Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      crypter
      Root Crypter v1.4 [Cracked]

      17 posts in this topic

      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This shell is the ultimate WinRM shell for hacking/pentesting.
          WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators.
          This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff.
          Features
              Command History
              WinRM command completion
              Local files completion
              Upload and download files
              List remote machine services
              FullLanguage Powershell language mode
              Load Powershell scripts
              Load in memory dll files bypassing some AVs
              Load in memory C# (C Sharp) compiled exe files bypassing some AVs
              Colorization on output messages (can be disabled optionally)

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. MODULES:
           
          1. Legacy | Over 50K CPM - Proxyless
          2. Accounts Brute Checking | Over 5K CPM - Need Proxies
          3. Account Checking with Capture - Proxyless
          4. Bits Sender - Proxyless
          5. Follower Sender - Proxyless
          6. Subscriber Sender - Proxyless
           
          Features:
           
              Legacy Checking - 50K CPM
              Brute Account Checking - Over 5K CPM
              Well its free?? Cause cracked nibba.
              Actually the most Accurate and Fastest Checker
              Stable
              Best Capture on the Checker Module


          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Eliminado:
          Autoloading, Anti-VM, añadido peso, iplogger, bug falso, ya que todo es público y puede extraer la fuente usted mismo.
          Sales:
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Server.exe

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Dirble is a website directory scanning tool for Windows and Linux. It’s designed to be fast to run and easy to use.
          Changelog v1.4
          Added
              Add ability to do scans using HEAD and POST requests
              Directories which return 401 and 403 codes are no longer scanned by default
              Not found detection now can detect response lengths that vary by the URL length
              Added dockerfile to git repository
              Commit hashes are now displayed with the version number in local builds
          Changed
              Wordlist items now have a leading and trailing slash removed
              Default wordlist location checks have been improved
              SimpleLog crate now used to print additional scanning information
              Silent and verbose flags now affect logging level
              Output for listable directories now has a bold L
              Wordlist splitting of initial URLs is increased
          Fixed
              Disable recursion flag now works as intended
              Validator always defaulting to 404


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

          Hidden Content
          Give reaction to this post to see the hidden content.