Welcome to The Forum
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to
existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile
and so much more. This message will be removed once you have signed in.
Hacker Forum
Hacker from all countries join this community to share their knowledge and their hacking tools
Hacking Tools
You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.
PRIV8
Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.
Read Rules
In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.
All Activity
This stream auto-updates
- Past hour
-
The Best WordPress Advertising Manager in 2021 / 2020 / 2019 / 2018 / 2017 / 2016 Ads Pro (v 4.3.97) is a Premium WordPress Ad Plugin that helps you manage, sell and display your advertising space, in a way that no other plugin can. This awesome tool supports a templates and grid system to show really matched and user-friendly ads on your site. And it’s 100% free from Ad blocker. Display your banners, including Google AdSense banners in more than 20 ways! Core Features 100% Responsive Geographical targeting (countries, states / provinces, cities or zip-codes) Schedule your ads and control their delay Option to show Ads in Specific Devices (mobile, tablet or desktop) Filters on Categories and Tags Hooks to show Ads before / inner / after Content Options to show / close Ads after X seconds Capping option to show Ads only X times per User / Session Display your ads in more than 20 different ways (sidebar, floating, video, background, corner peel, grids, hover and others) Huge Backend manager (easily manage your ads) 25+ ready to use Responsive and User-friendly Ad Templates [Hidden Content] [Hidden Content]
-
AmyMovie theme is a fully responsive WordPress theme designed for Movie websites. The various, modern and professional interface with clean code will make your Movie sites powerful, attractive and easy-to-use. You are easy to import movie data from IMDb and TMDb website. And with amazing showtime features, visitor can spend only some seconds to get the Movie Schedules in the different cinemas. [Hidden Content] [hide][Hidden Content]]
-
PHP FansOnly Patrons v1.7 - Paid Content Creators Platform - Nulled
a topic posted itsMe in Scripts & Templates
Start your own website like OnlyFans.com or Patreon.com and grow like mad. It’s like a social network but allows content creators to directly earn MONEY from their FANS for their PREMIUM content. [Hidden Content] [hide][Hidden Content]] - Today
-
Jquery Keywords Generator, Keywords Finder. 100% clients script to retreive a list of a long tail keywords [hide][Hidden Content]]
-
Combo List Generator for Android Devices (Termux) v4.0 Release Notes Google Scraping Fixed. Added Login & Authentication System. Major Bug Fixes. Stability & Performance Improvements. Combo List Generator v4.0 (Updated on 03/01/2021 02:15 IST) [hide][Hidden Content]]
-
once again awesome giveaway A friend of mine really need this account hope get some luck choose no : 2
- 2 replies
-
- 2023-06-22
- [giveaway]
-
(and 4 more)
Tagged with:
-
BurpCrypto Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! Changelog v0.1.6 opt js support. add Get PlainText to all panel. [hide][Hidden Content]]
-
[Hidden Content]
-
- proxies/socks4/5
- good-proxies.ru
-
(and 1 more)
Tagged with:
-
[Hidden Content]
-
- [15-01-21]
- http/socks4/socks5
-
(and 1 more)
Tagged with:
-
ExploitsNetsia SEBA+ 0.16.1 Authentcation Bypass / Add Root User
a topic posted 1337day-Exploits in Updated Exploits
This Metasploit module exploits an authentication bypass in Netsia SEBA+ versions 0.16.1 and below to add a root user. View the full article -
ExploitsAlumni Management System 1.0 Cross Site Scripting
a topic posted 1337day-Exploits in Updated Exploits
Alumni Management System version 1.0 suffers from a persistent cross site scripting vulnerability. Original discovery of cross scripting vulnerability in this version is attributed to Valerio Alessandroni in December of 2020. View the full article -
ExploitsE-Learning System 1.0 SQL Injection / Shell Upload
a topic posted 1337day-Exploits in Updated Exploits
E-Learning System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass and also suffers from remote code execution via file upload functionality. View the full article -
ExploitsBackdoor.Win32.Ncx.bt Remote Stack Buffer Overflow
a topic posted 1337day-Exploits in Updated Exploits
Backdoor.Win32.Ncx.bt malware suffers from a remote stack buffer overflow vulnerability. View the full article -
EyesOfNetwork version 5.3 suffers from a remote code execution vulnerability that leverages file upload. Original discovery of remote code execution in this version is attributed to Clement Billac in February of 2020. View the full article
-
ExploitsOnline Hotel Reservation System 1.0 Cross Site Request Forgery
a topic posted 1337day-Exploits in Updated Exploits
Online Hotel Reservation System version 1.0 suffers from a cross site request forgery vulnerability. View the full article -
ExploitsOnline Hotel Reservation System 1.0 SQL Injection
a topic posted 1337day-Exploits in Updated Exploits
Online Hotel Reservation System version 1.0 suffers from multiple remote SQL injection vulnerabilities. Original discovery of SQL injection in this version was discovered by Richard Jones in January of 2021. View the full article -
ExploitsWordPress Easy Contact Form 1.1.7 Cross Site Scripting
a topic posted 1337day-Exploits in Updated Exploits
WordPress Easy Contact Form plugin version 1.1.7 suffers from a persistent cross site scripting vulnerability. View the full article -
ExploitsOnline Hotel Reservation System 1.0 Cross Site Scripting
a topic posted 1337day-Exploits in Updated Exploits
Online Hotel Reservation System version 1.0 suffers from a persistent cross site scripting vulnerability. View the full article -
ExploitsPHP-Fusion 9.03.90 Cross Site Request Forgery
a topic posted 1337day-Exploits in Updated Exploits
PHP-Fusion version 9.03.90 suffers from a cross site request forgery vulnerability. View the full article -
wow.. wow.. wow... Espera viejo! Acaso quieres que seamos anonimos de por vida? xdd Anotame porfavor. Gracias Leyenda :alabanzas:
- 2 replies
-
- 2023-06-22
- [giveaway]
-
(and 4 more)
Tagged with:
-
The giveaway starts today and ends on 01/17/2021, I will be using a site like random.org to generate a random number that will answer the winner's post number. To participate leave a comment! Min. 2 Users Max. 10 Users
- 2 replies
-
- 2
-
-
- 2023-06-22
- [giveaway]
-
(and 4 more)
Tagged with:
-
What you'll learn How to use multiple methods to escalate privleges on modern versions of Windows 10 How to escalate privleges in CTFs such as HackTheBox, TryHackMe and more How to succeed in CTF style exams such as the OSCP, eCPPT and CEH How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career Requirements A HackTheBox VIP Subscription is Required Basic knowledge of virtual machines Description New Launch for Spring 2021! This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints. Everything is carefully, explained - step-by-step. Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments. Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course. The Techniques You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines Windows Kernel Exploits Weak Registry Permissions Token Manipulation CVE Exploits DPAPI Abuse (Three New Lectures Just Added January 2021!) The Tools You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more. You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more. My dream for you By the end of this course you should be able to use these techniques in: Your day to day work OSCP preparation CTF hacking About the lab There are 10 vulnerable machines. No lab setup is required as the entire environment is already established in HackTheBox VIP labs I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started. Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation. Tip: I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal. Never again will that happen. Who this course is for: Students interested in how attackers escalate privileges on modern Windows endpoints Beginning and Intermediate cyber security students. Students looking for OCSP practice [Hidden Content] [hide][Hidden Content]]
-
What you'll learn Understanding of RFID Use of RFID related hardware How to clone LF RFID tag How to crack HF Mifare Classic Encryption Key Requirements Basic Linux command and installation Description RFID is an acronym for ‘radio frequency identification’ and refers to a technology whereby digital data encoded in RFID tags or smart labels captured by reader via radio waves. In this course, students will learn the vulnerability of RFID and take this opportunity to know the secret of the tags. Students will know how to clone the different types of RFID tag for analysis or even pentesting. Disclaimer: Hardware Ninja is an official reseller of the ProxGrind products from Sneak Technology including Proxmark 3, ChameleonMini/Tiny and grants approval by RRG International Limited to delivery official training using their products. Who this course is for: Hardware Analyst and Pentester [Hidden Content] [hide][Hidden Content]]