Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      888 JS Exploit Buider + Fud Tutorial

      Recommended Posts

      Staff

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

       

      Share this post


      Link to post
      Share on other sites

      this seem a nice share. will try it out

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Content:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)
          Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file)
          You need to install lcab first (sudo apt-get install lcab)
          Check REPRODUCE.md for manual reproduce steps
          If your generated cab is not working, try pointing out exploit.html URL to calc.cab
          Finally try the docx in a Windows Virtual Machine:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          ـــــــــــــــــــــــــــــــــــــ
          In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
          You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
          Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
          Who this course is for:
          ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
          Anyone interested in Reverse Engineering and Exploit Development

          Requirements
          ـــــــــــــــــــــــــــــــــــــــــــ
          This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This video is original content created by Apoorv Gupta(The Decent Coder).
          In this video, I have provided you with knowledge regarding how to perform "OSINT" on Instagram accounts using a tool named "OSINTGRAM". This tutorial is a part of ethical hacking playlist of mine and no offensive techniques are used in this video. The information gathered using this tool is publicly available information like info, number of followers etc. It just provides you with all the info in an elegant way out. Also, tell me if you want more ethical hacking and coding tutorials for free.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.