Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      hashdb-ida v1.8 - Malware string hash lookup plugin for IDA Pro

      Recommended Posts


      Hidden Content

        Give reaction to this post to see the hidden content.

      Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service.

      Adding New Hash Algorithms
      The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes.

      Installing HashDB
      Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests)

      Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes!

      HashDB can be used to look up strings that have been hashed in malware by right-clicking on the hash constant in the IDA disassembly view and launching the HashDB Lookup client.

      Before the plugin can be used to look up hashes the HashDB settings must be configured. The settings window can be launched from the plugins menu Edit->Plugins->HashDB.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post

      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          Hi there,
          Welcome to my Linux for Beginners: Linux Basics Course!
          Linux For Beginners covers Linux basics. You will learn Linux fundamental skills; Command line, Linux Administration
          In this course, you will learn Kali Linux fundamentals, how to use basic commands, how Linux File hierarchy is, how to set the network of Linux, how to install packages from package managers and source code, how to manage services, processes and monitoring.
          Linux is available in a range of different distributions that are tailored to the needs and skills of its users. Simple distributions, like openSUSE, are great for personal computing, while Linux Ubuntu is ideal for network admins and computer scientists.
          Linux has a somewhat inaccurate reputation as being a much more technical and complex alternative to mainstay operating systems like Windows and MacOS. In reality, Linux is an approachable, open-source, and customizable OS that’s designed to address huge deficiencies in commercial operating systems.
          Our student says that: I loved this course and it taught me so many things, that now I am very competent in a terminal that has a UNIX background. Almost all of what is taught was transferable to the Mac terminal, and thanks to this course, I can even make my own scripting programs to make my life easier.
          What is Linux and why should I use it?
          Linux is an operating system (OS), which is the primary software that a computer uses to execute tasks and communicate directions to its hardware. The operating system that competes the most with Linux is Windows. Linux is a popular and widely-used OS because it is open-source, meaning that it is free to the public, and anyone can modify and customize Linux software as they wish. The reasons to use Linux can vary from developing an app or building a video game to learning how to hack computer systems. As Linux is one of the most popular operating systems, many developers use it to develop their web applications and software programs. This means knowledge of Linux is important for anyone working with computers and software in general. Learning how to work with Linux is a necessary skill for anyone pursuing a career in ethical hacking or penetration testing
          Why do hackers use Linux?
          Both ethical (white hat) hackers and malicious (black hat) hackers often prefer to use the Linux operating system (OS) over Windows OS. The biggest reason hackers turn to Linux is because it is far more accessible to a wider range of people than Windows OS offers. Linux is free, open-source, and provides a well-integrated command-line interface for users to customize the OS. This means anyone can modify Linux to create their own programs and software. Malicious hackers often opt for Linux because it gives them more control when using Linux, and ethical hackers need to be well-versed in Linux because it’s so popular among black hat hackers. Ethical hackers also often prefer using Linux as it has better existing security measures than Windows and doesn’t usually require third-party antivirus software.
          How long will it take to learn Linux and how can I teach it to myself?
          The time it takes to learn Linux can vary, depending on whether you have existing background knowledge of other operating systems and how deep of an understanding you want to gain. For beginners learning Linux to pursue a career in IT or software administration, you may only need a basic understanding of how to navigate and execute functions using Linux and how applications built on Linux behave. If you plan to become an ethical hacker, or pentester, you may need a more in-depth knowledge of Linux security procedures and a skill in manipulating Linux programs. You can learn Linux on your own time by seeking out video tutorials and online courses. There are plenty of courses available on Udemy that teach the fundamentals of Linux and more advanced Linux skills.
          What careers use Linux?
          Many jobs in IT, software development, and cybersecurity rely on Linux skills and expertise. A career in app development generally requires a deep understanding of Linux, as many app developers use Linux as a basis for their applications. Software-focused career paths that frequently use Linux include developer and software engineering roles for Python, Java, and Linux systems. Nearly any role in cybersecurity, such as a penetration tester or ethical hacker, requires a strong knowledge of Linux. With Linux expertise and skills, you could work as a system administrator, IT professional, system architect, or database administrator. You may even work in website development, maintenance, or security, as people in those roles build a majority of their web applications on Linux.
          What is the core of the Linux operating system?
          The core component of any operating system is called the kernel. Linux’s core is simply referred to as the Linux kernel. The Linux kernel is a single program that manages crucial tasks such as allocating memory, communicating software functions to the computer’s CPU, and comprehending all of the input and output from the computer’s hardware. The kernel is the most important part of an OS and often runs in a separate area from the rest of a computer’s software. The kernel is just one part of a full operating system, which includes a combination of components such as the bootloader, init system, graphical server, desktop environment, and more. The name “Linux” can refer to both the kernel itself (the Linux kernel) and an operating system built around that kernel. For example, the Android OS and the Ubuntu distribution are both made using the Linux kernel.
          What are the best Linux distributions for beginners?
          There is a wide range of Linux distributions to choose from when learning and working with Linux. When you are first learning Linux, the distribution you choose to learn may depend on how you plan to apply your Linux skills. If you are pursuing a career in cybersecurity, you may select a different Linux distribution to start with than someone pursuing a career in game development, for instance. Online courses are some of the best resources for beginners to Linux, as they will give guidance on which Linux distribution is a good fit for the intended application of Linux. For beginners, a few of the most highly recommended Linux distributions include Elementary OS, Ubuntu Linux, and Ubuntu Budgie. Other distributions that are considered easy to learn and master are Linux Mint, Zorin OS, Nitrux, Kodachi, Rescatux, and Parrot Security.
          This course is for beginner level.  You will learn step-by-step with hands-on demonstrations.
          At the end of the course you will learn;
              What is Linux
              Pieces of Linux
              Linux Signs $,#,%
              Desktop Environments
              Linux GUI
              Command Parameters
              List Files – “ls” Command
              Print Working Directory – “pwd” Command
              Show Manuel – “man” Command
              Change Directory – “cd” Command
              Concatenate Files – “cat” Command
              Display Output – “echo” Command
              View the File with “more” Command
              View the File with “less” Command
              Print First Lines with “head” Command
              Print Last Lines with “tail” Command
              Global Regular Expression Print – “grep” Command
              Output Redirections
              Linux File Hierarchy
              File Permissions
              Make Directory – “mkdir” Command
              Create File & Modify Date – “touch” Command
              Remove Files or Directories – “rm” Command
              Copy and Move Files or Directories – “cp” & “mv” Command
              Find Files and Directories – “find” Command
              Cut Parts of Lines – “cut” Command
              Change Ownership of a Given File – “chown” Command
              Network Settings
              Display Network Status – “ifconfig” Command
              Leasing New IP from DHCP Server
              User Management in Linux
              Important Files – “passwd” and “shadow”
              Adding a New User
              Change the Group and Delete a User
              Process Management
              Monitoring Running Processes – “ps” and “top” Commands
              Killing Processes
              Package Management
              Foremost Linux Package Managers
              APT Package Manager
              Install From Source Code
              System Monitoring
              Monitoring – “df”, “top”, “vmstat”, “netstat” CommandsUsing Linux
              Using linux, kali linux, linux administration, linux command line, kali
              Using Linux, Linux Certification, Linux Administration, Linux Security, Linux Kernel, Linux Command Line, Kali Linux, Embedded Linux, Comand Line, Bash Shell
              Using colt steele, rhcsa, ubuntu, red hat, shell script, redhat
              Using linux system administration, linux server administration, linux server, ubuntu
              Using Unix, bash, bash script, emacs
              Using kali linux, oscp, kali, linux, ceh, everything about kali linux os, kali linux tutorial, penetration testing, ethical hacking.
              ubuntu linux server, ubuntu server, ubuntu linux, server, linux server, linux administration, linux basics, nagios
              linux ubuntu linux for beginners ubuntu linux linux basics for beginners linux ubuntu linux for beginers libre office linux beginner linux basics for beginners linux basics ubuntu desktop linux for begineers linux 2021 intro to linux linux basic for beginners libreoffice linux beginners linux academy oak academy linux basics for beginers beginner linux learn linux linux full course linux begineer linux for beginners linux beginer linux basics for beginners ubuntu 20.04 ubuntu for beginners ubuntu course learn ubuntu libre linux course linux linux administration linux administration free linux beginers
              No prior knowledge is needed!
          It doesn’t need any prior knowledge to learn Linux!
          This course starts with very basics. First, you will learn how to install Linux, some terminology. Then the show will start and you will learn everything with hands-on practices.  I’ll also teach you the best practices and shortcuts.
          Step-by-Step Way, Simple and Easy With Exercises
          By the end of the course, you’ll have a firm understanding of the Linux system and you’ll also be very confident in using Linux commands and managing Linux system services and processes and hungry to learn more.
          You’ll also get:
          Lifetime Access to The Course
          Fast & Friendly Support in the Q&A section
          Udemy Certificate of Completion Ready for Download
          Dive in now to my “Linux for Beginners: Linux Basics“ Course.
          Who this course is for:
              Anyone who want to learn Linux
              Anyone who want deep dive into Linux world
              Those looking for alternatives to Microsoft operating systems.
              Anyone who wants to learn how new operating systems work by improving their existing computer knowledge and skills
              Employees of organizations planning to change Microsoft operating systems.
              Anyone who want to learn Linux
              Anyone who want deep dive into Linux world
              4 GB (Gigabytes) of RAM or higher (8 GB recommended)
              64-bit system processor is mandatory
              10 GB or more disk space
              Enable virtualization technology on BIOS settings, such as “Intel-VTx”
              All items referenced in this course are Free
              A strong work ethic, willingness to learn Linux Environments
              Nothing else! It’s just you, your computer and your ambition to get started today
              Curiosity for Linux, Linux Administration, Linux Command Line
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Video Pro X Edición de Video Intuitiva para Usuarios Avanzados
          Edición de vídeo intuitiva y profesional Video Pro X significa: creación de películas profesionales al alcance de todos. Su interfaz clara y funcionalidad intuitiva hacen que sea mucho más fácil empezar a trabajar con Video Pro X que con cualquier otro software de edición profesional. Ofrece una edición de vídeo de última generación: gracias al nuevo INFUSION Engine 3, la reproducción y la edición se ejecutan con fluidez y en tiempo real, incluso con grabaciones de alta resolución 8K UltraHD. Crea vídeos de forma gratuita con Video Pro X y consigue unos resultados profesionales: ideal para videocreadores semiprofesionales, editores avanzados o cineastas exigentes.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in the waybackmachine.
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exists and is accessible
              Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30
              Search S3 buckets in the source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v2.1
              New: Option -nfs (not first step) to pass the first recon steps
              Fixed: Any bug with the download file and bypass forbidden when differents options
              New: Google cse search (buckets…)
              New: Add LICENSE & PyPI version and stats

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Audio Editing for Beginners in Adobe Photoshop
          Learn how to add music or sound effects to your video projects!
          Have you ever wanted to spruce up a video project with music in Adobe Photoshop? It’s actually pretty simple! In this class, you’ll learn how to add and edit audio using the Video Timeline Tool in Photoshop.
          I’ve designed this class to help designers, content creators and others interested in video creation learn how they can take advantage of sound to elevate their videos.
          What you’ll learn:
              Fundamentals of audio storytelling
              How to find royalty-free music
              Basics of adding and editing music in Photoshop
          To help beginners understand the basics of audio editing, I have chosen to teach this class using Adobe Photoshop as it’s a program many students are already familiar with so we can focus on the principles and techniques.
          What you’ll make:
          At the end of this class, you will have created a video clip with audio, as well as gained some useful techniques and ways to approach sound, which you can apply, beyond this course, to future video projects.

          What you’ll need to complete class:
              Adobe Photoshop (free trial of the software program at )
              Your own video asset or the provided sample file from the resources section
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Super organized and flexible script for sending phishing campaigns.
              Sends to a single email
              Sends to lists of emails (text)
              Sends to lists emails with first, last name (csv)
              Supports attachments
              Splits emails in groups
              Delays sending emails between each group
              Support Tags to be placed and replaced in the message's body
                  Add {{name}} tag into the HTML message to be replaced with name (used with --to CSV).
                  Add {{track-click}} tag to URL in the HTML message.
                  Add {{track-open}} tag into the HTML message.
                  Add {{num}} tag to be replaced with a random phone number.
              Supports individual profiles for different campaigns to avoid mistakes and confusion.
              Supports creating database for sent emails, each email with its unique hash (useful with getCabrito)
              Supports dry test, to run the script against your profile without sending the email to test your campaign before the launch.

          Hidden Content
          Give reaction to this post to see the hidden content.