Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc. Ring 3 rootkit r77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes, scheduled tasks Processes CPU usage Registry keys & values Services TCP & UDP connections It is compatible with Windows 7 and Windows 10 in both x64 and x86 editions. [hide][Hidden Content]]
      3. Today
      4. wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web traffic WiFi networks scanning DNS monitoring service Credentials harvesting Transparent Proxies LLMNR, NBT-NS, and MDNS poisoner (Responder3) and more! Changelog v1.0.8 R2 Added added route for getting information of plugins and proxies on restAPI added new attribute on plugins and proxies mode class added logger resource API Removed removed support to Rest API controller temporally Fixed fixed cli error when request restAPI plugins and proxies fixed restApi error when getting exceptions http request fixed wirelesscontroller not started into restAPI mode fixed locale error in docker container [hide][Hidden Content]]
      5. Amazon Video Downloader An Excellent Amazon Video Downloader Download HD movies & TV shows from Prime Video. Support downloading videos in MP4 or MKV format. Keep audio tracks and subtitles. Download videos in batch at a fast speed. Free technical support and software upgrades. Support up to 25 languages. Check supported languages [Hidden Content] [hide][Hidden Content]]
      6. 1337day-Exploits

        ExploitsChrome Array Transfer Bypass

        The fix for CVE-2021-21148 has added a check in |ValueSerializer::WriteJSArrayBuffer| to make sure non-detachable array buffers cannot be transferred. The check can be bypassed with the help of asm.js and property getters. View the full article
      7. Student Management System version 1.0 suffers from a persistent cross site scripting vulnerability. View the full article
      8. Podcast Generator version 3.1 suffers from a persistent cross site scripting vulnerability. View the full article
      9. Chamilo LMS version 1.11.14 authenticated remote code execution exploit. View the full article
      10. itsMe

        EmEditor Pro 20.7 Latest

        EmEditor Pro – is a simple-to-use word processing tool that comes bundled with some interesting features. The interface of the application is familiar but comes with a twist. Right next to the editing area you can view an Explorer pane, to quickly locate and access files. So, you can use the undo and redo functions, copy and paste text, toggle sticky vertical mode, copy text in quotes and insert the current time and date. But you can also jump to a particular line, convert the selection (e.g. split or join lines, to lowercase or uppercase), insert special characters, duplicate and cut lines, as well as tag jump. Moreover, you can bookmark items, collapse or expand a line, check the spelling, as well as use a search and replace tool (you can even look for text in multiple files at once). Furthermore, you can wrap text by characters, window or page, display line numbers and a ruler, insert spaces for tabs, switch to full screen mode and change the font. Additionally, you can compare or synchronize two documents, reset to normal mode, record, customize and use macros, change properties for the currently selected configuration, import and export settings, use plugins and external tools, and others. Features • Play Record live streams and shows – Justin.tv, Ustream.tv, adult, etc • Free and fast downloads from YouTube and VKontakte Integrated free media converter – convert downloaded videos to any format including portable devices like iPod, iPhone, PSP, Mobile • Extract audio from downloaded videos • Easy to use – just type or drag URL of web page containing required video and download will start in a few seconds • Downloads resuming and video resolutions detection supported • Download subtitles in SubRip format • Download support through SOCKS proxies [Hidden Content] [hide][Hidden Content]]
      11. itsMe

        Metasploit: 6.0.44

        Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [hide][Hidden Content]]
      12. GyoiThon is a growing penetration test tool using Machine Learning. It identifies the software installed on the web server (OS, Middleware, Framework, CMS, etc…) based on the learning data. After that, it executes valid exploits for the identified software using Metasploit. Finally, it generates reports of scan results. It executes the above processing automatically. [hide][Hidden Content]]
      13. Yesterday
      14. Mughal125


        hello everyone i am very glad to be a part of this community
      15. There is a vulnerability in jscript9 that could be potentially used by an attacker to execute arbitrary code when viewing an attacker-controlled website in Internet Explorer. The vulnerability has been confirmed on Windows 10 64-bit with the latest security patches applied. View the full article
      16. Firefox 72 IonMonkey JIT type confusion exploit. View the full article
      17. ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Windows targets. View the full article
      18. Microsoft Internet Explorer 8/11 and WPAD service Jscript.dll use-after-free exploit. View the full article
      19. ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Linux targets. View the full article
      20. OpenPLC WebServer version 3 authentication remote code execution exploit. View the full article
      21. Dental Clinic Appointment Reservation System version 1.0 suffers from multiple remote SQL injection vulnerabilities with one of them allowing for authentication bypass. View the full article
      22. ZeroShell version 3.9.0 remote command execution exploit. View the full article
      23. Create a backup of your WordPress files and database. Duplicate and move an entire site from one location to another in a few steps. Create a full snapshot of your site at any point in time. [Hidden Content] [hide][Hidden Content]]
      24. Project SECURITY is a powerful website security app that will protect your website from hackers, attacks and other threats. It will protect your website from SQLi Attacks (SQL Injections), XSS Vulnerabilities, Proxy Visitors, VPN Visitors, TOR Visitors, Spam and many other types of threats. [Hidden Content] [hide][Hidden Content]]
      25. Support Board is a PHP plugin that helps you automate your customers’ communication with artificial intelligence-driven bots and a chat system integrated with the most-used platforms. Save time and use the software you already know and love. Communicate with your customers directly in Slack. Connect Dialogflow and use rich messages on the fly. [Hidden Content] [hide][Hidden Content]]
      26. Biolinks is a problem solver for Instagram and TikTok bio link problem and a URL Shortener at the same time! [Hidden Content] [hide][Hidden Content]]
      27. What you'll learn MITM Attack What is Botnet DDOS Attack How to protect yourself from such attacks Learning about the most dangerous hacking attacks and their prevention. Learning About BFA (Brute Force Attack) , IP Spoofing, Url Spoofing, LDAP Injection, SQL Injection, MIMA, Phishing Attacks and much more. Discover how cyber attacks work, How to avoid virus infections and How you can counteract their malicious consequences. Requirements Willingness to learn. Description I know why you are here. You are an intelligent and curious guy always searching words like firewalls, encryption, viruses and malware sound but couldn't get a satisfactory answer but don't worry we have a course right for you that teaches you all the basics of both information and cyber security in a fun relaxed manner. This course is made in such a way that it fits absolutely perfect for you. It doesn't matter if you don't know anything about cyber security, because this course will help you understand what it's all about. Even if you know the basics, you might still discover tips and tricks that really make a difference. So if you love gadgets, apps and everything that the Internet has to offer - you need this course! Remember: in the online world, with great opportunities come great threats as well. This course serves as an introduction to the exciting field of cyber security. As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cyber security. In this course, you will gain an overview of the cyber security landscape. PERFECT FOR COMPLETE BEGINNERS This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. Who this course is for: Cyber Security Engineers Ethical Hackers Penetration Testers Network Engineers I created this course for everyone who wants to learn how to stay safe online. Students who want to learn the basics of computer and cyber security. Students who want to become IT or Cyber Security Experts. [Hidden Content] [hide][Hidden Content]]
      1. Load more activity