Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Wiki-Leaks Posts Details On Al Lot Of SpywareTools That CIA Uses

      Recommended Posts

      CIA Just got f'd a while ago and their tools were, in what looks to be verifiable news, leaked.

      Wiki-leaks claim to have a copy of the tools and have published documents on all the CIA Tools that they have in their possession


      Some of the tools include:

      • HammerDrill - a CD/DVD collection tool that collects directory walks and files to a configured directory and filename pattern as well as logging CD/DVD insertion and removal events.
      • Sparrowhawk - collects user-entered keystrokes from any system terminal, and collate in a unified format across multiple Unix platforms.
      • MaddeningWhispers - a set of software components that provide beaconing and remote access capabilities to a Vanguard-based device.
      • BaldEagle -Local user-to-root privilege escalation exploit within the Hardware Abstraction Layer (HAL) daemon. Exploit is available on Linux and PC-BSD platforms.
      • Bee Sting - Proxy with iFrame injection.
      • Fight Club - encryption utility.
      • RainMaker - a survey and file collection tool.
      • Weeping Angel - transforms Samsung smart TVs into microphones, using a fake "Off mode."


      The documents also include various ways to ByPass Many Security Products i.e AV's which include Comodo,Kaspersky, Avast, Symantec, Defender among Others..

      As per my research, seems kaspersky was bypassed using a Kaspersky "heapgrd" DLL Inject which targetted WHEAPGRD.DLL file which due to a unicode

      error the dll's name is prepended with to the system root drive i.e C or whatever. Hence when the av can't detect (Due To The Error) it results in automatic search

      for the dll and thus an attacker can load a customized DLL into the AVP process thus f'ing up kaspersky.


      Download The Torrent Link Here:


      Magnet Link: magnet:?xt=urn:btih:7BF9A9F2A2809E13BD57A96A360725F1688A0D51&dn=WikiLeaks-Year-Zero-2017-v1.7z&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969&tr=udp%3a%2f%2fzer0day.ch%3a1337&tr=udp%3a%2f%2fexplodie.org%3a6969

      Original Torrent Link:

      Hidden Content

        Give reaction to this post to see the hidden content.



      Torrent File Password:



      Hidden Content

        Give reaction to this post to see the hidden content.



      For More INfo On This And More Tools Check Out Their Main Site:


      Hidden Content

        Give reaction to this post to see the hidden content.



      FYI The dump is called vault7

      Edited by J0k3rj0k3r
      correcting password

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this