Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Exploits Packs 2018

      Recommended Posts

      Staff

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      On 8/13/2018 at 4:54 PM, dEEpEst said:

      Exploits Packs 2018


      0x88 
      8MS08-067- Exploit 
      25 exploit kit 
      Adpack Exploit Pack 2.0.0 
      Apanda pack 
      Armitage Exploit Pack 1.0.0 
      Aurora Chinese Exploit 
      blackhole 
      Bleeding Life v2 
      bomba 
      Chinese Exploit JS 
      chinese Exploit 
      CRIMEPACK 2.0 
      CRIMEPACK 3.0 
      Cry Exploit Pack 2.7.2 
      cry217 
      Cute 
      czb_1. 1.1-7a DLoader 
      eventi 
      pack 
      Exploit Automatized 
      Exploit chino + WeB 
      Exploit Kit Chinese 
      Fake Game 1 
      Fake Game 2 
      Fake Game 3 
      fiesta 
      firepack 
      Fragus BlacK 
      Generator Exploits 
      Gong Da Pack 
      Gpack Exploit Pack 0.1.2
      paquete de hielo 3 
      Ice_pack_Platinum_Edition2_009_IDT_Group_and_BlackSun 
      IcePack-Platinum09-1x33x7-ES 
      IE exploit Kit 
      IE Exploit Pack chino 
      IE Generador [Aurora] 
      apasionado 20 FrameShit 
      en 
      Infector Pack de exploit 0.1.1 
      intoxicado 
      jiji Exploit 
      K0de Sploit Pack 
      KaiXin Exploit Pack 
      Kein Exploit Pack 
      Le_fiesta_1_8 
      Life 
      Limbo Troyan Kit 
      LinuQ Sploit Pack 
      luckysploit 
      Luiz Eleonore Exp 1.2 
      MassInfect 
      Merry Christmas Pack 
      mpack 
      multisploit 
      my-poly-sploit 
      n404 
      Napoleon Sploit 1.0 
      Neon Exploit sistem 
      neosploit-2
      Spl0its Nuke p4ck 
      Open Source Exploit Pack 
      paquetes 
      pex_2.5 
      Phoenix 
      phoenix2.4 
      phoenix23 
      primer Exploit v.1.2 sistema 
      RDS 
      Rojo Exploit Pack 2.0.0 
      SALO 
      Seo Sploit Paquete 
      chamán 
      de Siberia Exploit Pack 
      inteligente Exploit Pack 2.0.0 
      SPACK [Light Edition] 
      araña Paquete 
      sv14 Exploit Pack 
      Target Exploit Pack 0.16 
      tongji 
      Tornado Exploit Kit 
      ttedu Pack 
      Unique Pack 
      webattacker 
      wow Pack 
      X-Pack [Hecho en casa] 
      X-Pack Exploit 
      Yang Pack 
      yes_exploit_system 
      yes2.0 
      Zero Exploit pack 
      Zombie Infeccion Kit
      zoPack_v1.2 
      Chinese Exploit 

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

       

      Hidden Content
      • Hidden Content

          Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      the password did not work

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)
          Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file)
          You need to install lcab first (sudo apt-get install lcab)
          Check REPRODUCE.md for manual reproduce steps
          If your generated cab is not working, try pointing out exploit.html URL to calc.cab
          Finally try the docx in a Windows Virtual Machine:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. SpoolSploit
          A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
          Summary
          SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relaying machine accoun

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          ـــــــــــــــــــــــــــــــــــــ
          In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
          You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
          Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
          Who this course is for:
          ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
          Anyone interested in Reverse Engineering and Exploit Development

          Requirements
          ـــــــــــــــــــــــــــــــــــــــــــ
          This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Disclaimer
          Aurthor assumes that the users would use Gr3eNoX Vulnerabilitie scanner legally. Aurthor won't be responsible in case of any damage caused by any user using this source code. This code is open sourced for educational purpose.
          Features
              SQLI Scanner
              SQLI Simple
              SQLI Complex
              LFI Scanner
              LFI Fuzz
              XSS Scanner
              Custom domain
          Tested On
              Windows 10 (64 bits)
              Windows 10 (32 bits)
              Windows 7

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Introduction to Arm exploitation Part one
          What you'll learn
              Arm exploitation
              Binary exploitation
              Reverse engineering
              Basic arm instructions
              Gdb primer
              Patching binaries
              Ghidra,Binary ninja,Hopper etc
              Exploit development
              Format string vulnerabilities
              Ret2zp Attack
              Nx Bypass
              Buffer overflow
          Requirements
              A PC
              Basic programming concept(not necessary)
              Some interest
          Description
          Hello,
          Welcome to the cheapest and first course of Arm exploitation in Udemy.This course is purely for beginners.As you all know arm based devices are becoming more and more prominent these days so its important to learn about the securing them.i made this course highly practical so that it doesn't bore you as you go.This course Only requires just a PC we shouldn't be needing any raspberry pi or anything we will using emulated labs .This course is very basic and if you are already familiar with buffer overflows and format string exploitation this wouldn't be much help to you but still this can help you as a primer and as an introduction to ARM exploitation.
          This course is focused on Arm v6 vulnerabilities and Exploitation (32 bit ).We will start off with some basic arm instructions and will move to the practical exploitation.The core sections of these course is Reverse engineering and binary exploitation.We will reverse and modify the behaviour of simple crackme programs using Ghidra,Binary ninja,Hopper etc.Then we will move into exploiting various binaries using format string vulnerabilities and buffer overflows.After that we will be look at  the protections used  by the binaries and bypassing them.We will be using ctf style examples mostly.As this is the part one of the course we will cover everything from the scratch.This course has a 30 day refund policy so even if you dont like this course you can just surely get your money 100%.
          (NB : Its a ongoing course new contents will be added)
          I suggest you to watch the sample videos and then deciding to buy this.
          Who this course is for:
              Anyone Interested in learning binary exploitation
              Hackers
              Ctf players
              Reverse engineers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.