Jump to content


  • Posts

  • Joined

  • Last visited

  • Days Won


trayser last won the day on February 7 2018

trayser had the most liked content!

About trayser

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

trayser's Achievements


Beginner (5/13)



  1. trayser


    XAttacker - Website Vulnerability Scanner & Auto Exploiter Auto Cms Detect [1] WordPress : [+] Adblock Blocker [+] WP All Import [+] Blaze [+] Catpro [+] Cherry Plugin [+] Download Manager [+] Formcraft [+] levoslideshow [+] Power Zoomer [+] Gravity Forms [+] Revslider Upload Shell [+] Revslider Dafece Ajax [+] Revslider Get Config [+] Showbiz [+] Simple Ads Manager [+] Slide Show Pro [+] WP Mobile Detector [+] Wysija [+] InBoundio Marketing [+] dzs-zoomsounds [+] Reflex Gallery [+] Creative Contact Form [+] Work The Flow File Upload [+] WP Job Manger [+] PHP Event Calendar [+] Synoptic [+] Wp Shop [+] Content Injection [*][2] Joomla [+] Com Jce [+] Com Media [+] Com Jdownloads [+] Com Fabrik [+] Com Jdownloads Index [+] Com Foxcontact [+] Com Ads Manager [+] Com Blog [+] Com Users [+] Com Weblinks [+] mod_simplefileupload [*][3] DruPal [+] Add Admin [*][4] PrestaShop [+] columnadverts [+] soopamobile [+] soopabanners [+] Vtermslideshow [+] simpleslideshow [+] productpageadverts [+] homepageadvertise [+] homepageadvertise2 [+] jro_homepageadvertise [+] attributewizardpro [+] 1attributewizardpro [+] AttributewizardproOLD [+] attributewizardpro_x [+] advancedslider [+] cartabandonmentpro [+] cartabandonmentproOld [+] videostab [+] wg24themeadministration [+] fieldvmegamenu [+] wdoptionpanel [+] pk_flexmenu [+] pk_vertflexmenu [+] nvn_export_orders [+] megamenu [+] tdpsthemeoptionpanel [+] psmodthemeoptionpanel [+] masseditproduct [*][5] Lokomedia SQL injection Download: [Hidden Content]
  2. trayser


    fuxploider - File Upload Vulnerability Scanner And Exploitation Tool fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server. Download: [Hidden Content]
  3. Wapiti allows you to audit the security of your websites or web applications. It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Usage ██╗ ██╗ █████╗ ██████╗ ██╗████████╗██╗██████╗ ██║ ██║██╔══██╗██╔══██╗██║╚══██╔══╝██║╚════██╗ ██║ █╗ ██║███████║██████╔╝██║ ██║ ██║ █████╔╝ ██║███╗██║██╔══██║██╔═══╝ ██║ ██║ ██║ ╚═══██╗ ╚███╔███╔╝██║ ██║██║ ██║ ██║ ██║██████╔╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚═╝╚═════╝ Wapiti-3.0.0 (wapiti.sourceforge.net) usage: wapiti [-h] [-u URL] [--scope {page,folder,domain,url}] [-m MODULES_LIST] [--list-modules] [-l LEVEL] [-p PROXY_URL] [-a CREDENTIALS] [--auth-type {basic,digest,kerberos,ntlm}] [-c COOKIE_FILE] [--skip-crawl] [--resume-crawl] [--flush-attacks] [--flush-session] [-s URL] [-x URL] [-r PARAMETER] [--skip PARAMETER] [-d DEPTH] [--max-links-per-page MAX] [--max-files-per-dir MAX] [--max-scan-time MINUTES] [--max-parameters MAX] [-S FORCE] [-t SECONDS] [-H HEADER] [-A AGENT] [--verify-ssl {0,1}] [--color] [-v LEVEL] [-f FORMAT] [-o OUPUT_PATH] [--no-bugreport] [--version] wapiti: error: one of the arguments -u/--url --list-modules is required Download: [HIDE-THANKS][Hidden Content]]
  4. cSploit Android - The most complete and advanced IT security professional toolkit on Android Features Map your local network Fingerprint hosts' operating systems and open ports Add your own hosts outside the local network Integrated traceroute Integrated Metasploit framework RPCd Search hosts for known vulnerabilities via integrated Metasploit daemon Adjust exploit settings, launch, and create shell consoles on exploited systems More coming [*]Forge TCP/UDP packets [*]Perform man in the middle attacks (MITM) including: Image, text, and video replacement-- replace your own content on unencrypted web pages JavaScript injection-- add your own javascript to unencrypted web pages. password sniffing ( with common protocols dissection ) Capture pcap network traffic files Real time traffic manipulation to replace images/text/inject into web pages DNS spoofing to redirect traffic to different domain Break existing connections Redirect traffic to another address Session Hijacking-- listen for unencrypted cookies and clone them to take Web session Download: [HIDE-THANKS][Hidden Content]]
  5. This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it will trigger the download of the 2 previous files stored into apache2 (image.jpg + payload.ps1) and execute them. This module also changes the agent.exe Icon to match one file.jpg Then uses the spoof 'Hide extensions for known file types' method to hidde the agent.exe extension. All payloads (user input) will be downloaded from our apache2 webserver and executed into target RAM. The only extension (payload input by user) that requires to write payload to disk are .exe binaries. Download; [HIDE-THANKS][Hidden Content]]
  6. Trojanizer - Trojanize Your Payload (WinRAR [sFX] Automatization) The Trojanizer tool uses WinRAR (SFX) to compress the two files input by user, and transforms it into an SFX executable(.exe) archive. The sfx archive when executed it will run both files (our payload and the legit appl at the same time). To make the archive less suspicious to target at execution time, trojanizer will try to replace the default icon(.ico) of the sfx file with a user-selected one, and supress all SFX archive sandbox msgs (Silent=1 | Overwrite=1). Trojanizer will not build trojans, but from target perspective, it replicates the trojan behavior' (execute the payload in background, while the legit application executes in foreground). Download: [HIDE-THANKS][Hidden Content]]
  7. Features World's fastest password cracker World's first and only in-kernel rule engine Free Open-Source (MIT License) Multi-OS (Linux, Windows and macOS) Multi-Platform (CPU, GPU, DSP, FPGA, etc., everything that comes with an OpenCL runtime) Multi-Hash (Cracking multiple hashes at the same time) Multi-Devices (Utilizing multiple devices in same system) Multi-Device-Types (Utilizing mixed device types in same system) Supports distributed cracking networks (using overlay) Supports interactive pause / resume Supports sessions Supports restore Supports reading password candidates from file and stdin Supports hex-salt and hex-charset Supports automatic performance tuning Supports automatic keyspace ordering markov-chains Built-in benchmarking system Integrated thermal watchdog 200+ Hash-types implemented with performance in mind ... and much more download [HIDE-THANKS][Hidden Content]]
  8. Hello, im here to learn, also im here to collect hack tools as it is my hobby.
  9. Re: VenomLogger Cracked by Lopht Hello, after 99 days then it will stop working?
  10. Re: AnKeBuT Source Generator hello, it is for vb6 or vb net?
  11. trayser


    Re: remcos is this for the cracked version only, or and for the free once also?
  12. Re: AnonGhost DOSER hello, it asks for a decryption key on mega . nz
  13. Re: Reporten Links Caidos (Importante) Mass Reverser [Mass md5 cracking!] broken link [Hidden Content]
  14. Re: [REQ] Anatoli Rat 1.2.1 [Cracked By 0X22] hopping its not backdoored also.
  15. Re: [REQ] Anatoli Rat 1.2.1 [Cracked By 0X22] nice, thanks for helping me, now one more rat is on my collection.

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.