itsMe

Master
  • Content Count

    20,626
  • Avg. Content Per Day

    24
  • Joined

  • Days Won

    771

itsMe last won the day on May 8

itsMe had the most liked content!

Community Reputation

42,861 Excellent

About itsMe

  • Rank
    ~ KillmeMories ~
  • Birthday 09/06/1869

Converted

  • Location
    World

Converted

  • Interests
    Porn xD

Converted

  • Occupation
    What is it?

Recent Profile Visitors

15,444 profile views
  1. Unlimited data on unlimited devices Ultra-secure: Top, bank-grade encryption Unlimited data: Ideal for streaming content Ultimate privacy: Conceal activities, even on P2P networks [Hidden Content] [hide][Hidden Content]]
  2. jSQL Injection is a lightweight application used to find database information from a distant server. It is free, open-source, and cross-platform (Windows, Linux, Mac OS X). It is also part of the official penetration testing distribution Kali Linux and is included in other distributions like Pentest Box, Parrot Security OS, ArchStrike, or BlackArch Linux. This software is developed using great open-source libraries like Spring, Spock, and Hibernate, and it uses the platform Travis CI for continuous integration. Each program update is tested with Java version 8 through 13 in the cloud, against various MySQL, PostgreSQL, and H2 databases. Source code is open to pull requests and to any contribution on multi-threading, devops, unit and integration tests, and optimization. Features Automatic injection of 23 kinds of databases: Access, CockroachDB, CUBRID, DB2, Derby, Firebird, H2, Hana, HSQLDB, Informix, Ingres, MaxDB, Mckoi, MySQL{MariaDb}, Neo4j, NuoDB, Oracle, PostgreSQL, SQLite, SQL Server, Sybase, Teradata and Vertica Multiple injection strategies: Normal, Error, Blind and Time SQL Engine to study and optimize SQL expressions Injection of multiple targets Search for administration pages Creation and visualization of Web shell and SQL shell Read and write files on the host using injection Bruteforce of password’s hash Code and decode a string Changelog jSQL Injection v0.85 Compliance to Java 17 Switch to native HttpClient [hide][Hidden Content]]
  3. itsMe

    Learning C#

    Description The C# language got its start on Windows, but today you can find it almost everywhere. Whether it’s running on the cloud, to desktops with MacOS and Linux, to mobile operating systems like Android and iOS, C# has grown into a mature, powerful language for almost any programming purpose. In this course, Joe Marini dives into the fundamentals of C#, starting with a basic overview of language constructs like program flow and data types. He then gets into more advance topics such as functions, object-oriented programming techniques, and string processing. After this course, you’ll have a better understanding of C#, and how its combination of power, simplicity, and expressiveness make it an extremely versatile programming language that can be used for almost any scenario. [Hidden Content] [hide][Hidden Content]]
  4. Remove Duplicates From MASSIVE Wordlist, Without Sorting It (For Dictionary-Based Password Cracking) [hide][Hidden Content]]
  5. Accelerate application security testing with Burp Suite Join our community of 14,000 organizations, using PortSwigger's Burp Suite to accelerate application security testing. Burp Suite Professional Faster, more reliable security testing The leading toolkit for web security testing. [Hidden Content] [hide][Hidden Content]]
  6. itsMe

    DecSoft App Builder 2021.40

    If you want to create modern desktop and mobile apps you're in the right place! DecSoft App Builder is a professional visual development environment to create HTML5 apps, WebApps, Progressive WebApps, Web Extensions and Hybrid apps for the modern mobile and desktop browsers, as well platforms like Google Android, Apple iOS and Microsoft Windows. [Hidden Content] [hide][Hidden Content]]
  7. Ready to start building Web Applications with Visual FoxPro? Web Connection is a complete application framework for developing scalable, Web based business solutions using Visual FoxPro. With Web Connection you can create both server and client centric Html based Web applications, REST services or application servers. You can use the familiar FoxPro language and development environment to reuse existing FoxPro business code on the Web, using the environment and tooling you already know. Web Connection is a proven development platform that has been around since 1995 and is widely used in both small business and large scale applications. If you are a FoxPro developer you can leverage your existing FoxPro skills and development workflow to build Web/Cloud based applications. Whether you're an existing user looking to upgrade or a new user getting into Web Connection and Web development with FoxPro for the first time, Web Connection is easier than ever to build, deploy and manage your FoxPro based Web applications. Get started today! [Hidden Content] [hide][Hidden Content]]
  8. pyMalleableC2 A Python interpreter for Cobalt Strike Malleable C2 profiles that allows you to parse, modify, build them programmatically and validate syntax. Supports all of the Cobalt Strike Malleable C2 Profile grammar starting from Cobalt Strike version 4.3. It’s not backwards compatible with previous Cobalt Strike releases. What are the differences between pyMalleableC2 and other projects of this nature? Parses profiles with Lark using eBNF notation. This approach is a lot more robust then user-defined regexes, templating engines, or similar methods. Turns profiles into an Abstract Syntax Tree (AST) which can then be reconstructed back into source code. Because of the above, pyMalleableC2 allows you to build profiles programmatically or modify them on the fly. Allows you to validate the syntax of Malleable C2 profiles (Does not perform runtime checks, see the warning below.) It has AI in the form of a lot of if statements. [hide][Hidden Content]]
  9. Youtube Fly (Insider Secrets Revealed) *All of My Closely Guarded Strategies, Methods, Tools and Secrets Finally Revealed* This Course Reveals Everything I Did to Gain Over 700,000+ Subscribers in Less Than a Year Made for Digital Creators, Entrepreneurs, Experts, Gamers, Artists and Entertainers That Are Serious on Making Youtube Their Full-time Highly Paying Job The Most Comprehensive Youtube Course Ever Created WITH A SOLE FOCUS ON MAKING AS MUCH MONEY POSSIBLE 54 Step-by-Step Video Lectures (Latest Methods) All of the Future Updates & New Lectures Complete List of My Private Tools & Systems Bi-Weekly Channel Reviews from Investor Completely Beginner Friendly (No Exp. Needed) All Revenue Maximizing Systems in 2021. View Tsunami – How to Get A WAVE of Views Fast Your Favourite YouTubers Secret Methods Decoded All of My Closely Guarded Secrets and Methods 1,000 Subs & Monetization in Less than 7 Days Lifetime Course & Resource Access *Worldwide* Dedicated YouTubeFLY Support Team 24/7 Ad Revenue Booster – Highest CPM Possible Affiliate Marketing Jump Start & Private Tips High-Ticket Sponsorships (Up to $10,000 per post) Ultra Fast Subscribers – Insider Method Revealed AND MUCH MORE INSIDE THE YOUTUBEFLY PROGRAM… [Hidden Content] [hide][Hidden Content]]
  10. Learn Reverse Engineering Using Ghidra On Linux And Windows What you'll learn Reverse Engineering Basics of Ghidra Solving Linux and Windows CrackMe's Understand Windows API's Identify Entry Points, Main and WinMain functions Analyzing using Function Graph and Function Call Trees Doing String Search and Defined Strings Windows API Function Call Graphs Creating Functions Converting data types Editing function signatures Cross referencing function calls and strings and more... Requirements Familiar with basic Linux Commands Some Basics of Assembly and C would be helpful but not strictly necessary Windows PC Description If you have never used Ghidra before and want to learn how get started with using Ghidra to reverse engineer and analyse programs, then this is the course for you. Ghidra is the strong competitor to IDA Pro and is used by NSA itself for Reverse Engineering. And the best thing is that it is totally free. It is used for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn Ghidra by solving Linux and Windows CrackMe challenges. A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to understand how Linux and Windows binaries work. This course will equip you with the knowledge and skill to use Ghidra in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics. I will start off with showing you how to install Oracle Virtual Box. Then, installing Java SDK and Kali Linux in the Virtual Box. Then, we will reverse engineer Linux executable files. Next, we will move on to installing Java SDK and Ghidra for Windows and reverse and analyze Windows programs. You will also learn how to reverse GUI CrackMe's. You will learn how to use Function Graphs, Function Call Trees, Search String, Defined Strings and more. The course will also cover how to identify program entry point and also find the main functions for command line interface apps and WinMain for GUI based apps. By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries. What you will learn: How to disassemble programs into assembly code How to decompile programs to C code Static Analysis Understand Windows API's Identify entry points, main and WinMain functions Use String Search and Defined Strings Visualizing the Call Stack using Function Graph and Function Call Trees Solving Crackmes and more ... Suitable for: Anyone interested to learn Reverse Engineering on Linux and Windows executable files. Who this course is for: Anyone interested to learn how to get started with Ghidra on Linux and Windows Those who have never used Ghidra before and want to learn the basics Students with some basic experience with other disassemblers [Hidden Content] [hide][Hidden Content]]
  11. itsMe

    cc-checker

    Simple CC Checker [hide][Hidden Content]]
  12. Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok Features: Get Device Information Without Any Permissions Access Location [SMARTPHONES] Os Password Grabber [WIN-10] Access Webcam Access Microphone Operating Systems Tested Kali Linux 2020 [hide][Hidden Content]]
  13. BlackMamba BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some of BlackMamba features are: Multi-Client – Supports multiple client connections at the same time. Real-Time Communication Updates – Real-time communication and updates between the client and server. Encrypted Communication – Almost all communications are encrypted, with exception of screen video streaming. Screenshot Gathering – Get a real-time screenshot from the client. Video Streaming – Watch in real-time the client screen. Client Lock – Lock and unlock the machine of the client. Encrypted File Transfer (upload/download) – Download files from the client or uploads files for the client. Keylogger – Register all the keys pressed by the client. Web Downloader – Download files from URLs or content by RAW pages. Changelog v1.0.41 New feature: Enumeration of open ports. [hide][Hidden Content]]
  14. RemotePotato0 Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Briefly: It abuses the DCOM activation service and triggers an NTLM authentication of the user currently logged on in the target machine. It is required you have a shell in session 0 (e.g. WinRm shell or SSH shell) and that a privileged user is logged on in session 1 (e.g. a Domain Admin user). Once the NTLM type1 is triggered we set up a cross-protocol relay server that receives the privileged type1 message and relays it to a third resource by unpacking the RPC protocol and packing the authentication over HTTP. On the receiving end, you can set up a further relay node (eg. ntlmrelayx) or relay directly to a privileged resource. [hide][Hidden Content]]
  15. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.8 Update setup.py and fix typo (#98) @SkeletalDemise Remove Loguru from pyproject.toml and poetry.lock (#97) @bee-san Added one new Office hash type and updated some of the old ones (#95) @amadejpapez Upgrade to GitHub-native Dependabot (#94) @dependabot-preview Fix for the latest office test (#93) @amadejpapez Added MS Office <= 2003, Blake2b-512, Telegram Mobile App Passcode (#92) @amadejpapez [hide][Hidden Content]]