Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      ProRat v1.9

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites

       Vintage ;)

       

      Share this post


      Link to post
      Share on other sites
      Staff

      @Byll

      hace 18 minutos, Byll dijo:

       Vintage ;)

       

      Yes. :d_ice:

      Share this post


      Link to post
      Share on other sites
      On 18/6/2018 at 1:39, Cyber Dragon dijo:
        Ocultar contenido

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

       

      Pass:level23hacktools.com

      ---------------------------------------------

      Completely hidden and silent in the background.
      Doesn't require .Net Framework to working
      You can change the icon of your miner.
      and many more features you can check it yourself.

       

       

       

      On 14/8/2018 at 6:56, dEEpEst dijo:

      @Byll

      Yes. :d_ice:

      hace clases estimado

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM.
          Features
              Featureful hex view
                  Byte patching
                  Patch management
                  Copy bytes as feature
                      Bytes
                      Hex string
                      C, C++, C#, Rust, Python, Java & JavaScript array
                      ASCII-Art hex view
                      HTML self-contained div
                  String and hex search
                  Colorful highlighting
                  Goto from start, end, and current cursor position
              Custom C++-like pattern language for parsing highlighting a file’s content
                  Automatic loading based on MIME-type
                  arrays, pointers, structs, unions, enums, bitfields, using declarations, litte and big-endian support
                  Useful error messages, syntax highlighting, and error marking
              Data importing
                  Base64 files
                  IPS and IPS32 patches
              Data exporting
                  IPS and IPS32 patches
              Data Exporting
              Data inspector allowing interpretation of data as many different types (little and big-endian)
              Huge file support with fast and efficient loading
              Strings search
                  Copying of strings
                  Copying of detangled strings
              File hashing support
                  CRC16 and CRC32 with custom initial values and polynomials
                  MD4, MD5
                  SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              Disassembler supporting many different architectures
                  ARM32 (ARM, Thumb, Cortex-M, aarch32)
                  ARM64
                  MIPS (MIPS32, MIPS64, MIPS32R6, Micro)
                  x86 (16 bit, 32 bit, 64 bit)
                  PowerPC (32 bit, 64 bit)
                  Sparc
                  SystemZ
                  XCore
                  M68K
                  TMS320C64X
                  M680X
                  Ethereum
              Bookmarks
                  Region highlighting
                  Comments
              Data Analyzer
                  File magic-based file parser and MIME type database
                  Byte distribution graph
                  Entropy graph
                  Highest and avarage entropy
                  Encrypted / Compressed file detection
              Helpful tools
                  Itanium and MSVC demangler
                  ASCII table
                  Regex replacer
                  Mathematical expression evaluator (Calculator)
                  Hexadecimal Color picker
              Built-in cheat sheet for pattern language and Math evaluator
              Doesn’t burn out your retinas when used in late-night sessions

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in the waybackmachine.
          Features
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.9
              Fixed: Fixed percentage & line count bug during scan
              Added: Display errors number in live during scan

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. NullRAT
          Remote Access Trojan that uses Discord as C&C
          One of the main things about this RAT is it will be under 8mb, so you can always upload it without nitro
          That's also why it doesn't have too many features compared to other Discord RATs
          Features:
              Find the public IP of the victim
              Find their Discord token(s)
              Find victim's approximate location
              Add payload to startup with one command
              Take pictures using victim's webcam
              Take screenshot of victim's PC
              Download files from victim's PC
              Upload files to victim's PC
              Get some information about their PC
              Execute command prompt commands (Thank you Sp00p)
              Browse around their PC, see directory contents, and much more It's windows-only by the way; sorry :(
          Fourth stable release (Upgrade ASAP)
          This release contains important changes and tweaks
          You should upgrade right now basically
          Changes are mentioned in the changelog.md file

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights.
          Changelog
          v1.9
              added Section object structured dump
              added ALPC port connections list (similar to !alpc /lpc windbg command)
              added MmUnloadedDrivers list
              added ExCreateCallback list to the callbacks list (PR #26)
              updated ApiSet plugin now support in place search filter
              internal rearrange

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Worm, Virus & Trojan Horse: Ethical Hacking Tutorial
          Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.
          In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. We will also look at the countermeasures that can be used to protect against such activities.
          What is a Trojan horse?
          A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc.
          The list below shows some of the activities that the attacker can perform using a Trojan horse.
          Use the user’s computer as part of the Botnet when performing distributed denial of service attacks. Damage the user’s computer (crashing, blue screen of death, etc.) Stealing sensitive data such as stored passwords, credit card information, etc. Modifying files on the user’s computer Electronic money theft by performing unauthorized money transfer transactions Log all the keys that a user presses on the keyboard and sending the data to the attacker. This method is used to harvest user ids, passwords, and other sensitive data. Viewing the users’ screenshot Downloading browsing historyhistor What is a worm?
            A worm is a malicious computer program that replicates itself usually over a computer network. An attacker may use a worm to accomplish the following tasks;
          Install backdoors on the victim’s computers. The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. the backdoors can also be exploited by other malware. Worms may also slowdown the network by consuming the bandwidth as they replicate. Install harmful payload code carried within the worm. What is a Virus?
            A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent. Viruses can consume computer resources such as memory and CPU time. The attacked programs and files are said to be “infected”. A computer virus may be used to; Access private data such as user id and passwords Display annoying messages to the user Corrupt data in your computer Log the user’s keystrokes Computer viruses have been known to employ social engineering techniques. These techniques involve deceiving the users to open the files which appear to be normal files such as Word or Excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.
          Trojans, Viruses, and Worms counter measures
            To protect against such attacks, an organization can use the following methods. A policy that prohibits users from downloading unnecessary files from the Internet such as spam email attachments, games, programs that claim to speed up downloads, etc. Anti-virus software must be installed on all user computers. The anti-virus software should be updated frequently, and scans must be performed at specified time intervals. Scan external storage devices on an isolated machine especially those that originate from outside the organization. Regular backups of critical data must be made and stored on preferably read-only media such as CDs and DVDs. Worms exploit vulnerabilities in the operating systems. Downloading operating system updates can help reduce the infection and replication of worms. Worms can also be avoided by scanning, all email attachments before downloading them.