Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. dEEpEst

        X10 MineCraft

        [Hidden Content]
      3. dEEpEst

        Picture-In-Picture (PiP)

        [Hidden Content]
      4. [Hidden Content]
      5. Today
      6. Capture: Screens / Expiry / Language Fast with Socks4/5 [HIDE][Hidden Content]]
      7. dEEpEst

        pdf How to be 100% anonymous?

        [Hidden Content]
      8. itsMe

        rat ARES RAT v2.4.2

        @CrypterFUD Si
      9. CrypterFUD

        rat ARES RAT v2.4.2

        el rat es .net ?
      10. Capture: Account_level_display Locked Accounts [HIDE][Hidden Content]]
      11. itsMe

        x2 Deezer Premium

        [Hidden Content]
      12. Plan Subscribed Payment Made Payment Due [Hidden Content]
      13. identYwaf is an identification tool that can recognize web protection type (i.e. WAF) based on blind inference. The blind inference is being done by inspecting responses provoked by a set of predefined offensive (non-destructive) payloads, where those are used only to trigger the web protection system in between (e.g. [Hidden Content] AND 2>1). Currently, it supports more than 60 different protection products (e.g. aeSecure, Airlock, CleanTalk, CrawlProtect, Imunify360, MalCare, ModSecurity, Palo Alto, SiteGuard, UrlScan, Wallarm, WatchGuard, Wordfence, etc.), while the knowledge-base is constantly growing. Also, as part of this project, screenshots of characteristic responses for different web protection systems are being gathered (manually) for the future reference. Changelog v1.0.118 Adding signatures for new WAF (Wapples) [HIDE][Hidden Content]]
      14. [HIDE][Hidden Content]]
      15. [HIDE][Hidden Content]]
      16. Hi, I am a new user of the exploit. It seems that it is impossible to have the 0day .. I need it
      17. Yesterday
      18. [Hidden Content]
      19. FANUC Robotics Virtual Robot Controller version 8.23 suffers from a path traversal vulnerability. View the full article
      20. FANUC Robotics Virtual Robot Controller version 8.23 suffers from a stack-based buffer overflow vulnerability. View the full article
      21. An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. View the full article
      22. Linux suffers from broken permission and object lifetime handling for PTRACE_TRACEME. View the full article
      23. Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks. View the full article
      24. CentOS Control Web Panel version suffers from a user enumeration vulnerability. View the full article
      25. OFFTITAN95

        crypter THE DARK KNIGHT

        Hi, why don't I see the links,?
      1. Load more activity