Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Leaderboard


      Popular Content

      Showing most liked content since 01/14/2021 in all areas

      1. 6 likes
        Gold Alduin-botnet ImgSearch all disc. USBSpread, Tor Communication, Multi-language, Attacks: SlowLoris, ARME, Hulk, RUDY, TCP and UDP, ICMP, HTTPBandWidth, TORLoris. Monero minning, Execute file Open website ScreenShots Get Computer All hardware and deatils Send Message Seed Torrent Support fallback panel SourceCode/Git grabber FireFox, Chrome, FileZilla account grabber CMD executter Host file editor Process show and kill Ads miner Show attack speed [Hidden Content]
      2. 4 likes
      3. 4 likes
        Oski Stealer is an extremely advanced stealer showcasing many desired features such as credit card and wallet stealing. Firstly, this stealer is completely web-based, accessible from any device and can be hosted offshore for anonymity. Secondly, the payload will self destruct after loading, making it hard to trace the malware. Given the strong stealing features alongside being silent makes this extremely severe. In other words, alongside an exploit this stealer can be spread completely undetected. Allowing you to grow logs of data on a new level for any of your needs. However, with this stealer being completely native, working on all systems, it is arguably the best. In conclusion we highly suggest using Oski Stealer alongside any of our exploits to expand any of your data logging needs! Features: – Advanced Stealer – Browser Cookies / Passwords: – Chromium Based: Chromium, Google Chrome, Kometa, Amigo, Torch, Orbitum, Opera, Comodo Dragon, Nichrome, Yandex Browser, Maxthon5, Sputnik, Epic Privacy Browser, Vivaldi, CocCoc and other browsers that use the working directory Chromium. – Firefox Based: Mozilla Firefox, Pale Moon, Waterfox, Cyberfox, BlackHawk, IceCat, K-Meleon and other browsers that use the working directory Firefox. Filezilla Stealer – Crypto-Wallet Stealer – Bitcoin Core, Ethereum, ElectrumLTC, Monero, Electrum, Exodus, Dash, Litecoin, ElectronCash, ZCash, MultiDoge, AnonCoin, BBQCoin, DevCoin, DigitalCoin, FlorinCoin, Franko, FreiCoin, GoldCoin, InfiniteCoin, IOCoin, IxCoin, MegaCoin, MinCoin, NameCoin, PrimeCoin, TerraCoin, YACoinFiles from machine data about machine. Installed Softwares Native Stub requiring no dependencies other than Windows installation Multi-profile (up to 10) Low stub size of 93kb Supports Windows 7/8 / 8.1 / 10 | x32 / x64 Does not require administrative privilege User-friendly Admin Panel ICQ:653580170 Whatsapp +79017473945 jabber: [email protected] [hide][Hidden Content]]
      4. 4 likes
        [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.3.9 ADD: Support mining on AMD: RX 6800, 6900 [Hidden Content]
      5. 4 likes
        What you'll learn What Raspberry Pi Where To Buy In Cheap Price Setup Raspberry Pi as Portable Hacking Machine WIFI Network Jamming Protect Your WiFi From Jamming WiFi Password Hacking Protect Your WiFi Password From Hacking Requirements Basic Computer & IT Skills PC/Laptop/Mobile Raspberry Pi and Accesories Hacking Attitude Description In this WiFi Hacking with Raspberry Pi - Black Hat Hackers Special! course, I will teach you how to setup raspberry pi for various type of wifi hacking technics and DIY projects which are used by black hat hackers and ethical hackers too. I designed this course in such a manner that you can easily learn from this course even if you don’t have any previous knowledge about raspberry pi or hacking. I can assure you from this course you will learn something new that no one will teach you in any other course. So, Click on Enroll to join this course and start learning how to hack with raspberry pi. This course is designed for beginners and professionals, if you are a beginner you want to start from zero or if you are a professional and want to improve your hacking skills so this course will increase your knowledge about hacking. In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to perform various advanced hacking techniques to hack any wifi password no matter it's using any types of security WEP/WPA/WPA2 Wi-Fi encryption key and also you will learn jamming any wifi connection and disconnect any device from any wifi using the Raspberry Pi. Notice: This course is only for educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices. Do not perform any hacks on other people's networks if you don't have permission to do so. I will not be responsible for your actions, Who this course is for: Anyone Who Wants To Become an Ethical Hacker, Penetration Tester or Black Hat Hackers Anyone Who Wants To Learn Hacking Using Raspberry Pi Like Black Hat Hackers Anyone Who Wants To Learn How To Hack WiFi Passwords Like Black Hat Hackers Anyone Who Wants To Learn How To Jam WiFi Like Black Hat Hackers [Hidden Content] [hide][Hidden Content]]
      6. 3 likes
        Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules About: Arbitrium is a cross-platform is a remote access trojan (RAT), Fully UnDetectable (FUD), It allows you to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding. It gives access to the local networks, you can use the targets as a HTTP proxy and access Router, discover local IPs and scan their ports. Includes modules like Mimikatz, new modules can easily be added. In addition, if Arbitrium is used with a DNS spoofing software is can spread autonomously between devices (#AutoSpread). Arbitrium is a project of multiple parts, the parts were built using Java, JS, C, Python, Cordova and VueJS. Features: FUD The client uses simple tools which makes it completely undetectable, the trojan based on netcat mainly pipe TCP paquets to run the server's commands. Firewall Arbitrium doesn't require adding an exception to the firewall, or a port forwarding rule. The server is an API with endpoints that receives tasks for a specific target and others that the trojan periodically request to get the new instructions, the instructions can be a JavaScript file (the Android app is made using Cordova) or a Shell file to run in the terminal/CMD. Once the server receives a task for a device, the former schedule the task then it opens a child process where it waits for the trojan's response by listening to a dedicated ephemeral port. Therefore, the trojan doesn't need to listen to any port. Battery optimization / StealthMode Unlike with Stock Android, customizations like MIUI by Xiaomi, EMUI by Huawei or Samsung's Android Pie ignore the permissions/exceptions given to an app by the user. So if you try to run an Android's trojan in the background, the moment the app start running frequent or heavy (in some cases even lightweight) tasks (ex: sending http requests periodically) it will be killed no matter what permissions the user grants, ths OS completely ignores the current settings, dontkillmyapp.com is an known website dedicated for this particular issue. The aforementioned issue was quite annoying while working on this project, after awhile I found that building a lightweight binary that keeps running the assigned tasks in the background while the MainActivity stand still just after launching the binary apears to bypass most the restrictions and actually even improve the performance of the App. MainActivity receives a JS file from the server and uses ThreadPoolExecutor to initiate the binary without hanging for it to exit (More on this StealthMode/BatteryBypass). Web interface There is also a control panel, it's not a requirement but an extension, it's a simple VueJS webapp, a UI you can use to control the targets instead of directely sending requests to the API. The webapp is available here: Arbitrium WebApp [hide][Hidden Content]]
      7. 3 likes
        This is the modified version of SpyNote 6.4 And It bypass Maximum of the antivirus like device security and all major antivirus. [Hidden Content] Server Scan [Hidden Content]
      8. 3 likes
        [Hidden Content]
      9. 3 likes
      10. 3 likes
        Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
      11. 3 likes
      12. 2 likes
      13. 2 likes
        The giveaway starts today and ends on 01/21/2021, I will be using a site like random.org to generate a random number that will answer the winner's post number. To participate leave a comment! Min. 2 Users Max. 10 Users
      14. 2 likes
        Scan for a target wireless network. Launch the Handshake Snooper attack. Capture a handshake (necessary for password verification). Launch Captive Portal attack. Spawns a rogue (fake) AP, imitating the original access point. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. [hide][Hidden Content]]
      15. 2 likes
      16. 2 likes
      17. 2 likes
      18. 2 likes
      19. 2 likes
      20. 2 likes
      21. 2 likes
        bypass403 is tool to bypass 403 Forbidden responses. [hide][Hidden Content]]
      22. 2 likes
        What you'll learn How to Setup a Lab Environment Penetration Testing Penetration Testing Methodology Hacking Passwords OWASP OSINT, Reconnaissance, Banner Grabbing, & Scanning Hacking with Burp Suite Web Application Penetration Testing Toolsets HTTP & HTML Common Web Files, Pages, & File Extensions Web Application Vulnerabilities Web Application Vulnerability Detection Web Application Vulnerability Exploitation Capture the Flag Requirements Fundamental computer knowledge would be helpful but is not required Description Welcome to your Hacking Web Applications, Websites, & Penetration Testing course! Throughout this course, you will learn techniques that hackers could use to attack and penetrate web applications, websites, home, and business networks. You will learn about ethical hacking and penetration testing. You will also discover just how easy a cyber criminal could break into your own network. Furthermore, you will gain a comprehensive understanding of cyber attacks. After understanding how a hacker thinks and performs an attack, you will instantly be able to better defend your own computer and network from hackers. You will learn the importance of security along with highly desired skills that could boost your career. How would you like to land a job that pays you to ethically hack and perform penetration tests from your very own house? Do you value the privacy of your own home network? Imagine the comforting feeling that your computer and network is more secure from attacks because you know how to test the strength of your own computer and network using the amazing skills that you learned in this course. Act now to protect your wealth before it is too late and you become victim to another cyber attack. This course covers a broad range of cybersecurity, ethical hacking and penetration testing topics. Who this course is for: Ethical hackers Penetration testers Security enthusiasts Anyone interested in expanding their security knowledge Individuals wanting to learn ethical hacking Anyone interested in learning penetration testing Anyone looking to start or further their career in cybersecurity [Hidden Content] [hide][Hidden Content]]
      23. 2 likes
        Description Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware? This course will provide you the answers you’re looking for. It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV. You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation. You Will Learn What is malware development What is PE file structure Where to store your payload inside PE How to encode and encrypt payloads How and why obfuscate function calls How to backdoor programs How to inject your code into remote processes Target Audience Ethical Hackers Penetration Testers Blue Teamers Threat Hunters All security engineers/professionals wanting to learn advanced offensive tactics Requirements Understanding of operating system architecture Some experience with Windows OS Basic knowledge about C and Intel assembly Computer with min. 4 GB of RAM + 30 GB of free disk space VirtualBox 6.0+ installed Strong will to learn and having fun [Hidden Content] [hide][Hidden Content]]
      24. 2 likes
        HyperRDP can automatically start a Hyper-V Remote Desktop Protocol server on the host system Features Adds firewall bypass for RDP Adds firewall rules Adds group policies to support connecting from the internet outside local network Adds a new user account for hidden interaction (remotedesktop password: remotedesktop) Patches c:\Windows\System32\termsrv.dll to allow multiple simultaneous connections Starts RDP services [hide][Hidden Content]]
      25. 2 likes
        Change log Stable NexTGen WatchDog Add to SchTask Hard Install [ Stealth Mode ] FileZilla Stealer Clean Password Stealer [ Fixes ] CPU,FireWall,Client Privileges,MUTEX Information File Binder Modifed Icon Manager Modifed Plugin Manager Added More then 100 New Custom Icons Modifed Desktop Infection New Port Settings Full Data Transfer Encryption using Base64 New MUTEX Format (imosworm[xxxxxx-12345]) Listview Style Remove Empty Subs and Functions Process Manager With Cusotm Colors Command Shell Remote Powershell Remote Desktop Modfied Plugin Invoking Modifed Custom Plugin Invoking Keylogger Manager Military Grade RSA Encryption With 4096bit Encryption Key for the Host and Port Stable File Manager With a Downloading Large Files and Arabic Names Support Critical Process Modifed Admin Checker DynuDNS Updater NO-IP Automatic Updater Updating Password Plugin Added Produect Serial Stealer Service Manger with Full Service Controller Startup Manager Victim Notification with XtremeRAT Sound IP Tracker [ Removed From Dev-Point Version ] Infect ZIP & RAR Files [ PoC ] [ Beta UnTested ] Clients Groups [ Single and Multi Manager ] Upgrade Software DotNET Framework From 2.0 to 4.0 Small GUI Changes Small Fixes to the Socket to be more stable Multi Transfer XMR Silent Miner Bug Fixes IMOS Worm 1.0.0.8 Public Edition Change log: Small Changes [hide][Hidden Content]] Scan Server [Hidden Content]
      26. 2 likes
        [hide][Hidden Content]]
      27. 2 likes
        An Burpsuite extension to bypass the 403 restricted directories. By using PassiveScan (default enabled), each 403 requests will be automatically scanned by this extension, so just add to burpsuite and enjoy. Payloads: $1: HOSTNAME $2: PATH
      28. 2 likes
        Features Small Stub 15kb Support Multiple Files [hide][Hidden Content]]
      29. 2 likes
        Crypter dEEpEst v23 (6/36) - [C++ RunTime Update 13/11/2020] Scan result: This file was detected by 6 / 40 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-11-12 | 12:16:07 CRC32: 70c707cf MD5: fb87b0ac3b55c0413facb18ff9ccb4cf SHA-1: 0c9a16dce1c6b7bbf3a01cac7ab22500ddd6b425 SHA-2: af8ea924c7bb40c07630825e8602ea14fac0069f5e9a5fe069c4a61d1d233ff6 SSDEEP: 1536:be1Tl71RPU38azdZKPigH5C0Om1IphBhEHH:b0lRVazdZVdm1IphBhS [Hidden Content] AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Undetected ClamAV Undetected Comodo Undetected Comodo Linux Undetected DrWeb Trojan.PWS.Maria.3 Emsisoft Undetected eScan Undetected F-Prot Undetected F-Secure Heuristic.HEUR/AGEN.1127758 G Data Undetected IKARUS Undetected Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee Undetected Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Preventon Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Undetected Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirITExplorer Undetected VirusFighter Undetected Xvirus Undetected Zillya Undetected ZoneAlarm Undetected Zoner Undetected DOWNLOAD: [Hidden Content] PASSWORD: Only for Users PRIV8 ,send PM
      30. 2 likes
      31. 1 like
      32. 1 like
        REDasm – The Open Source Disassembler REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets. You can hack and improve REDasm without any issues and limitations. REDasm is under heavy development but it provides several interesting features: IDA-Like interactive listing. Multithreaded analysis. Graphing support. Project management. Signature engine. Cross-platform. Easy to use. Changelog v3.0 beta2 Reimplemented cross references analysis Implemented Tensilica Xtensa and ESP32 support Added support for Xtensa ELF executables Implemented COFF plugin Improved build system Restored RDCommandPlugin (WIP) Fixed UI related APIs Minor fixes [hide][Hidden Content]]
      33. 1 like
        Dash This is an Android Spyware App, Which uploads user data such as Contacts, Messages, Call log & recordings, Send messages, Photos, Videos, etc. The application is installed on the child's device as well as on the parent's device, in the login view the type of user is chosen. Features Multiple Child clients Hidden app icon (stealth mode) Real-time location. Recording calls: incoming/outgoing. SMS: received/sent. Environment recording. Take pictures. Keylogger. Phishing social network. Notifications received: Whatsapp, Instagram, Messenger. Disclaimer The Dash application is intended for legal and educational purposes ONLY. It is a violation of the law to install surveillance software on a mobile phone that you have no right to monitor. Dash is not responsible if the user does not follow the laws of the country and goes against it. If it is found that the user violates any law or spy in secret, he will be subject to sanctions that govern the legislation of the country. [hide][Hidden Content]]
      34. 1 like
      35. 1 like
        What you'll learn A much higher skill level as a pentester or a hacker. Be able to pentest any network. Help in preparation for the OSCP exam. Using manual hacks as opposed to automated tools. Requirements Intermediate expertise with pentesting or hacking. Completion of 'Ethical Hacking Using Hands on Training' or any ethical hacking course is a plus. Comfortable using the Linux command line interface (CLI). Comfortable learning bits of programming code such as Python and PHP. Comfortable creating virtual machines. Hardware and software capable of handling virtualization. Comfortable with the English language. Description Welcome to Ethical Hacking - Capture the Flag Walkthroughs v2! If you're like me, you can't get enough information on pentesting/hacking techniques. We want more, more, more! This course picks up where v1 left off using all-new capture the flag exercises, all new step-by-step video tutorials, and hands-on labs. You've taken enough ethical hacking courses. You know about the different pentesting tools but you're just not quite sure how to use them in a real-world pentest. Congratulations! You came to the right course! Using the hacking methodology, this course will teach you how to use pentesting tools to enumerate and gain root access. Throughout the course, you will learn the different attack vectors used to exploit a target. You'll learn Python, PHP scripting and tricks of the trade that will astound you! This is not a course for beginners, bug hunters or wanna-be script kiddies. Anyone enrolling should have a good command of the Linux terminal and be able to follow written step-by-step instructions. Each step of every capture the flag exercise is covered in a video tutorial. You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together showing students how to perform an actual pentest and gain root access. Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonstrates the advance techniques and different attack vectors used by professional pentesters and hackers. Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack like you've been wanting to. Don't cheat yourself! Check out the free preview of the first module of the course. Students have a lifetime of access and more CTF exercises will be added over time. Who this course is for: Those wanting to see the pentesting tools and hacking methodology being used. This course is not for those new to ethical hacking. Those wanting to be learn advance pentesting/hacking techniques. [Hidden Content] [hide][Hidden Content]]
      36. 1 like
        Wise Care 365® PC Cleaning and Speed up Tool Clean registry and junk files from your PCs. Protect your privacy and make your PCs more secure. Provide a better option for optimizing and accelerating your computer! Protect Your System in Real Time Take prompt action once some applications attempt to make modification without your permission. This protector will identify and stop any processes that try to secretly change Windows registry. Prevent programs from changing your Internet Explorer homepage Prevent any unwanted new application from adding into the windows startup Prevent changes to the default browser A Comprehensive PC Cleaner Improved Wise Care 365 is definitely the preferred option for billions of Windows users who want to keep their Windows PC at peak performance. Speed up a slow computer and free up more valuable hard disk space in seconds. Remove invalid Windows registry entries, easily back up and restore Windows registry. Clean Windows temporary files, clean browsers (IE, Edge - including the chromium-based version, Google Chrome, Mozilla Firefox, Opera, Safari, etc.) caches, download history, browsing history, Cookies, passwords. Wise Care 365 can also clean invalid shortcuts, recent use traces, useless files created by other applications. Scan whole system to clean files with specific extensions. World’s Fastest System Optimization Tool Wise Care 365 adopts world’s top technology. It optimizes PC's performance, defrags disks and the Windows registry, and manages the startup process as well as services. Over time, your computer’s hard disk drive and registry will become cluttered. Wise Care 365 can defrag the drive and registry to make them organized, thus making your computer run faster and more stable. You are going to be amazed by its blazing defrag speed. Many programs run silently in the background when you start up your computer. Wise Care 365 helps you disable unneeded programs that consume your precious system resources and improves PC startup speed. Your Ultimate Computer Privacy Protector Wise Care 365 protects your computer privacy from prying eyes. Privacy Eraser erases all traces of any computer operation like browsing history and accessed files, so any computer operation you do stays confidential. Disk Eraser prevents deleted data from being retrieved by third parties. Disk Shredder can delete files thoroughly so that they can never be recovered. [Hidden Content] [hide][Hidden Content]]
      37. 1 like
      38. 1 like
      39. 1 like
        Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY. [hide][Hidden Content]]
      40. 1 like
        This is the new SIB Netsky Project Sib Panel Full Setup Ebook [Hidden Content] [hide][Hidden Content]]
      41. 1 like
        @Richard Wilder @Haytham Mohamed You have to install the redistribuilble package visul c ++ [Hidden Content] x86: vc_redist.x86.exe x64: vc_redist.x64.exe
      42. 1 like
        The detailed description of the functionality below: Collect data from all Chromium browsers (Passwords, Credit Cards, Cookies, Autocomplete Forms, View History, Download History, Search History) Including data from Yandex Browser and browsers with non-standard data layout. Collecting all .dat files (recursion) of cryptocurrency wallets, as well as collecting cold wallets: Anoncoin, Bitcoin, Bitpay, Coinomi, DashCore, devcoin, Eidoo, Electrum, Electrum-NMC, Exodus, Feathercoin, Fetch, FLO, Franko, Freicoin, GoldCoin (GLD), Guarda, I0coin, iXcoin, Jaxx, Litecoin, Luckycoin, MegaCoin, Mincoin, Monero, Myptcryo, NovaCoin, Peercoin, Primecoin, 2FA Sessions - Authenticator (Authy) Collect all Telegram sessions Collect all session Discord Collect all Steam sessions Jabber Customer Correspondence Collection Collect all Filezilla profiles Collect all WinSCP profiles Collect all TotalCommander profiles Collect WindowsSecureVault credentials IE, Edge credential collection Collect all Pidgin accounts Collect all PSI accounts, PSI Collecting VPN client sessions Collecting Sessions and OpenVPN Authorization Data Collect details about Steam Collecting WiFi profile data Collect profiles from Credmanager Collecting system information, screenshots and geolocation data (useful for point processing of the client) Collecting a list of processes Grabber files Telegram alert Multi-user support Logger action in the panel Monitoring selected domains Ability to filter CIS-Logies (CIS), rep protection There is a Loader module with flexible parameters, the ability to specify multiple files at once and many filters A separate and convenient search page, with the ability to sort by a large number of criteria, including cookies and passwords, allowing you to automate the search for the necessary data. The ability to change the theme of design in one click, View log data without downloading (passwords, PC information) Automated panel installation Intuitive and at the same time beautiful admin panel. The ability to sort logs by custom templates (Presets), the ability to create/edit/delete patterns. The ability to download or delete all logs directly in the panel (in one click)! Clever filtering of fresh lairs Geostatistical information on the home page Regular updates tailored to the wishes of customers. We always try to implement what our users want. [hide][Hidden Content]] Server Scan [Hidden Content]
      43. 1 like
        YAK Pro stands for Yet Another Killer Product. Free, Open Source, Published under the MIT License. This tool parses php with the best existing php parser PHP-Parser 4.x, which is an awesome php parsing library written by nikic. You just have to download the zip archive and uncompress it under the PHP-Parser subdirectory, or make a git clone ... What is Php Obfuscation? When you have a php project you want to distribute, as php is a script interpretor, you distribute also all the sources of your software! You may want, for any reason, that other people do not understand, modify, or adapt your software. As your software must be understandable by the php runtime, but needs to be very difficult to understand by human people, obfuscation is a very good way to achieve this goal. YAK Pro - Php Obfuscator Obfuscation Main Features: Removes all comments, indentation, and generates a single line program file. Obfuscates if, else, elseif, for, while, do while by replacing them with if goto statements. Obfuscates string literals. Scrambles names for: Variables, Functions, Constants. Classes, Interfaces, Traits. Properties, Methods. Namespaces. Labels. Shuffles Statements. Recursivly obfuscates a project's directory. Makefile like, timestamps based mechanism, to re-obfuscate only files that were changed since last obfuscation. Many configuration options that let you have full control of what is obfuscated within your project! v2.0.12 fix issues with anonymous classes & return type declarations fix issue #72 with anonymous classes fix issue with return type declarations [HIDE][Hidden Content]]
      44. 1 like
      45. 1 like
        Restaurant Management System version 1.0 suffers from a remote shell upload vulnerability. View the full article
      46. 1 like
        Assassin one of the best Android RAT beta 1.0.0 adapter android Lollipop-Pie commit issues to me Construction Features get Sms_List send Sms to destinationAddress get Calling_History get GPS get Contacts_List something that u can do in background call someone take a photo then send to server record audio then send to server record video then send to server of course the duration decided by yourself Basement/Environment Gradle JDK1.8 AndroidSdk node.js npm Usage Options: -V, --version output the version number -a,--assassin <assassin> select a command post to the clients if you choose the shadow you should input the cmd -t to choose a type between pic/audio/video [sms,contacts,call,gps,shadow] (default: "sms") -C,--Clients show every client info -d,--address <address> input a phone num who you want to send a msg -m,--msg <msg> you should write the msg content, if your command is sms -t,--type <type> select a type between pic/audio/video and you should input the -l to choose the camera lens [pic,audio,video] -c,--client <client> select a client to post the command -l,--lens <lens> which camera lens that you want to open [0,1] -h, --help output usage information Step.1 clone/download the project and start up the server [Hidden Content] Step.2 build assasin.apk with shell at project folder befor build the apk confrim that you have prepare the env for building the app connect the android device to ur PC enable the develop mode on ur android device if you can not do step.2 and step.3 you can build the assassin.apk and install it to your device manually now let's start assembleApk at the first time when you download the project you should confirm your OS type mac or linux, and get your server IPAdress by "ifconfig/ipconfig" 0. chmod 777 ./assembleApk.sh chmod 777 ./installNewestApk.sh 1. execute the assemble shell "./assaembleApk.sh OS serverIP" serverIP type as 127.0.0.1:3000 OS type as mac or linux as follows: "./assembleApk.sh mac 127.0.0.1:3000" "./assembleApk.sh linux localHost:3000" 2. ./installNewestApk.sh if you are not able to connect the device to your PC, send the apk by email or xx and install it manually 3. look at your device, the apk has been installed into your device run it grant all of permissions and now you can see { a user connected info }at terminal you have opened at Step.1 Step.3 execute command,then you will get whaterver you want!!! cmd ./assassin.js -a sms -c 9910294050493 description select the command between [sms,contacts,call,gps,shadow] if you choose the shadow you should also use -t to choose a type between pic/audio/video args with -c can be gotten at server terminal {a user connected info} type the cmd into a new terminal at ~/project/Server and the result: { "command": "send_contacts_list", "IMEI": "99001249798100" } response is : [{name:ASX,phoneNum:2345 67}] exemples cmd -a description select the command between [sms,contacts,call,gps,shadow] if you choose the shadow you should also use -t to choose a type between pic/audio/video example ‘’./assassin.js -a sms‘’ ‘’ ./assassin.js -a shadow -t pic ‘’ result ERROR:you should input a type with -c to choose a client that you want to send cmd cmd -C description show every client info example ‘’./assassin.js -C ‘’ result {IMEI:9525238415950202,brand:Nokia,model:CAL-20,version:9.0} cmd -c description select a client with its IMEI to post the command example ‘’./assassin.js -a sms -c 9525238415950202 ‘’ result { command: 'send_sms_list', IMEI: '184859203' } Prompt keep node server alive when you send a command cmd with ./assassin.js will return a Json data you can do whatever with the response if you want to get a pic or video you should type the cmd as follow: ./assassin.js -a shadow -c 123456 -t pic -l 0 then you can find the pic has saved on the */project/Server/public/images/xxxx.jpeg' the same with other shadow the duration in recording video or audio decided by yourself Screen Shot server assembleApk installApk client connect to server executeCmd
      47. 1 like
        Version 2.2.7 Changing the .NET Framework platform from the 4.6.1 version to the updated 4.7.2 version. Added the Get server certificate domains option, which allows you to get the domain from the SSL'TLS server certificate. [HIDE][Hidden Content]]
      48. 1 like
        Re: CW CRMNL Crypter v2 [2/35] :dash1: :ruletaoff: [Hidden Content]