Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.


      Popular Content

      Showing most liked content on 01/20/2021 in all areas

      1. 1 like
        NCH Voxal Voice Changer Plus – with this program you can easily modify, change and disguise your voice in any application or game that uses a microphone to add another dimension of creativity. From ‘Girl’ to ‘Alien’, the voice changing options are limitless. Features • Effects can be applied to existing files • Apply effects in real time using a microphone or other audio input device • Load and save effect chains for voice modification • Vocal effect library includes robot, girl, boy, alien, atmospheric, echo and many more • Create unlimited, custom voice effects • Works with all existing applications and games • Create voices for characters in audiobooks • Output the changed audio to speakers to hear the effects live • Low CPU usage will not interfere with other running applications • Simple and intuitive interface • Use a female or male voice in online games Version 6.00 Windows Release Maintenance release Uploaded 2021-01-04 [Hidden Content] [hide][Hidden Content]]
      2. 1 like
        WP-Hide Explained The convenient way to hide your WordPress from being visible through the code. A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code. Provide a clean method for removing any WordPress fingerprints including themes and plugins. No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved. WP HIDE PRO now available! The plugin not only allow to change default urls of you WordPress, but it hide/block defaults! All other similar plugins just change the slugs, but the defaults are still accessible, obviously revealing the WordPress. [Hidden Content] [hide][Hidden Content]]
      3. 1 like
        KMS Bandit Full – The program to activate Windows licenses: 10, 8.1, 8 and activation of Office licenses: 2013, 2016, 2019. the KMS Bandit of Full is a program for activating the licenses for Windows: 10, 8, 8.1 and Office: 2010 2013 2016, 2019. Features • Easy to Use program • Activate any version of Windows & Office • Multiligual What’s New * accelerated the activation process [hide][Hidden Content]]
      4. 1 like
      5. 1 like
        OnlyFans DataScraper (Python 3.9.X) #path_formatting: {site_name} = The site you're scraping. {post_id} = The posts' ID. {media_id} = The media's ID. {username} = The account's username. {api_type} = Posts, Messages, etc. {media_type} = Images, Videos, etc. {filename} = The media's filename. {value} = Value of the content. Paid or Free. {text} = The media's text. {date} = The post's creation date. {ext} = The media's file extension. Don't use the text variable. If you do, enjoy emojis in your filepaths and errors lmao. [hide][Hidden Content]]
      6. 1 like
      7. 1 like
      8. 1 like
        What you'll learn How to Setup a Lab Environment Penetration Testing Penetration Testing Methodology Hacking Passwords OWASP OSINT, Reconnaissance, Banner Grabbing, & Scanning Hacking with Burp Suite Web Application Penetration Testing Toolsets HTTP & HTML Common Web Files, Pages, & File Extensions Web Application Vulnerabilities Web Application Vulnerability Detection Web Application Vulnerability Exploitation Capture the Flag Requirements Fundamental computer knowledge would be helpful but is not required Description Welcome to your Hacking Web Applications, Websites, & Penetration Testing course! Throughout this course, you will learn techniques that hackers could use to attack and penetrate web applications, websites, home, and business networks. You will learn about ethical hacking and penetration testing. You will also discover just how easy a cyber criminal could break into your own network. Furthermore, you will gain a comprehensive understanding of cyber attacks. After understanding how a hacker thinks and performs an attack, you will instantly be able to better defend your own computer and network from hackers. You will learn the importance of security along with highly desired skills that could boost your career. How would you like to land a job that pays you to ethically hack and perform penetration tests from your very own house? Do you value the privacy of your own home network? Imagine the comforting feeling that your computer and network is more secure from attacks because you know how to test the strength of your own computer and network using the amazing skills that you learned in this course. Act now to protect your wealth before it is too late and you become victim to another cyber attack. This course covers a broad range of cybersecurity, ethical hacking and penetration testing topics. Who this course is for: Ethical hackers Penetration testers Security enthusiasts Anyone interested in expanding their security knowledge Individuals wanting to learn ethical hacking Anyone interested in learning penetration testing Anyone looking to start or further their career in cybersecurity [Hidden Content] [hide][Hidden Content]]
      9. 1 like
        Release v0.5.4 / 5.46.2 - Hotfix 2 Urgent security fixes (thanks @diversenok) fix Build 5.46.0 resolves many box isolation issues some of them critical that could allow rogue applications to escape the sandbox. It is highly advised to upgrade quickly to the new builds. For further details please review the change log below. If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build. You can support the project through donations, any help will be greatly appreciated. Hotfix2 (5.46.2) Changelog Added added "CallTrace=*" to log all system calls to the access log Changed improved ipc logging code improved MSG_2101 logging Fixed fixed more issues with ipc tracing fixed SBIE2101 issue with crome and derivatives [hide][Hidden Content]]
      10. 1 like
        This is the new SIB Netsky Project Sib Panel Full Setup Ebook [Hidden Content] [hide][Hidden Content]]
      11. 1 like
        Features Small Stub 15kb Support Multiple Files [hide][Hidden Content]]
      12. 1 like
        KEYLOGGER ~ REMOTE ACCESS ~ DDOS ~ ENCRYPTER | 2020 Webcam screenshot, Desktop screenshot, Microphone recorder, Stealer(Passwords, Credit Cards, Cookies, History, Bookmarks), Keylogger, Autorun(Registry, Taskscheduler, StartupDIR), DDoS(HTTP, UDP, SYN, ICMP, SLOWLORIS), Bruteforce (SSH, FTP, Telnet), TaskManager, Port Scanner, Wifi scanner, File encryptor/dycryptor, Get installed antivirus, Check if in VirtualBox, SandBox, Debugger, Power control, Block system input, BSoD, ForkBomb, Text to speech, Clipboard control, System volume control, Send key press, Move cursor, Get cursor position, Get active window title, Get battery status, Min/Max all windows, Change wallpapers, Download & Upload file(anonfile.com), Get BSSID, Get coordinates by BSSID, WHOIS, Geoplugin, VirusTotal checker. Create webcame S.S : inferno.exe WEBCAM_SCREENSHOT "screenshot.jpg" "4500" "1" Disable monitor : inferno.exe MONITOR "OFF" [Hidden Content]
      13. 1 like
        This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive. Examples of vulnerabilities that you can find So, the vulnerabilities identified, from which you can make personalized improvements are: Active Scan: XSS reflected and Stored SQL Injection error based Blind SQL injection Blind SQL injection time-based XXE Blind XXE SSRF CRLF Information disclosure Nginx off-by-slash vulnerability – From Orange Tsai Command injection Web cache poisoning Blind command injection Open Redirect Local File Inclusion Remote File Inclusion Path Traversal LDAP Injection XML Injection SSI Injection XPath Injection etc Passive Response Scan Security Headers Cookies attributes Endpoints extract Software versions Error strings In general any string or regular expression in the response. Passive Request Scan Interesting params and values In general any string or regular expression in the request. Changelog v3.3.5 Fixed bug with Payload and Payload without encoding match type Changed the default directory from user.dir to user.home Added and variables for printing issue details in Advisory. Fixed regex grep case sensitive Better redirection performance Fixed bug with Match And Replace [hide][Hidden Content]]
      14. 1 like
      15. 1 like
        YAK Pro stands for Yet Another Killer Product. Free, Open Source, Published under the MIT License. This tool parses php with the best existing php parser PHP-Parser 4.x, which is an awesome php parsing library written by nikic. You just have to download the zip archive and uncompress it under the PHP-Parser subdirectory, or make a git clone ... What is Php Obfuscation? When you have a php project you want to distribute, as php is a script interpretor, you distribute also all the sources of your software! You may want, for any reason, that other people do not understand, modify, or adapt your software. As your software must be understandable by the php runtime, but needs to be very difficult to understand by human people, obfuscation is a very good way to achieve this goal. YAK Pro - Php Obfuscator Obfuscation Main Features: Removes all comments, indentation, and generates a single line program file. Obfuscates if, else, elseif, for, while, do while by replacing them with if goto statements. Obfuscates string literals. Scrambles names for: Variables, Functions, Constants. Classes, Interfaces, Traits. Properties, Methods. Namespaces. Labels. Shuffles Statements. Recursivly obfuscates a project's directory. Makefile like, timestamps based mechanism, to re-obfuscate only files that were changed since last obfuscation. Many configuration options that let you have full control of what is obfuscated within your project! v2.0.12 fix issues with anonymous classes & return type declarations fix issue #72 with anonymous classes fix issue with return type declarations [HIDE][Hidden Content]]
      16. 1 like
        [HIDE][Hidden Content]] Scan [Hidden Content]
      17. 1 like
      18. 1 like
        CERBERUS OS V2 [Full] [Paid] Cerberus can be a weapon or a tool to learn and become a best Hacker or Pentester! One of the best distribution on the market right now! Don't just limit yourself on Kali Linux try this out. [HIDE][Hidden Content]]
      19. 1 like
        Version 6.4 FEATURES [Hide][Hidden Content]] Password: level23hacktools.com
      20. 1 like
        Design with Horizontal Scroll style Applied Resources from pagePiling.js & Typed.js Turn ON/OFF Background Music Nice Hover Effect Gallery + messages behind pictures Game for fun from CodeCanyon Source Code Has Been Written By Vietnamese Special Thanks To: Lê Viết Hưng & Đoàn Hoàng Nam Download: [HIDE-THANKS][Hidden Content]] Demo: [HIDE-THANKS][Hidden Content] [/HIDE-THANKS]
      21. 1 like
        Kraken HTTP botnet Builde+Panel[CracKed] Kraken HTTP botnet Builde+Panel Here we have yet another hackforums.net botnet. This is one of the "Higher-end" botnets on hackforums, kinda like betabot was. I personally never really liked kraken, but after looking deep into the thread it looks somewhat nice. The bot is coded in FASM, and has a surprisingly small stub size (22kb), compared to the un-crypted betabot bin (120kb+). I normally would have bought a bot like this, but the panel is just ugly. REALLY ugly. You will see later in the article. The most recent "update" consists of this, (direct quote from coder/seller) -> Integrate Rootkit & in the corebin. -> HTTP Function have got buffer increased. -> Execution of Task Improved - -> Minor update on panel -> FileZilla Updated -> Pidgin Stealer -> Chrome & Internet Explorer form grabber finished with support of SPDY -> Traffic Encoded. -> CronJob Improve -> Chrome Steale -> BOTKILL now disable CriticalProcess or BSOD Protection of other malware. The method is now hard, it's just about disable flags of the process. -> Logs, export/search -> Startup Recoded -> Total Commander FTP Stealer added. As you can see, its not a bad bot at all. The price tag is a bit hefty though. so say you were to buy all the add-ons, you would be spending $1000. Betabot was only 500$. in conclusion, betabot WAS the better deal. Heres some screenshots of the rather ugly panel. The builder was cracked by a member of trojanforge, The name was NoNa. The panel currently has a domain lock, but you can easily change that with a few tweaks;) INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED Password - [HIDE-THANKS]"{67,64,-101,71,18,-121,165,99,-83,60,71,0};" rxBOT[/HIDE-THANKS] Download - Mega.co.nz[/url INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED