Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. Reflect the folder structure of your Real Media Library (media library folders) in your file system. Organize media in physical folders and benefit from SEO optimization. Reflecting the Real Media Library folder structure into your file system not only gives you a better file structure when working with an FTP client, but a more descriptive file path. This SEO optimization will drive traffic directly to your website from image search engines! [Hidden Content] [hide][Hidden Content]]
      3. GitDorker GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various sources to provide an overview of sensitive information stored on github given a search query. The Primary purpose of GitDorker is to provide the user with a clean and tailored attack surface to begin harvesting sensitive information on GitHub. GitDorker can be used with additional tools such as GitRob or Trufflehog on interesting repos or users discovered from GitDorker to produce the best results. Rate Limits GitDorker utilizes the GitHub Search API and is limited to 30 requests per minute. In order to prevent rate limits, a sleep function is built into GitDorker after every 30 requests to prevent search failures. Therefore, if one were to run use the alldorks.txt file with GitDorker, the process will take roughly 5 minutes to complete. [hide][Hidden Content]]
      4. VovSoft Hide Files – allows you to lock files or folders on internal or external hard drives, SSDs, USB-drives and even on memory cards. The operation is very fast, even when working with gigabytes of data. The application does not offer any other advanced features, so beginners can easily deal with all the subtleties. So, if you were looking for an easy program to quickly hide important files or folders without allowing other users to access them without the correct password, it is in front of you. [Hidden Content] [hide][Hidden Content]]
      5. This Metasploit module exploits a server-side include (SSI) in SharePoint to leak the web.config file and forge a malicious ViewState with the extracted validation key. This exploit is authenticated and requires a user with page creation privileges, which is a standard permission in SharePoint. The web.config file will be stored in loot once retrieved, and the VALIDATION_KEY option can be set to short-circuit the SSI and trigger the ViewState deserialization. View the full article
      6. UVK Ultra Virus Killer – is a powerful virus removal and Windows repair tool. With simple and intuitive interface, UVK allows users to detect and delete all types of malware and spyware from infected systems. It also includes lots of tools to repair windows after the disinfection. Features • Process manager • Startup entries and scheduled tasks • Windows services and drivers • Delete or replace file or folder • Scan & create log • Run UVK Scripts • UVK tools • UVK System repair • System Info • UVK immunization [Hidden Content] [hide][Hidden Content]]
      7. Chrome suffers from a use-after-free vulnerability in USB::OnServiceConnectionError. View the full article
      8. Chrome suffers from a use-after-free vulnerability in WebIDBGetDBNamesCallbacksImpl::SuccessNamesAndVersionsList. View the full article
      9. Mocha for Android suffers from an issue where a call can cause the callee device to send audio without user interaction. View the full article
      10. ReQuest Serious Play F3 Media Server version 7.0.3 suffers from an unauthenticated remote code execution vulnerability. Abusing the hidden ReQuest Internal Utilities page (/tools) from the services provided, an attacker can exploit the Quick File Uploader (/tools/upload.html) page and upload PHP executable files that results in remote code execution as the web server user. View the full article
      11. FRITZ!Box versions 7.20 and below suffer from a DNS rebinding protection bypass vulnerability. View the full article
      12. HiSilicon Video Encoder suffers from an unauthenticated RTSP buffer overflow vulnerability that can cause a denial of service condition. View the full article
      13. 1337day-Exploits

        ExploitsJenkins 2.63 Sandbox Bypass

        Jenkins version 2.63 suffers from a sandbox bypass vulnerability. View the full article
      14. ReQuest Serious Play F3 Media Server version 7.0.3 suffers from a denial of service vulnerability. The device can be shutdown or rebooted by an unauthenticated attacker when issuing one HTTP GET request. View the full article
      15. HiSilicon Video Encoder allows for full administrative access via a backdoor password. Versions affected are vendor specific. View the full article
      16. HiSilicon Video Encoder suffers from a remote code execution vulnerability via an unauthenticated upload of malicious firmware. Versions affected are vendor specific. View the full article
      17. ReQuest Serious Play F3 Media Server version 7.0.3 suffers from a debug log disclosure vulnerability. An unauthenticated attacker can visit the message_log page and disclose the webserver's Python debug log file containing system information, credentials, paths, processes and command arguments running on the device. View the full article
      18. HiSilicon Video Encoder suffers from a remote command injection vulnerability. Versions affected are vendor specific. View the full article
      19. ReQuest Serious Play Media Player version 3.0 suffers from an unauthenticated file disclosure vulnerability when input passed through the file parameter in tail.html and file.html script is not properly verified before being used to read web log files. This can be exploited to disclose contents of files from local resources. View the full article
      20. HiSilicon Video Encoder versions up to 1.97 suffer from a path traversal vulnerability that allows for file disclosure. View the full article
      21. Chrome suffers from a use-after-free vulnerability in XRSystem::FocusedFrameChanged and FocusController::NotifyFocusChangedObservers. View the full article
      22. 1337day-Exploits

        ExploitsTinyMCE 5 HTML Injection

        TinyMCE 5 suffers from an html injection vulnerability. View the full article
      23. Online Job Portal version 1.0 suffers from a persistent cross site scripting vulnerability. View the full article
      24. OX App Suite and OX Documents versions 7.10.3 and some prior versions suffer from information exposure, server-side request forgery, and cross site scripting vulnerabilities. View the full article
      25. Online Discussion Forum Site version 1.0 suffers from a cross site scripting vulnerability. View the full article
      26. Online Student's Management System version 1.0 suffers from a remote shell upload vulnerability. View the full article
      1. Load more activity