Jump to content

All Activity

This stream auto-updates

  1. Today
  2. Released Monday, 5 December 2022 This release upgrades Burp's browser to Chromium 108.0.5359.94/95. Burp Suite Pro – is a reliable and practical platform that provides you with a simple means of performing security testing of web applications. It gives you full control, letting you combine advanced manual techniques with various tools that seamlessly work together to support the entire testing process. The utility is easy-to-use and intuitive and does not require you to perform advanced actions in order to analyze, scan and exploit web apps. It is highly configurable and comes with useful features to assist experienced testers with their work. Features • Burp Proxy • Burp Spider • Burp Repeater • Burp Sequencer • Burp Decoder • Burp Comparer • Burp Intruder • Burp Scanner • Save and Restore • Search • Target Analyzer • Content Discovery • Task Scheduler • Release Schedule Info: [Hidden Content] [Hidden Content]
  3. Yesterday
  4. The most advanced Penetration Testing Distribution Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. [hide][Hidden Content]]
  5. Features No malicious code Extremely stable Small stub size 7-11 KB No drop to disk ( Memory Execution ) No suspicious API calls 32-bit Native output (C++) Supports 32-bit .NET executables Tested with: .NET 2.0 .NET 3.0 - 3.5 .NET 4.0 - 4.8 Various EXEs Various RATs Various Bots Various Native Crypters [hide][Hidden Content]]
  6. RouterGuard Monitors your FritzBox and alerts you in case of danger. Real-time protection: Alerts you to suspicious activities on your FritzBox Is the neighbour using my Wi-Fi? Shows you all connected devices How secure is my FritzBox? Overview of your FritzBox security settings [Hidden Content] [hide][Hidden Content]]
  7. WashAndGo The No.1 PC cleaner: removes data junk quickly and safely End the frustration of a cluttered and slow PC Test winner: Finds up to 8x more data junk than the competition Restoring the PC to its full potential and stability Optimised and perfected for over 20 years [Hidden Content] [Hidden Content]
  8. Cerbero Suite Advanced includes all the features of the Standard edition, so make sure to check out the standard edition for the list of features. The Advanced edition comes with additional features and is especially designed for experts in the security and forensic field. Among various additional file formats, it features the Carbon Interactive Disassembler with integrated Sleigh Decompiler, the Silicon Excel Emulator and the Native Ghidra UI. This is a list of some relevant features of Cerbero Suite Advanced. Please note that it is not possible to enumerate all features because of the complexity and on-going improvement of the product. All the features of the Standard edition Carbon Interactive Disassembler Supported architectures: x86, x64, ARM32/Thumb, ARM64 Integrated Sleigh Decompiler Loading of debug symbols Defining of data types Silicon Excel Emulator Native Ghidra UI Supported file formats: Email (EML) Extraction of attachments Torrent Windows crash dumps (WINDMP) Support for both kernel and mini-dumps Completely independent from WinDBG Inspection of code Inspection of call stack Inspection of threads Inspection of exception information Inspection of bug check information Inspection of memory Inspection of internal structures Windows Hibernation files Inspection of internal structures Full inspection of memory Windows Raw Memory Images (WINMEM) Support for all Windows editions Inspection of code Inspection of files in memory Inspection of SSDT, IDT, GDT Suppport for VAD trees User address spaces System address space This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ([Hidden Content]) [Hidden Content] [Hidden Content]
  9. WinTools.net 23.0 Premium new! Is a suite of tools for increasing MS Windows operating system performance. WinTools.net cleanly removes unwanted software from disk drives and dead references from the Windows registry. WinTools.net puts you in control of the Windows start up process, memory monitoring and gives you the power to customize desktop and system settings to fit your needs. Adds more speed and stability for your connection. Ensures your privacy and keep sensitive information secure. WinTools.net Premium contains tools: Clean Uninstaller, Scan Files, Scan Shortcuts, Scan Registry, Startup Manager, Tweak UI, Net Tweaker, Duplicate Files, The Privacy, Invisible Man, File Shredder... WinTools.net 23.0 Professional Is a suite of tools for increasing MS Windows operating system performance. WinTools.net cleanly removes unwanted software from disk drives and dead references from the Windows registry. WinTools.net puts you in control of the Windows start up process, memory monitoring and gives you the power to customize desktop and system settings to fit your needs. Adds more speed and stability for your connection. Ensures your privacy and keep sensitive information secure. WinTools.net Professional contains tools: Clean Uninstaller, Scan Files, Scan Shortcuts, Scan Registry, Startup Manager, Tweak UI, Net Tweaker, The Privacy, Invisible Man, File Shredder... [Hidden Content] [hide][Hidden Content]]
  10. Drupal H5P Module versions 2.0.0 and below suffer from a traversal vulnerability when handling a zipped filename on windows.View the full article
  11. Automotive Shop Management System version 1.0 suffers from a remote SQL injection vulnerability.View the full article
  12. Zillya Total Security versions 3.0.2367.0 and 3.0.2368.0 suffer from a local privilege escalation vulnerability via a symlink vulnerability when using the quarantine module.View the full article
  13. [Hidden Content]
  14. Acunetix 360 is a best-of-breed enterprise web vulnerability solution designed to be a part of complex environments. It provides multiple integrations as well as options to integrate within custom contexts. Version 1.7.1.955 (Vulnerability Database: 2022.11.29.1600) Cracked [Hidden Content] [Hidden Content]
  15. Description Being able to administer a Windows machine is an essential skill for any Windows administrator. But you need to keep your skills sharp and up to date with periodic Windows administration training. In this course, instructor Martin Guidry takes a detailed look at the Windows 11 operating system, focusing on the administrative tasks necessary for keeping your workflows in top shape. Explore the various desktop versions of Windows 11 along with the special features of the Enterprise edition, as well as the hardware requirements for some of the newest features and built-in tools of the latest release. Learn about installing and updating drivers, configuring and optimizing the OS, working with local groups and troubleshooting Group Policy, and managing security with authentication and encryption. By the end of this course, you’ll be prepared to leverage your new skills for virtualization, networking, backup, and recovery. [Hidden Content] [hide][Hidden Content]]
  16. Last week
  17. Course Description YOU CAN BECOME A CYBER SECURITY EXPERT! There is no need to spend years going through hundreds of different courses and still being average when it comes to practical knowledge of cyber security. Imagine you know everything important in the domain of cyber security... You can tackle all types of online threats, including advanced hackers, trackers, exploit kits, mass surveillance and much more... ALL OF THIS IS POSSIBLE IF YOU ENROLL IN THE COMPLETE CYBER SECURITY COURSE NOW! This is the most comprehensive online cyber security course out there in the market. It is a set of 4 different courses that will take you from beginner to expert, through easy to follow on-demand video lectures, articles, and other resources. In the course, you will learn how hackers hack, how trackers track, and what you can do to stop them. You will understand the global tracking and hacking infrastructures that exist and how to mitigate them. By the end of the course, you will master network security, firewalls, encryption, and how to stay anonymous online, password and email security, authentication, anti-virus, and end-point-protection. You will become a hacker hunter and will be able to seek and destroy malware. And you will be able to work with all major platforms including Windows, MacOS, Linux, iOS, Android and even firmware security. This course is for you if you are looking to start a career in cyber security, if you want to take you career to the next level, or even if you are simply interested in protecting your online presence. SO, IF YOU ARE INTERESTED IN LEARNING AN ADVANCED PRACTICAL SKILL-SET, ENROLL IN THE COMPLETE CYBER SECURITY COURSE NOW! 1.- The Complete Cyber Security Course! Volume 1: Hackers Exposed 2.- The Complete Cyber Security Course! Volume 2 : Network Security 3.- The Complete Cyber Security Course! Volume 3 : Anonymous Browsing 4.- The Complete Cyber Security Course! Volume 4 : End Point Protection [Hidden Content] [hide][Hidden Content]]
  18. [Hidden Content]
  19. v1.2.7.7 - fixed back to selected folder... [hide][Hidden Content]]
  20. [Hidden Content]
  21. [Hidden Content]
  22. [Hidden Content]
  1. Load more activity

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.