Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Who do you think the 2018 soccer world cup will win?

      Who will be the winner of the football world cup?  

      5 members have voted

      This poll is closed to new votes
      1. 1. Who will be the winner of the football world cup?

        • Uruguay
          0
        • France
        • Brazil
        • Belgium
        • Russia
          0
        • Croatia
          0
        • Sweden
          0
        • England

      • Please sign in or register to vote in this poll.
      • Poll closed on 07/06/2018 at 02:00 PM

      Recommended Posts

      Staff

      do you like football? who do you think they can win?
      term of this survey until the start of the first quarterfinal match.

      Share this post


      Link to post
      Share on other sites
      Staff

      Ooohhh !!  :russian:

      it seems that I will be the one that is going to approach the result the most !!

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This is a modern platform for sharing media content, an analogue of social networks such as twitter, instagram.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Understand the complete working, terminology and be able to have a complete understanding about the Deep/Dark web.
              To access the Deep web as well as the Dark web with Complete Ease and total security.
              To visit some advanced and famous websites located on the Hidden Web(Deep and Dark Web).
              Understanding Working, Trading, Buying, Selling as well as Mining CRYPTOCURRENCIES.
              About the Dangers as well as precautions to be taken care of while surfing the Web.
              Use Darknet Email services.
              Anonymously access the dark net and TOR hidden services (onion services).
          Requirements
              No particular requirements. But you should be interested in exploring the Deep/Dark web as they are the Hidden Sections of the Internet. you will only need a Computer and an Internet connection.
          Description
          Have you heard many times about the Deep/Dark Web but you never had any clue what it is?
          Have you ever thought about how the Hidden side of the web would be?
          Are you curious to explore the Hidden area of the internet but are unable to do so because of security reasons?
          Dark Web: Complete Introduction to the Deep/Dark Web 2021 is made for you! You will learn all the points related to the Deep/Dark Web Anonymity, TOR, Hidden services, TAILS, Web Security, Cryptocurrencies you name it, you learn it!
          Also a detailed guide on Cryptocurrencies is provided, points like Cryptotrading and Cryptomining are covered.
          This course is designed for anyone who wants to get started with using the Deep/Dark Web in a safe, and effective manner. So if you’re a complete newbie, or someone who has had a little experience with the Deep Web but no extensive use, then you’re in the right place.
          At the end of this cource you will be easily able to access the Deep web as well as the Dark web through the TOR browser and will be a master in web security(Anonymity) as well as Cryptocurrencies.
          Who this course is for:
              Anyone who is Curious and Interested about the Deep and the Dark Web.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              The student will be able to hack any wifi (WEP,WPA/WPA2).The student will also gain . some basic knowledge about Kali Linux.
          Requirements
              No need to have any knowledge previously. All you need is a computer. This course is for absolute beginners.
          Description
          Hey there!
          First of all,I am really happy that you are interested to learn about WiFi hacking.Trust me,it is going to be an awesome and fun journey throughout.
          Now coming to this course,
          1.I have made this course keeping beginners in mind.So, basically all the videos that you are about to watch are made in such a way that you can understand the concept in one shot.Everything is crystal clear and neat.
          2.This course takes you from Beginner level to Advanced level.By the end of this course, you will be able to hack any WiFi (Both WEP and WPA/WPA2).
          3.The best part of this course is that, if you are stuck at any point in the course, I will help you out.You can expect response from me for you query in less than 24 hours.
          Who this course is for:
              Anyone who wants to learn how to hack wifi from scratch.
              Anyone who is looking for clear and easy wifi hacking video course.

          Hidden Content
          Give reaction to this post to see the hidden content. Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. REDasm – The Open Source Disassembler
          REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets.
          You can hack and improve REDasm without any issues and limitations.
          REDasm is under heavy development but it provides several interesting features:
              IDA-Like interactive listing.
              Multithreaded analysis.
              Graphing support.
              Project management.
              Signature engine.
              Cross-platform.
              Easy to use.
          Changelog v3.0 beta2
              Reimplemented cross references analysis
              Implemented Tensilica Xtensa and ESP32 support
              Added support for Xtensa ELF executables
              Implemented COFF plugin
              Improved build system
              Restored RDCommandPlugin (WIP)
              Fixed UI related APIs
              Minor fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              How to use multiple methods to escalate privleges on modern versions of Windows 10
              How to escalate privleges in CTFs such as HackTheBox, TryHackMe and more
              How to succeed in CTF style exams such as the OSCP, eCPPT and CEH
              How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career
          Requirements
              A HackTheBox VIP Subscription is Required
              Basic knowledge of virtual machines
          Description
          New Launch for Spring 2021!
          This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course.  This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints.  Everything is carefully, explained - step-by-step.
          Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments.
          Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course.
          The Techniques
          You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines
              Windows Kernel Exploits
              Weak Registry Permissions
              Token Manipulation
              CVE Exploits
              DPAPI Abuse (Three New Lectures Just Added January 2021!)
          The Tools
          You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more.   You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more.
          My dream for you
          By the end of this course you should be able to use these techniques in:
              Your day to day work
              OSCP preparation
              CTF hacking
          About the lab
          There are 10 vulnerable machines.
          No lab setup is required as the entire environment is already established in HackTheBox VIP labs
          I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started.
          Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation.
          Tip:
          I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal.  Never again will that happen.

          Who this course is for:
              Students interested in how attackers escalate privileges on modern Windows endpoints
              Beginning and Intermediate cyber security students.
              Students looking for OCSP practice
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.