Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Exploits Packs 2018

      Recommended Posts

      Staff

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      On 8/13/2018 at 4:54 PM, dEEpEst said:

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

       

      Hidden Content
      • Hidden Content

          Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      the password did not work

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Disclaimer
          Aurthor assumes that the users would use Gr3eNoX Vulnerabilitie scanner legally. Aurthor won't be responsible in case of any damage caused by any user using this source code. This code is open sourced for educational purpose.
          Features
              SQLI Scanner
              SQLI Simple
              SQLI Complex
              LFI Scanner
              LFI Fuzz
              XSS Scanner
              Custom domain
          Tested On
              Windows 10 (64 bits)
              Windows 10 (32 bits)
              Windows 7

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Introduction to Arm exploitation Part one
          What you'll learn
              Arm exploitation
              Binary exploitation
              Reverse engineering
              Basic arm instructions
              Gdb primer
              Patching binaries
              Ghidra,Binary ninja,Hopper etc
              Exploit development
              Format string vulnerabilities
              Ret2zp Attack
              Nx Bypass
              Buffer overflow
          Requirements
              A PC
              Basic programming concept(not necessary)
              Some interest
          Description
          Hello,
          Welcome to the cheapest and first course of Arm exploitation in Udemy.This course is purely for beginners.As you all know arm based devices are becoming more and more prominent these days so its important to learn about the securing them.i made this course highly practical so that it doesn't bore you as you go.This course Only requires just a PC we shouldn't be needing any raspberry pi or anything we will using emulated labs .This course is very basic and if you are already familiar with buffer overflows and format string exploitation this wouldn't be much help to you but still this can help you as a primer and as an introduction to ARM exploitation.
          This course is focused on Arm v6 vulnerabilities and Exploitation (32 bit ).We will start off with some basic arm instructions and will move to the practical exploitation.The core sections of these course is Reverse engineering and binary exploitation.We will reverse and modify the behaviour of simple crackme programs using Ghidra,Binary ninja,Hopper etc.Then we will move into exploiting various binaries using format string vulnerabilities and buffer overflows.After that we will be look at  the protections used  by the binaries and bypassing them.We will be using ctf style examples mostly.As this is the part one of the course we will cover everything from the scratch.This course has a 30 day refund policy so even if you dont like this course you can just surely get your money 100%.
          (NB : Its a ongoing course new contents will be added)
          I suggest you to watch the sample videos and then deciding to buy this.
          Who this course is for:
              Anyone Interested in learning binary exploitation
              Hackers
              Ctf players
              Reverse engineers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Students will learn assembly language fundamentals for x64 processors
              Students will learn how to write shellcode on Linux for x64 processors
              Students will learn practical Linux exploit development concepts for x64 processors
              Students will learn how to bypass Linux exploit mitigation techniques such as NX, Stack Cookies and ASLR
          Requirements
              A computer with administrative access, if you want to follow the hands-on exercises.
              It is good to have knowledge basic on exploit development
          Description
          This course teaches exploit development for Linux (x86_64). This course introduces students to the exploit development concepts associated with Linux x86_64 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.
          [IMPORTANT NOTES]: This is an ongoing course and new content will be uploaded progressively.
          Who this course is for:
              Bug bounty hunters
              Penetration testers
              Security Auditors
              Red Team Operators
              Anyone interested in security.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability.
          This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability.
          Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities.
          What you’ll learn

          Web Application Pentesting
          Completing 20 exercise of Mutillidae Vulnerable Web Application
          OWASP top 10 2017
          Mitigations for each vulnerability
          Secure code for mitigation
          Are there any course requirements or prerequisites?
          This course is for beginners
          Basic knowledge of OWASP top 10
          Basics of using Burp Suite and Proxy
          Burpsuite and Browser Setup

          Who this course is for:

          Beginner ethical hacking students
          Students who want to learn Web Application Pentesting
          Students who want to perform exercises on Mutillidae Vulnerable Application
          Students who want to learn about the Mitigations of each vulnerability in OWASP top 10 2017
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Getting Comfortable with Kali Linux
              The Essential Tools
              Passive Information Gathering
              Linux Buffer Overflow Exploitation
              Working with Exploits
              Client Side Attacks
          Requirements
              No prerequisites for this course - A computer with Internet
          Description
          With the skills you gain here, you’re equipped to pursue the Security+ certification from CompTIA.The Security+ Certification by CompTIA is an international and vendor-neutral certification that has been endorsed and recognized by industry computing manufacturers and organizations. This course provides foundational knowledge of the principles, techniques, and tools needed to successfully prepare for the SY0-401 exam. With the skills you gain here, you’re equipped to pursue a number of security certifications including the Security+ from CompTIA and the CEH from EC-Council.
          Who this course is for:
              Beginner hackers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.