Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      Sign in to follow this  
      lk.hc2010

      Malwares and trojans

      Question

      1 answer to this question

      Recommended Posts

      • 0
      Staff

      Loaris Trojan Remover or Glarysoft Malware Hunter PRO

      https://level23hacktools.com/hackers/forum/178-protection-programs/

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Answer this question...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure.
          Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out.
          Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to:
           
              Use the Internet anonymously.     All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption.     Leave no trace on the computer you are using unless you ask it explicitly.     Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique.
          Changelog v7.4
              Based on: Xbuntu 18.04.5 LTS
              Kernel: 5.9.1
              System: 64bit
              Release date: 23.10.2020
              Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare
              Code name: Stable
              + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23
              + Firefox + Signal + Tor browser update
              + Added new information on panic room system information

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. BeDrive allows you to create your own fully-featured, self-hosted file sharing and hosting website in minutes without any coding or server management knowledge.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Course List:
          Advance Course of Android Hacking
          Advance Of Black Hat Hacking
           Antivirus Evasion Course
          Complete Basic Course Of Android Hacking
           Complete Basic Course Of Kali Linux
           Complete Course Of Wifi Hacking
          Complete Course Of Carding
          ERC Course By DedSec
           Facebook & Instagram Hacking
           Manually Binding And Making FUD Payloads For Android
          Online Accounts Cracking Course
           Reverse Engineering Course – The Hacks Behind Cracking
           Spamming Practical Course – First Time In Internet History
           DedSec Latest FUD Ransomware

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Mail-Swipe | Keep your real mailbox clean and secure.
          Mail Swipe is a python script that helps you to create temporary email addresses and receive emails at that address. It uses the API provided by 1secmail to create emails addresses and fetch emails.
          You can either generate your own email address or you can generate a random email address using this script. Once you receive an email it will be save in a text file inside the "All Mails" folder.
          For security reason you cannot read messages from addresses: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] All other addresses are free to use. - 1secmail team -


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly.Docker for pentest
          Features
              OS, networking, developing and pentesting tools installed.
              Connection to HTB (Hack the Box) vpn to access HTB machines.
              Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
              Proxy service to send traffic from any browsers and burp suite installed in your local directory.
              Exploit database installed.
              Tool for cracking password.
              Linux enumeration tools installed.
              Tools installed to discovery services running.
              Tools installed to directory fuzzing.
              Monitor for linux processes without root permissions
              Zsh shell installed.
          Tools installed
          Operative system tools
              rdate
              vim
              zsh
              oh-my-zsh
              locate
              cifs-utils
              htop
              gotop
          Network tools
              traceroute
              telnet
              net-tools
              iputils-ping
              tcpdump
              openvpn
              whois
              host
              prips
              dig
          Developer tools
              git
              curl
              wget
              ruby
              go
              python
              python-pip
              python3
              python3-pip
              php
              aws-cli
              tojson
              nodejs
          🔪 Pentest tools
          Port scanning
              nmap
              masscan
              ScanPorts created by @s4vitar with some improvements
          🔍 Recon
              Subdomains
                  Amass
                  GoBuster
                  Knock
                  MassDNS
                  Altdns
                  spyse
                  Sublist3r
                  findomain
                  subfinder
                  spiderfoot
                  haktldextract
              Subdomain takeover
                  subjack
                  SubOver
                  tko-subs
              DNS Lookups
                  hakrevdns
              📷 Screenshot
                  gowitness
                  aquatone
              🕸️ Crawler
                  hakrawler
                  Photon
                  gospider
                  gau
                  otxurls
                  waybackurls
              📁 Search directories
                  dirsearch
              Fuzzer
                  wfuzz
                  ffuf
              Web Scanning
                  whatweb
                  wafw00z
                  nikto
                  arjun
                  httprobe
                  striker
                  hakcheckurl
              CMS
                  wpscan
                  joomscan
                  droopescan
                  cmseek
              Search JS
                  LinkFinder
                  getJS
                  subjs
          Wordlist
              cewl
              wordlists:
                  wfuzz
                  SecList
                  Fuzzdb
                  Dirbuster
                  Dirb
                  Rockyou
                  all.txt
              crunch
          Git repositories
              gitleaks
              gitrob
              gitGraber
              github-search
              GitTools
          OWASP
              sqlmap
              XSStrike
              kxss
              dalfox
          Brute force
              crowbar
              hydra
              patator
              medusa
          Cracking
              hashid
              john the ripper
              hashcat
          OS Enumeration
              htbenum
              linux-smart-enumeration
              linenum
              enum4linux
              ldapdomaindump
              PEASS – Privilege Escalation Awesome Scripts SUITE
              Windows Exploit Suggester – Next Generation
              smbmap
              pspy – unprivileged Linux process snooping
              smbclient
              ftp
          Exploits
              searchsploit
              Metasploit
              MS17-010
              AutoBlue-MS17-010
              PrivExchange
          Windows
              evil-winrm
              impacket
              CrackMapExec
              Nishang
              Juicy Potato
              PowerSploit
              pass-the-hash
              mimikatz
              gpp-decrypt
          Reverse shell
              netcat
              rlwrap
          Other resources
              pentest-tools from @gwen001
              qsreplace from @tomnomnom
          Custom functions
              NmapExtractPorts from @s4vitar
          Other services
              apache2
              squid
          Changelog v0.3
          📝 Changelog
              feat: Update amass and change wafw00f installation mode.
          🏷️ Commits
              [ a987755 ] – Update amass and change wafw00f installation mode.


          Hidden Content
          Give reaction to this post to see the hidden content.