Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. ForumEngine Build your online community without worries it would be abandoned. ForumEngine is optimized for a more social interaction. [Hidden Content] [hide][Hidden Content]]
      3. Start your new site the right way! With a Coming Soon page. Forget about complicated plugins that'll waste hours of your time. We know you're busy & need fast results! Coming Soon is extremely easy to use, has only the features you need and comes with themes that fit your business. [Hidden Content] [hide][Hidden Content]]
      4. With MailWizz not only that you will be able to properly handle email marketing for your own purposes but you can also become an Email Service Provider for your customers, since MailWizz integrates easily with payment gateways like Paypal and it offers all the needed tools to create pricing plans, promotional codes and to manage orders and transactions created by your customers. [Hidden Content] [hide][Hidden Content]]
      5. phpShort is an advanced URL Shortener Platform, that allows you to easily shorten links, target your audience based on their location or platform, and provide analytics insights for the shortened links. [Hidden Content] [hide][Hidden Content]]
      6. Tidal Music Downloader Tidal Converter Supports Downloading Music from Tidal Convert to MP3, FLAC, WAV, AAC and AIFF with High Fidelity (HiFi) Sound Kept. [Hidden Content] [hide][Hidden Content]]
      7. Netflix Video Downloader A professional Netflix video downloader trueDownload movies & TV shows from Netflix. trueSupport downloading the HD quality Netflix video. trueKeep audio tracks and subtitles. trueDownload Netflix videos in Fast Speed. trueSupport downloading video in MP4 & MKV format. trueFlexible and easy-to-use. trueFree technical support and software upgrades. [Hidden Content] [hide][Hidden Content]]
      8. BurpCrypto Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! Changelog v0.1.7 fix rsa data length limit (#10) [hide][Hidden Content]]
      9. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.7 Added: Function “check_backup_domain” added, test before start “domain.zip/rar etc..” Added: New option (-ffs) to force the first step of scan during the first running (waf, vhosts, wayback etc…) [hide][Hidden Content]]
      10. Unified Remote version suffers from a remote code execution vulnerability. View the full article
      11. Backdoor.Win32.Delf.adag malware suffers from hardcoded credential and traversal vulnerabilities. View the full article
      12. 1337day-Exploits

        ExploitsLayerBB 1.1.4 SQL Injection

        LayerBB version 1.1.4 suffers from a remote SQL injection vulnerability. View the full article
      13. Python jsonpickle version 2.0.0 suffers from a remote code execution vulnerability. View the full article
      14. Backdoor.Win32.Agent.xw malware suffers from denial of service and null pointer vulnerabilities. View the full article
      15. VMware vCenter version 6.5 and 7.0 remote code execution proof of concept exploit. View the full article
      16. Microsoft Exchange Server has a flaw that exists within the HasValidCanary function inside of the Canary15 class. The issue results in an insecure generation of cross site request forgery tokens that can be used to install an office-addins. An attacker can leverage this vulnerability to escalate privileges to an administrative account. View the full article
      17. @Hassan TM Just detected. 1.- 2.- ALL Files posted by me here are checked/decompiled or tested!
      18. password stealer? [Hidden Content]
      19. SLMail version remote code execution exploit. View the full article
      20. Softros LAN Messenger version 9.6.4 suffers from an unquoted service path vulnerability. View the full article
      21. Last week
      22. What you'll learn -Java SE( Standard Edition) -Core Java 3 Real World Application +30 Java Examples and mini Applications -Algorithms -Writing short and exact code -OOP(Object Oriented Programming) Learn the core Java skills needed to apply for Java developer position Be able to sit for and pass the Oracle Java Certificate exam if you choose. Be able to demonstrate your understanding of Java to future employers. Obtain proficiency in Java 8 and Java 11 -SOLID Priciples A wide variety of Java Collections - List, Map, Set and Queue Interfaces The BEST PRACTICES in Writing High Quality Java Code Gain enough experience to pass a core Java Programming interview and perform well on the job Course content 24 sections • 187 lectures • 27h 32m total length Requirements Computer with Min 4Gb Ram Except these there is no requirement Description 3: Real World Application and Projects +30 Mini Applications or Examples for each Topis Basics of Java Programming - Expressions, Variables, and Printing Output Java Operators - Java Assignment Operator, Relational and Logical Operators, Short Circuit Operators Java Conditionals and If Statement Methods - Parameters, Arguments, and Return Values Object-Oriented Programming - Class, Object, State, and Behavior Basics of OOPS - Encapsulation, Abstraction, Inheritance, and Polymorphism Basics about Java Data Types - Casting, Operators and More Java Built-in Classes - String, Java Wrapper Classes Conditionals with Java - If Else Statement, Nested If Else, Java Switch Statement, Java Ternary Operator Loops - For Loop, While Loop in Java, Do While Loop, Break and Continue Java Wrapper Classes, String Java Array and ArrayList - Java String Arrays, Arrays of Objects, Primitive Data Types, toString and Exceptions Introduction to Variable Arguments Understanding Object Composition and Inheritance Java Abstract Class and Interfaces. Introduction to Polymorphism. Java Collections - List Interface(ArrayList, LinkedList and Vector), Set Interface (HashSet, LinkedHashSet) Map Interface (HashMap, HashTable, LinkedHashMap and TreeMap() - Compare, Contrast and Choose Generics - Why do we need Generics? Restrictions with extends and Generic Methods, WildCards - Upper Bound and Lower Bound. Method References - static and instance methods Introduction to Threads and MultiThreading - Need for Threads Implementing Threads - Extending Thread Class and Implementing Runnable Interface States of a Thread and Communication between Threads Introduction to Executor Service - Customizing the number of Active Threads. Returning a Future, invokeAll, and invokeAny Introduction to Exception Handling - Your Thought Process during Exception Handling. try, catch, and finally. Exception Hierarchy - Checked Exceptions vs Unchecked Exceptions. Throwing an Exception.. Try with Resources - New Feature in Java 8. List files and folders in Directory with Files list method, File walk method and find methods. Read and write from a File. This course comes with a full 30-day money-back guarantee. Meaning if you are not completely satisfied with the course or your progress, simply let me know and I’ll refund you 100%, every last penny no questions asked. You either end up with Java skills, go on to develop great programs and potentially make an awesome career for yourself, or you try the course and simply get all your money back if you don’t like it… You literally can’t lose. Who this course is for: The one who wants to be Software Developer [Hidden Content] [hide][Hidden Content]]
      23. LogonExpert version 8.1 suffers from an unquoted service path vulnerability. View the full article
      24. Backdoor.Win32.Agent.xs malware suffers from an insecure permissions vulnerability. View the full article
      25. K7 Scanner for Ransomware & BOTs – comes with an award-winning Antivirus scanner that runs in parallel with any Antivirus software currently installed on your PC. Its Deep Scanning technology eliminates high risk BOTs and Ransomware. Features • Scans and removes high risk BOTs and Ransomware(including WannaCry) • Runs seamlessly with your existing Anti-Virus application • No installation required. Can be run from a USB drive [Hidden Content] [hide][Hidden Content]]
      26. SpotAuditor version 5.3.5 suffers from a denial of service vulnerability. View the full article
      1. Load more activity