Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.


      Popular Content

      Showing content with the highest reputation since 08/21/2019 in all areas

      1. 16 points
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      2. 16 points
        Scan Result: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message
      3. 13 points
      4. 13 points
        Builder Panel A lightweight bot but with a lot of functionalities. Supports all Windows, starting with XP (Server 2003). Full Unicode support. Net build size: 75-80kb. The build comes in two variations: exe and dll (separate stream). Sales: [Hidden Content] [Hidden Content]
      5. 12 points
        [Hidden Content] Fixed some bugs! [Hidden Content] New Users: • NET Framework 4.5 The software is compatible with the following Windows Mycrsoft Systems • Windows 10 • Windows 8 • Windows 7 • Windows Xp HP compatible with Android systems • 9.0-bay / Pie • 8.0-Oreo / Oreo • 7.0-Nuja / nougat • 6.0-marshmallows / marshmallow • 5.0 - Loli pop / Lollipop Features • Hide Notifications (doze) • Connect apps, videos, pictures ... • Advanced Link • Change the name of the package • Do not need Java in the process of building the Bach • Monitoring of the victim's activity And other features ... Improvements • Fixed a sudden problem • The microphone has been incorrectly repaired • Repaired Misreach • Improved program connection speed • Improved program interfaces • Improved positioning accuracy And other improvements ...
      6. 12 points
        Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
      7. 12 points
        Crypter was on my forum under hidden content, it's time to send him to the ball Crypter only works with Revenge RAT Once installed, you can find it in: "C:"RevCrypt" Important: In the Revenge Builder remove all checkboxes, including Auto StartUP This is to ensure that the antivirus does not detect the file by HIPS Options: USG: Unique Stub Generation StartUP: Adding a file to startup Icon: Install file icon Clone: Clone another file EOF: End OF File Save Source: Saves Crypt Source IP Logger: For those who buy the installs Output extensions: ".exe", ".src", ".com", ".cmd", ".vbs", ".wsf" File compression: PECompact, MPRESS, UPX Scantime Scan: Video: [Hidden Content] [Hidden Content] [HIDE]Download: [Hidden Content]]
      8. 12 points
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      9. 12 points
        This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 2.4.2 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] [Hidden Content]/hackers/topic/44370-ares-rat-v100 [Hidden Content]/hackers/topic/44869-ares-rat-v121 [Hidden Content]/hackers/topic/46961-ares-rat-v200 [Hidden Content]/hackers/topic/47882-ares-rat-v242 In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] [Hidden Content] [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts [Hidden Content]/hackers/clients/donations/ In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- UPDATE VERSION --- ARES RAT v2.4.2 --- WHAT'S NEW IN THIS VERSION --- RDP Native Fixed minor problems in client //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v2.0.0 --- WHAT'S NEW IN THIS VERSION --- Proxy Reverse Checked Proxy It was repaired sight flags by countries Was added "sqlite3" missing library Was added two styles darks //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v1.2.1 --- WHAT'S NEW IN THIS VERSION --- Was added missing style library Changed target platform in ATENEA.exe (server) for NET. Framework 2.0 It was repaired active firewall tester //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      10. 10 points
        Don`t leech my priv8 config for level23hacktools just put random wordlist to OP CAPTURE + AUTO GENERATE + CHECKER [HIDE][Hidden Content]]
      11. 10 points
        Zyklon HTTP Botnet Zyklon HTTP is a botnet that is currently being sold on the Darknet (see Figure 1), HackForums and available on a number of member only communities. This botnet supports Tor for anonymization and comes loaded with a number of additional features. It allows its users to execute various types of DDoS attacks, data theft and fraud. It also features secure operation mechanisms to detect other malware and assure its availability. Zyklon HTTP Botnet targets PCs and spreads itself via a number of different methods including phishing attacks. Figure 1: Zyklon H.T.T.P for sale on the darknet Attack Methods Distributed Denial of Service HTTP Flood The Zyklon HTTP botnet consists of seemingly legitimate session-based sets of HTTP GET or POST requests that are designed to consume a significant amount of server's resources, and can result in a denial-of-service condition - without necessarily requiring a high rate of network traffic. TCP flood Sending numerous SYN packets to the victim. In many cases, attackers will spoof the SRC IP so the reply (SYN+ACK packet) will not return, thus overwhelming the session/connection tables of the targeted server or firewall. Servers need to open a state for each SYN packet that arrives and store this state in tables that have limited size and are easily filled. Once this happens, the server drop new requests, including legitimate ones. UDP Flood The Zyklon HTTP botnet attacker sends large UDP packets to a single destination or to random ports. Since the UDP protocol is “connectionless” and does not have any type of handshake mechanism, the main intention of a UDP flood is to saturate the Internet pipe. Usually, the attackers spoof the SRC IP. SYN Flood Overwhelming a target machine by sending thousands of connection requests to it using spoofed IP addresses. The target machine attempts to open a connection for each malicious request and subsequently wait for an ACK packet that never arrives. Since a SYN-ACK packet never arrives, the massive number of half-open connections quickly fills up the server’s TCB table before it can time any connections out. SlowLoris By sending HTTP headers in tiny chunks as slow as possible (just before the server would time out the request), the target server is forced to continue to wait for the headers to arrive. If enough connections are opened to the server in this fashion, it is unable to handle legitimate requests. Malware Contamination Cloud-based malware inspection Zyklon HTTP botnet will enumerate all startup files and upload them to the VirusTotal online malware scanner. This will lead to analyzing of samples of malicious software that resides on the system. If the file is found to be malicious, Zyklon HTTP botnet will terminate all processes associated with that file and remove the file along with the registry keys from the system. This is a great option for perpetrators to ensure that their enslaved client systems are running without disruption. The botnet user can specify files to exclude from VirusTotal, and by calculating the MD5 hash of the file Zyklon HTTP botnet will skip it while scanning. Botkiller While the Cloud-based malware inspection relies on VirusTotal, Botkiller uses its own algorithm to determine if a file is malicious or not. This method tends to have more false-positive detections. When using this feature, Zyklon HTTP botnet will scan all processes and will check common locations that malwares reside in. It will attempt to detect injected processes and it will try to identify malware by behavioral analysis. If a file is detected as malicious the program will follow the settings specified in the botkiller feature, leading to the process termination and deletion of all associated files and registry keys. Like the Cloud-based malware inspection, this feature is keeps an enslaved client machine secure and available. Keylogger Keylogger is a great feature when it comes to client surveillance. It will record all keystrokes and log them to a database. The logs are sorted by dates and can be accessed from almost anywhere in the C&C panel. The control panel also lets one specify the window titles to record keystrokes for, as opposed to bloated logs with all kind of entries. Keylogger supports most if not all languages and keyboard layouts. The user can specify the maximum amount of characters that will client hold in a buffer before they are sent to the panel, or set an interval at which the logs are being uploaded to the panel. Automatic updater Zyklon HTTP botnet features automatic update function that ensures that all enslaved clients are running up to date software. When executed, it compares the update file hash and installed file hash and if found different – an updated file will be downloaded and installed. This comes very handy when controlling many clients. Figure 2: Zyklon HTTP Panel Data Theft Browser password recovery Zyklon botnet is able to recover passwords from popular web browsers. Most noticeable ones are Google Chrome, Mozilla Firefox, Internet Explorer, Opera Browser, Chrome Canary/SXS, CoolNovo Browser, Apple Safari, Flock Browser, SeaMonkey Browser, SRWare Iron Browser and Comodo Dragon Browser. FTP password recovery Currently supports FTP password recovery from following FTP applications: FileZilla, SmartFTP, FlashFXP, FTPCommander, Dreamweaver, WS_FTP Gaming software key recovery Currently supports around 50 PC gaming software’s including Battlefield, Call of Duty, FIFA, NFS, Age of Empires, Quake, The Sims, Half-Life, IGI, Star Wars and many more. License key recovery Automatically detects and decrypts the license/serial keys of over 200+ popular software’s including Office, SQL Server, Adobe, Nero and many more. Socket Secure 5 proxy Turn your bots into proxy servers - The Zyklon HTTP botnet automatically checks and updates a list of active proxy servers, and features reverse socket secure proxy servers, facilitating the creation of a proxy server on any client. Email password recovery Currently it can recover your lost email passwords from following applications: Microsoft Outlook Express, Microsoft Outlook 2002/XP/2003/2007/2010/2013, Mozilla Thunderbird, Windows Live Mail 2012, IncrediMail, Foxmail v6.x - v7.x, Windows Live Messenger, MSN Messenger, Google Talk, GMail Notifier, PaltalkScene IM, Pidgin (Formerly Gaim) Messenger, Miranda Messenger, Windows Credential Manager. Encrypted communication Connection between client and server is encrypted using RSA asymmetric encryption algorithm (Valid key sizes are 512-bit, 1024-bit, 2048-bit, 4096-bit) that is paired with AES-256. AES-256 keys are dynamically generated on the client and are encrypted before being stored in a session variable in the panel. After the initial key exchange, the whole communication is encrypted with AES-256. Figure 3: Zyklon Builder * In its previous version, Zyklon was able to perform crypto mining services but this feature has been removed in the latest update. It is likely to return more mature and sophisticated in a future version, as it used to turn the infected computers into Bitcoin miners for profit – a very popular competence. How to install Zyklon H.T.T.P BotNet on your server [Hidden Content] Download: [HIDE][Hidden Content]]
      12. 9 points
      13. 8 points
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      14. 8 points
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      15. 8 points
        Version 6.4 FEATURES [Hide][Hidden Content]] Password: level23hacktools.com
      16. 8 points
        Email / EMAIL : PASSE Proxies : Oui, HQ , Proxies Free Capture : ABONNEMENT Recommended Bots: 50-100 [HIDE][Hidden Content]]
      17. 7 points
        BlackNET A Free MultiOS PHP Interface Botnet with VB.NET and Python based Stub and VB.NET Builder About BlackNET BlackNET is a simple botnet with PHP Panel and VB.NET or Python Output for MultiOS Hacking Created By : DarkSoftwareCo What You Can Do On Windows Upload File DDOS Attack [ TCP,UDP,ARME,Slowloris ] Open Webpage Show MessageBox Uninstall Client Close Client On Linux Print Simple Message for Client Open Webpage Upload File Simple DDOS Attack Uninstall Client Close Client Python Stub You Can use it to hack any Linux system with python on it How to Install PHP Panel Download BlackNET - PHP Panel.zip Upload The ZIP File to your Server Extract it Go to PHPMyAdmin Create a database with any name you want Change the data in classes/database.php Change files and folders permission to 777 [connection.php,sendcommand.php,receive.php,Clients Folder] Go to install.php to create the botnet tables automatically Enter you network and enjoy hacking What's New v0.5 - Stable Connection - Cleaner Code - Secure Database Connection - Admin Settings - Better and Secure Login System - Salted MD5 Hashing - Rewrite Project in OOP with PDO Connection - Bug Fixed - SQL Injection Fixed YouTube - How To Install & Download File [Hidden Content]
      18. 7 points
        Download: [HIDE][Hidden Content]] Password: level23hacktools.com
      19. 7 points
        SpyMAX-2.0_Update.rar (102M) [Hidden Content] Updated version for compatibility with 32bit, 64bit • All the problems of pylod have been repaired • All the problems mentioned in this topic have been fixed
      20. 6 points
        [HIDE][Hidden Content]]
      21. 6 points
        Bot : 100 Proxy : Yes Combo : EMAIL/PASS * USER/PASS Capture : POINTS + PREMIUM [HIDE][Hidden Content]]
      22. 6 points
      23. 6 points
        How to Make Private Mail Access Combo from SQLi 100% Private+Valid[NEW METHOD 2019] [Hidden Content]
      24. 6 points
        Software Name: Black Worm Version: 6.0 [ Black Ninja ] Software Job: Create a spreading worm with a GUI to control it dotNET Framework: 4.0 Server, 2.0 Client Source code author before developing: njQ8 [ jnRat ] Developer: Black.Hacker Credits: in the About Form What's New? 1. Full Data Transfer Encryption using Base64 2. Modified Icon Manager 3. Modified Plugin Manager 4. Modified Admin Checker 5. Modified Plugin Invoking 6. Modified Custom Plugin Invoking 7. DynuDNS Updater 8. NO-IP Automatic Updater 9. New About Page 10. Stable WatchDog to look after your client 11. Add to SchTask 12. Hard Install [ Stealth Mode ] 13. FileZilla Stealer 14. Clean Password Stealer [ Fixes ] 15. CPU,FireWall,Client Privileges,MUTEX Information 16. File Binder 17. Added More than 100 New Custom Icons 18. Modified Desktop Infection 19. New Port Settings 20. New MUTEX Format (bWorm[xxxxxx-12345]) 21. Listview Style 22. Remove Empty Subs and Functions 23. Process Manager With Custom Colors 24. Command Shell 25. Remote Powershell 26. Remote Desktop 27. Keylogger Manager 28. RSA Encryption With 4096bit Encryption Key for the Host and Port 29. Stable File Manager With a Downloading Large Files and Arabic Names Support 30. Critical Process 31. Updating Password Plugin 32. Added Product Serial Stealer 33. Service Manager with Full-Service Controller 34. Startup Manager 35. Victim Notification with XtremeRAT Sound 36. Simple IP Tracker 37. Infect ZIP & RAR Files [ PoC ] [ UnTested ] 38. Clients Groups [ Single and Multi-Manager ] 39. Upgrade Software DotNET Framework From 2.0 to 4.0 34. Small GUI Changes 41. Small Fixes to the Socket to be more stable 42. Multi Transfer 43. Bug Fixes To download any large files from the Target Device you need to Foreword The Port 6060 BlackWorm v6.0 Black Ninja + Source Code [Hidden Content] Server.exe
      25. 6 points
        All you need is VS . 1. You open the project file 2. Then you go to "Program.cs" 3. After that you replace "[Hidden Content]" with your direct download link. 4. You compile everything 5. Finished [Hidden Content] Password: level23hacktools.com