Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hacking With C ++ (Tutorial videos)

      Recommended Posts

      Staff

      C/C++ Memory Hacking — Code Cave | Inject function to a process

      C/C++ Game Hacking — Simple Triggerbot (CS:GO)

      C/C++ Memory Hacking — Eject Dll From a Process | Reverse Dll Injection

      C/C++ Game Hacking — Simple Wallhack (CS:GO)

      C/C++ Memory Hacking — API Call Hooking | Intercepting API calls

      C/C++ Memory Hacking — Dynamically Use Dlls || Hide API Calls

      C/C++ Memory Hacking — Dll Injection

      C/C++ Memory Hacking — Self Modifying Code | Encrypt Memory At Runtime

      C/C++ Memory Hacking — Run PE | Run Executable From Memory

      C/C++ Load Dll From Memory (RunPE) || (Manually Load Dll From Byte Array, Crypter)

       

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Password

      level23hacktools.com

       

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GHunt is an OSINT tool to extract information from any Google Account using an email.
          It can currently extract:
              Owner’s name
              The last time the profile was edited
              Google ID
              If the account is a Hangouts Bot
              Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.)
              Possible YouTube channel
              Possible other usernames
              Public photos (P)
              Phones models (P)
              Phones firmwares (P)
              Installed Softwares (P)
              Google Maps reviews (M)
              Possible physical location (M)
              Events from Google Calendar (C)
          The features marked with a (P) require the target account to have the default setting of Allow the people you share content with to download your photos and videos on the Google AlbumArchive, or if the target has ever used Picasa linked to their Google account.
          More info here.
          Those marked with a (M) require the Google Maps reviews of the target to be public (they are by default).
          Those marked with a (C) requires user to have Google Calendar set on public (default it is closed)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          HackerOne is your big opportunity. This is the platform where you can hack legally and at the same time you can make money. You can hack many different companies like Twitter, Yahoo, Uber, Coinbase, and a lot more. And you can get paid for your findings, for example $100, $1,000, or even $10,000 per one bug. It’s just amazing.
          All you need is Internet connection and knowledge. Yes – you need knowledge to go from zero to thousands of dollars at HackerOne, and in this online training I’m going to share my knowledge with you.
          This self-paced online training is composed of 6 different courses:
              Start Hacking and Making Money Today at HackerOne
              Keep Hacking and Making Money at HackerOne
              Case Studies of Award-Winning XSS Attacks: Part 1
              Case Studies of Award-Winning XSS Attacks: Part 2
              DOUBLE Your Web Hacking Rewards with Fuzzing
              How Web Hackers Make BIG MONEY: Remote Code Execution
          Who This Course is For
              Penetration testers
              Ethical hackers
              Bug hunters
              Security Engineers / Consultants
          Basic knowledge
              Basic hacking skills
              Basic understanding of XSS attacks
          What will you learn
              Master web application security testing
              Become a successful bug hunter
              Go from zero to thousands of dollars at HackerOne.
              Double your web hacking rewards with fuzzing
              Learn how hackers earn thousands of dollars per one bug
              Discover how to find these bugs step-by-step in practice (DEMOS)
              Learn from one of the top hackers at HackerOne
          Torrent File - 1.6GB

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. ABOUT TOOL :
          mrphish is a bash based script which is officially made for phish*ng social media accounts with portforwarding and otp bypassing cntrole. This tool works on both rooted Android device and Non-rooted Android device.
          AVAILABLE ON :
              Termux
          TESTED ON :
              Termux
          REQUIREMENTS :
              internet
              php
              storage 400 MB
              ngrok Token
          FEATURES :
              [+] Instagram Login Page !
              [+] Updated maintainence !
              [+] 1 Port Forwarding Option !
              [+] Easy for Beginners !

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. ABOUT TOOL :
          Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device.
          AVAILABLE ON :
              Termux
          TESTED ON :
              Termux
          REQUIREMENTS :
              internet
              external storage permission
              storage 400 MB
              1gb ram
          FEATURES :
              [+] Dangerous virus tool !
              [+] Updated maintainence !
              [+] Easy for beginners !
              [+] Working virus tool for termux !


          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. whatsapp-hacking
          Hack whatsapp web via a cloned website
          Requirements
          • Python >= 3.6.3 • Flask==1.0.2 • Selenium==3.7.0 • Gecko Driver
          Disclaimer
          THIS IS FOR DEMONSTRATIVE PURPOSES ONLY.
          DO NOT USE ON REAL VICTIMS FOR ANY REASON. CRIMINAL LAW WILL APPLY.
          As the victim scans the qr on the fake website, whatsapp web on the browser spawned by the grabber will be connected to the victim's number.

          Before Usage
          change the last line of the server.py script to fit your needs (if run on port 80, you might need to run as superuser) router configuration might be necessary (port mapping)

          Hidden Content
          Give reaction to this post to see the hidden content.