Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      sQuo

      Encrypt | Decrypt Tools

      Recommended Posts

      Staff
      012e8026.png

      ximg.php?fid=12522709

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Pass: level-23.info

       

      Mirror:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Pass: level-23.info

      Share this post


      Link to post
      Share on other sites

      Re: Encrypt | Decypt Tools

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Pass: level-23.info

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Tnx Hum Bro

      Reupload 22 Link More...

      Join It....:rolleyes1:


      [url="http://uploadmirrors.com/download/78O72BIN/Decrypters.rar"]http://uploadmirrors.com/download/78O72BIN/Decrypters.rar[/url]

      [url="http://www.embedupload.com/?d=6GEUDJQDIE"]http://www.embedupload.com/?d=6GEUDJQDIE[/url]

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      No Pass

      Share this post


      Link to post
      Share on other sites

      Level-23 Antinub - 80+ in one

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      I have collected popular antinubs into one program for my favourite forums

      Maybe, someone will find it useful

      There are three styles, a particular style for particular forum.

      To reset style, you need to click on contact icon on the second tab.

      There are two files that must be in the same directory as program,

      so it would be easier to make an icon on Desktop etc.

      The program itself is clean , but I haven't checked each antinub.

      Good luck! dance4:

      Here are some screens:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      [VERDE]Files are Clean[/VERDE] & Functional [Analyzed by you2004975]

       

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.
      [/HIDE-THANKS]

      Share this post


      Link to post
      Share on other sites

      PAPA File Encryption

       

      PAPA File Encryption

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      ScanLink

       

      Filename: PAPA File Encryption.exe

      File MD5 Hash:

      File SHA1: 48fe468cb6f878856defe40f5d56da449bd96a1a

      File Size: Bytes

      Time Scanned: 18-01-16, 12:41:09

      Scan provided by

      Hidden Content

        Give reaction to this post to see the hidden content.

      Link to Scan:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Result: (0/57)

      A-Squared(Emisoft AntiMalware) Clean - Nothing Found

      Agnitum Clean - Nothing Found

      AhnLab V3 Internet Security Clean - Nothing Found

      ArcaVir Clean - Nothing Found

      Avast Clean - Nothing Found

      Avg Clean - Nothing Found

      Avira Clean - Nothing Found

      Ad-Aware Clean - Nothing Found

      Baidu AV Clean - Nothing Found

      BitDefender Clean - Nothing Found

      BKav Clean - Nothing Found

      BullGuard Internet Security Clean - Nothing Found

      ByteHero Clean - Nothing Found

      ClamAv Clean - Nothing Found

      Comodo Clean - Nothing Found

      Dr. Web Clean - Nothing Found

      eScan Clean - Nothing Found

      eTrust-Vet Clean - Nothing Found

      eScan Internet Security Suite 14 Clean - Nothing Found

      ESET NOD32 Clean - Nothing Found

      Fortinet Clean - Nothing Found

      Fprot Clean - Nothing Found

      FSB Antivirus Clean - Nothing Found

      F-Secure Clean - Nothing Found

      Gdata Clean - Nothing Found

      Immunet Antivirus Clean - Nothing Found

      IObit Malware Fighter Clean - Nothing Found

      K7Ultimate Clean - Nothing Found

      Kaspersky Internet Security 2015 Clean - Nothing Found

      KingSoft Clean - Nothing Found

      Malwarebytes Anti-Malware Clean - Nothing Found

      mcafee Clean - Nothing Found

      Microsoft Security Essentials Clean - Nothing Found

      nProtect Clean - Nothing Found

      NANO Antivirus Clean - Nothing Found

      Netgate Clean - Nothing Found

      Norton Internet Security Clean - Nothing Found

      Norman Clean - Nothing Found

      Outpost Security Suite Pro Clean - Nothing Found

      Ozone AV Clean - Nothing Found

      Panda Antivirus Clean - Nothing Found

      PC Tools Clean - Nothing Found

      Quick Heal Clean - Nothing Found

      SUPERAntiSpyware Clean - Nothing Found

      Solo Clean - Nothing Found

      Sophos Clean - Nothing Found

      TotalDefense Clean - Nothing Found

      Trendmicro Internet Security Clean - Nothing Found

      TrustPort Antivirus 2014 Clean - Nothing Found

      Twister Antivirus 8 Clean - Nothing Found

      Unthreat AntiVirus BE Clean - Nothing Found

      Vexira Clean - Nothing Found

      Vipre Internet Security 2014 Clean - Nothing Found

      VirIT Clean - Nothing Found

      Webroot Clean - Nothing Found

      Zillya Clean - Nothing Found

      Zoner Clean - Nothing Found

      360 Clean - Nothing Found

       

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.
      [/HIDE-THANKS]

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.

      [/HIDE-THANKS]

       

       

       

      [VERDE]File is CLEAN ! Analyzed By Spoofer[/VERDE]

      Edited by Spoofer

      Share this post


      Link to post
      Share on other sites

      PAPA Pass Encryption

       

      PAPA Pass Encryption

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      ScanLink

       

      Filename: PAPA Pass Encryption.exe

      File MD5 Hash: d8d8f4c75394dda7def7855028d802ca

      File SHA1: 5b4f0cadc66e7cbb5c184a71c237a3252202ec73

      File Size: 31744 Bytes

      Time Scanned: 18-01-16, 12:56:59

      Scan provided by

      Hidden Content

        Give reaction to this post to see the hidden content.

      Link to Scan:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Result: (0/57)

      A-Squared(Emisoft AntiMalware) Clean - Nothing Found

      Agnitum Clean - Nothing Found

      AhnLab V3 Internet Security Clean - Nothing Found

      ArcaVir Clean - Nothing Found

      Avast Clean - Nothing Found

      Avg Clean - Nothing Found

      Avira Clean - Nothing Found

      Ad-Aware Clean - Nothing Found

      Baidu AV Clean - Nothing Found

      BitDefender Clean - Nothing Found

      BKav Clean - Nothing Found

      BullGuard Internet Security Clean - Nothing Found

      ByteHero Clean - Nothing Found

      ClamAv Clean - Nothing Found

      Comodo Clean - Nothing Found

      Dr. Web Clean - Nothing Found

      eScan Clean - Nothing Found

      eTrust-Vet Clean - Nothing Found

      eScan Internet Security Suite 14 Clean - Nothing Found

      ESET NOD32 Clean - Nothing Found

      Fortinet Clean - Nothing Found

      Fprot Clean - Nothing Found

      FSB Antivirus Clean - Nothing Found

      F-Secure Clean - Nothing Found

      Gdata Clean - Nothing Found

      Immunet Antivirus Clean - Nothing Found

      IObit Malware Fighter Clean - Nothing Found

      K7Ultimate Clean - Nothing Found

      Kaspersky Internet Security 2015 Clean - Nothing Found

      KingSoft Clean - Nothing Found

      Malwarebytes Anti-Malware Clean - Nothing Found

      mcafee Clean - Nothing Found

      Microsoft Security Essentials Clean - Nothing Found

      nProtect Clean - Nothing Found

      NANO Antivirus Clean - Nothing Found

      Netgate Clean - Nothing Found

      Norton Internet Security Clean - Nothing Found

      Norman Clean - Nothing Found

      Outpost Security Suite Pro Clean - Nothing Found

      Ozone AV Clean - Nothing Found

      Panda Antivirus Clean - Nothing Found

      PC Tools Clean - Nothing Found

      Quick Heal Clean - Nothing Found

      SUPERAntiSpyware Clean - Nothing Found

      Solo Clean - Nothing Found

      Sophos Clean - Nothing Found

      TotalDefense Clean - Nothing Found

      Trendmicro Internet Security Clean - Nothing Found

      TrustPort Antivirus 2014 Clean - Nothing Found

      Twister Antivirus 8 Clean - Nothing Found

      Unthreat AntiVirus BE Clean - Nothing Found

      Vexira Clean - Nothing Found

      Vipre Internet Security 2014 Clean - Nothing Found

      VirIT Clean - Nothing Found

      Webroot Clean - Nothing Found

      Zillya Clean - Nothing Found

      Zoner Clean - Nothing Found

      360 Clean - Nothing Found

       

       

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.
      [/HIDE-THANKS]

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.

      [/HIDE-THANKS]

       

       

       

      [VERDE]File is CLEAN ! Analyzed By Spoofer[/VERDE]

      Edited by Spoofer

      Share this post


      Link to post
      Share on other sites

      Crypt.Net Encrypt/Decrypt Package

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      [VERDE]File Cleaned[/VERDE] Analyzed for Caballo

      [HIDE-THANKS]

      Hidden Content

        Give reaction to this post to see the hidden content.
      [/HIDE-THANKS]

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The software is designed to replace domains with domains of the same location. A useful utility for converting valid to new lines. For example, you have a valid .de database: you load these lines into the software, having previously set the criteria for replacing the online.de with gmx.de in the settings, at the output we get new lines with new domains. This method allows you to make new lines, which are likely to pass on the valid.
          How to work with the program? It's that simple.

          1.- Open the program. A window will pop up that there is no settings file and the program will close, a file will be created geo_settings.txt
          2.- Open the created file geo_settings.txt
          3.- We prescribe there the criteria for replacing domains in the format domain_that_we change;domain_to_which_we change (";" is used to correctly separate domains) The number of lines to replace is not limited by the program, but affects the speed.

          Hidden Content
          Give reaction to this post to see the hidden content. Click "Get Started"
          The results will be saved in the format "Input_filename_ReplaceGEO.txt"

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              What is Hacking
              How to Use go language for Hacking
              How to Change MAC address using golang
              How to create a TCP network Scanner
              How to Perform Man in the Middle attack using golang
              Perform Packet capturing and interception
              Create your own malware
              Running Commands remotely on victim
              Navigating File system on victim machine
              Stealing Files and Folders from victim machine
              Uploading Viruses on victim Machine
              Creating your own keylogger
              How to Package your malware into a trojan
          Requirements
              Basics of go language
              A working PC
          Description
          In this course we will learn hacking using Go language.  Go is an open source programming language created by Google. As one of the fastest growing languages in terms of popularity, its a great time to pick up the language and start using it.
          First we start with learning about why we should use go language and what are its advantages. Then we will start diving into what hacking is and what are different types of hacking. We will learn how to keep ourselves secure over LAN by developing a program for changing MAC address. Then we will create a Network Scanner that will help us in scanning devices over our local network and finding out their IP and MAC addresses. During our course, we will explore a lot of aspects of hacking using go language in detail and use important packages for Hacking purposes.
          In the later part of our course, we will start developing programs that will help us in hacking. Firstly we will perform a man in the middle attack using ARP spoofing and then we will intercept traffic between users. Then we will create our own backdoor malware that will give us complete control over the victim machine using a power-shell , i.e you will be able to run commands on the remote PC. We will also develop a functionality to steal user files from his machine using our backdoor.
          Who this course is for:
              Go language programmers who want to learn hacking
              people who want to learn fundamentals of hacking
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of them.
              Written in python 3
              Provides a modelisation of "pentest objects" : Scope, Hosts, Ports, Commands, Tools etc.
              Tools/scripts are separated into 4 categories : wave, Network/domain, IP, Port
              Objects are stored in a NoSQL DB (Mongo)
              Keep links between them to allow queries
              Objects can be created through parsers / manual input
              Business logic can be implemented (auto vuln referencing, item triggers, etc.)
              Many tools/scripts launch conditions are availiable to avoid overloading the target or the scanner.
              A GUI based on tcl/tk
          Features
              Register your own tools
                  Add command line options in your database.
                  Create your own light plugin to parse your tool output.
                  Use the objects Models to add, update or delete objects to the pentest inside plugins.
                  Limit the number of parallel execution of noisy/heavy tools
              Define a recon/fingerprinting procedure with custom tools
                  Choose a period to start and stop the tools
                  Define your scope with domains and network IP ranges.
                  Custom settings to include new hosts in the scope
                  Keep results of all files generated through tools executions
                  Start the given docker to implement numerous tools for LAN and Web pentest
              Collaborative pentests
                  Split the work between your machines by starting one worker by computer you want to use.
                  Tags ip or tools to show your team mates that you powned it.
                  Take notes on every object to keep trace of your discoveries
                  Follow tools status live
                  Search in all your objects properties with the fitler bar.
                  have a quick summary of all hosts and their open ports and check if some are powned.
              Reporting
                  Create security defects on IPs and ports
                  Make your plugins create defects directly so you don't have to
                  Generate a Word report of security defects found. You can use your own template with extra work.
                  Generate a Powerpoint report of security defects found. You can use your own template with extra work.
              Currently integrated tools
                  IP / port recon : Nmap (Quick nmaps followed by thorough scan)
                  Domain enumeration : Knockpy, Sublist3r, dig reverse, crtsh
                  Web : WhatWeb, Nikto, http methods, Dirsearch
                  LAN : Crackmapexec, eternalblue and bluekeep scan, smbmap, anonymous ftp, enum4linux
                  Unknown ports : amap, nmap scripts
                  Misc : ikescan, ssh_scan, openrelay
          Roadmap
              Change the architecture to an API based one
              Get rid of Celery
              Add flexibity for commands
              Improve UX
              Add more plugin and improve existing ones
              Add real support for users / authenticated commands

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function to verify whether the vulnerability actually exists.
          It currently has vulnerability scanning (poc) and exploiting (exp) modes. Use “-m” to select which mode to use, and the default poc mode is the default. In poc mode, it also supports “-f” batch target scanning, “-o” File output results and other main functions, Other functions Options Or python3 vulmap.py -h, the Poc function will no longer be provided in the exploit mode, but the exploit will be carried out directly, and the exploit result will be fed back to further verify whether the vulnerability exists and whether it can be exploited.
          Changelog v0.8
              Support scanning dismap recognition result file -f output.txt
              Added coremail, ecology, eyou, qianxin, ruijie vulnerabilities in categories
              POC added Apache OFBiz CVE-2021-29200 CVE-2021-30128
              POC added Apache Solr CVE-2021-27905
              POC added Fastjson echo VER-1224-2 VER-1224-3
              POC added Oracle Weblogic CVE-2016-0638 CVE-2018-3191 CVE-2019-2890

          Hidden Content
          Give reaction to this post to see the hidden content.