Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. [HIDE][Hidden Content]]
      3. [HIDE][Hidden Content]]
      4. itsMe

        68K Mail-Access

        [HIDE][Hidden Content]]
      5. [HIDE][Hidden Content]]
      6. [HIDE][Hidden Content]]
      7. itsMe

        x3 DAZN [De]

        [Hidden Content]
      8. itsMe

        x17 CableVision-Flow

        [Hidden Content]
      9. StrongCore

        x17 CableVision-Flow

        @itsMe What is CableFlow? Site Link please.
      10. * Sure you can't decrypt these config's! [HIDE][Hidden Content]]
      11. [HIDE][Hidden Content]]
      12. Name AVG Antivirus Capture Expired/Products Proxies Yes Wordlists Mail:Pass [HIDE][Hidden Content]]
      13. itsMe

        BIN DAZN

        [Hidden Content]
      14. Social Email Extractor is a powerful and innovative program able to search and scan public pages on the most important social networks like Linkedin, Facebook, Twitter and Instagram and then scrape and extract email addresses (of companies, professionals and individuals). The search takes place at 360 ° within the profiles and posts of the various users. It is also possible to choose the search engine to use to get the best results by selecting one among Google, Bing and Yahoo. All captured emails are 100% valid and with extension @gmail.com, @hotmail.com and @yahoo.com. After the search you can get and save them on your computer in an excel, txt or csv file. [Hidden Content] [HIDE][Hidden Content]]
      15. Today
      16. VMware Workstation 15 Pro VMware Workstation Pro es el estándar del sector para la ejecución de varios sistemas operativos en un único PC con Linux o Windows. Workstation 15 Pro mejora el escritorio líder al ofrecer una interfaz de usuario actualizada con alta resolución de PPP, una nueva API de REST y soporte actualizado para los sistemas operativos Windows y Linux más recientes, entre otros. [Hidden Content] [HIDE][Hidden Content]]
      17. itsMe

        x2 DAZN

        [Hidden Content]
      18. itsMe

        x5 HBO España

        [Hidden Content]
      19. [Hidden Content]
      20. Yesterday
      21. ps-framework 100% fud payload generator !!! no metasploit !!! ____ ___ ____ _____ ___ ____ ___ _ _ | _ \ / _ \/ ___|| ____|_ _| _ \ / _ \| \ | | | |_) | | | \___ \| _| | || | | | | | | \| | | |__/| |_| |___) | |___ | || |_| | |_| | |\ | |_| \___/|____/|_____|___|____/ \___/|_| \_| _____ ____ _ __ __ _______ _____ ____ _ __ | ___| _ \ / \ | \/ | ____\ \ / / _ \| _ \| |/ / | |_ | |_) | / _ \ | |\/| | _| \ \ /\ / / | | | |_) | ' / | _| | _ < / ___ \| | | | |___ \ V V /| |_| | _ <| . \ |_| |_| \_\/_/ \_\_| |_|_____| \_/\_/ \___/|_| \_\_|\_ --------------disclamer------------ this program is for authorised penetration testing with written concent only!!! the creators and distributors of this program are not responseble for anny misuse of this program. !!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united states, and is generaly severely punished arround the world --------------discription------------- (linux only)(must be run as root) ! no dependancys or files required ! payloads have 2 layers of encryption and are compiled to exe format ! all connections are encrypted with aes ! installer builds the program into a binary file, then copies it to /usr/bin/ payloads are basicly reverse_shells ------------instructions------------- [Hidden Content] ----------sample-------------- ____ ___ ____ _____ ___ ____ ___ _ _ | _ \ / _ \/ ___|| ____|_ _| _ \ / _ \| \ | | | |_) | | | \___ \| _| | || | | | | | | \| | | __/| |_| |___) | |___ | || |_| | |_| | |\ | |_| \___/|____/|_____|___|____/ \___/|_| \_| _____ ____ _ __ __ _______ _____ ____ _ __ | ___| _ \ / \ | \/ | ____\ \ / / _ \| _ \| |/ / | |_ | |_) | / _ \ | |\/| | _| \ \ /\ / / | | | |_) | ' / | _| | _ < / ___ \| | | | |___ \ V V /| |_| | _ <| . \ |_| |_| \_\/_/ \_\_| |_|_____| \_/\_/ \___/|_| \_\_|\_ this program is for authorised penetration testing with written concent only!!! the creators and distributors of this program are not responseble for anny misuse of this program. !!! use against a target without concent is a felony under The Computer Fraud and Abuse Act of 1986 (CFAA) in the united states, and is generaly severely punished arround the world [B]BUILDER [L]LISTENER [E]EXIT [B,L,E] :
      22. dEEpEst

        Aresskit v2.0 [RAT]

        Next Generation Remote Administration Tool (RAT) What is Ares? Ares - Arsenal of Reaping Exploitational Suffering (for lack of a better name) Ares is my first large-scale framework consiting of special, hand-crafted malware for the Windows OS. This framework was designed to work with Windows 7 and up, however it has only been tested on Windows 10. Aresskit is designed to infest a target machine, and under special command and control it has the ability to programmatically assume control over the victim. In which it can execute administrative tasks that vary in complexity and strength. Some quick features of Aresskit: Aresskit comes equipped with networking tools and administration tools such as: Built-In Port Scanner Reverse Command Prompt / Powershell Shells UDP/TCP Port Listener (similar to Netcat) File uploading/downloading (coming soon) Live Cam/Mic Feed (coming soon) Screenshot(s) (using AnonymousFiles) Real-Time and Log-based Keylogger Self-destruct feature (protect your privacy) Build Requirements: Some of these may not be required, but they do help in development Visual Studio 2019 .NET Framework 4 Costura.Fody PM> Install-Package Costura.Fody Json.NET PM> Install-Package Newtonsoft.Json How Aresskit works: The software has a simple concept, yet a complicated design. The idea of Aresskit is to be deployed and executed on a target machine, then to send a specially constructed command line interface back to the attacker's listening server. Then, the attacker will be able to pipe commands back to the infected machine, in which the specified commands are programmed into the source code for ease of access/use. This is a simple backdoor; however, the unique thing about Aresskit is that commands are implemented simply by adding Classes/Methods to the source code. How to build/deploy Aresskit Modify variables found at the top of Program.cs to suite your needs To build the software, simply execute build-release.bat and publish the exe. How to use Aresskit In order to use Aresskit, you will need a VPS or at least some other port listener. For my testing purposes, I used Netcat (native on Linux as command nc). You can use pretty much anything you would like to though. The fist thing you'll need to do is to open a port and listen for connections on it using netcat. This command should help: $ nc -lvk 9000. Make sure no firewalls are blocking connections on whatever port you choose. The program, assuming it has already been deployed, now needs to be executed either by you, the attacker, or the victim (try Social Engineering). Then, once the program is executed on the victim's end, you should now see some text being piped back to you on your listening port. The text should simply display aresskit> .. Which now you can start piping your commands and controlling the victim! How to control Aresskit after it has been deployed/executed: So now that you've deployed and executed the malware onto your target, you need to learn the basics of how the program works. Much like Meterpreter, it is able to recieve and parse custom commands to be executed by the malare. The way the command and control system works is that whenever it received input, the syntax is required to match up to Class/Method names built into the software. For example, you would pipe in the command aresskit> Administration::IsAdmin, and the malware should return True or False, based on whether or not the executable has administrative permissions. Notice that Administration is the name of the class that is built into the software (take a look at Administration.cs). For every class/method there is built into the malware, it then becomes a new command in the interpreter. This design system was created to create an extremely easy, and effective method of allowing other engineers to include custom commands into the malware to give it more power and user customizability. Video : [Hidden Content] Download: [Hidden Content]
      23. dr.pwr

        Hello

        I want my account to be reactivated. Thank you.
      1. Load more activity