Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Today
      2. All in One SEO Pack Pro is the popular WordPress plugin for managing the Search Engine Optimization of your website or blog. All in One SEO Pack is the most downloaded plugin for WordPress with over 14 million downloads to date. Chances are you've searched Google and found a website that's running this powerful WordPress plugin. [Hidden Content] [hide][Hidden Content]]
      3. More than 1 billion people in over 180 countries use WhatsApp. WordPress WhatsApp Support plugin provides better and easy way to communicate visitors and customers directly to your support person. It runs on your own WordPress site, allowing you full control over your support via WhatsApp. [Hidden Content] [hide][Hidden Content]]
      4. UberMenu is a user-friendly, highly customizable, responsive Mega Menu WordPress plugin. It works out of the box with the WordPress 3 Menu System, making it simple to get started but powerful enough to create highly customized and creative mega menu configurations. [Hidden Content] [hide][Hidden Content]]
      5. What you'll learn Programming in C Computer Programming Write code Data Structure in C File i/o Modular Programming Pointers in C/C++ Course content 12 sections • 68 lectures • 13h 13m total length Requirements A cup of coffee Description This C course will help you achieve your programming goals. In this course, you will be introduced to concepts through hands-on coding. There will be no long drawn out lectures and boring slides. You will be guided in a step-by-step fashion from novice level to where you will be able to build your own applications. This course goes beyond C; it's a foundation course for programming. In other words, whatever your learn here will apply to other languages such as C++, Python, Java and many others. All you have to do from that point forward is adjust to the new syntax of whatever language you choose to deal with. This course will go over how to build an application in C using functions, pointers, structures, arrays and it will even cover Data Structure concepts such as Lists. This is a comprehensive course with many hands-on examples that will help get your competency to professional developer levels. Thank you and enjoy your journey to success. Who this course is for: Beginners computer programmers Intermediate computer programmers in need of review Software developers College students High school students Programming enthusiasts [Hidden Content] [hide][Hidden Content]]
      6. itsMe


        Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules About: Arbitrium is a cross-platform is a remote access trojan (RAT), Fully UnDetectable (FUD), It allows you to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding. It gives access to the local networks, you can use the targets as a HTTP proxy and access Router, discover local IPs and scan their ports. Includes modules like Mimikatz, new modules can easily be added. In addition, if Arbitrium is used with a DNS spoofing software is can spread autonomously between devices (#AutoSpread). Arbitrium is a project of multiple parts, the parts were built using Java, JS, C, Python, Cordova and VueJS. Features: FUD The client uses simple tools which makes it completely undetectable, the trojan based on netcat mainly pipe TCP paquets to run the server's commands. Firewall Arbitrium doesn't require adding an exception to the firewall, or a port forwarding rule. The server is an API with endpoints that receives tasks for a specific target and others that the trojan periodically request to get the new instructions, the instructions can be a JavaScript file (the Android app is made using Cordova) or a Shell file to run in the terminal/CMD. Once the server receives a task for a device, the former schedule the task then it opens a child process where it waits for the trojan's response by listening to a dedicated ephemeral port. Therefore, the trojan doesn't need to listen to any port. Battery optimization / StealthMode Unlike with Stock Android, customizations like MIUI by Xiaomi, EMUI by Huawei or Samsung's Android Pie ignore the permissions/exceptions given to an app by the user. So if you try to run an Android's trojan in the background, the moment the app start running frequent or heavy (in some cases even lightweight) tasks (ex: sending http requests periodically) it will be killed no matter what permissions the user grants, ths OS completely ignores the current settings, dontkillmyapp.com is an known website dedicated for this particular issue. The aforementioned issue was quite annoying while working on this project, after awhile I found that building a lightweight binary that keeps running the assigned tasks in the background while the MainActivity stand still just after launching the binary apears to bypass most the restrictions and actually even improve the performance of the App. MainActivity receives a JS file from the server and uses ThreadPoolExecutor to initiate the binary without hanging for it to exit (More on this StealthMode/BatteryBypass). Web interface There is also a control panel, it's not a requirement but an extension, it's a simple VueJS webapp, a UI you can use to control the targets instead of directely sending requests to the API. The webapp is available here: Arbitrium WebApp [hide][Hidden Content]]
      7. Def4lt

        oski stealer

        @itsMe yeah but its good to share it to people that want to test it out
      8. The giveaway starts today and ends on 01/19/2021, I will be using a site like random.org to generate a random number that will answer the winner's post number. To participate leave a comment! Min. 2 Users Max. 10 Users
      9. itsMe

        oski stealer

        outdated stealer
      10. REDasm – The Open Source Disassembler REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets. You can hack and improve REDasm without any issues and limitations. REDasm is under heavy development but it provides several interesting features: IDA-Like interactive listing. Multithreaded analysis. Graphing support. Project management. Signature engine. Cross-platform. Easy to use. Changelog v3.0 beta2 Reimplemented cross references analysis Implemented Tensilica Xtensa and ESP32 support Added support for Xtensa ELF executables Implemented COFF plugin Improved build system Restored RDCommandPlugin (WIP) Fixed UI related APIs Minor fixes [hide][Hidden Content]]
      11. Yesterday
      12. Def4lt

        oski stealer

        Oski Stealer is an extremely advanced stealer showcasing many desired features such as credit card and wallet stealing. Firstly, this stealer is completely web-based, accessible from any device and can be hosted offshore for anonymity. Secondly, the payload will self destruct after loading, making it hard to trace the malware. Given the strong stealing features alongside being silent makes this extremely severe. In other words, alongside an exploit this stealer can be spread completely undetected. Allowing you to grow logs of data on a new level for any of your needs. However, with this stealer being completely native, working on all systems, it is arguably the best. In conclusion we highly suggest using Oski Stealer alongside any of our exploits to expand any of your data logging needs! Features: – Advanced Stealer – Browser Cookies / Passwords: – Chromium Based: Chromium, Google Chrome, Kometa, Amigo, Torch, Orbitum, Opera, Comodo Dragon, Nichrome, Yandex Browser, Maxthon5, Sputnik, Epic Privacy Browser, Vivaldi, CocCoc and other browsers that use the working directory Chromium. – Firefox Based: Mozilla Firefox, Pale Moon, Waterfox, Cyberfox, BlackHawk, IceCat, K-Meleon and other browsers that use the working directory Firefox. Filezilla Stealer – Crypto-Wallet Stealer – Bitcoin Core, Ethereum, ElectrumLTC, Monero, Electrum, Exodus, Dash, Litecoin, ElectronCash, ZCash, MultiDoge, AnonCoin, BBQCoin, DevCoin, DigitalCoin, FlorinCoin, Franko, FreiCoin, GoldCoin, InfiniteCoin, IOCoin, IxCoin, MegaCoin, MinCoin, NameCoin, PrimeCoin, TerraCoin, YACoinFiles from machine data about machine. Installed Softwares Native Stub requiring no dependencies other than Windows installation Multi-profile (up to 10) Low stub size of 93kb Supports Windows 7/8 / 8.1 / 10 | x32 / x64 Does not require administrative privilege User-friendly Admin Panel ICQ:653580170 Whatsapp +79017473945 jabber: [email protected] [hide][Hidden Content]]
      13. wawama25

        x4 iptv iptvworld.ml

        [Hidden Content]
      14. wawama25

        x3 iptv iptv.oirza.com

        [Hidden Content]
      15. itsMe

        Hidden Miner Builder v1.3.9

        [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.3.9 ADD: Support mining on AMD: RX 6800, 6900 [Hidden Content]
      16. KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc Generator Features Encrypt Source Code Using AES 256 Bit Encryption Encrypt Source Code Using Base64 Encryption Packing Evil Exe Using UPX Packer Interactive Mode [Generator Ask Required Parameter] Debug Mode [Can Be Used In Debugging Payload] Persistence Payload 3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie) Built-in File Binder Useful Icons Inside icon Folder Virtual Machine Bypass Methods Includes Registry Check Processes and Files Check MAC Adderess Check Disclaimer This project was created only for good purposes and personal use. THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
      17. Responsive websites. Really fast. Build beautiful sites for any browser or device. Quickly create and publish web pages almost anywhere with web design software that supports HTML, CSS, JavaScript, and more. Fast, flexible coding. Create, code, and manage dynamic websites easily with a smart, simplified coding engine. Access code hints to quickly learn and edit HTML, CSS, and other web standards. And use visual aids to reduce errors and speed up site development. Set up to site up in fewer steps. Get your sites up and running faster with starter templates that you can customize to build HTML emails, About pages, blogs, e-commerce pages, newsletters, and portfolios. And because Dreamweaver is part of Creative Cloud, you can quickly bring in assets from your Libraries and Adobe Stock to enhance your sites. Dynamic display on every device. Build responsive websites that adapt to fit any screen size. Preview your sites and edits in real time to make sure your pages look and work the way you want before you publish. [Hidden Content] [hide][Hidden Content]]
      18. Hide My WP is the number one security plugin for WordPress. It hides your WordPress from attackers, spammers and theme detectors. Over 26,000 satisfied customers use Hide My WP. It also hides your wp login URL and renames admin URL. It detects and blocks XSS, SQL Injection type of security attacks on your WordPress website. [Hidden Content] [hide][Hidden Content]]
      19. Support Board is a WordPress plugin that helps you automate your customers’ communication with artificial intelligence-driven bots and a chat system integrated with the most-used platforms. Save time and use the software you already know and love. Communicate with your customers directly in Slack. Connect Dialogflow and use rich messages on the fly. [Hidden Content] [hide][Hidden Content]]
      20. What you'll learn Basic Programming Concepts Learn with 20 quizzes Practice along with 37 coding exercises Test your knowledge with 2 practice tests and assignments Decision Control in Python Creating Loops in Python Creating Functions in Python Object Oriented Programming with Python Creating Classes in Python Error Handling in Python Python GUI or Graphical User Interface Applications Advanced Python Programming Data Science with Python Data Importing, Processing, Cleansing and Analytics with NumPy and Pandas Data Visualization with Matplotlib 5 Data Science Applications with Python Course content 26 sections • 132 lectures • 12h 8m total length Requirements Curiosity & Enthusiasm Description Welcome to the Full Python Programming Course For Beginners! By the end of this course you'll be to do any sort of Advanced Level Python Programming and the same applies even if you are a complete beginner. This course is designed for beginners to become Advanced level Programmers step by step. This course is divided into three sections on the basis of levels : Beginner Level, Intermediate Level and Advanced Level In the Beginner Level we will cover all the basic programming concepts of Python Programming so that you know what is where for which reason and also understand : What is Programming? How to Program? What is Syntax? Python Programming Python Data Types In the Intermediate Level we will get more into the details and learn concepts like : Decision Control in Python Creating loops in Python What are Iterables and Iterations How to iterate over data types in Python How to create functions in Python Object Oriented Programming with Python Creating Classes and initializing objects in Python Inheriting Classes in Python How to Handle Errors in Python Modules & Packages in Python By the end of this section, you've already mastered Python Programming and jump into any Advanced Level Programming, that's why In the Advanced Level we will learn about data science with Python and you'll be able to perform : Importing Data Data Cleansing Data Processing Data Analysis Data Visualization And at the end you'll perform 5 Data Science Projects to start working with Data anywhere. I will ensure EVERYBODY taking this course will be able to perform any Advanced Level programming not Immediately but DEFINITELY Who this course is for: Python People curious about Python Programming Beginner at Programming Beginner Python Developers Beginner Python Developers Curious about Data Science Beginner Python Developers Curious about Data Analysis Beginner Python Developers Curious about Data Visualization [Hidden Content] [hide][Hidden Content]]
      21. Main function of Smadav : 1) Additional Protection for your PC, mostly compatible with another antivirus products! Almost all other antivirus cannot be installed with another antivirus, it's because the antivirus designed for main protection in your PC. It's not the case for Smadav, Smadav is an antivirus that is designed as additional (second layer) protection, so it's mostly compatible and could be installed and run together with another antivirus in your PC. Smadav using their own technique (behavior, heuristic, and whitelisting) to detect and clean virus that improves security in your PC. 2) Protection for USB Flashdisk USB Flashdisk is one of the most used media for virus spread. Smadav use its own technology to avoid virus spread and infection from USB Flashdisk. Smadav can detect many new unknown virus in USB even if the virus is not in the database. Not only for protection, Smadav can also help you to clean USB Flashdisk from virus and restore hidden/infected file in the USB Flashdisk. 3) Low resource Antivirus Smadav has advantage with its very small installer size (under 10 MB) and low usage of internet while active in your PC. And also smadav only using small fraction of your PC resources. Smadav most of the time only use small memory and small CPU usage. With this small resource usage, Smadav will not heavily slow your computer. And you can still install another antivirus that will together work with Smadav to protect your PC. 4) Cleaner and tools to clean virus Smadav can clean some virus that already infected your PC and also fix the registry change made by the virus. Many tools included in Smadav Pro to fight for virus cleaning. The tools are : One-Virus By-User, to manually add your suspect file for virus cleaning in the PC. Process Manager, to manage processes and programs run in your PC. System editor, to change some system options that usually changed by virus. Win-Force, to force open some system management programs in Windows. Smad-Lock, to immunize your drive from some virus infection. Smadav 2021 Rev. 14.6 : + New theme for Smadav 2021, + New detection database of 7051 new viruses, + Smadav-AI update (Artificial Intelligence, version 9.82M) to detect most new viruses and reduce false/incorrect detection, + Smadav-AI is more active in detecting suspicious programs, + New feature to select AI detection level when scanning, + Changes to name of virus detected by AI, + Changes to some of the settings. [Hidden Content] [hide][Hidden Content]]
      22. itsMe

        TikTok Downloader 3.2.0

        TikTok Downloader is a product of Social Media Apps. Social Media Apps is a professional multimedia and internet software development team. It was formed by a group of designers, developers, researchers, and social media aficionados. We are dedicated to creating apps for unprofessional users that make video and audio processing and internet operatin Download videos from TikTok. Increase download speeds by up to 500%. Download multiple videos at the same time. Pause and resume downloads at any time. [Hidden Content] [hide][Hidden Content]]
      1. Load more activity