• Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

Community Reputation

44 Excellent

About Bipo

  • Rank
    Junior Member
  • Birthday 04/03/1990


  • Location

Recent Profile Visitors

468 profile views
  1. Bipo

    10x Malwarebytes lifetime keys

    To late , someone use it alll
  2. Google Helps Police Identify Devices Close to Crime Scenes Using Location Data April 15, 2019Swati Khandelwal It's no secret that Google tracks you everywhere, even when you keep Google's Location History feature disabled. As revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude. According to Google, the company uses this location-tracking features with an intent to improve its users' experience, like "personalized maps, recommendations based on places you've visited, help finding your phone, real-time traffic updates about your commute, and more useful ads." Moreover, it's also known that Google could share your location data with federal authorities in criminal investigations when asked with a warrant. Google 'SensorVault' Database Help Police Solve Crimes But what many people weren't aware of is that Google also helps federal authorities identify suspects of crimes by sharing location history of all devices that passed through crime scenes over a certain time period. It should be noted Google doesn't share personal information of all nearby users; instead, it asks the police to first analyze location history of all users and narrows down results to only a few selected users to receive their names, email addresses, and other personal data from Google. A new in-depth report from The New York Times revealed that Google maintains a database, known internally as Sensorvault, over nearly the past decade, containing detailed location records from hundreds of millions of phones around the world, and shares with authorities nationwide with warrants to mine it to help in criminal cases. According to several unnamed Google employees cited in the report, such requests to dive into Google's Sensorvault database have spiked in the last six months, with the company receiving as many as 180 requests in just one week. How Does Law Enforcement Use Google SensorVault Database? To seek location data, law enforcement needs to get a so-called "geofence" warrant. Here below I have tried to step-by-step illustrate how Google shares location data when "legally" required: The authorities reached out to Google with a geofence warrant looking for smartphones Google had recorded around the crime scene. After receiving the warrant, Google gathers location information from its Sensorvault database and sends it to investigators, with each device identified by an anonymous ID code and not the actual identity of the devices. Investigators then review the data, look for patterns of the devices near the crime scene, and request further location data on devices from Google that appear relevant to see the particular device movement beyond the original area defined in the warrant. When investigators narrow results to a few devices, which they think may belong to suspects or witnesses, Google reveals the real name, email address and other data associated with the devices. The NYT report explained the entire process when federal agents requested the location data to investigate a string of bombings around Austin, Texas. Federal agents first used this technique of catching criminals in 2016, which has since been spread to local departments across the country, including in California, Florida, Minnesota, and Washington. While the technique has been proven to work, it's not a foolproof way to catch criminals. Some cases highlighted by the NYT report showed how police used this data to accuse innocents, with one man jailed for a week last year in a murder investigation after being recorded near the killing location and then released after investigators pinpointed and arrested another suspect. It's no surprise that law enforcement seeks help from tech companies during criminal investigations, but the use of location history databases like Sensorvault has raised concerns... concerns about the privacy of users... concerns about data collection... concerns about innocent being accused and implicated.
  3. Bipo

    remote administration tool ARES RAT v1.0.0

    This look very interresting ....Gradulatioin 👍
  4. First Android Clipboard Hijacking Crypto Malware Found On Google Play Store February 11, 2019Swati Khandelwal A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post. Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out. The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency. To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node. Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores. However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard. As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app. Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1. Google took down the malicious app almost immediately after being notified by the researcher. While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry. Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
  5. Bipo


    Hi It's possible to now if this .Net or C code ......
  6. Tech Viral TECH SCIENCE SECURITY HOW-TO TOP LIST GADGETS How to Computer How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 By Tushar Subhra Dutta - January 25, 2019 0 How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 We all know that the well-known Windows Defender is a security tool that the tech giant Microsoft includes by default in Windows 10. However, this does not mean that the tech giant Microsoft’s Windows users cannot use any other third-party security tools. As the presence of Windows Defender on Windows 10 is a clear indication that it is compatible with all the third-party security tools and can coexist at the same time in our Windows 10 system. However, since the latest Windows updates, users are simply receiving more and more Windows Defender notifications on their desktop or laptop. Yes, notifications that sometimes are important, but for many others they simply become annoying. While most users agree that the tech giant Microsoft’s well-known security tool, of course, Windows Defender notifications are displayed when it tries to report any type of threat, however, the vast majority of Windows Defender notifications do not provide information relevant to the user, hence, today we will show you a solution for it. So, now without wasting much time let’s explore the tutorial in which we will show you all below how to turn off the Windows Defender notifications in Windows 10. How to disable Windows Defender notifications in Windows 10? In this way, we will make sure that Windows Defender notifications will only be displayed to inform us that a threat could attack our system. First of all, you have to click on the start button. Then on the left side of the start menu simply click on the settings (gear icon). After that now you will get a Window like this. Now simply open the “Update & Security” option. After opening the above option you will get a new Window which is mentioned below. Then simply you have to click on the Windows Security option on the left side of your screen. Now after that simply click on the option “Open Windows Defender Security Centre”. Then simply click on the settings option on the left-lower side of your screen. Now here in this Window, you can simply disable all the Windows Defender notifications. That’s it, now you are done. Moreover, in these settings, we can simply find a general switch that simply deactivates the Windows Defender notifications, and along with the On/Off switch, it also features a set of different options to establish the type of notifications that we want to receive. As the account protection notifications are related to the dynamic blocking of Windows 10, while the Windows Firewall is shown when the firewall blocks an application on the computer. So, what do you think about this tutorial to disable Windows Defender notifications in Windows 10? If you liked this tutorial then do not forget to share this tutorial with your friends and family.
  7. Bipo

    Man in The Middle ?

  8. Bipo

    Man in The Middle ?

    In your opinion what is the best Man in the Middle tools for windows ?
  9. Bipo

    Ban Evasion from HF

    maby i understant more now .....this how i write Thank's for level23 and for that clown on hf and maby i should write like this. Thank's for level23 it is very well here and for that clown on hf bomb i maby not separate my words correctly . Because here is super friendly and not the other one .
  10. Bipo

    Ban Evasion from HF

    Not shure about your mess but i try to anwser my best . For this Ransomware i never anwser for this because it is to expensive for me . But for the second question about help yess you give great help .every question i ask you you always anwser me very well.
  11. Bipo

    Ban Evasion from HF

    Hi I just want to said that i was in another forum ( That one with to letter ) HF from 3 years and always do clean post always stay in my place and i try to open my account this week and notthing. So i write them to say i was never ban but this guy who i was talking by mail told me ban evasion explain notthing . I use to buy a few tools there but ......I just want to sead i thing he now everything with hacking et programaing but he can figure out that i was never ban. For me he is just a CLOWN and we are in a better forum here . Thank's for level23 and for that clown on hf
  12. Bipo

    good direct link ?

    I will try but my english is just soso .... Y make a free website in 000webhost with a very short name Chek for redirect link and there you put your long link . I don't now if you will be able to use it lollllll Y'm newbie and maby you will be able to install your 'EXE in the site .
  13. Bipo

    LuminositeLink jail

    LuminosityLink Hacking Tool Author Gets 30-Months Prison Sentence October 17, 2018Swati Khandelwal A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure. First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently." However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to: Record the keys that victims pressed on their keyboards Surveil victims using their computers' cameras and microphones View and download the computers' files Steal names and passwords used to access websites In his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators. However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent. Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own website and public internet forum According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide. According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years. Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.
  14. Bipo

    Web Shell

    I now i asking a lot of questions but In your opinion ..did Web Shell is good for RAT spreading ? and did it also a good parts of hacking to learn ?? You should call this section Bipo questions
  15. Bipo

    For now i just like to now .....

    Thank's for the anwser , maby i will go take a look ......