Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. james bond

        x6 iptv Onisat

        [Hidden Content]
      3. mikewaals

        I am back

        Hello All, Good to see this forums flourished. Awesome design. Love it. Going to stay here and would buy priv8 as well.
      4. This Metasploit module exploits an authenticated PHP code injection vulnerability found in openmediavault versions before 4.1.36 and 5.x versions before 5.5.12 inclusive in the "sortfield" POST parameter of the rpc.php page, because "json_encode_safe()" is not used in config/databasebackend.inc. Successful exploitation grants attackers the ability to execute arbitrary commands on the underlying operating system as root. View the full article
      5. This Metasploit module uses the Kong admin API to create a route and a serverless function plugin that is associated with the route. The plugin runs Lua code and is used to run a system command using os.execute(). After execution the route is deleted, which also deletes the plugin. View the full article
      6. This Metasploit module exploits WordPress Simple File List plugin versions prior to 4.2.3, which allows remote unauthenticated attackers to upload files within a controlled list of extensions. However, the rename function does not conform to the file extension restrictions, thus allowing arbitrary PHP code to be uploaded first as a png then renamed to php and executed. View the full article
      7. SyncBreeze version 10.0.28 suffers from a remote buffer overflow vulnerability. View the full article
      8. osCommerce version 2.3.4.1 suffers from a persistent cross site scripting vulnerability. View the full article
      9. Wondershare Driver Install Service Help version 10.7.1.321 suffers from an unquoted service path vulnerability. View the full article
      10. View File 1000+ Social Engineering Methods 1000+ SOCIAL ENGINEERING METHODS Size :- 1.3MB File :- Rar Download- File Free download for Users PRIV8 Submitter dEEpEst Submitted 25/11/20 Category Libro Online Password ********  
      11. 0 downloads

        1000+ SOCIAL ENGINEERING METHODS Size :- 1.3MB File :- Rar Download- File Free download for Users PRIV8

        $100.00 PRIV8

      12. WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0 Follow The Instructions 1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ. 2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\ 3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ. 4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs. 5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!! ᴏʀ (1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ (2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1 (3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ [Hidden Content]
      13. Last week
      14. What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provieded; ->Tries To Find Owner Of The Number ->Tries To Find Risk Level Of The Number ->Tries To Find Location,Time Zone Of The Number,Carrier ->Tries To Find Social Media Platforms That The Number Is Registered ->Tries To Find Links About Phone Number ->Tries To Find Comments About Phone Number ->Sends Sms To Phone Number With Amazon Aws [hide][Hidden Content]]
      15. itsMe

        MailWasher Pro 7.12.45

        MAILWASHER PRO STOPS SPAM BLOCK ALL SPAM BEFORE IT GETS TO YOUR COMPUTER Works with all email accounts and email programs The recycle bin ensures you never lose an important email Intelligent spam tools do the work for you Eliminate spam and viruses before they get to your pc Easy to use on your PC or Mobile Inspect every aspect of your email at the server [Hidden Content] [hide][Hidden Content]]
      16. ZTE WLAN router MF253V version 1.0.0B04 suffers from cross site request forgery, hardcoded password, outdated component, and cross site scripting vulnerabilities. View the full article
      17. This Metasploit module exploits an unauthenticated command injection vulnerability found in ZeroShell version 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options. View the full article
      18. Seowon 130-SLC router version 1.0.11 suffers from a remote code execution vulnerability. View the full article
      19. OpenCart version 3.0.3.6 suffers from multiple persistent cross site scripting vulnerabilities. View the full article
      20. nopCommerce Store version 4.30 suffers from a persistent cross site scripting vulnerability. View the full article
      21. Apache OpenMeetings version 5.0.0 suffers from a denial of service vulnerability. View the full article
      22. itsMe

        System Ninja 3.2.8 - Repack

        System Ninja is a fast, powerful and effective system optimization solution for Windows. It’s designed to quickly remove junk files, improve system speed and fix problems. [Hidden Content] [hide][Hidden Content]]
      23. ProInvest is a fully functional web app for managing your high yield investment platform conveniently. It allows you to register users, take deposits, remit earnings and process both single and multi-level referral earnings. With ProInvest you’ll be able to setup your own platform as fast as possible.Major payment gateways and cryptocurrencies supported include Payeer, Stripe, Coinpayments (BTC, ETH, LTC, DASH, XRP and BCH), Paypal and Paystack. [Hidden Content] [hide][Hidden Content]]
      24. Malware Hunter Hyper scan makes you enjoy a faster scanning speed. Detect and remove stubborn malware, against potential danger. Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Virus Scan Fast hyper scans, detect and remove stubborn malware, against potential danger. Automatic updates Automatic updates provides real-time protection so that your PC is always up to date and secure. Process Protection Aimed at the process, our protection can ensure the safe operation of your computer. [Hidden Content] [hide][Hidden Content]]
      25. duenho

        [Giveaway] SurfShark VPN Expire = 2022-08-14

        Y ahi es donde entro yo.jpg Gracias por este pedazo de sorteo. Nunca pude sacar ninguna cuenta; Es una gran oportunidad!! Te Amo.
      26. itsMe

        RedGate .NET Reflector 10.3.1.1956

        Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
      27. Malwarebytes Anti-Exploit Ahora forma parte de Malwarebytes for Windows, la defensa completa frente a las amenazas avanzadas. [Hidden Content] [hide][Hidden Content]]
      1. Load more activity