Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. itsMe

        RedGate .NET Reflector

        Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
      3. Malwarebytes Anti-Exploit Ahora forma parte de Malwarebytes for Windows, la defensa completa frente a las amenazas avanzadas. [Hidden Content] [hide][Hidden Content]]
      4. The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their profile The information includes: [ profile ] : user id, followers / following, number of uploads, profile img URL, business enum, external URL, joined Recently, etc [ tags & mentions ] : most used hashtags and mentioned accounts [ email ] : if any email is used any where it'll be displayed [ posts ] : accessability caption, location, timestamp, caption, picture url, etc ( yet not working correctly with posts instagram marks as 'sensitive cotent' ) [hide][Hidden Content]]
      5. OneForAll is a powerful subdomain collection toolsubdomain collection The importance of information collection in penetration testing is self-evident. Subdomain collection is an essential and very important part of information collection. At present, there are many open-source tools for subdomain collection on the Internet, but there are always some of the following problems: Not powerful enough,there are not enough interfaces to collect subdomains automatically, and there are no functions such as automatic subdomain resolve, verification, FUZZ, and information expansion. Not friendly enough,although the command line module is more convenient, but when there are a lot of optional parameters and the operation to be implemented is complex, using command line mode is a bit unfriendly. If there is a good interaction, With a highly operable front end, the experience will be much better. Lack of maintenance,Many tools have not been updated once in years, what issues and PR are, do not exist. Efficiency issues,do not take advantage of multi-process, multi-threading and asynchronous cooperation technology, the speed is slow. Features Powerful collection capability,For more information, please see collection module description. Collect subdomains using certificate transparency (there are currently 6 modules: censys_api,certspotter,crtsh,entrust,google,spyse_api) General check collection subdomains (there are currently 4 modules: domain transfer vulnerability exploitationaxfr, cross-domain policy file cdx, HTTPS certificate cert, content security policy csp, robots file robots, and sitemap file sitemap. Check NSEC record, NSEC3 record and other modules will be added later). Collect subdomains using web crawler files (there are currently 2 modules: archirawl, commoncrawl, which is still being debugged and needs to be added and improved). Collect subdomains using DNS datasets (there are currently 23 modules: binaryedge_api, bufferover, cebaidu, chinaz, chinaz_api, circl_api, dnsdb_api, dnsdumpster, hackertarget, ip138, ipv4info_api, netcraft, passivedns_api, ptrarchive, qianxun, rapiddns, riddler, robtex, securitytrails_api, sitedossier, threatcrowd, wzpc, ximcx) Collect subdomains using DNS queries (There are currently 5 modules: collecting subdomains srv by enumerating common SRV records and making queries, and collecting subdomains by querying MX,NS,SOA,TXT records in DNS records of domain names). Collect subdomains using threat intelligence platform data (there are currently 6 modules: alienvault, riskiq_ api, threatbook_ api, threatkeeper , virustotal, virustotal_ api, which need to be added and improved). Use search engines to discover subdomains (there are currently 18 modules: ask, baidu, bing, bing_api, duckduckgo, exalead, fofa_api, gitee, github, github_api, google, google_api, shodan_api, so, sogou, yahoo, yandex, zoomeye_api), except for special search engines in the search module. General search engines support automatic exclusion of search, full search, recursive search. Support subdomain blasting,This module has both conventional dictionary blasting and custom fuzz mode. It supports batch blasting and recursive blasting, and automatically judges pan-parsing and processing. Support subdmain verification,default to enable subdomain verification, automatically resolve subdomain DNS, automatically request subdomain to obtain title and banner, and comprehensively determine subdomain survival. Support subdomain takeover,By default, subdomain takeover risk checking is enabled. Automatic subdomain takeover is supported (only Github, remains to be improved at present), and batch inspection is supported. Powerful processing feature,The found subdomain results support automatic removal, automatic DNS parsing, HTTP request detection, automatic filtering of valid subdomains, and expansion of Banner information for subdomains. The final supported export formats are rst, csv, tsv, json, yaml, html, xls, xlsx, dbf, latex, ods. Very fast,collection module uses multithreaded calls, blasting module uses massdns, the speed can at least reach 10000pps under the default configuration, and DNS parsing and HTTP requests use asynchronous multiprogramming in subdomain verification. Multithreaded check subdomain takeover risk. Good experience,Each module has a progress bar, and the results of each module are saved asynchronously. [hide][Hidden Content]]
      6. [Hidden Content]
      7. [Hidden Content]
      8. TROJAN KILLER [PORTABLE EDITION] Carry Trojan Killer Portable on your memory stick - be sure that you're safe from the cyber threats wherever you go Your protection is always with you! [Hidden Content] [hide][Hidden Content]]
      9. solution to protect one single computer, such as your home or school PC. Just one standalone computer is protected. Loaris will become your personal ideal helper and defender in the web. family License coverage is granted for several PCs in your family. Have a peace of mind with all your home PCs protected! corporate Now the security of your business is under reliable defense. Entrust your safety to professionals! agency Use Loaris to the fullest. Enjoy our extended customer service. Hurry up to become our client! [Hidden Content] [hide][Hidden Content]]
      10. LifeRay version 7.2.1 GA2 suffers from a persistent cross site scripting vulnerability. View the full article
      11. The TP-Link TL-WA855RE V5_200415 suffers from a flow where an unauthenticated attacker can reset the device and then set a new administrator password. View the full article
      12. Boxoft Audio Converter version 2.3.0 suffers from a buffer overflow vulnerability. View the full article
      13. jbinks

        im back my friend

        heloo, after a long time im back here
      14. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver crt.sh ThreatCrowd AnubisDB ThreatMiner Traceroute Protocols UDP TCP ICMP Directory Searching Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv Changelog v1.1.1 paths fixed, subdomain enum optimized, new apis [hide][Hidden Content]]
      15. Last week
      16. itsMe

        App Builder 2021.15

        App Builder – is a Complete suite to create HTML5 and hybrid mobile applications. Features Visual designer • App Builder provide us with dozens of visual and non visual controls we can simply drop it in the application’s designer. Timers, HTTP Clients, Text Inputs, Push Buttons and many more controls ready to use. Based in actions • You no need to know Javascript to create applications. App Builder scripting is based in visual assisted actions that we can use to do whatever we wanted. Hundreds of actions are available out of the box. Fully extensible • App Builder’s applications can be extended in many ways. We can use Javascript in addition to the action’s based script. We can develop and use third party App Builder’s Javascript plugins and also Apache Cordova™ plugins. What’s New * The App options -> WebExtension help topic has been updated to refer the way that we can follow in order to extend the browser’s Developer Tools from our WebExtension apps. A new WebExtension4 sample app has been also added: this sample app is a modification of the WebExtension sample app, which now also adds a new panel into the browser’s Developer Tools. * DecSoft App Builder (in addition to modern HTML apps, WebApps, Progressive WebApps and Hybrid apps) produces also WebExtension apps for the modern browsers and this release of the product incorporate some changes and enhancements to provide a way to use a characteristic of the WebExtension apps: the ability to extend the browser’s Developer Tools. [Hidden Content] [hide][Hidden Content]]
      17. GHunt is an OSINT tool to extract information from any Google Account using an email. It can currently extract: Owner’s name The last time the profile was edited Google ID If the account is a Hangouts Bot Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.) Possible YouTube channel Possible other usernames Public photos (P) Phones models (P) Phones firmwares (P) Installed Softwares (P) Google Maps reviews (M) Possible physical location (M) Events from Google Calendar (C) The features marked with a (P) require the target account to have the default setting of Allow the people you share content with to download your photos and videos on the Google AlbumArchive, or if the target has ever used Picasa linked to their Google account. More info here. Those marked with a (M) require the Google Maps reviews of the target to be public (they are by default). Those marked with a (C) requires user to have Google Calendar set on public (default it is closed) [hide][Hidden Content]]
      18. VMware Workstation Pro – is a popular program for creating several virtual computers in one system. Designed primarily for programmers and system administrators who need to test applications that work in different environments. VMware MultipleWorlds proprietary technology makes it possible to isolate operating systems and applications within the framework of the created virtual machines. At the same time, each virtual machine has a standard computer with its own processor and memory. Features • Simultaneous launch of several guest operating systems on one computer • Launch of a virtual machine in the desktop windows of the main operating system and in full screen • Install virtual machines without re-partitioning disks • Launch OS already installed on the computer without reinstalling or reinstalling them configuration • Running Windows operating system applications on a Linux computer and vice versa • Creating and testing applications for different systems simultaneously • Running untested applications without risk of disrupting the stable operation of the system or losing critical data • Sharing files and applications with different virtual machines through the use of a virtual network • Launching client-server and web applications on one PC • Launching several virtual computers on one PC and simulating the local network operation • And much more.. What's New Support for new host/guest operating systems: Windows 10 20H2 Ubuntu 20.10 Fedora 33 RHEL 8.3 Updated vctl kind to support KIND v0.9.0 Includes docker-machine-driver-vmware [Hidden Content] [hide][Hidden Content]]
      19. The giveaway starts today and ends on November 25, I will be using a site like random.org to generate a random number that will answer the winner's post number. To participate leave a comment! Min. 2 Users Max. 10 Users
      20. AMS is designed for forum owners to provide an interface for their members to add and publish Articles. Supported XenForo Version: XF 2.2 Available Unsupported XenForo Versions: XF 1.0 - 1.5, XF 2.0 - 2.1 Your license purchase includes 1 year of support and downloads. Access to Stable versions (Beta and RC releases are available with Premium licenses) 1 AMS license 1 year of support/downloads Basic Support [Hidden Content] [Hidden Content] [hide][Hidden Content]]
      21. Features Automatic installation Detailed statistics in dashboard Admin panel Easy to translate Advertising Ready SEO Ready Mobile Compatible AJAX Based Automatic caching Multiple Video Resolutions Social Media Ready 100% Responsive Design GDPR Ready Automatic sitemap Free Lifetime Updates And more… Supported Sources 9GAG Video Downloader AkıllıTV Video Downloader Bandcamp Music Downloader Bitchute Video Downloader Blogger/Blogspot Video Downloader Break Video Downloader Buzzfeed Video Downloader Dailymotion Video Downloader Douyin Video Downloader ESPN Video Downloader Facebook Video Downloader and Audio Downloader Flickr Video Downloader Gaana Music Downloader IMDB Video Downloader Imgur Video Downloader Instagram Video Downloader and Photo Downloader Izlesene Video Downloader Kwai Video Downloader Likee Video Downloader Linkedin Video Downloader Liveleak Video Downloader Mashable Video Downloader Odnoklassniki (Ok.ru) Video Downloader Pinterest Video Downloader Reddit Video Downloader Soundcloud Music (MP3 and OGG) Downloader Streamable Video Downloader TED Video Downloader and Audio Downloader Tiktok Video Downloader (Watermark free) and Music Downloader Tumblr Video Downloader Twitch Clip Video Downloader Twitter Video Downloader Vimeo Video Downloader VK Video Downloader YouTube Video Downloader and Audio Downloader More will be added System Requirements PHP >= 7.0 (allow_url_fopen must be on) cURL MySQL PDO [Hidden Content] [hide][Hidden Content]]
      22. For people who code, and those who don't. Site Designer's code-free controls allow you to experiment with high-level features without needing to know how the markup is written. Your creativity can run wild! Build utilizing a drag-n-drop workflow in a live browser environment. Then style your content in super speed using clickable controls. [Hidden Content] [hide][Hidden Content]]
      23. WindowManager – will helps you to improve your work flow by remembering and restoring the position and size of your programs and windows. Many programs don’t remember their position and size between sessions and even Windows Explorer does not restore windows to their last position under Windows 7 or higher. This is where WindowManager steps in and makes sure your windows are placed exactly where you want them every time you open them. WindowManager even allows you to lock the position and size of any window, so that it will always open at the same spot no matter where you move it. The window handling is fully customizable and you can set up special rules for your favorite or most frequently used windows. You can also make WindowManager send keystrokes or mouse-clicks to a program when its window is opened, run additional programs and other advanced actions. With WindowManager, you can also minimize most windows to the system tray. Features • Remembers and restores the position and size of your programs and windows • Supports explorer windows, programs, dialogs, etc. • Configurable rules for moving or sizing only, activating, closing windows, etc. • Advanced actions for typing text into windows, pressing keys, clicking mouse buttons, etc. • Multi-monitor support • Multiple profiles • Powerful trigger system for profile switching • Minimize windows to the system tray area • Fully customizable • Now with Windows 10 support Version 7.6.2(20.11.20) Fix: reduced system load [Hidden Content] [hide][Hidden Content]]
      24. itsMe


        DorkScanner is a tools to find vulnerable sites using dork .DorkScanner is Developed by @Xpykerz. The script is writen is python. This tool will works on both Linux,Windows and Android by using python. [hide][Hidden Content]]
      25. Spotify-Checker is a tools helps to Mass Spotify Accounts Checker .Spotify-Checker is Developed by @Xpykerz. The script is writen is python. This tool will works on both Linux,Windows and Android by using python. You can able to check Spotify Account Combo list using this tool . note : combo in the format Email:Password [hide][Hidden Content]]
      26. itsMe


        This webshell was created for those times where you can upload a php webshell but you cannot execute commands due to disabled functions and you can only interact with the filesystem using php capabilities. It also can dump entire MysQL databases using PHP functions (for CTFs). [hide][Hidden Content]]
      27. itsMe


        Powerful DDoS Attack [hide][Hidden Content]]
      1. Load more activity