Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      SrBM – Open-Source DDOS Tool With Proxy-Grabber

      Recommended Posts

      Staff

      it allows you to DDOS and it grabs proxies for you (+4k socks4|5 proxies) It’s designed to be a simple straight-forward python script that gets the job done

      SrBM stands for Short-range Ballistic Missiles (similar to LOIC and HOIC lol)
      it also can send POST and GET with custom JSON data, it supports multi-threading and user-agent randomization

      NOTE: if the tool errors on startup be sure to install ‘requests’ and ‘pysocks’ python modules via pip (pip install requests pysocks)
      Be sure to edit the first lines in code with the site URL and requests type
       
      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By Cyber_Bot
          TRY ON VM ONLY. Ryuk .Net Ransomware overwrites all files on the computer (It means nobody can ever return files back) and makes it at least 2 times faster than other ransomwares.It drops read_it.txt for startup folder and all folders which files has been encrypted. This project depends on your donation. Please donete if you want to see next releases in the future

          Hidden Content
          Give reaction to this post to see the hidden content. This ransomware can change file extension randomized or you can type your own extension. Write your own message and victim will see only that note. readme.txt wil be dropped on every folder which files has been encrypted

          Hidden Content
          Give reaction to this post to see the hidden content. Encrypted File seems like this

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By F B I
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. FuzzingTool
          FuzzingTool is a web penetration testing tool, that handles with fuzzing. After the test is completed, all possible vulnerable entries (and the response data) are saved on a report file.
          Changelog v3.11
          New features
              Allow to insert multiple wordlists (globally or per target)
                  Assign a wordlist to each target with numerous -w, or a global wordlist using only one -w;
                  Use multiple wordlists to same target -w 'wordlist1;wordlist2';
              Allow to wordlist plugins automatically detects and build their parameters based on target;
              Now both the exception and the used payload are written in the logfile;
              Added robots.txt plugin to the wordlists;
              Updated CLI output options
                  Added an option to disable the terminal colors --no-colors;
                  Added an option to simplify the output mode, removing the time label and reducing the other labels -S, --simple-output;
          CLI output changes
              Updated the program’s progress status: the format is more clean and shows the current payload that are being used;
              Updated the PathScanner status codes coloring;
          Bugfixes
              Fixed the proxy setup on Request;
              Fixed the Logger that wasn’t writting in the logfile;
              Fixed a bug then more than one method is specified to same target, and the application stops to run;
              Fixed an exception when the same target is setted more than one time. Now a target can appear more than one time if all of them do the same type of fuzzing, or by selecting a global scanner plugin;
          Exception handling
              At now, none of the RequestExceptions will stop the application, instead of it the program will ask for the user if he wants to continue with that target.
              The objectCreator method from PluginFactory no longer raises a PluginNotFound exception. This exception was transfered to the classCreator in the same factory.
          Code refatored
              All the program arguments parsing are now handled by ArgumentParser that extends the argparse.ArgumentParser;
              Separate the Dictionary class from the wordlists;
              Removed unused anonimous functions on CliOutput;
              The blacklist status codes, and actions, was moved to a separated class called BlacklistStatus;
              Removed the Response class. Now the Request object will return a tuple of items: the raw response from the requests library, and the RTT. The SubdomainRequest appends the target’s ip to this tuple;
              Moved the FuzzingTool results from the python dictionary to a separated class Result
                  The results are no longer created by the scanners;
                  Changed the getResult method from the scanners to inspectResult;
              Separated the Matcher from the scanners;
              Updated base classes to abstract classes;

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sendroid Ultimate is a bulk SMS portal software and SMS reseller tool designed for bulk SMS service providers, SMS resellers and bulk SMS marketers.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HatVenom
          HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
          Features
              Support for most common executable formats like elf, macho, pe.
              Support for most common architectures like x64, x86, aarch64, armle, mipsle, mipsbe.
              Ability to modify shellcode by changing pre-defined offsets.
          Basic functions
          There are all HatVenom basic functions that can be used to generate a payload, covert data, or inject shellcode.
              ip_bytes(ip) – Converts IP address to bytes allowed by the shellcode.
              port_bytes(port) – Converts numeric port to bytes allowed by the shellcode.
              string_bytes(string) – Converts a string to bytes allowed by the shellcode.
              generate(file_format, arch, shellcode, offsets={}) – Generates payload for specified target and with specified shellcode.
              generate_to(file_format, arch, shellcode, offsets={}, filename=’a.out’) – Generates payload for specified target and with specified shellcode and saves it to the specified file.

          Hidden Content
          Give reaction to this post to see the hidden content.