Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Crack WPA2 PSK Passwords Using Aircrack-Ng Tool

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WPrecon (WordPress Recon)
          Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go.
          Features
               Detection WAF
               Fuzzing Backup Files
               Fuzzing Passwords
              Random User-Agent
               Plugin(s) Enumerator
               Theme(s) Enumerator
               Scripts
               Tor Proxy
               User(s) Enumerator
               Vulnerability Version Checking (Beta)
          Changelog v1.0 alpha
          New:
              Scripts in LUA 🌑
              Vuln Scan (Beta)
              Passive Mode User(s) Enumeration
              Aggressive Mode User(s) Enumeration
              Passive Mode Plugin(s) Enumeration
              Aggressive Mode Plugin(s) Enumeration
              Passive Mode Theme(s) Enumeration
              Aggressive Mode Theme(s) Enumeration
              Auto Finding Important File(s)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
          Description
          A cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as the server who accepts connections or to perform as the client/target who establish connections to the server. The generate command uses the module pyinstaller to compile the actual payload code. So, in order to generate payload file for your respective platform, you need to be on that platform while generating the file. Moreover, you can directly get the source file as well.
          Features
              Built-in Shell for command execution
              Dumping System Information including drives and rams
              Screenshot module. Captures screenshot of client screen.
              Connection Loop (Will continue on connecting to server)
              Currently, it uses BASE64 encoding.
              Pure Python
              Cross Platform. (Tested on Linux. Errors are accepted)
              Source File included for testing
              Python 3
          To be expected in future
              Stealth Execution
              Encryption
              Storing Sessions from last attempt
              Pushing Notifications when a client connects

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in waybackmachine.
          Features
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.6.7
              Add: Option –auth for HTTP authentification. Exemple –auth admin:admin
              Fixed: Bugs

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Carnivore – Microsoft External Attack Tool
          Overview: Carnivore is an assessment tool for Skype for Business, Exchange, ADFS, and RDWeb servers as well as some O365 functionality. Carnivore includes some new post-authentication Skype for Business functionality.
          In general, the tabs will unlock in-line with what functionality you can use. Ie – the post auth options will unlock after you have discovered valid credentials.
          Feature
          Subdomain Enumeration
          Username Enumeration
          Smart Enumeration
          9 lists of statistically likely usernames
          Automatically selects likely format
          Legacy vs Modern Format
          Password Spraying
          Discovered Format
          Pre-built lists
          Post Compromise

          Hidden Content
          Give reaction to this post to see the hidden content.