Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  


      Recommended Posts


      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Evil-WinRM
          This shell is the ultimate WinRM shell for hacking/pentesting.
          WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators.
          This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff.
              Command History
              WinRM command completion
              Local files completion
              Upload and download files
              List remote machine services
              FullLanguage Powershell language mode
              Load Powershell scripts
              Load in memory dll files bypassing some AVs
              Load in memory C# (C Sharp) compiled exe files bypassing some AVs
              Colorization on output messages (can be disabled optionally)
          Changelog v3.0
              Remote files/directories autocomplete feature (Thanks to arale61)
              Added option to log commands and outputs to a log file (Thanks to Borch Cañavate)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Invoke-Stealth
          Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator.
          This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques. You can use any of them separately, together, or all of them sequentially with ease, from Windows or Linux.
          · Chimera: Substitute strings and concatenate variables
          · BetterXencrypt: Compresses and encrypts with random iterations
          · PyFuscation: Obfuscate functions, variables and parameters
          · PSObfuscation: Convert content to bytes and encode with Gzip
          · ReverseB64: Encode with base64 and reverse it to avoid detections

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. YAPS – Yet Another PHP Shell
          As the name reveals, this is yet another PHP reverse shell, one more among hundreds available out there. It is a single PHP file containing all its functions and you can control it via a simple netcat listener (nc -lp 1337).
          In the current version, its main functions support only Linux systems, but I’m planning to make it work with Windows too.
              Single PHP file (no need to install packages, libs, or download tons of files)     Works with netcat, ncat, socat, multi/handler, almost any listener     Customizable password protection     No logs in .bash_history     Can do some enumeration         Network info (interfaces, iptables rules, active ports)         User info         List SUID and GUID files         Search for SSH keys (public and private)         List crontab         List writable PHP files     Auto download LinPEAS, LinEnum, or Linux Exploit Suggester     Write and run PHP code on a remote host     (Semi) Stabilize shell Cons
              Connection isn’t encrypted (yet) (nc does not support SSL)     Not fully interactive (although you can spawn an interactive shell with !stabilize)         CTRL+C breaks it; can’t use arrows to navigate (unless you use rlwrap nc -lp <ip> <port>)
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Just a little refresh on the popular PHP reverse shell script pentestmonkey/php-reverse-shell. Credits to the original author!
          Works on Linux OS and macOS with /bin/sh and Windows OS with cmd.exe. Script will automatically detect an underlying OS.
          Works with both ncat and multi/handler.
          Tested on XAMPP for Linux v7.3.19 (64-bit) with PHP v7.3.19 on Kali Linux v2020.2 (64-bit).
          Tested on XAMPP for OS X v7.4.10 (64-bit) with PHP v7.4.10 on macOS Catalina v10.15.6 (64-bit).
          Tested on XAMPP for Windows v7.4.3 (64-bit) with PHP v7.4.3 on Windows 10 Enterprise OS (64-bit).
          In addition, everything was tested on Docker images nouphet/docker-php4 with PHP v4.4.0 and steeze/php52-nginx with PHP v5.2.17.
          Made for educational purposes. I hope it will help!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          In this course I will walk you through, how you could build a full working python shell without using IP or PORT forwarding method. Hope you will find useful tips to think outside a box when you always try to build your own program. We use the Simple mail transfer protocol, instead of the SOCKET protocol. I was trying to navigate many of the course published on Udemy but didn’t find a course who use SMPT protocol more than in a keylogger apps. So in this course, I try to take this program to next level, and I build a full script that works even better than what we can build using the SOCKET protocol. Just to list some of them you don’t need to use the IP/Port forwarding method to make your program work outside the local area network. SO you could just use this type of shell outside your network as simple as it is.
          DISCLAIMER this course is for educational purposes only.
          SMTP servers are complicated, and if you’re just dipping your toe into the how-email-gets-sent world, it’s easy to feel overwhelmed. To help you navigate your email sending, we’ve put together a list of the most common SMTP server questions we receive, so you’ll be an SMTP expert in no time.
          What is an SMTP server?
          An SMTP (Simple Mail Transfer Protocol) server is an application that’s primary purpose is to send, receive, and/or relay outgoing mail between email senders and receivers.
          An SMTP server will have an address (or addresses) that can be set by the mail client or application that you are using.
          When you send an email, the SMTP server processes your email, decides which server to send the message to, and relays the message to that server. The recipient’s inbox service provider, such as Gmail or AOL then downloads the message and places it in the recipient’s inbox.
          You can find more details on SMTP servers on our docs page.
          Is an SMTP server the same as a normal server?
          Technically, yes. Like most servers, the SMTP server processes data to send to another server, but it has the very specific purpose of processing data related to the sending, receiving, and relaying of email. An SMTP server is also not necessarily on a machine. It is an application that is constantly running in anticipation of sending new mail.
          Why are SMTP servers important?
          Without an SMTP server, your email wouldn’t make it to its destination. Once you hit “send,” your email transforms into a string of code that is then sent to the SMTP server. The SMTP server is able to process that code and pass on the message. If the SMTP server wasn’t there to process the message, it would be lost in translation.
          Additionally, the SMTP server verifies that the outgoing email is from an active account, acting as the first safeguard in protecting your inbox from illegitimate email. It also will send the email back to the sender if it can’t be delivered. This informs the sender that they have the wrong email address or that their email is being blocked by the receiving server.
          If you’re looking for more information on SMTP, check out our post, SMTP Service Crash Course.
          Source (sendgrid/blog/what-is-an-smtp-server/)
          What we learn on this course?
          on this course we will build fully functional reverse shell, which could work outside your local area network.
          what makes this program different from others?
          on this course we build our reverse shell using SMTP protocol instead of using SOCAT protocol. 2w
          Who this course is for:
              Anyone who wants to learn about Ethical hacking and Python programming.
          What you’ll learn
              Create reverse shell which could work anywhere in the world WITHOUT using your public IP address or PORT forwarding method.

          Hidden Content
          Give reaction to this post to see the hidden content.