Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      dEEpEst

      TheSilentOfficeExploit - 888 tools (CVE 2017) draining

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Password:

      level23hacktools.com

      Share this post


      Link to post
      Share on other sites

      wooooooooooooooooooooooooooooooooow tnx mate, i hope it's still UD. thanks a bunch

      Share this post


      Link to post
      Share on other sites
      hace 34 minutos, valgalaxy dijo:

      I will indeed need to have this in my tool box

      @valgalaxy If you need it, why do not you download it? Nobody cares what you need, do not relive topics to say things like that or you will be expelled.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations.
          Demo:
           
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. XCat
          XCat is a command-line tool to exploit and investigate blind XPath injection vulnerabilities.
          It supports a large number of features:
              Auto-selects injections (run xcat injections for a list)
              Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval
              Built-in out-of-bound HTTP server
                  Automates XXE attacks
                  Can use OOB HTTP requests to drastically speed up retrieval
              Custom request headers and body
              Built-in REPL shell, supporting:
                  Reading arbitrary files
                  Reading environment variables
                  Listing directories
                  Uploading/downloading files (soon TM)


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A Penetration Testing Framework, you will have the very script that a hacker needs
          Fsociety Contains All Tools Used In Mr. Robot Series
          Menu
          Fsociety
              Information Gathering
              Password Attacks
              Wireless Testing
              Exploitation Tools
              Sniffing & Spoofing
              Web Hacking
              Private Web Hacking
              Post Exploitation
              Contributors
              Install & Update
          Information Gathering :
              Nmap
              Setoolkit
              Host To IP
              WPScan
              CMS Scanner
              XSStrike
              Dork – Google Dorks Passive Vulnerability Auditor
              Scan A server’s Users
              Crips
          Password Attacks :
              Cupp
              Ncrack
          Wireless Testing :
              reaver
              pixiewps
              Bluetooth Honeypot
          Exploitation Tools :
              ATSCAN
              sqlmap
              Shellnoob
              Commix
              FTP Auto Bypass
              JBoss Autopwn
          Sniffing & Spoofing :
              Setoolkit
              SSLtrip
              pyPISHER
              SMTP Mailer
          Web Hacking :
              Drupal Hacking
              Inurlbr
              WordPress & Joomla Scanner
              Gravity Form Scanner
              File Upload Checker
              WordPress Exploit Scanner
              WordPress Plugins Scanner
              Shell and Directory Finder
              Joomla! 1.5 – 3.4.5 remote code execution
              Vbulletin 5.X remote code execution
              BruteX – Automatically brute force all services running on a target
              Arachni – Web Application Security Scanner Framework
          Private Web Hacking
              Get all websites
              Get Joomla websites
              Get wordpress websites
              Control Panel Finder
              Zip Files Finder
              Upload File Finder
              Get server users
              SQli Scanner
              Ports Scan (range of ports)
              ports Scan (common ports)
              Get server Info
              Bypass Cloudflare
          Post Exploitation
              Shell Checker
              POET
              Weeman

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By F B I

          Hidden Content
          Give reaction to this post to see the hidden content.