Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. Malware program that includes a back door for administrative control over the target computer using Telegram. Features WebCam Threading Tasklist TaskKill Easy for Beginners ! [hide][Hidden Content]]
      3. watermark_disabler Disabling "Activate Windows" watermark made simple, the code in this repository is a PoC, and has not been tested above Windows 10 1803. How does this work? The function responsible for drawing whole desktop including the watermark is xxxDesktopPaintCallback located in win32kfull.sys. Both of the approaches used by this project were found while analyzing functions further down in the callstack. [hide][Hidden Content]]
      4. You can protect with password virtually any folder, allowing only authorized users to open the protected files or folders. You can password-protect an unlimited number of folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once. [Hidden Content] [hide][Hidden Content]]
      5. Hola a todos quería saber que mails sin contar los temporales son los que utilizais y por que: Me explico, hay mails con cifrado de extremo a extremo como tiene whatsshap juasjuas, disculpar; hay otros con cifrado asimetrico, osea de clave publica y clave privada, otros con mas anonimato, otros con politica o no de no logs, pero no hay ninguno que tenga las tres cosas que yo quisiera, o si lo hay lo estoy buscando. Para mi seria, Anonimato, política de no logs, cifrado pgp (cifrado asimétrico) o gpg si hablamos de open source. Cual de todos es el que mas seguridad tiene, aparte de añadirle luego anti spam etc..etc..etc. Yo ya me estoy decantando por uno, a ver si coincidimos, no voy a poner los que tengo mirados, quiero que la gente que sabe mas que yo, me explique también el por que elige ese. Gracias, si lo contestais os regalo un curso a vuestra elección, menos las certificaciones en las que estoy metido evidentemente. De blackhat o de udemy, o de ....
      6. C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process. The snippets are randomly selected from a small pool of techniques/variations before being obfuscated. Every snippet is obfuscated at runtime/request so that no generated output share the same signatures. What is AMSI? As f-secure explained in one of their excellent blog-posts: AMSI is an interface on which applications or services (third-party included) are able to scan a script’s content for malicious usage. If a signature in the script is registered by the AMSI antimalware service provider (Windows Defender by default), it will be blocked. To put this into context, consider the following steps PowerShell takes to integrate with AMSI: When a PowerShell process is created, AMSI.DLL is loaded from disk into its address space. Within AMSI.DLL, there’s a function known as AmsiScanBuffer(), essentially the function used to scan a script’s content. In the PowerShell command prompt, any supplied content would first be sent to AmsiScanBuffer(), before any execution takes place. Subsequently, AmsiScanBuffer() would check with the registered anti-virus to determine if any signatures have been created. If the content is deemed malicious, it would be blocked. Since AMSI relies on being loaded within the process executing the actual script, techniques to break or patch specific functions within amsi.dll are well known. [hide][Hidden Content]]
      7. BigTree CMS version 4.4.10 suffers from a remote code execution vulnerability. View the full article
      8. Anchor CMS version 0.12.7 suffers from a persistent cross site scripting vulnerability. View the full article
      9. itsMe


        Report Accounts and Videos [hide][Hidden Content]]
      10. itsMe


        Generates Steam Random Key [hide][Hidden Content]]
      11. itsMe


        Finds Combolists From Throwbin.io !!Don't use vpn when you are scraping! [hide][Hidden Content]]
      12. itsMe

        exe2py - pyinstxtractor

        Decompile exe to py compiled pyinstaller [hide][Hidden Content]]
      13. itsMe


        This program created for educational purposes only... I am not responsible for anything... You can check combolists for NordVpn. [hide][Hidden Content]]
      14. Retriver: Recovering accounts from valid mail Cleaning mail after recovery Not picky about the proxy, because before sending the request, the mail is checked for validity Extensive IMAP database, with the addition of new settings when checking If the IMAP setting is not found in the local database, the setting is searched for in the Mozila ThunderBird cloud Brute: Checking accounts for games Sort by games and platforms Demanding on a proxy, but if you load the result only from Retriver, you can check without a proxy in 1 thread (there will be no blocking) [hide][Hidden Content]]
      15. Advanced Web Design for Everyone Do you want to create totally stellar websites? If yes, then consider the HTML Editor your new best friend. Feel empowered with handy tag references, intuitive tools like code completion, website components that update instantly across all pages, live previews, and dozens of other extraordinary tools and features. [Hidden Content] [hide][Hidden Content]]
      16. itsMe


        Scrapes active gleam.io giveaways for you, using YouTube's API. Information This tool was developed to demonstrate how you could easily profit by developing a simple scraper like this, as it would be inefficient and time consumable to do the process manually. It filters the most recent YouTube videos with gleam.io URLs in their descriptions, and saves them with additional information to the giveaways. You can then enter the giveaways — the more you enter, the higher chance you have of winning, obviously. [hide][Hidden Content]]
      17. xeca is a project that creates encrypted PowerShell payloads for offensive purposes. Creating position independent shellcode from DLL files is also possible. How It Works Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt” The key to decrypt the payload is saved to a file named “safe.txt” Execute “launch.txt” on a remote host The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt” Decrypt the payload in memory Execute the intended payload in memory Changelog v0.3 ETW and Script Block Logging bypass added to all payloads. The bypasses can be disabled with –disable-etw and –disable-script-logging. [hide][Hidden Content]]
      18. Last week
      19. itsMe

        Metasploit: 6.0.8

        Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [hide][Hidden Content]]
      20. Malwarebytes Anti-Exploit Is now part of the premium version of Malwarebytes, your complete defense against advanced threats. Malwarebytes Anti-Exploit beta Malwarebytes will continue to test cutting-edge anti-exploit technology in a free beta version of Malwarebytes Anti-Exploit. Want to be part of the beta program? Go to our forums to sign up and learn more. [Hidden Content] [hide][Hidden Content]]
      21. Simple Online Food Ordering System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
      22. itsMe

        Text Editor Pro 10.1.0

        Powerful text editing tool with syntax highlighting support for programming languages and scripts, multi-caret and synchronized editing, code/text folding, over 100 options for customizing, over 100 ready made skins, character map, numerical unit convert tool, text compare, JSON/SQL/XML formatter, and support for multiple directories and search results. Version 10.1.0 (September 24, 2020) - Added highlighter for AutoHotkey - Added highlighter for NSIS - Fixed EXE installer - Fixed favorites menu skinning - Fixed language files [hide][Hidden Content]]
      23. Bimber is a viral magazine theme, that lets you launch a fully functional viral site in no more than 24 hours. It comes with powerful sharing buttons; popular, hot, trending listings and multiple ad locations. Everything in a lightweight and easy-to-use package. Just start today and go viral today! [Hidden Content] [hide][Hidden Content]]
      24. Introducing The Most Advanced and Intuitive WordPress Theme Ever. Design and features never seen before with unparalleled attention to detail. Unleash the power of WordPress today with Essentials️ Build stunning and powerful websites without writing a single line of code! [Hidden Content] [hide][Hidden Content]]
      25. itsMe

        IDM UltraEdit + x64

        UltraEdit: The world's best text editor Our 4+ million power users all agree – UltraEdit is the most flexible, powerful, and secure text editor out there. Download a free, full-feature trial to see why. Available for Windows, Mac, and Linux. [Hidden Content] [hide][Hidden Content]]
      26. itsMe

        Hex Workshop v6.8.0.541 + Patch

        The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. [Hidden Content] [hide][Hidden Content]]
      27. EmEditor is a fast, lightweight, yet extensible, easy-to-use text editor for Windows. Both native 64-bit and 32-bit builds are available, and moreover, the 64-bit includes separate builds for SSE2 (128-bit), AVX-2 (256-bit), and AVX-512 (512-bit) instruction sets. EmEditor v20.1.2 released! September 23, 2020/in EmEditor Core /by Yutaka Emura Today, we are releasing EmEditor v20.1.2. Updates from v20.1.1 include bug fixes found while developing v20.2 beta and stability/speed improvements. Please see EmEditor v20.1 New Features for details and screenshots. If you use the Desktop Installer version, you can select Check for Updates on the Help to download the newest version. If you use the Desktop portable version, you can go to the Download page to download the newest version. The Store App versions can be updated through Microsoft Store (64-bit or 32-bit) after a few days. Thank you for using EmEditor! [Hidden Content] [hide][Hidden Content]]
      1. Load more activity