Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Chromepass - Hacking Chrome Saved Passwords

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      About The project

      Chromepass is a python-based console application that generates a windows executable with the following features:

          Decrypt Google Chrome, Chromium and Edge saved paswords
          Send a file with the login/password combinations and cookies remotely (http server)
          Undetectable by AV if done correctly
          Custom icon
          Custom error message
          Customize port


      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Practice Web Applications Hacking & Penetration Testing against a number of real world web applications/websites.
          What you'll learn
              Set Up a Lab Environment To Practice Hacking and Penetration Testing.
              Understand How Websites / web applications Work.
              Detect What Technologies / Scripts A Website Is Using.
              Intercepting HTTP Requests Using A Personal Proxy.
              Collect Sensitive Information About The Target.
              Web Applications Hacking / Websites Hacking.
              TOP 10 Web Applications / Websites Vulnerabilities and Website Related Hacking Techniques.
              Discover and Exploit Cross Site Scripting (XSS) Vulnerabilities.
              Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities.
              Discover and Exploit Command Execution Vulnerabilities.
              Uncover and Exploit SQL Injection Vulnerabilities.
              Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
              Using Burp Suite Proxy.
              How To Use Vega (Web App / website Vulnerability Scanner) to Scan Websites.
              How To Use Arachni (Web Vulnerability Scanner) to Scan Websites.
              Answers to all of your questions about ethical hacking and penetration testing!
              Get A Job As A Penetration Tester / Ethical Hacker & Make Money Online As A Freelancer.
              The Ability To Hack And Pen Test Any Website / web application.
              Learn About The different fields of Web Applications Hacking.
          Requirements
              Basic Information Technology Skills.
              A Desire To Learn.
              Basic Knowledge Of Web Applications (not mandatory).
              Hacking Operating Systems: KALI LINUX, PARROT SECURITY OS, BACKBOX LINUX...etc
              No previous hacking knowledge required.
          Description
          This course includes all necessary information to start your carrier in the Cyber Security field. This course aims to teach you how to perform full penetration testing on web applications.
          JOIN OVER 11000 STUDENTS IN THE Website Hacking & Penetration Testing (Real World Hacking!) COURSE
          #############################################################################
              Web applications hacking course is not like other courses. I will not teach you the boring hacking stuff that you can get from Google.
              All the videos in this course are simple, short and practical.
              You will practice web applications Hacking / Penetration Testing against a number of real-world web applications.
              You will learn how to discover Web Applications vulnerabilities through Penetration Testing.
              You will learn how to hack the web security.
          I will start by teaching you the basics of any vulnerability and then exploiting it with pure technical skills. The web applications hacking and penetration testing course is designed to cover all the latest vulnerabilities of Web Applications like Web Applications Attacks, CSRF attacks, Injection attacks, and many more.
          In this course, we will answer the following questions:
          How do hackers hack websites?
          The Best Ways to Hack a Website.
          How to Hack a Web Application?
          In this course, you will learn the following:
          Hacking a website database.
          Hacking a website using sql injection.
          Website hacking by php source code.
          Website hacking exploits.
          Website ethical hacking.
          Website ethical hacking tools.
          Website hacking techniques.
          Ethical hacking tools.
          The ethical hacking process.
          Ethical hacking basics.
          OWASP top 10.

          *This Course Is For Educational Purposes Only*
          ------Don't be evil------

          Student reviews:
          ***********************************************
          I like the way the instructor is explaining the course. As of now I am happy with the contents and support I am receiving for my queries. This is one of the best courses on Udemy! ★★★★★
          ***********************************************
          Very good course, enjoying it so far. the instructor is, helpful, clear and direct to the point with practical tutorials.★★★★★
          ***********************************************
          Excellent course! The Course was amazing. I learned a lot of things about ethical hacking and the instructor was awesome. I think that the course is definitely worth way more than it's asking price. ★★★★★
          Who this course is for:
              Penetration testers
              Web developers
              IT admins and staff
              Anyone who wants to learn websites / web applications hacking
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Complete Practical Course on Ethical Hacking && master System Hacking, Website Hacking, Wi-Fi Hacking and many more.
          What you'll learn
              Setting up your Hacking Lab: Kali Linux and Virtual Machine.
              Practical Ethical hacking skill.
              Different types of phases of hacking.
              will learn about Kali Linux hackers operating system.
              Complete understanding of all the attacks.
              Hack and secure server and client operating system.
              Will create undetectable backdoors.
              learn to crack wifi password of any security level WEP,WPA,WPA2.
              All the attacks are performed live and safest environment.
              Gathering information about the target.
              Learn to secure and protect any network from hackers and loss of data.
              Server-side attack.
              Client-side attack.
              Networking basics.
              Learn to gain access to a router in various ways.
          Requirements
              Internet Connection & Computer (4gb RAM or more).
              No programming or hacking knowledge required.
          Description
          Welcome to Complete Ethical Hacking Course 2021: Beginner to Advanced!

          This Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals anyone can take this course.
          The ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn network hacking, gaining access, website hacking, Server-side attacking and Client-side attacking.
          In-network hacking section, we will learn how networks work, how to crack Wi-Fi keys, and gain access to the Wi-Fi networks. In the Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.
          Environment Setup
          This section is very important for hackers who want to polish their skills. In this section, we will learn how to make our own hacking environment which will help us to perform attacks on our own hacking environment without any worrying.
          Linux Command Line
          In the section, we will learn what is Linux operating system distributions. Mainly this section teaches you how Linux works and what are the main important command that we use inside the Linux terminal. It is very important for a hacker to have Linux skills because Linux has lots of distribution and there are some distributions which totally dedicated to penetration testing and hacking.
          Networking Basics
          Networking basics are very important for a hacker because every attack that we would perform is with the help of a computer network. Networking basics are very important for network penetration testing and hacking because in this section every thing is about networking so in this section we will learn the basics of networking.
          Network Penetration Testing
          After completing the network basics it is very important to keep things in mind because in-network penetration section we will learn about how to perform real-world network hacking. This section is totally dedicated to network penetration testing and hacking, here we will learn key cracking, fake authentication attack, and many more things.
          Server-side Testing
          This section is going to be fun because in this section we will be learning about server-side attacking which is very important to learn the skill if you want to be a hacker. The Server-side is the place where juicy data about the user, the system takes place so that makes it just for the hacker to have the skill of hacking the server-side.
          Website / Web Application Hacking
          In this section, you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc), and how to discover and exploit the dangerous vulnerabilities to hack into websites.
          Who this course is for:
              Anyone interested in learning ethical hacking
              Anyone interested in how hackers hack computer systems
              Anyone interested in how to secure systems from hackers
          Notes: This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.
          Who this course is for:
              Ethical hacker
              Cyber security learners
              Penetration testers
              Programmings
              Coders
              Network penetration testers
              wep application penetration testers
              wifi hacking
              system-side attacks
              client-side attacks
              IT professionals
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn the art of System and Mobile Hacking. Learn to secure your devices like a Security Professional
          What you'll learn
              How to hack a Computer
              You will learn How different tools and techniques work in real world
              How to test the security of your system
              How to protect your Mobile from various external threats
              You will learn about System Security
              Hands-on Experience
          Requirements
              You will able to use PC
              You must have internet connection
          Description
          Learn by doing. You will learn most of the important tools and techniques used to test the security of your Computer System and Mobile Devices. You will learn how to hack your device and how to protect them from various external Threats. System Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of system hacking can be: using a password cracking tool to gain access to a computer system. You may also perform System Hacking without using any kind of tool. Learning computer hacking and security is an important aspect in today world. Let's have a look on the topics you will learn in this course.
          Topics Covered in this Course are:
          1. Footprinting
          2. Scanning
          3. Gaining Access
          4. Maintaining Access
          5. Clearing Tracks
          6. Generating Reports
          7. Quick Hacking Tips
          8. Hands-on Training
          9. Hacking Mobile Device
          10. Securing your Computer and Mobile.
          Anyone who is interested to learn about Cyber Security may join this course.
          This course doesn't make you an expert in the field of cyber security. But, this course will teach you practical things which are must to learn for an individual if you want to know about latest attacks and their defence. Let's get started....
          Who this course is for:
              Anyone who want to learn System and Mobile Security
              Anyone who is interested in Cyber Security
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Become a Competent Red Teamer or Penetration Tester with Step-By-Step Guidance over Bite-Sized Lectures
          What you'll learn
              Modern Offensive Operational Hacking Techniques
              How to build a World Class Cyber Range to Practice Attacks and Defense
              Attacker Tradecraft against modern Active Directory environments
              End to end hacking hacking from Initial Access to Action on Objectives (mapped to MITRE ATT&CK)
              New Bug Bounty reconnaissance techniques being used on HackerOne and BugCrowd
              Blue Team strategies for detecting and blocking Red Team aggressors.
              How to EASILY write an awesome Penetration Testing report (and WOW your Managers)
              Practical steps for getting a job in Cyber Security!
          Requirements
              A HacktheBox VIP subscription is recommended (but not required because you can still follow along)
              16GB of RAM is recommended for our Active Directory lab environment; although, 32GB is ideal.
          Description
          New Summer/Fall 2021 Launch!
          Did you know some estimates are showing there is a 3 million shortfall in Cyber Security talent in 2020?
          Isn't that crazy?
          This means this fields is thirsty for competent cybersecurity professionals who can help organizations fortify their critical infrastructure, eradicate adversaries from their networks and emulate the most advanced threat actors in the world to help protect companies from compromise.
          It feels like hacking is always in the news, glamorized on TV but often misunderstood.  So in this course you will learn hacking from A-Z - from the ground up.
          Nothing is missing.
          All attacks are mapped to the latest industry standard frameworks such as the OWASP Top 10 and the MITRE ATT&CK Enterprise Matrix.   And all techniques are currently being used by real world black hat attackers.  By the end of this course you will know how to protect any organization with an internet presence from a thinking and adaptive adversary using the latest tools, techniques and procedures.
          This is a full scope course - meaning it covers everything from recon to action on objectives... breach to impact... it's all here.
          Scroll down and take a look at the lectures and tell me if it's not getting you excited!!
          For example, in the Cyber Range section you can see you will build a world-class range featuring fully intrumented Windows 10 Endpoints with Windows Defender for Endpoint EDR, Sysmon, and the Splunk Universal Forwarder!  You'll  also notice we are using a dockerized OWASP Juice Shop container with logs being shipped from the Docker container into Splunk Enterprise.  And we're using OPNSense as our Firewall with Suricata signatures and the ET PRO ProofPoint ruleset!  We've even got enterprise email setup so you can spearphish victims in your Active Directory lab!  You'll learn how to setup an internal DNS resolver, configure Windows Server 2019 DHCP services and even push out policies via Active Directory GPO!  And it gets even better than that - I'm just sharing the tip of the iceberg as new lectures are currently being released weekly.
          Let's get started!
          Oh and one more thing: the best part is you will be being a hands-on lab that is completely isolated from the internet and will afford you the best opportunity to learn real world attacks through experimentation.  This is truly the best way to learn and since it's your lab you'll have access to it forever.... it isn't limited by cloud costs or monthly limitations!
          Let's do this!
          Who this course is for:
              ANYONE with a passion for Cyber Security
              Help Desk Analysts
              Network Engineers
              System Administrators
              SOC Analysts
              Penetration Testers
              Red Teamers
              Bug Bounty Hunters
              Cyber Threat Hunters
              Cyber Security Managers (who want to keep their tech skills sharp!)
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          How to Become an Expert in Ethical Hacking
            This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether it be a red team, blue team, or freelance infosec consultant.
          As an ethical hacker, you not only need to have prior knowledge of basic networking, programming languages, and security tool guidelines, but a hands-on practice on these theoretical concepts is mandatory.
          Why Hands-on Learning is Essential for Ethical Hacking
          Ethical hacking is a practical approach in which white hat hackers try to penetrate the network. The goal of an ethical hacker is to identify vulnerabilities and try to exploit them to determine the extent of the compromise under a defined scope. This job requires a set of technical skills that can only obtain from lab oriented training.
          Lab-based ethical hacking training helps you get exposure to how things work in the real world and will train you to perform specific tasks. If we compare this with traditional classroom training, we come to know that previous methods are only focusing on theoretical knowledge, not enough for cybersecurity professionals. These methods ignore all practical implementations; hence students have a large gap of grades while comparing to on paper and their actual performance.
          By analyzing all these methods, instructors have come to make hands-on learning essential, especially for an ethical hacker. By learning practical implementations, individuals can learn different concepts of real-time problems that develop their hands-on skills.
          Practical Techniques Used in Ethical Hacking
          Practical Techniques Used in Ethical Hacking For ethical hacking, you need to have some hacking skills and exposure to the methodologies often used by malicious actors. Following are the few basic hacking techniques used in ethical hacking:
          Performing port scanning to find vulnerabilities. There are various scanning tools used by ethical hackers to perform port scanning of the target network. While port scanning, ethical hackers find open ports and try to study the vulnerabilities associated with each port. Perform network traffic analysis by sniffing IP packets. There are many tools available to perform network sniffing. Ensuring the target system to not affected by new vulnerabilities. For this purpose, ethical hackers often try to analyze the process of patch installation. Make attempts to intrude intrusion detection systems, firewalls, intrusion prevention systems, and honeypots. Perform various social engineering techniques to find information against the target organization’s computing environment. To be ‘job-ready,’ one ought to have hands-on learning on different hacking techniques. This, combined with both theoretical knowledge and practical implementation training, guarantees that you have the essential aptitudes to
          enter the industry. Fortunately, there are many platforms available to get this combined package of learning a lab-intrinsic ethical hacking program.
          Top 3 Cybersecurity Certifications to Become an Ethical Hacker
          CEH – Hands-on Training Program Verifies Your Advanced IT Security Skill-Set
          EC-Council’s Certified Ethical Hacker (CEH) is a certification program that combines both theoretical knowledge and hands-on learning. It comprises of different modules that start with the basics, modes of penetration testing, tools demonstration, and more. The training gives you the required knowledge on everything from analyzing to exploiting the defined scope of IT infrastructure.
          The Practical Approach of CEH
          1.    CEH is a complete ethical hacking program dealing with 20 of the most current security areas.
          2.    40% of the program is comprising of hands-on learning.
          3.    The syllabus covers 340 attack methodologies mostly used by malicious hackers.
          4.    The certification trains you in the scope of five phases of ethical hacking. These phases are information gathering, scanning, gaining access, maintaining access, and clearing tracks.
          CEH is the most recognized training program of ethical hacking in the industry. There is another training program, a follow-up to the CEH i.e. CEH (Practical). The CEH (Practical) is entirely based on hands-on learning, and the examination is all comprised of practical tasks.
          Offensive Security Certified Professional – Hands-on Penetration Testing with Kali Linux
          The OSCP certification is a well-known foundational penetration testing practical training, intended for cybersecurity professionals to ignite their skill set at a swift pace. It will help to learn the latest ethical hacking tools and techniques to get expert in penetration testing. Learning material provides:
          A detailed course guide Complete video lectures by professionals Active student forums Access to a virtual penetration testing lab The final exam has a 24-hour time limit and comprising of a hands-on penetration test in an isolated VPN network.
          You will get the exam and connectivity instructions for an isolated virtual network for which you have no prior knowledge or information. Scores are awarded for each compromised host, based on their difficulty and level of access obtained.
          After completing the tasks, you will submit a comprehensive penetration test report as part of your exam. Reports should cover in-depth notes and screenshots detailing your findings. This exam is proctored.
          After gaining this certification, the certified OSCPs can identify severe vulnerabilities and can execute organized cyber-attacks. They can modify exploits, execute network pivoting, and data exfiltration.
          GIAC Penetration Tester (GPEN)- A Process-Oriented Approach To Penetration Testing Projects
          This certification verifies an ethical hacker’s ability to perform a penetration test. GPEN certified has developed skills to conduct exploits and perform detailed reconnaissance. The main features of this certification include:
          The complete guide of comprehensive penetration test planning and reconnaissance In-depth knowledge of scanning and exploitation Additional methods to attack password hashes and authenticate Domain escalation and persistence attacks Penetration testing with PowerShell and the windows command line GIAC developed CyberLive hands-on, real-world practical testing lab environment to let the practitioner validates their knowledge and hands-on skills.
          A practitioner will able to perform real-world attacks with actual programs, codes, and virtual machines. The final exam comprises 1 proctored exam, 82-115 questions, a time limit of 3 hours, and a minimum passing score of 75.
          The summary is, if you want to be an expert in ethical hacking, you need to understand the real-world scenarios and have the exposure of real hacking incidents. You need to think exactly like a malicious hacker to find all the loopholes, risks, vulnerabilities, and timely mitigate them. This can only be done by getting hands-on training, polishing the required set of skills by trying to attempt hacking techniques and gain valuable certifications that have been discussed above to make your resume worthy of the desired job.