Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hide your "server" in files of any format (JPG, txt, PSD)

      1 post in this topic

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By 1337day-Exploits
          The IDAL HTTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server. The IDAL HTTP server does not safely handle username or cookie strings during the authentication process. Attempting to authenticate with the username "%25s%25p%25x%25n" will crash the server. Sending "%08x.AAAA.%08x.%08x" will log memory content from the stack.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          The IDAL FTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Hidden Content
          Give reaction to this post to see the hidden content.
           

          Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  is a javascript app that provides secure file encryption using the  Hidden Content
          Give reaction to this post to see the hidden content.  algorithm from  Hidden Content
          Give reaction to this post to see the hidden content.  provided by your browser. it was coded following the WebCrypto  Hidden Content
          Give reaction to this post to see the hidden content.  . It's fast, secure and Serverless, the app never uploads the files to the server.
          in a small amount of code the app can encrypt any type of files at any size within seconds.
          To use the app all you have to do is Browse a file, Type a Decryption Key or Generate one through our secure key generator. and your encrypted file is ready to download.
          How to use
          just simply browse a file, type a decryption key or use our secure key generator, and encrypt or decrypt.

          Hidden Content
          Give reaction to this post to see the hidden content. Offline Use
          the app is cross-platform and is available to download on 
          Hidden Content
          Give reaction to this post to see the hidden content.  ,  Hidden Content
          Give reaction to this post to see the hidden content.  and  Hidden Content
          Give reaction to this post to see the hidden content. Requirements

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  which lets you require('modules') in the browser by bundling up all of your dependencies. Installation
          Download or clone the repository

          Hidden Content
          Give reaction to this post to see the hidden content. go to the app directory
          cd [app directory] open terminal and install the node modules that are in the package.json file
          sudo npm install after the packages are installed bundle main app.js and modules together in one file using Browserify
          browserify src/js/app.js -o bundle.js then start the app by running index.html
          Browser Compatibility
          We officially support the last two versions of every major browser. Specifically, we test on the following
          Chrome on Windows, macOS, and Linux , IOS, Android Firefox on Windows, macOS, and Linux Safari on iOS and macOS Edge on Windows IE 11 on Windows for more info see 
          Hidden Content
          Give reaction to this post to see the hidden content. home page  Hidden Content
          Give reaction to this post to see the hidden content. Crypto Examples
          AES-GCM - generateKey
          window.crypto.subtle.generateKey( { name: "AES-GCM", length: 256, }, true, ["encrypt", "decrypt"] ) .then(function(key){ console.log(key); }) .catch(function(err){ console.error(err); }); AES-GCM - importKey
          function importSecretKey(rawKey) { return window.crypto.subtle.importKey( "raw", rawKey, "AES-GCM", true, ["encrypt", "decrypt"] ); } .then(function(key){ console.log(key); }) .catch(function(err){ console.error(err); }); AES-GCM - exportKey
          async function exportCryptoKey(key) { const exported = await window.crypto.subtle.exportKey( "raw", key ) .then(function(keydata){ console.log(keydata); }) .catch(function(err){ console.error(err); }); AES-GCM - encrypt
          async function encryptMessage(key) { let encoded = getMessageEncoding(); // The iv must never be reused with a given key. iv = window.crypto.getRandomValues(new Uint8Array(12)); ciphertext = await window.crypto.subtle.encrypt( { name: "AES-GCM", iv: iv }, key, encoded ) .then(function (encrypted) { console.log(new Uint8Array(encrypted)); }) .catch(function (err) { console.error(err); }); } AES-GCM - decrypt
          async function decryptMessage(key) { let encoded = getMessageEncoding(); let decrypted = await window.crypto.subtle.decrypt({ name: "AES-GCM", iv: iv }, key, ciphertext ) .then(function (decrypted) { console.log(new Uint8Array(encrypted)); }) .catch(function (err) { console.error(err); }); } Source:

          Hidden Content
          Give reaction to this post to see the hidden content. Tool Online:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.