Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Yesterday
      2. This Metasploit module exploits a directory traversal in F5's BIG-IP Traffic Management User Interface (TMUI) to upload a shell script and execute it as the root user. View the full article
      3. itsMe

        ConfuserEx Unpacker Dynamic

        ConfuserEx Unpacker Dynamic Edited copy of cawks confuserex unpacker, this one supports trinity and netguard 4.5 ConfuserEx Unpacker 2 (Supports Trinity & Netguard 4.5) STILL UNDER BETA This is my own "mod" of this unpacker, ive added constant support for 2 parameter decryption support (Netguard 4.5, Ben Mhenni 4.5), and i added support for 3 parameters with string (Trinity). Added support for the packer in trinity and also added many different mutation removers that will come in handy for custom mods. You can easily clean programs piece by piece or however you want by editing the program.cs. //////////////////////////////////////////////////////////// A new and updated version of my last unpacker for confuserex which people actually seem to use so i thought i would update it and actually make it better as that version is very poor this is currently in beta and in its first version will only support confuserex with no modifications or additional options from confuserex itself. this will change as i add more features this will heavily be based off my instruction emulator which makes it much more reliable as long as theres no hidden surprises from modified confuserex i have not used sub modules due to making changes within de4dot.blocks in Int32/64Value i have modified the Shr_Un methods and such to fix a bug (well not really a bug but it prevents some operations from giving correct result) if you have an issue with this unpacker please make an issue report but if you simply go 'does not work on this file please fix' i simply will just close your issue please make a detailed report and explain where it crashes [hide][Hidden Content]]
      4. itsMe

        efiXplorer v1.0 [REcon Edition]

        efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: everytime we focus on last versions of IDA and Decompiler because trying to use most recent features from new SDK releases. That means we tested only on recent versions of Hex-Rays products and do not guarantee stable work on previous generations. Why not IDApython: all code developed in C++ because it's a more stable and performant way to support a complex plugin and get full power of most recent SDK's features. Supported Platforms: Win, Linux and OSX (x86/x64). efiXplorer v1.0 [REcon Edition] Make your UEFI RE life easier with efiXplorer identify Boot/Runtime Services identify EFI Protocols recognize known EFI GUID's [hide][Hidden Content]]
      5. Various CDATA OLTs suffer from backdoor access with telnet, credential leaks, shell escape with root privileges, denial of service, and weak encryption algorithm vulnerabilities. View the full article
      6. Online Shopping Portal version 3.1 suffers from a remote SQL injection vulnerability. View the full article
      7. Sony PS4 versions prior to 7.02 and FreeBSD versions 9 and 12 ip6_setpktopt kernel local privilege escalation proof of concept exploit. View the full article
      8. This exploit demonstrates the remote code execution vulnerability in the Traffic Management User Interface (TMUI) in BIG-IP versions 15.0.0 through, 14.1.0 through, 13.1.0 through, 12.1.0 through, and 11.6.1 through View the full article
      9. BIG-IP versions 15.0.0 through, 14.1.0 through, 13.1.0 through, 12.1.0 through, and 11.6.1 through suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities. View the full article
      10. Sickbeard version 0.1 suffers from a remote command injection vulnerability. View the full article
      11. IObit Malware Fighter 8 PRO La protección completa en tiempo real de tu PC, para tus datos personales y navegación en línea Estas son algunas de las características destacadas que solo podrás obtener con IObit Malware Fighter PRO: El motor Anti-virus de Bitdefender Evita que más de 200 millones de amenazas de seguridad infecten y dañen tu computadora. Protección Inteligente Utiliza detección avanzada del comportamiento e inteligencia artificial para detectar actividades maliciosas de cualquier programa para prevenir que los ciber-criminales obtengan control de tu ordenador. Defensa de Ransomware Reforzada Combina el motor exclusive anti-ransomware de IObit con la protección por contraseña de la Caja Fuerte para garantizar que todos tus archivos importantes estén seguros de ataques y accesos no autorizados. [Hidden Content] [hide][Hidden Content]]
      12. itsMe

        Onekey Decompile Apk v2.4.0

        How to use Drag your apk on _onekey-decompile-apk.bat Wait for invoking jd-gui, "File"-"Save All Sources" Folder and apk with the same name is what you needed You can replace your own framework-res.apk to get better experience of decompilation. framework-res.apk is in your phone sys\framework\framework-res.apk v2.4.0 20200612 upgrade all tools 2.4.0 Add files via upload [hide][Hidden Content]]
      13. itsMe

        Bin Multifunctional

        [Hidden Content]
      14. james bond

        x10 Nordvpn

        [Hidden Content]
      15. itsMe

        hidemy.name [Proxies] Premium Keys

        [Hidden Content]
      16. itsMe

        WPNotif v2.0.1.8 NULLED

        WPNotif v2.0.1.8 NULLED - WordPress SMS & WhatsApp Notifications [Hidden Content] [hide][Hidden Content]]
      17. WP Content Copy Protection (Pro) Protect your content from being selected and copied.‎ No one can right-click on images from your site if you don’t want them to. (*NEW) Get full control over Right-Click or context menus. Show alert messages, when the user right-clicks on images, text boxes, links, plain text,… etc. Disable the keys CTRL+A, CTRL+C, CTRL+X, CTRL+S or CTRL+V, or CTRL+U. (*NEW) Watermark your images on the fly by access and jquery. Admin can exclude Home page or Single posts from being copy protected. Admin can disable copy protection for admin users. (If the admin is there you don’t need to protect it.) Aggressive image protection (It’s not easy or it’s impossible for expert users to steal your images !). Compatible with all major theme frameworks. Compatible with all major browsers. You can also choose where this Plugin should work like All Pages (including Home Page and all other Pages and Posts), Home Page, or Custom Pages/Posts using the Settings Page options. Multiple Text and Image Protection layers. Enable Right Click on hyperlinks or any type of elements added. New flat interface. [Hidden Content] [hide][Hidden Content]]
      18. [hide][Hidden Content]]
      19. itsMe


        sitedorks: Search Google/Bing/DuckDuckGo/Yandex/Yahoo for a search term with different websites Search Google, Bing, Yahoo, or Yandex for a search term with different websites. A default list is already provided, which contains Github, Gitlab, Surveymonkey, Trello, etc. Currently, a default list of 205 dorkable websites is available. Why sitedorks? Why wouldn’t you just enter dorks for several websites manually? Because: It’s really easy to query different search engines. Dorks can be executed per 1 or more categories. It’s easy to create different input files for different uses. Adding new websites to your search query can be arranged by just adding them to an input file. It already has a lot of dorkable websites included. The list with dorkable websites is updated regularly. Some search engines ignore too many keywords/characters in a query and with an argument -count it’s easy to split your dork into more queries. [hide][Hidden Content]]
      20. itsMe


        Use wwwordlist to generate a wordlist from words based on HTML (extracted with BS4), URLs, JS/HTTP/input variables, quoted texts found in the supplied text and mail files. About wwwordlist wwwordlist takes input from stdin and extracts words based on HTML (extracted with BS4), URLs, JS/HTTP/input variables, quoted texts found in the supplied text and mail files. Why use wwwordlist? Because Stök says you should use good wordlists, based on the content of the target. This is my attempt on creating a tool that supports this. [hide][Hidden Content]]
      21. Last week
      22. This Metasploit module exploits multiple vulnerabilities in openSIS 7.4 and prior versions which could be abused by unauthenticated attackers to execute arbitrary PHP code with the permissions of the webserver. The exploit chain abuses an incorrect access control issue which allows access to scripts which should require the user to be authenticated, and a local file inclusion to reach a SQL injection vulnerability which results in execution of arbitrary PHP code due to an unsafe use of the eval() function. View the full article
      23. RSA IG+L Aveksa version 7.1.1 suffers from a remote code execution vulnerability due to an authorization bypass issue. View the full article
      24. rauLink Software Domotica Web version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. View the full article
      25. Fire Web Server version 0.1 remote denial of service proof of concept exploit. View the full article
      26. Nagios XI version 5.6.12 remote code execution exploit that leverages export-rrd.php. View the full article
      27. Microsoft Windows mshta.exe allows processing of XML external entities which can result in local data-theft and or program reconnaissance upon opening specially crafted HTA files. View the full article
      1. Load more activity