itsMe

Master
  • Content Count

    35,764
  • Avg. Content Per Day

    29
  • Joined

  • Days Won

    1,154

itsMe last won the day on May 26

itsMe had the most liked content!

Community Reputation

69,460 Excellent

About itsMe

  • Rank
    ~ KillmeMories ~
  • Birthday 09/06/1869

Converted

  • Location
    World

Converted

  • Interests
    Porn xD

Converted

  • Occupation
    What is it?

Recent Profile Visitors

19,573 profile views
  1. Knowing how networks are built and how to keep communications technologies and network protocols safe What you’ll learn Learning Types of Transmission: An Introduction to Network Security Foundations of Learning and Networking Services for Learning Networks Wireless Networks: An Overview An Overview of Protocols Understanding Different Network Sizes Network Attacks: An Overview Learning Model Based on Open Systems Interconnection (OSL) Requirements An internet connection and access to a computer Description Hello and welcome to this course. While practically every nation on the globe has experienced difficult economic times, one sector that has remained relatively unaffected is information security. Organizations and government agencies do not have a big enough pool of employees with the required skillset from which to recruit, yet assaults on these institutions are only rising and becoming more crucial. If you are genuinely smart, talented, and disciplined, security is a terrific industry to be in. Telecommunications and networking make use of a variety of interconnected and integrated processes, devices, software, and protocols. Because there are so many technologies involved and changing, networking is one of the most complicated issues in the computer world. Our existing technologies are always changing, and it seems like there are new “emerging” technologies to study, comprehend, adapt, and protect every month. A network administrator should be able to set up networking software, protocols, and devices, as well as deal with interoperability difficulties, install, configure, and interface with telecommunications software and equipment, and efficiently troubleshoot. To properly recognize where vulnerabilities might exist within each of these components and then know what to do about them, a security expert must first comprehend them and then be able to analyze them at a deeper level. This may be a difficult process. You may have more employment choices than you know what to do with if you are informed, have a strong practical skill set, and are ready to continue learning. This course will teach you how to: TCP/IP and OSI models. Types of protocols and security concerns technologies such as LAN, WAN, MAN, intranet, and extranet. Data transmission kinds and cable types Internet-connected devices and services Routing by software Dissemination networks Protocols with several layers Network technologies that are convergent Communication, safety, and management Devices and technology for communication Technology for remote connection Technologies that are based on wireless communication Encryption over the internet Attainment and threats Who this course is for: Anyone interested in learning more about network security should consult [hide][Hidden Content]]
  2. itsMe

    ArcoLinux 22.06.07

    ArcoLinux es una distribución de Linux que proporciona a los usuarios un entorno informático basado en Arch Linux con el entorno de escritorio Xfce. El modelo de lanzamiento es de Liberación continua o rolling release. Su país de origen y sede actual es Bélgica. [hide][Hidden Content]]
  3. itsMe

    x81 IPTV ipro.tv

    [Hidden Content]
  4. itsMe

    x7 IPTV turkiyetv.live

    [Hidden Content]
  5. Hidden miner that allows you to mine XMR ETH ETC coins Miner functions The NET - Miner installer and watchdog timer are encoded in C#, the loader/injector is encoded in .NET Framework 4.6 CPU Mining GPU Mining Does not work when Task Manager, Hacker Process and Management Console are open Injection (Silent/Hidden) - Hide payload behind another process Coin mining, ETC&ETH, via lolminer Mutex Generation Copying files and their descriptions bypassUAC/disableDefenderNotifications/Hide from TaskManager/Anti-Sandbox/Debug (Stealth Mode) [hide][Hidden Content]]
  6. FindFunc is an IDA Pro plugin to find code functions that contain a certain assembly or byte pattern, reference a certain name or string, or conform to various other constraints. This is not a competitor to tools like Diaphora or BinNavi, but it is ideal to find a known function in a new binary for cases where classical bindiffing fails. [hide][Hidden Content]]
  7. Description The complete CEH video course with recorded labs by Dean Bushmiller Table of contents Welcome Mindmaps Notecards Activity Readings Lab Choices Professional Lab Setup Tools or Lab Command Syntax Step missing or Wrong order Exam Overview Quiz Practice LCA Ethical Hacking Overview Footprinting and Reconnaissance Footprinting and Reconnaissance Tools Footprinting and Reconnaissance Lab Recording Scanning Networks Scanning Networks Tools Scanning Networks Lab Recording Enumeration Enumeration Tools Enumeration Lab Recording Vulnerability Analysis Vulnerability Analysis Tools Vulnerability Analysis Lab Recording System Hacking System Hacking Tools System Hacking Lab Recording Malware Malware Tools Sniffing Sniffing Tools Sniffing Lab Recording Social Engineering Social Engineering Tools Denial of Service Denial of Service Tools Session Hijacking Session Hijacking Tools Session Hijacking Lab Recording Evading IDS, Firewalls, and Honeypots Evading IDS, Firewalls, and Honeypots Tools Web Servers Web Servers Tools Web Servers Lab Recording Web Applications Web Applications Tools Web Applications Lab Recording SQL Injection SQL Injection Tools SQL Injection Lab Recording Wireless Networks Wireless Networks Tools Mobile Platforms Internet of Things Cloud Computing Cryptography Cryptography Tools Metasploitable3 Lab setup walk-thru What is new this month in CEH [Hidden Content] [hide][Hidden Content]]
  8. SMB Session Spoofing This is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program is to create a fake SMB Session. The primary purpose of this is to serve as a method to lure attackers into accessing a honey-device. This program comes with no warranty or guarantees. What an Attacker Sees The theory behind this is when an adversary runs SharpHound and collects sessions and analyzes attack paths from owned principals, they can identify that a high privileged user is signed in on Tier-2 infrastructure (Workstations), which (it appears) they can then access and dump credentials on to gain Domain Admin access. [hide][Hidden Content]]
  9. Bypass 4xx HTTP response status codes. Script uses multithreading, and is based on brute-forcing so might have some false positives. Script uses colored output. Results will be sorted by HTTP response status code ascending, content length descending, and ID ascending. Extend this script to your liking. Tested on Kali Linux v2021.4 (64-bit). Made for educational purposes. I hope it will help! Tests: various HTTP methods, various HTTP methods with ‘Content-Length: 0’ header, cross-site tracing (XST) with HTTP TRACE and TRACK methods, file upload with HTTP PUT method, various HTTP method overrides, various HTTP headers, various URL overrides, URL override with two ‘Host’ headers, various URL path bypasses, basic-authentication/authorization including null session, broken URL parser check. Changelog v5.8 Added port overrides, and added more HTTP request headers. [hide][Hidden Content]]
  10. itsMe

    VOVSOFT Link Analyzer 1.6

    List all links on a web page Vovsoft Link Analyzer is an easy to use hyperlink checker, able to crawl both small and very large websites efficiently, while allowing you to find broken links, analyze the results in real-time, gather onsite data, distinguish internal and external links, check dofollow and nofollow links, analyze META descriptions and various tags. Tabulate all links in any HTML file In addition to website URLs, you can analyze HTML files in your computer. In this way, you can detect broken links in your bookmarks and export the results into CSV or TXT files. Drag and drop is also supported. Category: Web Development - Site Administration Supports: Windows Windows 11, Windows 10, Windows 8/8.1, Windows 7, Windows Vista, Windows XP (32-bit & 64-bit) Language: English [Hidden Content] [hide][Hidden Content]]
  11. itsMe

    ophcrack 3.8.0

    A Windows password cracker based on rainbow tables Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds. Features Cracks LM and NTLM Windows hashes Free tables available for Windows XP, Vista and 7 Brute-force module for simple passwords Audit mode and CSV export Real-time graphs to analyze the passwords LiveCD available to simplify the cracking Loads hashes from encrypted SAM recovered from a Windows partition [hide][Hidden Content]]
  12. What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. tornado can do create hidden service with tor network generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things hidden service becomes available outside tor network and ready to reverse shell connection be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim's point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users. Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  13. An Obfuscation-Neglect Android Malware Scoring System Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way. We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced. According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware. Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation. Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system. [hide][Hidden Content]]
  14. Prevent Intruders from Accessing Your Personal Information Advanced Identity Protector the best id theft protection tool ensures confidential information such as passwords, email accounts, credential details, credit card information and social security number etc. cannot be accessed by anyone except you. How Advanced Identity Protector Works? Using Advanced Identity Protector is extremely simple. Once this identity protection software gets installed, launch, and click Start Scan Now to identify any hidden privacy exposing identity traces. These traces contain sensitive information such as email ids, login ids, passwords, credit card numbers, contact information and social security number etc. Once Advanced Identity Protector detects these traces, you can either delete or can save them in the in-built Secure Vault. The scan results are neatly organized in distinct categories, you can choose what to delete and what to store in Secure Vault. Once moved to Secure Vault, the information is encrypted and accessible via a password known only to you. [Hidden Content] [hide][Hidden Content]]
  15. itsMe

    DoNotSpy11 1.0.0.0

    Why should I download DoNotSpy11? DoNotSpy11 empowers you to protect your privacy on Windows 10 and Windows 11. Supports Windows 10 up to Windows 10 21H2 (19044) Supports Windows 11 up to Windows 11 22H2 (22621) Available in English, French (translated by Deadbox1) and German Lets you manage settings regarding: Advertising, Apps, Defender, Edge, Office, Privacy, Search, Start, Updates Clean and simple user interface DoNotSpy11 Changelog Version 1.0.0.0 (24/05/2022) initial release based on DoNotSpy10 5.3.0.0 General: Added Support for Windows 11 22H2 (22621) General: Added Support for Windows 11 21H2 (22000) General: Added Support for Windows 10 21H2 (19044) General: Added Support for Microsoft Office General: Urls in tweak descriptions can be clicked Bugfix: Tweaks were not saved if user chose to enable system restore Tweak added: Advertising: Disable “Meet Now” (from build 19043) Tweak added: Advertising: Disable News and Interests (from build 19044) Tweak added: Apps: Prevent Apps From Taking Screenshots (from build 19044) Tweak added: Apps: Disable App Access to Downloads Folder (Windows 11) Tweak added: Apps: Disable App Access to Music Library (Windows 11) Tweak added: Apps: Disable Screenshot Border Settings (Windows 11) Tweak added: Privacy: Disable Cloud Consumer Account State Content (Windows 11) Tweak added: Privacy: Disable OneSettings Downloads (Windows 11) Tweak added: Privacy: Disable Widgets (Windows 11) Tweak added: Privacy: Limit Diagnostic Log Collection (Windows 11) Tweak added: Privacy: Limit Dump Collection (Windows 11) Tweak added: Privacy: Turn off Microsoft Consumer Experiences (Windows 10) Tweak added: Office: Disable First Run Movie Tweak added: Office: Disable Customer Experience Improvement Program Tweak added: Office: Disable Feedback Tweak added: Office: Disable Sending Personal Information Tweak added: Office: Disable Telemetry Tweak added: Office: Disable Connected Experiences That Analyze Content Tweak added: Office: Disable Connected Experiences That Download Online Content Tweak added: Office: Disable Additional Optional Connected Experiences Tweak added: Office: Disable In-Product Surveys Tweak added: Office: Block Signing Into Office Tweak added: Office: Disable LinkedIn Features Tweak added: Search: Disable Highlights (from build 22572) Tweak added: Apps: Disable Location Override (from build 22572) Tweak added: Privacy: Disable Windows Spotlight on Desktop Tweak added: Privacy: Disable Display of office.com Files in Explorer (from build 22572) Tweak updated: Privacy: Disable Facts, Tips, Ticks and More on your Lock Screen [hide][Hidden Content]]