Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Chrome Theif - Silent Password Stealer

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      
      
      
      
      	

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      27.04.2018 günü saat 06: 16'da dEEpEst şunları söyledi:

      Gizli içeriği görmek için bu yayına tepki ver

      please

      Share this post


      Link to post
      Share on other sites
      Staff

      @Greles1986 you have to hit like on the heart button to see the link

      Share this post


      Link to post
      Share on other sites
      Staff
      hace 10 horas, AgentT dijo:

      dead link!!

      Link fixed

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.
          Features
                  World’s fastest password cracker         World’s first and only in-kernel rule engine         Free         Open-Source (MIT License)         Multi-OS (Linux, Windows and macOS)         Multi-Platform (CPU, GPU, DSP, FPGA, etc., everything that comes with an OpenCL runtime)         Multi-Hash (Cracking multiple hashes at the same time)         Multi-Devices (Utilizing multiple devices in same system)         Multi-Device-Types (Utilizing mixed device types in same system)         Supports password candidate brain functionality         Supports distributed cracking networks (using overlay)         Supports interactive pause / resume         Supports sessions         Supports restore         Supports reading password candidates from file and stdin         Supports hex-salt and hex-charset         Supports automatic performance tuning         Supports automatic keyspace ordering markov-chains         Built-in benchmarking system         Integrated thermal watchdog         200+ Hash-types implemented with performance in mind         … and much more Changelog v6.1.1
          This release is mostly about expanding support for new algorithms and fixing bugs:
              Added hash-mode: Apple Keychain
              Added hash-mode: XMPP SCRAM
          Changelog fixed Bugs:
              Fixed integer overflow for large masks in -a 6 attack mode
              Fixed alias detection with additional processor core count check
              Fixed maximum password length in modules of hash-modes 600, 7800, 7801 and 9900
              Fixed non-zero status code when using –stdout
              Fixed uninitialized value in bitsliced DES kernel (BF mode only) leading to false negatives
          Changelog Improvements:
              Compile ZLIB: Fixed makefile include paths in case USE_SYSTEM_ZLIB is used
              Compile macOS: Fixed makefile target ‘clean’ to correctly remove *.dSYM folders
              OpenCL Kernels: Added datatypes to literals of enum costants
              OpenCL Kernels: Added pure kernels for hash-mode 600 (BLAKE2b-512)
              OpenCL Runtime: Reinterpret return code CL_DEVICE_NOT_FOUND from clGetDeviceIDs() as non-fatal
              OpenCL Runtime: Add some unstable warnings for some SHA512 based algorithms on AMD GPU on macOS
          Changelog Technical:
              Backend: Changed the maximum number of compute devices from 64 to 128
              Tests: Improved tests for hash-mode 11300 (Bitcoin/Litecoin wallet.dat)
              Tests: Improved tests for hash-mode 13200 (AxCrypt)
              Tests: Improved tests for hash-mode 13600 (WinZip)
              Tests: Improved tests for hash-mode 16400 (CRAM-MD5 Dovecot)
              Tests: Improved tests for hash-mode 16800 (WPA-PMKID-PBKDF2)


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Get All Registered Wifi Passwords from Target Computer.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe
          Telegram Session Stealer

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Stealer with sending logs to Telegram bot
          Echelon Stealer v6.2.5 \ Clipper \ Chrome(v80) - source
          Update! v6.2.5
          -Fixed the first password styling algorithm from browsers on the Chromium engine, when instead of passwords were empty spaces. Now everything is working properly.
          -Release profile is now the default and works properly. Debug - doesn't work.
          A little weight optimization.
          Don't forget that once you've assembled, the file will be in the OUTPUT folder at the root of the project!