Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Exploits Packs 2018

      Recommended Posts

      Staff

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      On 8/13/2018 at 4:54 PM, dEEpEst said:

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

       

      Hidden Content
      • Hidden Content

          Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      the password did not work

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability.
          This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability.
          Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities.
          What you’ll learn

          Web Application Pentesting
          Completing 20 exercise of Mutillidae Vulnerable Web Application
          OWASP top 10 2017
          Mitigations for each vulnerability
          Secure code for mitigation
          Are there any course requirements or prerequisites?
          This course is for beginners
          Basic knowledge of OWASP top 10
          Basics of using Burp Suite and Proxy
          Burpsuite and Browser Setup

          Who this course is for:

          Beginner ethical hacking students
          Students who want to learn Web Application Pentesting
          Students who want to perform exercises on Mutillidae Vulnerable Application
          Students who want to learn about the Mitigations of each vulnerability in OWASP top 10 2017
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Getting Comfortable with Kali Linux
              The Essential Tools
              Passive Information Gathering
              Linux Buffer Overflow Exploitation
              Working with Exploits
              Client Side Attacks
          Requirements
              No prerequisites for this course - A computer with Internet
          Description
          With the skills you gain here, you’re equipped to pursue the Security+ certification from CompTIA.The Security+ Certification by CompTIA is an international and vendor-neutral certification that has been endorsed and recognized by industry computing manufacturers and organizations. This course provides foundational knowledge of the principles, techniques, and tools needed to successfully prepare for the SY0-401 exam. With the skills you gain here, you’re equipped to pursue a number of security certifications including the Security+ from CompTIA and the CEH from EC-Council.
          Who this course is for:
              Beginner hackers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. peda
          PEDA – Python Exploit Development Assistance for GDB
          Key Features:
              Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
              Add commands to support debugging and exploit development (for a full list of commands use peda help):
                  aslr — Show/set ASLR setting of GDB
                  checksec — Check for various security options of binary
                  dumpargs — Display arguments passed to a function when stopped at a call instruction
                  dumprop — Dump all ROP gadgets in the specific memory range
                  elfheader — Get headers information from debugged ELF file
                  elfsymbol — Get non-debugging symbol information from an ELF file
                  lookup — Search for all addresses/references to addresses which belong to a memory range
                  patch — Patch memory start at an address with string/hexstring/int
                  pattern — Generate, search or write a cyclic pattern to memory
                  procinfo — Display various info from /proc/pid/
                  pshow — Show various PEDA options and other settings
                  pset — Set various PEDA options and other settings
                  readelf — Get headers information from an ELF file
                  ropgadget — Get common ROP gadgets of binary or library
                  ropsearch — Search for ROP gadgets in memory
                  searchmem|find — Search for a pattern in memory; support regex search
                  shellcode — Generate or download common shellcodes.
                  skeleton — Generate python exploit code template
                  vmmap — Get virtual mapping address ranges of section(s) in debugged process
                  xormem — XOR a memory region with a key
          Changelog v1.2
              Bug fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. SUDO_KILLER is a tool that can be used for privilege escalation on the Linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo rules, vulnerability within the version of sudo being used (CVEs and vulns), and the use of dangerous binary, all of these could be abused to elevate privilege to ROOT.
          SUDO_KILLER will then provide a list of commands or local exploits which could be exploited to elevate privilege. It is worth noting that the tool does not perform any exploitation on your behalf, the exploitation will need to be performed manually and this is intended.
          Features
          Some of the checks/functionalities that are performed by the tool.
              Misconfigurations
              Dangerous Binaries
              Vulnerable versions of sudo – CVEs
              Dangerous Environment Variables
              Credential Harvesting
              Writable directories where scripts reside
              Binaries that might be replaced
              Identify missing scripts
          What version 2 of SK includes:
                  New checks and/or scenarios
                          CVE-2019-14287 – runas
                          No CVE yet – sudoedit – absolute path
                          CVE-2019-18634 – pwfeedback
                          User Impersonation
                          list of users in sudo group
                  Performance improved
                  Bugs corrected (checks, export, report,…)
                  Continous improvement of the way output presented
                  New videos will be added soon
                  Annonying password input several time removed
                  New functionality: offline mode – ability to extract the required info from audited system and run SK on host.
                  Testing environment : A docker to play with the tool and different scenarios, you can also train on PE.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Download And Execute File With Fud HTA Payload

          Hidden Content
          Give reaction to this post to see the hidden content. Payload.hta Scan

          Hidden Content
          Give reaction to this post to see the hidden content. https://shadowscan.net/panel/detection?report_uuid=a0306053-3b20-4afa-b4b4-24113dc69341