Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. This program is only for educational purposes it's a Proof Of Concept. Description gremeydescription A lite, fast and anonymous tool for phishing and spamming. Send mass spam emails and creates custom links for the phishing pages. Works with NGROK and TOR network. Features phishing pages, mass spam, database storage for credentials. [hide][Hidden Content]]
      3. itsMe

        TUTORIAL DE AUTOIT

        [hide][Hidden Content]]
      4. Today
      5. New Android Remote Tool (SpyMax Modded Version) Tested on Android : 5,6,7,8,9,10,11 Application Features : ------ Manage : .Files .Sms .contacts .Calls .Applications .Accounts ------ Monitor : .camera .live screen .microphone .keylogger .Location . real time calls monitor ------ tools : .Download apk and install .show message .open link .call number .phone info ----- Social media Hunter: - Facebook - gmail - more coming soon ------ super mode : -Anti-Kill -Anti-Delete -Realtime Monitor Active App -Auto Click Start Screen Record -Anti shutdown phone New Update Free Version : -Auto grant Request battery optimization [ super mod ] -update anti-remove to work on more phones [ super mod ] -hide bars when camera open -more stable payload for weak phones [hide][Hidden Content]] Scan Server [Hidden Content]
      6. itsMe

        SilentETHMiner v1.5.4

        SilentETHMiner v1.5.4 - Based on Lime Miner v0.3 Main Features .NET - Coded in Visual Basic .NET, requires .NET Framework 4.5 Codedom - No need for external libraries to compile Injection (Silent) - Hide payload behind another process Idle Mining - Can be configured to only mine when the computer isn't in use Stealth - Pauses the miner while Task Manager, Process Explorer or Process Hacker is open Watchdog - Replaces the miner if removed and starts it if closed down Ethash - Supports mining all Ethash coins like Ethereum, Ethereum Classic, Metaverse, Ellaism, QuarkChain and others Remote Configuration - Can get the connection settings remotely from a URL at each startup Bypass Windows Defender - Adds exclusions into Windows Defender for the general folders the miner uses Online Downloader - Can download the miner binary during runtime (from GitHub) to greatly decrease file size and detections SilentETHMiner v1.5.4 Fixed the GPU detection for systems that have custom lowercase characters like Turkish, seems like I failed the "Turkey Test" again [hide][Hidden Content]]
      7. Restrict Content Pro is a complete membership and premium content manager plugin for WordPress. Create an unlimited number of memberships levels, including free, trial and premium. Manage members and their subscriptions, track payments, offer discounts with a complete discount code system, and provide premium, members-only content to your subscribers. [Hidden Content] [hide][Hidden Content]]
      8. FaceLive – Live Stream Broadcaster Plugin for WordPress is a Facebook Live Video streaming tool which allows you to go live on Facebook with pre-recorded videos. You can go live directly on your account/page/group or create a live event for the stream, to increase views. Facebook live stream broadcaster plugin is ideal for increasing your Facebook account/page/group views count in no time, with the help of your WordPress blog. It uses the Facebook native PHP API to boost your Facebook account/page/group’s traffic! [Hidden Content] [hide][Hidden Content]]
      9. Cerbrutus Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB, HTTP(s) POST, HTTP(s) GET, HTTP BASIC AUTH Thanks to @0dayctf, Rondons, Enigma, and 001 for testing and contributing [hide][Hidden Content]]
      10. Yesterday
      11. El lenguaje de programación Python ha ganado una inmensa atención y popularidad en los últimos años. La razón para amar y usar Python es muy simple: la simplicidad y las características versátiles que este maravilloso lenguaje de programación ofrece a los usuarios. ¡Hoy veremos la introducción de Python, algunas de las mejores características que admite y varios factores que hacen que Python sea diferente de la plétora de lenguajes de programación que existen! ¿Qué es Python? Python es un lenguaje de programación de alto nivel, dinámico, interpretado y orientado a objetos, que fue desarrollado por Guido Van Rossum. Python está enriquecido con varias funciones y características útiles para su uso. Funciones de Python Python le brinda al usuario el corte que necesita mientras programa, al admitir varias funciones útiles. Estas funciones incluyen: • Dinámico • Orientado a objetos • Soporte GUI • Multiplataforma • Extensible • Facilidad de uso • Integrado • De uso gratuito y de código abierto • Soporte comunitario • Actualizaciones frecuentes ¿Por qué aprender Python? ¡Las razones para aprender Python son muchas y para no aprender ninguna! Python se ha convertido en la primera opción de los desarrolladores de todo el mundo, debido a su eficiencia y características versátiles. • Las empresas de tecnología más grandes y líderes, incluidas CISCO, IBM, Mozilla, Google, Quora, HP, Dropbox, QUALCOMM, etc., utilizan Python debido a su simplicidad y elegancia. • Los desarrolladores prefieren usar Python sobre la pila de diferentes disponibles en el mercado debido a su énfasis en la legibilidad y la eficiencia. • Python es el lenguaje de programación preferido de la mayoría de los científicos de datos, aprendices de máquinas, científicos de inteligencia artificial, etc. • Python es un lenguaje fácil de aprender y dominar. Esto se debe principalmente a la semejanza de su sintaxis con el idioma inglés. La sintaxis de Python se caracteriza por muy pocas reglas y excepciones. • Es seguro decir que en Python la atención se centra en lo que quiere hacer con el código, no en las complejidades del lenguaje. Cualquiera puede dominar Python fácilmente. • Python es puramente multiplataforma y de código abierto. El mismo código escrito en un sistema Windows se puede ejecutar en máquinas Linux o Mac con cambios mínimos o nulos en el código fuente. • Otro aspecto notable de Python es que está respaldado por décadas de corrección de errores y enderezado de torceduras, lo que garantiza que su código funcione según lo previsto siempre que el usuario lo ejecute. • Python es compatible con PYPI, que tiene más de 85.000 bibliotecas y módulos de Python para los usuarios. • Python se adapta a todos los propósitos de desarrollo, desde desarrollo web, automatización, inteligencia artificial, aprendizaje automático, desarrollo de juegos, aplicaciones de escritorio y mucho más. Python para desarrollo web Python ofrece algunos marcos bien conocidos para desarrolladores web como Django y Flask. Estos marcos se pueden utilizar en el desarrollo de backend para aplicaciones basadas en web con gran funcionalidad, eficiencia y diseño. Estos marcos no solo son funcionales, sino que también son seguros y estables. Los marcos como Django brindan seguridad contra varios errores de configuración de seguridad en las aplicaciones web. Algunos otros marcos de desarrollo web populares son: Web2Py, TurboGears, CherryPy, Bottle, etc. Python para automatización Python es un gran lenguaje para automatizar las tareas diarias de la computadora. Se pueden programar scripts simples en Python para automatizar las tareas aburridas regulares, lo que puede ahorrar mucho tiempo a los usuarios y aumentar su eficiencia y productividad en el trabajo. Los módulos de Python como PyAutoGUI se pueden usar para automatizar las tareas del teclado y el mouse. Las tareas diarias también se pueden revisar a través de estas tareas. Algunos módulos de Python populares utilizados en la automatización incluyen Selenium, BeautifulSoup, PyAutoGUI, Requests, JSON, etc. Python para aprendizaje automático e inteligencia artificial Python se ha convertido en el principal lenguaje de programación para modelos de aprendizaje automático e inteligencia artificial. Python proporciona la coherencia y la simplicidad necesarias para los modelos de IA y ML, seguidas de algunos de los mejores marcos. La sintaxis de Python es fácil de entender y significativa, lo que la hace ideal para proyectos de Inteligencia Artificial. Algunos marcos de Python populares para aprendizaje automático e inteligencia artificial incluyen TensorFlow, Torch, Skikit-Learn, Apache Singa, etc. Python para desarrollo de juegos Python no es un lenguaje ideal para desarrollar juegos debido a su baja velocidad. Sin embargo, tiene algunas buenas bibliotecas para el desarrollo de juegos como PyGame, Pyglet, Pandas3D, etc. que se pueden usar para desarrollar juegos de escritorio simples basados en GUI. La simplicidad de Python se puede utilizar como una ventaja para aprender los fundamentos del desarrollo de juegos. Después de aprender el desarrollo básico de juegos a través de Python, uno puede saltar a un lenguaje como C o C ++. Python para aplicaciones de escritorio Python es un lenguaje de programación interactivo con soporte para el desarrollo de GUI. Python proporciona varios marcos y módulos que se pueden usar para desarrollar aplicaciones de escritorio interactivas para múltiples sistemas operativos. Algunos de los mejores módulos de Python que brindan asistencia para el desarrollo de aplicaciones de escritorio incluyen PyQt, Tkinter, Kivy, PyGUI, etc. Python para la administración de redes Python también se puede utilizar para tareas de red complejas como administración de redes, automatización de redes, etc. Python es el lenguaje de programación líder para redes definidas por software. Python aumenta la eficiencia y la flexibilidad de los sistemas de red al facilitar su configuración y administración. Socket es uno de los módulos de Python más utilizados para tareas de red. Conclusión Python es un lenguaje de programación fácil de aprender, por eso, si está trabajando en cualquier proyecto en Python, no tiene que crear su propia función grande, puede usar módulos que ya han sido creados por otros desarrolladores. Python facilita el trabajo y la comprensión de Python es tan fácil como leer un párrafo en inglés.
      12. View File 800GB+ Collection Of IT Stuff 800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup Submitter dEEpEst Submitted 31/07/21 Category Libro Online Password ********  
      13. 1 download

        800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup

        $100.00 PRIV8

      14. Learn how to enumerate and exploit WordPress CMS What you'll learn Enumerate WordPress Enumerate Users , Themes , Plugins in WordPress Bruteforce Attacks using XMLRPC , Python , BurpSuite and Hydra Bruteforce Attacks using Metasploit Exploit Themes , Plugins and Pop a Shell Shell Upload using Metasploit Requirements No Prerequisites needed but web and python fundamentals are optional Description This course teaches you how to enumerate WordPress CMS. Wordpress cms is one of most popular cms to build blogs , shopping websites and more Wordpress comes with lot of 3rd party plugins and themes so does vulnerabilities and misconfigurations We need to know how hackers attack wordpress thus protecting ourself from the attacks We will see how to enumerate and bruteforce with python , burp , wpscan , metasploit etc tools like wpscan does awesome job at enumeration and also at bruteforce attacks thus testing our password security Metasploit have some auxiliary scanners and wordpress exploits to test aganist wordpress we can script our code in python to bruteforce the login credentials and hence some what faster than burp community edition Burp professional edition have the option of multi threading thus testing passwords faster but in this course we will not discuss about professional edition as it is not free we will also get the reverse shell from the vulnerable wordpress machine Bonus video includes how we attack a Drupal CMS using droopescan we can use droopescan to scan wordpress , joomla , drupal , moodle etc but for wordpress we better use wpscan first later we see some try hack me writeup which involves pentesting wordpress cms and exploiting it after this course you can try mrrobot room from tryhackme and test your skills Who this course is for: Anyone who is interested in Pentesting Anyone who wants to learn how to pentest Wordpress or any other CMS [Hidden Content] [hide][Hidden Content]]
      15. An incredibly fast proxy checker & IP rotator with ease. Features Proxy IP rotator: Rotates your IP address for every specific request. Proxy checker: Check your proxy IP which is still alive. All HTTP/S methods are supported. HTTP & SOCKSv5 proxy protocols apply. All parameters & URIs are passed. Easy to use: You can just run it against your proxy file, and choose the action you want! Cross-platform: whether you are Windows, Linux, Mac, or even Raspberry Pi, you can run it very well. [hide][Hidden Content]]
      16. Last week
      17. Fort is a simple firewall for Windows 7+. Features Filter by network addresses, application groups Support wildcards in program path names Application group speed limits Stores traffic statistics Graphical display of bandwidth Based on Windows Filtering Platform (WFP) [hide][Hidden Content]]
      18. Softwarenetz Text Editor The Softwarenetz text editor is a simple and user friendly program for your private and business letters. Create your personal or business writing paper within the text editor program. [Hidden Content] [hide][Hidden Content]]
      19. Cybersecurity researchers from Bitdefender discovered a new malware, “MosaicLoader,” which is targeting users looking online for pirated software. Adversaries often target users with various phishing tactics. But sometimes, unwitting users fall into a hacker’s trap, revealing their private data to attackers. Cybersecurity researchers from Bitdefender recently identified a new malware variant that targets users who are looking online for pirated software. Tracked as MosaicLoader, the malware is distributed via paid advertisements in search results, specially crafted to trick users into clicking the malicious ads link and infect their devices. Once deployed on the system, MosaicLoader creates a complex chain of processes and automatically downloads additional payloads like cookie stealers, crypto-currency miners, and backdoors like Glupteba. Glupteba is a malware Trojan with advanced features that could turn the infected system into a remotely controlled bot and steal personal information. MosaicLoader’s Infection Flow Initially, the MosaicLoader malware adds local exclusions in Windows Defender for legitimate-looking filenames to evade security detections. The malware then deploys additional malware payloads to gain persistent access to the targeted device. The execution flow of MosaicLoader include: Creating a fake software file > Code obfuscation with execution order > Auto-downloading with several malware strains. Impact In addition to MosaicLoader, Bitdefender researchers also identified a malware sprayer distributing Facebook cookie stealers to access users’ login cookies from browsers. This allows threat actors to take over victims’ Facebook accounts, deploy malware, and steal identities. They even leveraged a variety of RATs like AsyncRAT and Powershell Dropper for their cyberespionage campaigns to obtain users’ log keystrokes, audio from the microphone, and images from the infected system. “Due to MosaicLoader’s capabilities, user privacy may be severely affected. The malware sprayer can deliver Facebook cookie stealers on the system that might exfiltrate login data, resulting in complete account takeovers, posts that can harm the reputation of businesses or persons, or posts that spread malware. Another significantly dangerous malware delivered through MosaicLoader is the Remote Access Trojans. They can log keypresses on the system, record audio from the microphone and images from the webcam, capture screenshots, etc. With this private information, attackers can take over accounts, steal digital identities and attempt to blackmail victims,” Bitdefender said. Indicators of Compromise URLs t1.cloudshielding.xyz c1.checkblanco.xyz s1.chunkserving.com m1.uptime66.com 5a014483-ff8f-467e-a260-28565368d9be.certbooster.com 0129e158-aa17-4900-99a6-30f4a49bd0a4.nordlt.com Integral.hacking101.net IP Address 195.181.169.92 Mitigation While the MosaicLoader campaign has not targeted any specific countries or sectors, the attackers are mostly targeting personal computers. To prevent MosaicLoader infections: Organizations should apply the indicators of compromises (IOCs) to endpoint detection and response (EDR) systems Ensure employees avoid downloading pirated software or applications Always download from authentic sources Keep devices updated
      20. itsMe

        APPLE CODEGEN+CHECKER v1.0.0

        FEATURES GENERATES CODE && CHECKS SIMULTANEOUSLY ROXYLESS EASY TO USE [hide][Hidden Content]]
      21. itsMe

        Mercy - Discord selfbot

        Mercy is my last selfbot discord and possibly the last one, from first it was paid but now it is free open source. Categories. NSFW Commands Funny Commands Misc Commands Image Commands TEXT Commands Raid Commands Status Commands Selfbot information. [hide][Hidden Content]]
      22. @acider dont need key added mirror
      23. it asks decryption key
      24. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the Crimeflare.com database. Bruteforce scan over 2500 subdomains. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [hide][Hidden Content]]
      25. smartbrute The smart password spraying and bruteforcing tool for Active Directory Domain Services. [hide][Hidden Content]]
      26. Mystikal Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. Changelog v2.2.13 Merge pull request #107 from its-a-feature/2.2-updates added in a few more pages for the new ui, updated mythic-cli to include… [hide][Hidden Content]]
      1. Load more activity