Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      m3tal

      AZOrult 3.0 - 3.1 - 3.3 beta

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      AZO 3.0 - 3.1 - 3.3 beta

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      it keeps asking for password when installing on panel. please advise

      Share this post


      Link to post
      Share on other sites

      its old version! its public!!! 

      Hidden Content

        Give reaction to this post to see the hidden content.
       u waste my time!!!!!!

      Share this post


      Link to post
      Share on other sites
      On 02.11.2018 at 3:25 PM, dolanpls said:

      is it working? and whats the version?

      is it old version! 2016 year

      Share this post


      Link to post
      Share on other sites

      lets try this , and see if builder work

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. faqMailAccess is tool that developed by Salman Alwan aka JustFaQ to save your time checking your mail access combo, it is simple i know but this is the beta version. You may face some problems, feel free to edit the code. More tools will be added soon.
          Features
          Main Commands
              fast tool
              simple ui

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What is Spray365?
          Spray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is Spray365 different from the many other password spraying tools that are already available? Spray365 enables passwords to be sprayed from an “execution plan”. While having a pre-generated execution plan that describes the spraying operation well before it occurs has many other benefits that Spray365 leverages, this also allows password sprays to be resumed (-R option) after a network error or other interruption. While it is easiest to generate a Spray365 execution plan using Spray365 directly, other tools that produce a compatible JSON structure make it easy to build unique password spraying workflows.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malwarebytes Anti-Exploit Premium – will provides the essential exploit protection with proactive technology for browsers and applications. It blocks dangerous exploit-based malware and prevents the damage it can do. Not an antivirus, but compatible with most antivirus, Malwarebytes Anti-Exploit is a small, specialized shield designed to protect you against one of the most dangerous forms of malware attacks. And it’s free. Malwarebytes Anti-Exploit Premium protects you from zero-day exploits targeting browser and application vulnerabilities. Its proprietary technology guards you in that critical period between the release of a new exploit and its security patch. And, unlike antivirus products, Malwarebytes Anti-Exploit Premium proactively prevents the exploit from installing its payload. Before it can do damage.
          No other anti-exploit technology (including Microsoft’s Enhanced Mitigation Experience Toolkit) provides three layers of protection. These layers work together to block exploits instantly, in both in the first stage of the attack, preventing shell code execution, and in the second stage, memory calls and sandbox escapes and memory mitigation bypasses.
          Malwarebytes Anti-Exploit doesn’t slow down your computer, because this technology doesn’t use a signature database like traditional endpoint security, so it doesn’t require frequent updating. And it only takes up three MBs on your hard drive – the size of one large high-resolution photo.
          Malwarebytes Anti-Exploit Premium operates at a different level from and independently of anti-malware and antivirus programs, so you can install it without worry.
          Features
          • Shields Java
          • Shields browsers and browsers add-ons (including Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera)
          • Shields PDF readers (including Adobe Reader, Adobe Acrobat, Foxit Reader)
          • Shields Microsoft Word, Excel, and Powerpoint
          • Shields media players (including Microsoft Windows Media Player, VLC Player, QuickTime Player, Winamp Player)
          • Ability to add/manage custom shields
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping. Supports both manual and automated analysis on variety of target types with many available features & tools. For more information checkout the documentation

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 0x1

          Hidden Content
          Give reaction to this post to see the hidden content. Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, Linux.
          Disassemble : Disassemble executables and libraries from multiple formats, platforms, and architectures.
          Decompile : Decompile code to C or BNIL for any supported architecture - including your own.
          Automate : Automate analysis with C++, Python, and Rust APIs from inside or outside the UI.
          Analyze : Visualize control flow and navigate through cross-references interactively.
          Annotate : Name variables and functions, apply types, create structres, and add comments.
          Collaborate : Collaborate effortlessly with synchronized commits using our Enterprise product.

          Disassemble Files
          Vector 35 provides first-party support for dissassembly from multiple architectures, including x86, x86-64, ARMv7 (with Thumb2), ARMv8 (AArch64), PowerPC, 6502, Z80, and MIPS. Additionally, our community supports many other architectures through our public plugin ecosystem. Loaders are available for all major platforms (PE, Mach-O, ELF) and can be extended or customized using our API.
          Decompile Code
          Our built-in decompiler works with all of our officially supported architectures at one price and builds on a powerful family of ILs called BNIL. In fact, not just our architectures, but even community architectures can produce amazing decompilation. Our decompiler outputs to both C and BNIL and can be switched on-demand.
          Automate Anything
          Our extensive API can be used to create and customize loaders, add or augment architectures, customize the UI, or automate any workflow (types, patches, decompilation…anything!). Bindings are available for C++, Python, and Rust.
          Create Plugins
          Made something cool and want to share? Publish your community plugin and have it featured in our Plugin Manager! These plugins can be installed (or updated) at any time by any customer, right inside the client.
          Triage Quickly
          Use our API to quickly batch process files and see the results in our triage view. Use the entropy graph to identify areas of interest, like packed or encrypted data. Click on any location to navigate there quickly.
          Explore Interactively
          We didn’t just build the best automation and API for binary analysis, but our UI design is intentional and clean. None of the distractions, but all of the features you need for the biggest jobs including multiple tabs, synchronized and split views, custom layouts and more.
          Annotate Everything
          Reverse engineering is the process of exploring the unknown. As your understanding improves, we give you the tools to represent that and improve analysis. Add types, structures, comments, highlights, tags, and more.
          Patch Effectively
          Make binary patches quickly and effectively with a variety of tools purpose-built for speed. Edit lines of assembly directly, select a preset patch, edit raw bytes with our hex editor view, or even compile C into the executable directly with our own built in compiler SCC.
          Switch Platforms
          You’ll never be stuck. Binary Ninja not only runs seamlessly on Windows, macOS, and Linux, but every purchases includes all three platforms for one price.
          Run Headlessly
          No need to only do your analysis inside of Binary Ninja. Instead, bring Binary Ninja into your analysis environment. Use the python repl of your choice, or even statically compile our core analysis library into an existing framework, our analysis can be completely untethered from the UI.
          Download :

          Hidden Content
          Give reaction to this post to see the hidden content.