Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Past hour
      2. Today
      3. dEEpEst

        Hacking Library

        APT,‬ ‪Cyber warfare,‬ ‪Penetration testing,‬ ‪Zero-day,Exploiting,‬Fuzzing,Privilege-Escalation,browser-security‪,Spyware,Malwres evade anti-virus detection,‬ ‪Rookit CYPTER,‬ ‪Antiviruses Bypassing-av,‬ social engineering,WORMS,Sandbox-Escape,‬ ‪Memory-injection,‬ ‪Ethical,Gray,White,RedTeam,Bugbounty,bug hunter,Cheat Sheet‬... Cheat Sheet‬ A study on Advanced Persistent Threats.pdf AV-Sandbox-Presentation_v2.0.pdf AV_Evasion.pdf Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf Advanced Penetration Testing for Highly Secured Environments.pdf Advanced Persistent Threat Hacking, The Art & Science...pdf Advanced Polymorphic Techniques.pdf An Automated Online Packing Service for Optimal Antivirus Evasion.pdf An Automated Online Packing Service.pdf Antivirus , Firewall evasion techiniques.pdf Antivirus Evasion with.pdf Breaking the Sandbox.pdf BypassAVDynamics.pdf Bypassing Anti-.pdf CHAPTER 9 Strategies of Computer Worms.pdf Computer Virus Strategies and Detection.pdf CybraryAdvancedPenSlides.pdf DEFCON-20-King-Reflective-Injection-Detection.pdf Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf Detect_Malware_w_Memory_Forensics.pdf ETHICAL HACKING AND PENETRATION.pdf EVOLUTION419.pdf Evading Antivirus Metasploit Webcast.pdf Fighting_Advanced_Threats.pdf FireEye_AdvMalwareExposed.pdf HACKING-17 Most Dangerous Hacking Attacks Volume 4 by ALEX WAGNER.pdf Add files via upload 4 months ago HS-P005_ReflectiveDllInjection.pdf How did I get into the hacker world.rar Add files via upload 2 months ago Hyperion_ Implementation of a PE-Crypter.pdf Introduction to Logical Privilege Escalation on Windows-D2T3 - James Forshaw .pdf La complessità del malware.pdf MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf MalWareBytes_sSecurity_IO.pdf Malware Analyst's Cookbook and DVD.pdf Malware Obfuscation with Threat Emulation.pdf Malware1.pdf Malware_Magazine_1.pdf McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf Mobile Malware Attacks And Defense.pdf Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf NOT OLD ENOUGH TO BE.pdf No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf Outsmarted – Why Malware Works in face.pdf Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf Patterns of a Cooperative Malware Analysis Workflow.pdf Piano Thieving for Experts - SABSA 2014 - v1.5.ppt Practical Anti-virus Evasion - avevasion_pentestmag.pdf README.md Update README.md 2 months ago ROPInjector Using Return Oriented Programming for.pdf ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf Rowhammer.js A Remote Software-Induced Fault.pdf Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf ScyllaHide.pdf Serial Variant Evasion Tactics.pdf Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf Spyware_Adware.pdf Stopping Zero-day Exploits for DUMMIES.PDF Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf Testing antivirus engines to determine theireffectiveness as a security layer.pdf The Art Of Human Hacking.pdf Add files via upload 4 months ago The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf The Threat of Evasive Malware.pdf The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm UNPROTECTING THE CRYPTER.pdf Utilisation de Stub En VB.NET.pdf Why Antivirus.pdf Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf advance-penetration-testing-kali-linux-training.pdf asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit.pdf avevasion-techniques.pdf awesome phishing.md Add files via upload 4 months ago b-advanced_persistent_threats_WP_21215957.en-us.pdf botnets-detection-measurement-disinfection-defence.pdf browser-security-whitepaper.pdf darkhotel_kl_07.11.pdf darkhotelappendixindicators_kl.pdf esg-apts-deep-discovery-whitepaper-en.pdf fatkit_dll_rc3.pdf fighter-pos-whitepaper-en.pdf fuzzing_four.rar how i learned to stop fuzzing and find more bugs.pdf jxia-JCS-wormdetection.pdf lumension_reflective-memory-injection.pdf rp-nss-labs-corporate-exploit-evasion-defenses.pdf security-guide-how-to-evade-anti-virus-detection.pdf whoamipriv-show me your privileges and I will lead you to SYSTEM.pdf [HIDE][Hidden Content]]
      4. Insanity-Framework THIS PROJECT ARE CLOSED NOW - FEEL FREE TO CONTINUE IT Copyright 2017 Insanity Framework (IF) 2.0 END Written by: * Alisson Moretto - 4w4k3 Special Thanks to Thomas Perkins - Ekultek Insanity Payload consists of encrypting your code and decrypting it in memory, thus avoiding a possible av signature, also has the ability to wait long enough to bypass a running sandbox. **NOTE: Insanity payloads may experience a 1 minute delay while connecting, this is necessary in order to bypass most avs and sandboxes. ** Twitter: @4w4k3Official DISCLAIMER: "DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." Taken from LICENSE. INSTALLATION OF DEPENDENT LIBRARIES cd Insanity-Framework chmod +x install.sh ./install.sh That's it Features Bypass most AV and Sandboxes. Remote Control. Payload Generation. Some Phishing methods are included on payloads generated. Detect Virtual Machines. Multiple Session disabled. Persistence and others features can be enabled. Bypass UAC. Memory Injection. Needed dependencies apt wine wget Linux sudo access python2.7 python 2.7 on Wine Machine pywin32 on Wine Machine VCForPython27 on Wine Machine Tested on: Kali Linux - SANA Kali Linux - ROLLING Ubuntu 14.04-16.04 LTS Debian 8.5 Linux Mint 18.1 Black Arch Linux Cloning: git clone [Hidden Content] Running: sudo python insanity.py If you have another version of Python: sudo python2.7 insanity.py Screenshot: More in Screens Contribute: Send me more features if you want it 😄 I need your help for Insanity to become better! Things needed to be improved and future updates: File Transfer (FTP) Webcam Snaps and Streaming Keylogging Print Screens Download: [HIDE][Hidden Content]]
      5. Yesterday
      6. dEEpEst

        Loki [Remote Access Tool]

        Loki Loki is Remote Access Tool. Loki uses RSA-2048 with AES-256 to keep your communication secure. Warning: DO NOT upload any samples generated by this program to online scanners. Requirements Python 3.6.x Server tested on Windows 10 Kali Linux Bot tested on Windows 10 Kali Linux Features Upload & Download Chrome Launching Persistence Screenshot Keylogger Ddos SFTP SSH Video [HIDE][Hidden Content]] Installation pip install -r requirements.txt Server side open /lib/const.py & configure your private and public IP's start loki.py navigate to [Hidden Content] login, Username: loki Password: ikol navigate to settings, selected server tab and start the server on the same IP as your private IP Click the home button Generate a payload Navigate to the builder directory Run: python builder.py -h After connection You can click the hostname of the bot once it connects Explore FYI The bot will call the server using the Public IP, not the private IP The bot will call the server using the port specified on the server tab Download: [HIDE][Hidden Content]]
      7. dEEpEst

        Carbanak Source with Plugins

        Updated-Carbanak-Source-with-Plugins [Hidden Content] -Run in a VM, don't be derp- If you're curious as to why, I think like 1 or 2 file hashes are slightly different, it's because I translated a couple RU sentences into EN. Other than that this is untouched from original beta.virusbay.io files. Oh and if FLARE crew are hiring smart-ass millenials with barely any talent, no skill and zero previous experience... hit me up. ^^ shout-out to ThreatHunters Download: [HIDE][Hidden Content]]
      8. This bug report describes a bug in systemd that allows a service with DynamicUser in collaboration with another service or user to create a setuid binary that can be used to access its UID beyond the lifetime of the service. This bug probably has relatively low severity, given that there are not many services yet that use DynamicUser, and the requirement of collaboration with another process limits the circumstances in which it would be useful to an attacker further; but in a system that makes heavy use of DynamicUser, it would probably have impact. View the full article
      9. EscobarMoney

        CapBreaker 1.2.0 - Stable version

        I was looking for good unhash tool, let's try!
      10. Recover Deleted photo is an application that has a very high search on google play because most people lose photos and want to recover them. This application is for illiterate users, those who delete an image in the gallery and do not know how to search in the hidden directory, then the image can be in a directory (whatsapp folder for example) so this application can help these users to recover their images. Demo: [Hidden Content] [Hidden Content]
      11. Lavavo CD Ripper version 4.20 license activation name SEH buffer overflow exploit. View the full article
      12. [Hidden Content]
      13. itsMe?

        GREAT E-BOOK FOR PYTHON LEARNERS

        [HIDE][Hidden Content]]
      14. itsMe?

        FIND ADMIN PAGE

        [Hidden Content]
      15. Sales page: [Hidden Content] Download: [HIDE][Hidden Content]]
      16. osTicket version 1.11 suffers from cross site scripting and local file inclusion vulnerabilities. View the full article
      17. [HIDE][Hidden Content]]
      18. [HIDE][Hidden Content]]
      19. Email/User: Email Proxies: Yes (Good proxies) Capture: Captures balance & points Recommended Bots: 50/100 [HIDE][Hidden Content]]
      20. Email/User: Email Proxies: Yes Capture: Captures points & level Recommended Bots: 50/100 [HIDE][Hidden Content]]
      21. [Hidden Content]
      22. [Hidden Content]
      23. Fatz GC Checker 1.0 by Yuri - Blazing Fast / 200 CPM - Capture / Balance - Clean UI / Easy to use Powered by Yuri [HIDE][Hidden Content]] Good Pattern to Use 1144000!!!! Generator : [HIDE][Hidden Content]]
      24. JioFi 4G M2S version 1.0.2 suffers from a denial of service vulnerability. View the full article
      25. JioFi 4G M2S version 1.0.2 suffers from cross site scripting and html injection vulnerabilities. View the full article
      26. VyprVPN Checker 1.0 by Yuri - Fast / 4K CPM - Capture / Plan - 100% Accurate / Doesn't miss - Clean UI / Easy to use [HIDE][Hidden Content]]
      27. Backup Key Recovery version 2.2.4 denial of service proof of concept exploit. View the full article
      28. HeidiSQL Portable version 10.1.0.5464 denial of service proof of concept exploit. View the full article
      1. Load more activity