Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Leaderboard


      Popular Content

      Showing most liked content since 09/18/2020 in all areas

      1. 5 likes
        Script to add all udemy paid/free courses having coupons automatically to your udemy account Features Automatic login through browser using browser_cookie3 One click to add all courses available with coupons to your udemy account. You can add any specific course to your account from the list of courses available. Many popular sites added to grab fresh/new courses (coupons). Many more features [hide][Hidden Content]]
      2. 5 likes
        Generate Free Edu Mail(s) within minutes Features One click install/setup. No programming knowledge needed (other then python3 with pip installed). Setup will install all webdrivers needed automatically based on your browsers. Many more features. [hide][Hidden Content]]
      3. 5 likes
      4. 5 likes
        [WIP] Remote Access Tool written in Visual Basic .NET (Server V4.8 and client at least V4.5) with rare features that others rats don't have :) (like keyboard locking or encrytion of files directly from File Manager) UNDER LICENSE READ THE END OF THIS PAGE ! LEGAL DISCLAIMER PLEASE READ! I, the creator and all those associated with the development and production of this program are not responsible for any actions and or damages caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's intended purpose is NOT to be used maliciously, or on any system that you do not have own or have explicit permission to operate and use this program on. By using this software, you automatically agree to the above. Key Features : -File Manager : Delete , Download , Launch Files , Go through Folders and Disks , Go Back , Move File to Bin -Encryption : Can encrypt | decrypt files in files manager with custom key (AES , RC6 , BlowFish , Salsa20 , Cast6 , TwoFish ) -Passwords Recovery : Currenly Supports most Chromium Web Browsers -Tasks Manager : Kill Tasks , Refresh , Get Information -Remote Desktop Viewer (OPTIONAL) : If you do not want to forward second port , do not use -Change Wallpaper -TaskBar : Hide , Show , Hide Apps , SHow Apps -Mouse : Swap Mouse Button , Lock Left Click , Lock Right Click , Lock Movements ,Lock All , Unlock All -Keyboard : Lock , Unlock -Message -Computer Power : Log Out , Reboot , Shutdown , Hibernate, Suspend -BSOD -DDOS : UDP -OS INFORMATION : Get Precious Information about OS -Client : Close , Close And Delete -Client Size : 15KB at least (depending on the options you add) => easy to encrypt and bind -Builder : X86 ,X64 (Default is AnyCPU) , Stealth Mode , Spread , Add To Startup -Currently DOESN'T SUPPORT DNS -Show and Hide Desktop Icons -Show and Hide Start Icons -Spread Client -Add Client To Startup -RED VIRUS : Block Keyboard , Block Mouse , add a watchdog to kill task manager and set a full red screen window To Close , you need to reboot -Fork Bomb -Process INFO: Handle , FilePath , ID , BaseAddress , Priority , Handle Window , Window title -Delete Files On Desktop , Delete Files On Desktop + Reboot -Auto Recovery Options -Injection Exe (NOT NATIVE) -Auto Execute File In memory : BE SURE IT IS A .NET EXE , not native -Monitor Rotation : 0 , 90 , 180 , 270 degrees -Empty Bin | Trash Summer Update 5 - Release Massive Update : -Added BlowFish Algo -Added Icon To Tasks Manager -Corrected Bugs with Process Info -Added TwoFish Algo -Corrected Bugs with TasksManager -Added Logs [BETA] -Added possibility to save Logs -UI Fixes -Added Salsa20 Algo -Added Exception with "Download File" from File managers to prevent client's closing -Added Empty Bin | Trash function -Added Move File to Bin in File Manager -Added Cast6 Algo -Changed Icon -Added Regions in Source and clearer code [Hidden Content] [Hidden Content]
      5. 4 likes
      6. 4 likes
        This tool gives information about the phone number that you entered. What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provieded; ->Tries To Find Owner Of The Number ->Tries To Find Risk Level Of The Number ->Tries To Find Location,Time Zone Of The Number,Carrier ->Tries To Find Social Media Platforms That The Number Is Registered ->Tries To Find Links About Phone Number ->Tries To Find Comments About Phone Number ->Sends Sms To Phone Number With Amazon Aws [hide][Hidden Content]]
      7. 3 likes
      8. 3 likes
      9. 3 likes
        Burp Suite Professional: power tools for security specialists The toolkit that started it all. Find out why Burp Pro has been the penetration testing industry's weapon of choice for well over a decade. The Burp Suite family Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research. A global leader in the fight against cybercrime Each new edition of Burp Suite shares a common ancestor. The DNA running through our family tree represents decades of excellence in research. As the industry has shown time and time again, Burp Suite is the tool you can trust with your online security. [Hidden Content] [Hidden Content]
      10. 3 likes
      11. 3 likes
      12. 3 likes
        paypal pro integration for carding(cc cashout ) I am not responsible for your actions recharge your paypal account with a bank card extract the vendor.zip file open charge.php set your paypal infos [hide][Hidden Content]]
      13. 2 likes
        Powerful text editing tool with syntax highlighting support for programming languages and scripts, multi-caret and synchronized editing, code/text folding, over 100 options for customizing, over 100 ready made skins, character map, numerical unit convert tool, text compare, JSON/SQL/XML formatter, and support for multiple directories and search results. Version 10.1.0 (September 24, 2020) - Added highlighter for AutoHotkey - Added highlighter for NSIS - Fixed EXE installer - Fixed favorites menu skinning - Fixed language files [hide][Hidden Content]]
      14. 2 likes
        UltraEdit: The world's best text editor Our 4+ million power users all agree – UltraEdit is the most flexible, powerful, and secure text editor out there. Download a free, full-feature trial to see why. Available for Windows, Mac, and Linux. [Hidden Content] [hide][Hidden Content]]
      15. 2 likes
        Malware Hunter Hyper scan makes you enjoy a faster scanning speed. Detect and remove stubborn malware, against potential danger. Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Virus Scan Fast hyper scans, detect and remove stubborn malware, against potential danger. Automatic updates Automatic updates provides real-time protection so that your PC is always up to date and secure. Process Protection Aimed at the process, our protection can ensure the safe operation of your computer. [Hidden Content] [hide][Hidden Content]]
      16. 2 likes
        shadowscan [Hidden Content]
      17. 2 likes
      18. 2 likes
        What's SMTP/Mail access Cracker V3 ? > Crack Smtp > Crack Mail Access [hide][Hidden Content]]
      19. 2 likes
        This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world. [hide][Hidden Content]]
      20. 2 likes
        Web-scraping tools generally use macros or configuration methods, and follow a sequential list of commands. The macro approach is more user friendly and automatically records the actions of a user in a browser. However, there are typically restrictions on accessing the code behind the agent. The configuration approach allows the user to directly configure each part of the agent. They can introduce more code structure, controls, data refinements, or add their own naming conventions. Content Grabber gives you the option to either follow the simple macro automation methods, or to take direct control over the treatment of each element and command within your agent. Content Grabber Agent Development With Content Grabber, you can visually browse the website and click on the data elements in the order that you want to collect them. Based on the content elements selected, Content Grabber will automatically determine the corresponding action type and provide default names for each command as it builds the agent for you. [Hidden Content] [Hidden Content]
      21. 2 likes
        Features Automatically scour Instagram for fresh, relevant E-mail addresses in order to build your very own private E-mail list. Proxy Support In order to avoid limitations, we have HTTP/HTTPS proxy support. Simply import your proxy list along with your username list and click "START". Data Collection User ID Visible Email Addresses Followers/Following Is Business/Business Category Multithreaded Choose how many requests you make simultaneously by inputting your desired thread count. Saves Successful Proxies Instagram is notoriously hard to find working proxies for. To save you a lot of trouble, we implimented a successful proxy list builder. Simply let the program run. [Hidden Content]
      22. 2 likes
        [hide][Hidden Content]]
      23. 2 likes
        [hide][Hidden Content]]
      24. 2 likes
        FROM NOW ON, TROJAN KILLER IS ALWAYS WITH YOU Trojan Killer is the effective anti-malware tool for your memory stick. Be sure that you're safe from the internet threats wherever you go! [Hidden Content] [hide][Hidden Content]]
      25. 2 likes
      26. 2 likes
      27. 2 likes
        Recox v2.0 The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other than OWASP top ten. The script presents information against the target system. It gathers the information recursively over each subdomain, and IP addr for a sophisticated attack. RecoX automates several functions and saves a significant amount of time that requires throughout a manual penetration test. Video: [Hidden Content] Download: [Hidden Content]
      28. 2 likes
        Generates target specific word lists by searching for endpoints in javascript and appends parameters for Fuzzing with other tools [hide][Hidden Content]]
      29. 2 likes
      30. 2 likes
        A ransonware tool that uses cryptocurrency to decrypt What's a RansomCryWare? RansomCryWare is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties: Property 1: The hostile binary code must not contain any secret (e.g. deciphering keys). At least not in an easily retrievable form, indeed white box cryptography can be applied to ransomware. Property 2: Only the author of the attack should be able to decrypt the infected device. Property 3: Decrypting one device can not provide any useful information for other infected devices, in particular the key must not be shared among them. Features: encrypt all user files with AES-256-CBC. Random AES key and IV for each file. Works even without internet connection. Communication with the server to decrypt Client-private-key. encrypt AES key with client-public-key RSA-2048. encrypt client-private-key with RSA-2048 server-public-key. Change computer wallpaper -> Gnome, LXDE, KDE, XFCE. Decryptor that communicate to server to send keys. python webserver Daemon Kill databases [hide][Hidden Content]]
      31. 2 likes
      32. 2 likes
        v2 version. Flipper. Since our team (before that the team) ran this business cleanly, as beautifully as possible, we will complete it beautifully. For 70% of clients, financial obligations have already been closed. We ask you to unsubscribe the rest in the LAN or in telegrams, do not forget to write your toad, the license key and the server ip. This is necessary in order for me to make sure that you are the owner of the license. It is also desirable to attach the apk file. Sources to be torn apart, especially for xss.is Cerberus v1 + Cerberus v2 + install scripts + admin panel + sql db [hide][Hidden Content]]
      33. 2 likes
        This is the modified version of SpyNote 6.4 And It bypass Maximum of the antivirus like device security and all major antivirus. [Hidden Content] Server Scan [Hidden Content]
      34. 2 likes
        View File Advanced Web Hacking Tools Tools Contains: Havij NetDatabaseScanner Open Web Spider Quick Web Site Hog Snippets Manager Spider mail SQL Injection SQL Map Project The Mole ZeroTeam ™ MD5 Password Encryptor Acunetix Web Vulnerability Scanner Advanced Deface Creator 1.3 Anonymous DNS Extractor-2013 Anonymous FTP Stealer Anonymous Text Encrypter Anonymous Tinypaste Uploader Ashiyane SQL Scanner Base64 Image Encoder-Decoder BTI Admin Page Finder v2 BTI HTML Encoder-Decoder BTI Multi Site Checker BTI Reverse IP Domain Check v2 ChromePasswordDecryptor CSS Minifier v2 Deface Page Created Dork Searcher Setup v1091 dorkinj DorkTools Eternals WebBrowser Explode Web Scanner ezDataBase_Defacer Fiddler Web Debugger Setup Gklspy Google URL Extractor Gr3eNoX LFi Exploiter Hacker’s Browser v2.0 Injection Framework - Automatized Sql Injection Tool Iron Web application Advanced Security testing Platform Joomla Security Scanner JSQL-Injection Mass Dork Scanner v1.0.0.1 Multi Vuln Checker nmap Spider mail SQL Exploiter Pro v2.10 SQL Helper SQLI-Hunter_v1.1 SQLI-Hunter_v1.2 SQL-Inject-Me-master sqlmap_win_v01 sqlmap-0.9 sqlninja-0.2.6-r1 SQLSentinel_v_0.3 Surf Excuse Survey Bypasser Tiny URL Shortener Vulcan Cleaner Vuln Hunter vulnerability master wapiti-2.3.0-win32-standalone Warbot VersaoSQL Tool v1.0 Alpha Build 6 Web Source Tools WebCruiser WebCruiserPro Websecurity Scanner 0.9 Website Blocker v2 WebSurgery-Setup-1.1.1 XCodeExploitScannerSept xSQL SCanner Size: 141MB Download: Free for Users PRIV8 Submitter dEEpEst Submitted 24/07/20 Category Files Password ********  
      35. 2 likes
        BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET. About BlackNET No major features will be added just bug fixes. What You Can Do Upload File DDOS Attack [ TCP,UDP,ARME,Slowloris, HTTPGet, POSTHttp, Bandwidth Flood ] Start DDOS Stop DDOS Open Webpage Visible Hidden Show MessageBox Take Screenshot Steal Firefox Cookies Steal Saved Passwords [ Chrome, Firefox ] Steal Chrome Cookies Steal Discord Token Steal Chrome Hisory Execute Shell Commands [ CMD, Powershell ] Send Spam Emails Keylogger Execute Scripts Computer Operations Restart Shutdown Logout Bitcoint Wallet Stealer Uninstall Client Move Client Blacklist Client Close Client [HIDE][Hidden Content]] Server Scan [Hidden Content]
      36. 2 likes
        Operating systems The program is compatible with win 10 - win 8 - win 7 - win vista - win xp .. Requires installation Net framework 4.0 Compatible with systems Android 10.0 .. Android 9.0 .. Android 8.0 .. Android 7.0 .. Android 6.0 .. Android 5.0 .. Android 4.0 .. Demo CHARACTERISTICS Take a photo of the screen * New * Record phone calls * New * Record Messenger, Skype and Skype calls. * New * browse and download files Live camera shooting locate record the microphone keylogger browse messages browse calls To call .. And other features Download from the official program website [HIDE][Hidden Content]] The next version It will include a method of key extraction for WhatsApp
      37. 1 like
        The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. [Hidden Content] [hide][Hidden Content]]
      38. 1 like
        Bruter19 Advanced Brute Force Attack Tool. This tool has been developed for "ethical hacking course" students don't use it for illegal purposes. ADDED FEATURES IN V2.0 The Tool Supports Turkish Language Now The Tool Is Able To Generate Personalized Wordlist Now The Tool Is A Bit Faster Now FIXED BUGS IN V2.0 The tool was finding the wrong password in the long wordlists. It is fixed, the user is able to use long wordlists now. The tool was finding the wrong password every time you press ctrl+c. That issue is fixed now. The tool was failing when you inputed the wordlist path incorrectly. That issue is fixed now. Anonsurf was failing in the long wordlists. Now torghost is used in the tool. That issue is fixed now. [hide][Hidden Content]]
      39. 1 like
        D-Link DGS-1210-28 suffers from a denial of service vulnerability. View the full article
      40. 1 like
        jackdaw Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other a how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a password-cracking project by storing/looking up/reporting hashes/passwords/users. Features Data acquisition via LDAP LDAP enumeration phase acquires data on AD info, User, Machine, OU, Group objects which will be represented as a node in the graph, and as a separate table in the DB. Additionally, all aforementioned objects’ Security Description will be parsed and the ACLs for the DACL added to the DB. This, together with the membership information will be represented as edges in the graph. Additionally, custom SQL queries can be performed on any of the aforementioned data types when needed. via SMB SMB enumeration phase acquires data on shares, localgroups, sessions, NTLM data via connecting to each machine in the domain (which is acquired via LDAP) via LSASS dumps (optional) The framework allows users to upload LSASS memory dumps to store credentials and extend the session information table. Both will be used as additional edges in the graph (shared password and session respectively). The framework also uses this information to create a password report on weak/shared/cracked credentials. via DCSYNC results (optional) The framework allows users to upload impacket’s DCSYNC files to store credentials. This is used as additional edges in the graph (shared password). The framework also uses this information to create a password report on weak/shared/cracked credentials. via manual upload (optional) The framework allows manually extending the available DB in every aspect. Example: when user-session information on a given computer is discovered (outside of the automatic enumeration) there is a possibility to manually upload these sessions, which will populate the DB and also the resulting graph Graph The framework can generate a graph using the available information in the database and plot it via the web UI (nest). Furthermore, the graph generation and path calculations can be invoked programmatically, either by using the web API (/ui endpoint) or the graph object’s functions. Anomalies detection The framework can identify common AD misconfigurations without graph generation. Currently only via the web API. User User anomalies detection involves the detection of insecure UAC permissions and extensive user description values. This feature set is expected to grow in the future as new features will be implemented. Machine Machine anomalies detection involves detection of insecure UAC permissions, non-mandatory SMB singing, outdated OS version, out-of-domain machines. This feature set is expected to grow in the future as new features will be implemented. Password cracking The framework is not performing any cracking, only organizing the hashes and the cracking results currently main focus is on impacket and aiosmb’s dcsync results !NT and LM hashes only! Sample process is the following: Harvesting credentials as a text file via impacket/aiosmb or as memory dumps of the LSASS process via whatever tool you see fit. Upload the harvested credentials via the API Poll uncracked hashes via the API Crack them (hashcat?) Upload the results to the framework via the API Generate a report on the cracked/uncracked users and password strength and password sharing note from the author: This feature was implemented for both attackers and defenders. Personally I don’t see much-added value on either side since at the point one obtained the NT hash of a user it’s just as good as the password… Nonetheless, more and more companies are performing password strength exercises, and this feature would help them. As for attackers: it is just showing off at this point, but be my guest. Maybe scare management for extra points. Changelog v0.2.24 new release, lot of fixes, even more features [hide][Hidden Content]]
      41. 1 like
        Searpy Search Engine Toolkit Support search engine Shodan Fofa Zoomeye Censys Dnsdb Google Baidu Bing 360so Goo Yahoo Changelog v2.3 fix some bugs add fofa_icon module [hide][Hidden Content]]
      42. 1 like
      43. 1 like
        Windows-Linux-RAT - A tool to get persistent backdoor access to Windows and Linux OS Features .NET Coded in Visual Basic .NET, Client required framework 2.0 or 4.0 dependency, And server is 4.0 Plugin Using plugin system to decrease stub's size and lower the AV detection Encryption The communication between server & client is encrypted with AES Spreading Access all files and folders on USB drivers Bypass Very low AV detection and undetected startup method Lightweight Payload size is about 25 KB Anti Virtual Machines Uninstall itself if the machine is virtual to avoid scanning or analyzing Access Cryptocurrency sensitive data Screen-Locker Prevents user from accessing their Windows GUI And more On Connect Auto Task Force enable Windows RDP Persistent or none File manager Passowrds stealer Remote desktop Bitcoin grabber Downloader Keylogger [hide][Hidden Content]]
      44. 1 like
        Text Engine is data manipulation software that gives you many possibilities to change and edit text or file you want. Its possibilities can be seen on the screenshot above: Removing duplicate lines Removing lines containing text Adding prefix or suffix Adding line breaks Removing line breaks Removing empty lines Removing whitespaces Finding and replacing text Combo tools Count data [hide][Hidden Content]]
      45. 1 like
        Bind files in single .exe file Two types of file binder: Via CodeDOM compiler Via NSIS compiler [hide][Hidden Content]]
      46. 1 like
        DragonFlux Clipper Written In C# Clipper: BTC, ETH, XMR, BCH, BCN, ADA, GRFT. [HIDE][Hidden Content]]
      47. 1 like
        Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility. Overview A debugger with functionality designed specifically for the security industry Cuts exploit development time by 50% Simple, understandable interfaces Robust and powerful scripting language for automating intelligent debugging Lightweight and fast debugging to prevent corruption during complex analysis Connectivity to fuzzers and exploit development tools The Best of Both Worlds Immunity Debugger's interfaces include the GUI and a command line. The command line is always available at the bottom of the GUI. It allows the user to type shortcuts as if they were in a typical text-based debugger, such as WinDBG or GDB. Immunity has implemented aliases to ensure that your WinDBG users do not have to be retrained and will get the full productivity boost that comes from the best debugger interface on the market. Commands can be extended in Python as well, or run from the menu-bar. Python commands can also be run directly from our Command Bar. Users can go back to previously entered commands, or just click in the dropdown menu and see all the recently used commands. Remote command bar From the command line menu, you can choose to start a threaded command line server, so you can debug remotely from another computer: Python Scripting Python scripts can be loaded and modified during runtime. The included Python interpreter will load any changes to your custom scripts on the fly. Sample scripts are included, as is full documentation on how to create your own. Immunity Debugger's Python API includes many useful utilities and functions. Your scripts can be as integrated into the debugger as the native code. This means your code can create custom tables, graphs, and interfaces of all sorts that remain within the Immunity Debugger user experience. For example, when the Immunity SafeSEH script runs, it outputs the results into a table within the Immunity Debugger window. Other scripts can ask for user input with dialogs and combo boxes: Having a fully integrated Python scripting engine means you can easily paint variable sizes and track variable usage, which in turn comes in handy when trying to automatically find bugs! Python Hooks Often you will want to run a Python script on certain program events, for example when a breakpoint is hit or an exception is caused. Immunity Debugger's hook support includes many debugger events, and more are added with every release. Python Graphing Built in Graphing Another Immunity Debugger feature is the capability of creating function graphs. Our Python VCG library will create a window inside Immunity Debugger at the click of a button to graph your selected function. No third party software is required. Immunity Debugger is light Immunity Debugger strives to absorb as few resources on the system as possible. Being too CPU-heavy will cause heap overflows and other complex vulnerabilities to behave differently than they would under normal load. Likewise, fuzzing and other vulnerability analysis is only possible when the debugger is not causing undue system strain. Immunity Debugger exposes the information you need Most debuggers offer only one method to allow you to attach to a process of interest - the pid and the process name. Immunity Debugger offers the pid, process name, services within that process, TCP/UDP ports listened to by that process, complete binary name, and window name. This allows quick and easy access to the exact process you wish to analyze. Download [HIDE][Hidden Content]]
      48. 1 like
      49. 1 like
        [HIDE][Hidden Content]] Pass: level23hacktools.com
      50. 1 like
        Apps-Apk Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] FREE Police Scanner lets you listen to Police radio scanners from around the world. USA, Canada, UK, Germany, Japan, Italy, Chile, Austria with more scanners added all the time. Listen to police radio in your area any time, day or night!These are live streams, feeds from real scanners. Top 50 Feeds (3000+ more available!)Chicago PoliceLAPD […] The post Police Scanner appeared first on . 09-20-2017 10:39 PM