Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Cracking Passwords Version 1.1 by: J. Dravet

      Recommended Posts

      Staff
      Spoiler

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By albar
          Hello guys, I have a question. e.g
          I have a rat and I created a payload then binded it with pdf file with the help of silent exploit but it is not fud. How can I obsfucate the binded virus? Is it possible or not?
        • By dEEpEst
          What is password cracking ?
          - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource. It can also be used to help a threat actor obtain unauthorized access to resources.
          - With the information malicious actors gain using password cracking, they can undertake a range of criminal activities. Those include stealing banking credentials or using the information for identity theft and fraud.
          - A password cracker recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. SoftPerfect NetGenius – NetGenius is a modern Internet connection monitoring tool. It lets you watch the apps using your Internet in real-time and control their access. Bandwidth-sensitive applications like voice calls, videos or games can be prioritised. Less important applications like software updates, file downloads or cloud backups can be restricted to and prevented from occupying your entire connection. Finally, the applications that should not be going online can be blocked from accessing the Internet, which is important for better privacy and security.
          Features
          • Internet usage monitoring in real-time.
          • Bandwidth prioritisation for important apps.
          • Bandwidth caps on less important apps.
          • Firewall functionality that blocks Internet for selected apps and folders.
          • Comprehensive usage reports for any time period.
          • Additionally NetGenius is
          • Capable of excluding LAN traffic and handling up to 1 Gbps speed.
          • Built atop the Windows Filtering Platform and fully supports Windows 7 to Windows 10.
          • Able to manage multiple computers from one place.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PDF Page Lock Pro – PDF Page Lock allows you to hide or lock any page(s) of a PDF document. This PDF utility is simple-to-use and gives you the ability to efficiently lock or hide any page you select within the PDF document. You can then password-protect the entire PDF before saving it. It supports drag n’ drop or standard search for opening your target PDF. All pages will show in the left side pane with their corresponding status.
          To lock or hide a page, just hit the lock/hide button. Any page that has been locked will show that they are locked within the body of the PDF. Hidden pages, however, will not be visible at all. PDF Page Lock comes in a portable version as well so you can take it with you when you are on the go.
          Features
          • Lock PDF Pages
          • Hide PDF Pages
          • Password Protecting PDF Pages
          • Customize Pages to be Locked
          • Doesn’t Affect Normal Pages
          • Easily Unlock PDF with 1-Click Unlock
          • Multi-language
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Meet Icecream PDF Editor – intuitive free PDF editor for Windows that enables you to create and edit PDF files. Make use of 4 major PDF editing modes: Edit, Annotate, Manage pages and Fill in forms. You can edit text and objects, add notes, manage pages, merge PDFs, protect files, and much more with the PDF editor.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.