Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0

      Will pay for VB Skin with (Bitcoins)




      Who got this Skin for VB 5

      Hidden Content

        Give reaction to this post to see the hidden content.


      i need BlueFox skin for VB 5 and will pay with bitcoins.


      Please anyone got  let me know.



      Share this post

      Link to post
      Share on other sites

      1 answer to this question

      Recommended Posts

      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Blog Designer is an effective and user friendly way to beautify your blog pages on your websites. It’s very popular plugin for website’s WordPress blog to attract more clients as well as more blog visitors. Blog Designer makes your blog section more intuitive with no coding skill. It’s very easy to manage for beginners to website developers.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Changelog v2.3.61
              FIX: Airgap link to Release Notes #4685
              FIX: CyberChef unable to load due to recent Content Security Policy restrictions #4885
              FIX: Suricata dns.response.code needs to be renamed to dns.response.code_name #4770
              UPGRADE: alpine 3.12.1 to latest for Fleet image #4823
              UPGRADE: Elastic 7.13.4 #4730
              UPGRADE: Zeek 4.0.3 #4716

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PassFab for RAR – Quickly recover forgotten passwords from encrypted RAR archives (*.rar) created by any applications, including the latest version of WinRAR. Unlock any password-protected RAR archive no matter what compression and encryption algorithm is used.
          Brute-force Attack
          • Try all combinations of password. It requires maximum time and it is usually used when you have no idea of the password.
          Brute-force with Mask Attack
          • Use this attack when you still remember part of your password, you can set approximate minimum and maximum length of the password and more
          Dictionary Attack
          • Find the password based on a built-in or self-created dictionary. It is the quickest type.
          Recover Fast with GPU & Multi-core CPU
          • Recover RAR password at high speed by using advanced SSE technology and new search algorithm. Also, it allows you to accelerate RAR password recovery speed with Multi-core CPUs, NVIDIA CUDA GPUs and ATI OpenCL GPUs.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Evil-WinRM
          This shell is the ultimate WinRM shell for hacking/pentesting.
          WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators.
          This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff.
              Command History
              WinRM command completion
              Local files completion
              Upload and download files
              List remote machine services
              FullLanguage Powershell language mode
              Load Powershell scripts
              Load in memory dll files bypassing some AVs
              Load in memory C# (C Sharp) compiled exe files bypassing some AVs
              Colorization on output messages (can be disabled optionally)
          Changelog v3.0
              Remote files/directories autocomplete feature (Thanks to arale61)
              Added option to log commands and outputs to a log file (Thanks to Borch Cañavate)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Complete Methodology for Ethical Hacking, Pentesting & Bug Bounties with Live Attacks
          What you'll learn
              Target Expansion
              Content Discovery
              CMS Identification
              Certificate Transparency
              Visual Recon
              Github Recon
              Custom Wordlists
              Bug Bounty Automation
              Bash Scripting
              Bug Bounty Roadmap
              Report Writing
              Shodan for Exploitation
              Subdomain Enumeartion
              DNS Dumpster
              FFUF & WFUZZ
              Project Discovery
              Subjack for Bug bounties
              Amass for Bug bounties
              Dirsearch for Bug bounties
              Masscan for Bug bounties
              Nmap for Bug bounties
              Recon Methodologies
              ASN Identification
              TLS Cert Extraction
              Basic IT Skills
              No Linux, programming or hacking knowledge required.
              Computer with a minimum of 4GB ram/memory & Internet Connection
              Operating System: Windows / OS X / Linux
          Welcome to Recon for Bug Bounty, Pentesting & Ethical Hacking.
          This course starts with the Basics of Recon & Bug Bounty Hunting Fundamentals to Advance Exploitation.
          This course starts with basics with Web and Web Server Works and how it can be used in our day to day life. We will also learn about DNS, URL vs URN vs URI and Recon for Bug Bounties to make our base stronger and then further move on to Target Expansion, Content Discovery, Fuzzing CMS Identification, Certificate Transparency, Visual Recon , Github Recon , Custom Wordlists , Mind maps, Bug Bounty Automation, Bug Bounty Platforms with practicals.
          This course covers All the Tools & Techniques for Penetration Testing & Bug Bounties for a better understanding of what’s happening behind the hood.
          The course also includes in depth approach towards any target and increases the scope for mass hunting and success.
          With this course, we will learn Target Selection Techniques for Host, Subnet Scans & Host Discovery, Content Discovery, Subdomain Enumeration Horizontal & Vertical, CMS Identification, Fuzzing the target for finding web vulnerabilities like XSS, Open Redirect, SSRF, Sql Injection etc. How to increase the scope and take screenshots for large number for hosts for better visualisation. We will also learn How to use Shodan for Bug Bounties to find critical vulnerabilities in targets. We will also see Github Recon to find sensitive information for targets like API keys from GitHub Repositories. Next we will see How to perform Automation for daily day to day tasks and easier ways to run tools, We will also see How to write Bug Bounty & pentesting Reports. We will also cover mind maps by other hackers for a better approach towards any target and also we will see mindmap created by us. We will also see Bug Bounty Platforms and how to kick start our journey on them.
          Here's a more detailed breakdown of the course content:
          In all the sections we will start the fundamental principle of How the scan works and How can we perform Exploitation.
              In Introduction, We will cover What is Web, What are Web Servers, DNS and We will also learn about DNS and How DNS works and also How DNS is important in our day to day life.We will also see the difference between URL, URN and URI, We will also see the complete breakdown of URL to understand better. We will also learn about Bug-Bounty Hunting and Understand the Importance of Recon in Bug-Bounty Hunting and Pentesting.
              Before starting the journey, We will see Top-10 rules for Bug-Bounty Hunting and we will understand the psychology of the Hackers.
              In Shodan for Bug-Bounties we will start with the installation of Shodan and we will learn about Shodan Queries such as Info, Count downloads and many more and will run them from our command line. We will also learn Host Enumeration, Parse dataset, Search Queries, Scan commands using Shodan. The Section cannot be completed without learning about Shodan GUI which is very simple and easily understandable. We will also see Shodan Images, Exploits , Report generation and alot more.
              In the end, we will see the summary and revision of the section to remember the important queries and key points.
              We will see live hunting with Shodan and understand about latest CVE’s and perform exploits. We will see Jenkins Exploitation Logs, Jenkins Exploitation Credentials, ADB under Shodan LIVE Hunting.
              In Certificate Transparency for Subdomain Enumeration we will learn about crt[dot]sh, wildcards of crt[dot]sh and We will learn automation for crt[dot]shto enumerate subdomains for a target. We will also learn about Shodan, Censys for Subdomain Enumeration, We will learn about Google and Facebook Certificate Transparency. We will also learn to find out Subdomains using DNS Dumpster and enumerate all the DNS records as well as save the hosts in a xlsx format. We will also see the workflow for dnsdumpster to know about the whole target server from its DNS records like A, CNAME, MX, TXT etc.
              In Scope Expansion we will learn about ASN Lookup, Pentest tools, VirusTotal. We will also learn about some awesome tools like Sublister, Subfinder, knockpy, Asset Finder, Amass, Findomain, Sublert, Project Discovery Nmmapper and a lot more.
              We will also understand how to use them effectively for expanding the scope to walk on less travelled road and achieve success in bug bounties
              In DNS Enumeration for Bug-Bounties we will learn and understand about DNS Dumpster, DNS Goodies, Altdns, Massdns, Vertical & Horizontal Correlation (Viewdns.info) and enumerate the subdomains from the recursive DNS.
              We will start with Introduction to Fuzzing, Its importance and Step by Step process, We will see fuzzing practically on LAB and LIVE websites to understand better.
              We will Learn, Understand and Use tools like Wfuzz and FFUF and also see how we can perform recursive fuzzing on the target. We will also perform HTTP Basic Auth Fuzz to crack the login of the dashboards and also do Login Authentication Cracking with the help of useful wordlists.
              We will utilise some of the wordlists like Seclists, FuzzDB, Jhaddix All.txt and will also see how to make our own custom wordlists for the targets.
              Content Discovery covers tools like Dirsearch, Gobuster which will be helpful for finding out sensitive endpoints of the targets like db.conf or env files which may contain the DB username and passwords. Also sensitive information like periodic backups or source code and can also be identified which can lead to compromise of the whole server.
              In CMS Identification we will learn and understand about Wappalyzer, Builtwith, Netcraft, Whatweb, Retire.js
              As Banner Grabbing and identifying information about the target is the foremost step, we will identify the underlying technologies which will enable us to narrow down the approach which will lead to success.
              In WAF Identification we will see WAF Detection with Nmap, WAF Fingerprinting with Nmap, WafW00f vs Nmap.
              We will know, If there are any firewalls running on the target and accordingly send our payloads to the targets and throttle our requests so we can evade them successfully.
              The Mindmaps for Recon and Bug-Bounty section will cover the approach and methodology towards the target for pentesting and bug bounty. A strong and clear visual building block visual representation will help in performing the attack process with more clarity and will help in knowing the next steps.
              The Bug-Bounty Platforms section contains a Roadmap of How to start your Bug-Bounty Journey on different Platforms like Hackerone, Bugcrowd, Integrity, Synack, It also covers how to Report Private RVDP Programs.
              With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.
                  This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.
                  Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.
          Who this course is for:
              Anybody interested in learning website & web application hacking / penetration testing
              Any Beginner who wants to start with Penetration Testing
              Any Beginner who wants to start with Bug Bounty Hunting
              Trainer who are willing to start teaching Pentesting
              Any Professional who working in Cyber Security and Pentesting
              Ethical Hackers who wants to learn How OWASP Works
              Beginners in Cyber Security Industry for Analyst Position
              SOC person who is working into a corporate environment
              Developers who wants to fix vulnerabilities and build secure applications
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.