure the safe operation of your computer. [Hidden Content] [hide][Hidden Content]]
      13. duenho

        [Giveaway] SurfShark VPN Expire = 2022-08-14

        Y ahi es donde entro yo.jpg Gracias por este pedazo de sorteo. Nunca pude sacar ninguna cuenta; Es una gran oportunidad!! Te Amo.
      14. Last week
      15. itsMe

        RedGate .NET Reflector

        Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
      16. Malwarebytes Anti-Exploit Ahora forma parte de Malwarebytes for Windows, la defensa completa frente a las amenazas avanzadas. [Hidden Content] [hide][Hidden Content]]
      17. The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their profile The information includes: [ profile ] : user id, followers / following, number of uploads, profile img URL, business enum, external URL, joined Recently, etc [ tags & mentions ] : most used hashtags and mentioned accounts [ email ] : if any email is used any where it'll be displayed [ posts ] : accessability caption, location, timestamp, caption, picture url, etc ( yet not working correctly with posts instagram marks as 'sensitive cotent' ) [hide][Hidden Content]]
      18. OneForAll is a powerful subdomain collection toolsubdomain collection The importance of information collection in penetration testing is self-evident. Subdomain collection is an essential and very important part of information collection. At present, there are many open-source tools for subdomain collection on the Internet, but there are always some of the following problems: Not powerful enough,there are not enough interfaces to collect subdomains automatically, and there are no functions such as automatic subdomain resolve, verification, FUZZ, and information expansion. Not friendly enough,although the command line module is more convenient, but when there are a lot of optional parameters and the operation to be implemented is complex, using command line mode is a bit unfriendly. If there is a good interaction, With a highly operable front end, the experience will be much better. Lack of maintenance,Many tools have not been updated once in years, what issues and PR are, do not exist. Efficiency issues,do not take advantage of multi-process, multi-threading and asynchronous cooperation technology, the speed is slow. Features Powerful collection capability,For more information, please see collection module description. Collect subdomains using certificate transparency (there are currently 6 modules: censys_api,certspotter,crtsh,entrust,google,spyse_api) General check collection subdomains (there are currently 4 modules: domain transfer vulnerability exploitationaxfr, cross-domain policy file cdx, HTTPS certificate cert, content security policy csp, robots file robots, and sitemap file sitemap. Check NSEC record, NSEC3 record and other modules will be added later). Collect subdomains using web crawler files (there are currently 2 modules: archirawl, commoncrawl, which is still being debugged and needs to be added and improved). Collect subdomains using DNS datasets (there are currently 23 modules: binaryedge_api, bufferover, cebaidu, chinaz, chinaz_api, circl_api, dnsdb_api, dnsdumpster, hackertarget, ip138, ipv4info_api, netcraft, passivedns_api, ptrarchive, qianxun, rapiddns, riddler, robtex, securitytrails_api, sitedossier, threatcrowd, wzpc, ximcx) Collect subdomains using DNS queries (There are currently 5 modules: collecting subdomains srv by enumerating common SRV records and making queries, and collecting subdomains by querying MX,NS,SOA,TXT records in DNS records of domain names). Collect subdomains using threat intelligence platform data (there are currently 6 modules: alienvault, riskiq_ api, threatbook_ api, threatkeeper , virustotal, virustotal_ api, which need to be added and improved). Use search engines to discover subdomains (there are currently 18 modules: ask, baidu, bing, bing_api, duckduckgo, exalead, fofa_api, gitee, github, github_api, google, google_api, shodan_api, so, sogou, yahoo, yandex, zoomeye_api), except for special search engines in the search module. General search engines support automatic exclusion of search, full search, recursive search. Support subdomain blasting,This module has both conventional dictionary blasting and custom fuzz mode. It supports batch blasting and recursive blasting, and automatically judges pan-parsing and processing. Support subdmain verification,default to enable subdomain verification, automatically resolve subdomain DNS, automatically request subdomain to obtain title and banner, and comprehensively determine subdomain survival. Support subdomain takeover,By default, subdomain takeover risk checking is enabled. Automatic subdomain takeover is supported (only Github, remains to be improved at present), and batch inspection is supported. Powerful processing feature,The found subdomain results support automatic removal, automatic DNS parsing, HTTP request detection, automatic filtering of valid subdomains, and expansion of Banner information for subdomains. The final supported export formats are rst, csv, tsv, json, yaml, html, xls, xlsx, dbf, latex, ods. Very fast,collection module uses multithreaded calls, blasting module uses massdns, the speed can at least reach 10000pps under the default configuration, and DNS parsing and HTTP requests use asynchronous multiprogramming in subdomain verification. Multithreaded check subdomain takeover risk. Good experience,Each module has a progress bar, and the results of each module are saved asynchronously. [hide][Hidden Content]]
      19. [Hidden Content]
      20. [Hidden Content]
      21. TROJAN KILLER [PORTABLE EDITION] Carry Trojan Killer Portable on your memory stick - be sure that you're safe from the cyber threats wherever you go Your protection is always with you! [Hidden Content] [hide][Hidden Content]]
      22. solution to protect one single computer, such as your home or school PC. Just one standalone computer is protected. Loaris will become your personal ideal helper and defender in the web. family License coverage is granted for several PCs in your family. Have a peace of mind with all your home PCs protected! corporate Now the security of your business is under reliable defense. Entrust your safety to professionals! agency Use Loaris to the fullest. Enjoy our extended customer service. Hurry up to become our client! [Hidden Content] [hide][Hidden Content]]
      23. LifeRay version 7.2.1 GA2 suffers from a persistent cross site scripting vulnerability. View the full article
      24. The TP-Link TL-WA855RE V5_200415 suffers from a flow where an unauthenticated attacker can reset the device and then set a new administrator password. View the full article
      25. Boxoft Audio Converter version 2.3.0 suffers from a buffer overflow vulnerability. View the full article
      26. jbinks

        im back my friend

        heloo, after a long time im back here
      27. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver crt.sh ThreatCrowd AnubisDB ThreatMiner Traceroute Protocols UDP TCP ICMP Directory Searching Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv Changelog v1.1.1 paths fixed, subdomain enum optimized, new apis [hide][Hidden Content]]
      1. Load more activity