Search the Community

Showing results for tags 'python'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 56 results

  1. The Complete Python 3 Course: Beginner to Advanced! Learn Python with projects covering game & web development, web scraping, MongoDB, Django, PyQt, and data visualization! If you want to get started programming in Python, you are going to LOVE this course! This course is designed to fully immerse you in the Python language, so it is great for both beginners and veteran programmers! Learn Python as Nick takes you through the basics of programming, advanced Python concepts, coding a calculator, essential modules, creating a "Final Fantasy-esque" RPG battle script, web scraping, PyMongo, WebPy development, Django web framework, GUI programming, data visualization, machine learning, and much more! We are grateful for the great feedback we have received! "This course it great. Easy to follow and the examples show how powerful python can be for the beginner all the way to the advanced. Even if the RPG may not be your cup of tea it shows you the power of classes, for loops, and others!" "Good course even for non-programmers too." "It's really well explained, clear. Not too slow, not too fast." "Very thorough, quick pace. I'm learning A TON! Thank you :)" "Good explanation, nice and easy to understand. Great audio and video quality. I have been trying to get into Python programming for some time; still a long way to go, but so far so good!" The following topics are covered in this course: Programming Basics Python Fundamentals JavaScript Object Notation (JSON) Web Scraping PyMongo (MongoDB) Web Development Django Web Framework Graphical User Interface (GUI) Programming (PyQt) Data Visualization Machine Learning This course is fully subtitled in English! Thank you for taking the time to read this and we hope to see you in the course! [Hidden Content] Download: [hide][Hidden Content]]
  2. Record All Keystrokes, Clipboard Data, Microphone & Monitors on Windows & Linux With This Python Ethical Hacking Course What you'll learn Code your own Python Hacking Cyber Surveillance Tools Convert Python Scripts into Windows EXE Learn How-To Get Started with Python for the Complete Beginner Code Your Own Windows and Linux Keylogger Write Your Own Windows and Linux Microphone Recorder Setting up Your Development Environment on Windows and Linux Code a Windows and Linux Clipboard Logger Code a Windows and Linux Screenshot Logger Requirements Basic understanding of Windows and Linux Ability to follow basic instructions [Hidden Content] [hide][Hidden Content]]
  3. wsltools is an elegant and simple Web Scan auxiliary library for Python. User Guide Tree: urlclean ast etl pathSplit mixPayload checksec Check Web Application Firewall checkWaf updateRules Check HTTP Response Headers checkHeaders x_xss_protection content_security_policy content_security_policy_report_only x_content_security_policy x_webkit_csp feature_policy x_frame_options access_control_allow_methods access_control_allow_headers access_control_expose_headers strict_transport_security public_key_pins public_key_pins_report_only Other about Security Header datatype datatype isnumeric istext isxml isjson isjsonp isurl isip isdomain isserialize isimage isaudio isvideo isdocument isarchive isurl Support Schemes Stream Support Types similar similar faker Instance profile userAgent creditCard email name ssn phone job company address Support Credit Card Types Support Locales code domaintools domain valid main sld tld subdomain sublevel subMatch updateTLDS [hide][Hidden Content]]
  4. Black-Rose is a cross platform python remote access torjan which allows you to access the command line of windows and linux series with unicast, multicast and broadcast methods. What is Remote Access Trojan (RAT) A Remote Access Trojan (RAT, sometimes called Creepware) is a type of malware that controls a system through a remote network connection. A RAT is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software and other anti-virus software Base features Multi-threading Error handling Keylogger Screenshot Webcam-snapshot Reporting Reverse shell with Unicast,Multicast,Broadcast addressing Works with MySQL database Download/Upload file Scan famous ports of protocols (You can add another port to the list) [HIDE][Hidden Content]]
  5. USE THIS TOOL ONLY FOR EDUCATIONAL PURPOSE.DONT USE FOR ILLEGAL PURPOSE . THIS TOOL CAN BYPASS MAJORITY OF ANTIVIRUS EVEN WINDOWS DEFENDER CHANGE IP AND PORT IN SHELL GAIN AND LISTENER.PY FILE.PLEASE DONT UPLOAD IN VIRUSTOTAL [HIDE][Hidden Content]]
  6. What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined then all chars to their hexadecimal value Delete all comments, all spaces lines Padding random snippets code/functions/classes with an always differents values CHANGELOG of Intensio-Obfuscator project 05-30-2020 [update] isse template file [update] documentation for code compatibility documentation [HIDE][Hidden Content]]
  7. [HIDE][Hidden Content]]
  8. Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Changelog v05-11-2020 [upgrade] to version 1.0.9.2 [fix] issue #46 – improve detect multiple lines code of Replace string to string and Padding scripts features [add] new parameter to define manually base indentation of python source code [HIDE][Hidden Content]]
  9. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Features Features Descriptions remove comment Remove all comments (this feature is executed by default) remove space line Remove all spaces line (this feature is executed by default) correction padding empty class/function Adding padding to empty classes and functions, if the class or function contains only comments, the default feature remove comments will leave a class or function empty, this will avoid generating an error (this feature is executed by default) replace string to string mixed Replace all names of variables/classes/functions to random strings with a length defined padding script Adding padding of random scripts after each line replace file name Replace all files name to random strings with a length defined replace string to hex Replace all chars to their hexadecimal value correction remove pyc file Remove all pyc file in the output directory (this feature is executed by default) mixerlevel lower Generate random strings of 32 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel medium Generate random strings of 64 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel high Generate random strings of 128 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified replace string to string mixed -> -rts, –replacetostr, padding script -> -ps, –paddingscript, replace file name -> -rfn, –replacefilename, replace string to hex -> -rth, –replacetohex features can be executed separately Changelog v05-09-2020 [upgrade] to version 1.0.9 [fix] issue #26 [fix] issue #23 [fix] regex in delete comments feature which could generate bad behavior with certain type of case involving quotes strings [fix] bad detection when the variable had a value on multiple line in replace string to string feature [update] henceforth it’s possible to launch tool without obfuscation argument as [-rts, -ps, -rfn, -rth] [add] execution time of Intensio-Obfuscator tool [HIDE][Hidden Content]]
  10. DeathRansom - A Ransomware Developed In Python, With Bypass Technics, For Educational Purposes What is a ransomware? A ransomware is malware that encrypts all your files and shows a ransom request, which tells you to pay a set amount, usually in bitcoins (BTC), in a set time to decrypt your files, or he will delete your files. How it works? First, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it. It then encrypts all files starting with the defined directory on the line 60 in deathransom.py. Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files. Bypass Technics Anti-Disassembly Creates several variables to try to make disassembly difficult. Anti-Debugger Checks if a debugger is active using the ctypes function: windll.kernel32.IsDebuggerPresent() Anti-Vm Checks if the machine's mac is the same as the standard vms mac. Anti-Sandbox Sleep-Acceleration Some sandboxes speed up sleep, this function checks if nothing out of the ordinary has occurred. Sandbox in Process Checks if have any sandbox in running processes Display-Prompt Shows a message, if the user interact with the pop up, the malware will be executed. Idle-Time Sleeps for a while and proceed. Some sandboxes wait for a while and stop running, that tries to bypass this. Check-Click If the user does not click the number of times necessary the malware not will be executed. Check-Cursor-Pos If the user not move the mouse in a seted time the malware not be executed. [HIDE][Hidden Content]]
  11. uncompyle6 A native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2. Introduction uncompyle6 translates Python bytecode back into the equivalent Python source code. It accepts bytecodes from Python version 1.3 to version 3.8, spanning over 24 years of Python releases. We include Dropbox’s Python 2.5 bytecode and some PyPy bytecode. This software is amazing. It is more than your normal hacky decompiler. Using compiler technology, the program creates a parse tree of the program from the instructions; nodes at the upper levels that look a little like what might come from a Python AST. So we can really classify and understand what’s going on in sections of Python bytecode. Building on this, another thing that makes this different from other CPython bytecode decompilers is the ability to deparse just fragments of source code and give source-code information around a given bytecode offset. Python fragment deparsing given an instruction offset is useful in showing stack traces and can be encorporated into any program that wants to show a location in more detail than just a line number at runtime. This code can be also used when source-code information does not exist and there is just bytecode. Again, my debuggers make use of this. There were (and still are) a number of decompiling, uncompyle, uncompyle2, uncompyle3 forks around. Almost all of them come basically from the same code base, and (almost?) all of them are no longer actively maintained. One was really good at decompiling Python 1.5-2.3 or so, another really good at Python 2.7, but that only. Another handles Python 3.2 only; another patched that and handled only 3.3. You get the idea. This code pulls all of these forks together and moves forward. There are some serious refactoring and cleanup in this code base over those old forks. This demonstrably does the best in decompiling Python across all Python versions. And even when there is another project that only provides decompilation for the subset of Python versions, we generally do demonstrably better for those as well. How can we tell? By taking Python bytecode that comes distributed with that version of Python and decompiling these. Among those that successfully decompile, we can then make sure the resulting programs are syntactically correct by running the Python interpreter for that bytecode version. Finally, in cases where the program has a test for itself, we can run the check on the decompiled code. We are serious about testing, and use automated processes to find bugs. In the issue trackers for other decompilers, you will find a number of bugs we’ve found along the way. Very few to none of them are fixed in the other decompilers. Changelog v3.6.5 Back port some of the changes in decompile3 here which mostly helps 3.7 and 3.8 decompilation, although this may also help 3.6ish versions too. Handle nested async for in for... and better async comprehension detection via xdis. Still more work is needed. include token number in listings when -g and there is a parser error remove unneeded Makefiles now that remake 4.3+1.5dbg is a thing that has -c Bug in finding annotations in functions with docstrings Fix bug found by 2.4 sre_parse.py testing Fix transform module’s ifelseif bugs Fix bug in 3.0 name module detection Fix docstring detection [HIDE][Hidden Content]]
  12. Katana-ds Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and supports Tor It becomes more powerful in combination with GHDB Google Mode : Google mode gives you 2 inputs the “Dork” and the “TLD” (Top Level Domain) that gives you the ability to search in specific countries. e.g : com for Usa / co.ma for Morocco / be for Belgium For more please see the included TLDs.txt file. [HIDE][Hidden Content]]
  13. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Changelog v03-16-2020 [upgrade] to version 1.0.8.2 [update] StringGenerator function to reduce the process of string replacement when -rts, --replacetostr is called [update] move any line feed (\n) after disabling the color [HIDE][Hidden Content]]
  14. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Features Features Descriptions remove comment Remove all comments (this feature is executed by default) remove space line Remove all spaces line (this feature is executed by default) correction padding empty class/function Adding padding to empty classes and functions, if the class or function contains only comments, the default feature remove comments will leave a class or function empty, this will avoid generating an error (this feature is executed by default) replace string to string mixed Replace all names of variables/classes/functions to random strings with a length defined padding script Adding padding of random scripts after each line replace file name Replace all files name to random strings with a length defined replace string to hex Replace all chars to their hexadecimal value correction remove pyc file Remove all pyc file in the output directory (this feature is executed by default) mixerlevel lower Generate random strings of 32 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel medium Generate random strings of 64 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel high Generate random strings of 128 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified replace string to string mixed -> -rts, –replacetostr, padding script -> -ps, –paddingscript, replace file name -> -rfn, –replacefilename, replace string to hex -> -rth, –replacetohex features can be executed separately Changelog v1.0.8.1 (03-10-2020) [Update] StringGenerator function that change method of generate number (ramdom.random() => random.SystemRandom() that use urandom) [Remove] intensio_error.py file, that contained useless feature to improve verbosity type of error during the reading of Intensio-Obfuscator code [Remove] simple obfuscation removed, previous parameter hard obfuscation is used by default for strings obfuscation now [Remove] parameter -mlvl, --mixerlevel to control obfuscation level of strings generated (simple by default or hard) ## 02-01-2020 [HIDE][Hidden Content]]
  15. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transform it into an obfuscated python code What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length and obfuscation level defined then all chars to their hexadecimal value Delete all comments, all spaces lines Padding random scripts with an always differents values Changelog v1.0.8 Upgrade] to version 1.0.8 [Update] -m, -mixerlevel become -mlen, --mixerlength to control length of random strings generated [Update] redefine all colors without external library [Fix] issue # 14 [Fix] issue # 28 [Add] new paramter -mlvl, --mixerlevel to control obfuscation level of strings generated (simple by default or hard) [HIDE][Hidden Content]]
  16. PHANTOM EVASION 3.0 Python AV evasion tool capable to generate FUD executable Phantom-Evasion is an antivirus evasion tool written in python (both compatible with python and python3) capable to generate (almost) fully undetectable executable even with the most common x86 msfvenom payload. The following OSs officialy support automatic setup: Kali Linux Parrot Security The following OSs likely support automatic setup but require manual installation of metasploit-framework: OSX (tested on Catalina) Ubuntu Linux Mint Elementary Deepin other Debian distro Centos Fedora Blackarch The following OSs require manual setup: Windows 10 Simply git clone or download and unzip Phantom-Evasion folder [HIDE][Hidden Content]]
  17. Stitch - Python Remote Administration Tool (RAT) A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. [Hidden Content]
  18. Proxies: Yes Bots: 100/150 Email:Pass / User:Passs Capture: Proxy / ProxyPort [HIDE][Hidden Content]]
  19. BECOME A PYTHON DEVELOPER FROM SCRATCH FREE TUTORIALS ʙᴇᴄᴏᴍᴇ ᴀ ᴘʏᴛʜᴏɴ ᴅᴇᴠᴇʟᴏᴘᴇʀ ғʀᴏᴍ sᴄʀᴀᴛᴄʜ ғʀᴇᴇ ᴛᴜᴛᴏʀɪᴀʟs. ᴄᴏᴍᴘʟᴇᴛᴇᴅ ᴘʏᴛʜᴏɴ ᴅᴇᴠᴇʟᴏᴘᴇʀ ᴛᴜᴛᴏʀɪᴀʟ. ᴛʜɪs ɪs ᴛʜᴇ ʙᴇsᴛ ᴘʀᴏɢʀᴀᴍᴍɪɴɢ ʟᴀɴɢᴜᴀɢᴇ ᴛᴜᴛᴏʀɪᴀʟ. ʏᴏᴜ ᴡɪʟʟ ɢᴇᴛ ᴇxᴘᴇʀᴛ ʟᴇᴀʀɴ ᴛʜɪs ᴛᴜᴛᴏʀɪᴀʟ ʙᴇᴄᴏᴍᴇ ᴀ ᴘʏᴛʜᴏɴ ᴅᴇᴠᴇʟᴏᴘᴇʀ ғʀᴏᴍ sᴄʀᴀᴛᴄʜ ғʀᴇᴇ ᴛᴜᴛᴏʀɪᴀʟs Download Now : [Hidden Content]
  20. dEEpEst

    [on sale] .2GB OF PYTHON COURSES

    View File 2GB OF PYTHON COURSES 2GB OF PYTHON COURSES ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 20/11/19 Category Libro Online Password ********  
  21. dEEpEst

    2GB OF PYTHON COURSES

    2 downloads

    2GB OF PYTHON COURSES ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  22. dEEpEst

    Cool New Features in Python 3.8

    [Hidden Content]
  23. A simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed up his job (CPU intensive). Supported permutations: Capital Upper 1337 Append Prepend Additional functions: Test/Dry run Multiprocessing Multicore Possibility to adjust cores/processes number manually. Each generated password doesnt contain same word twice. [HIDE][Hidden Content]]
  24. 0x1

    SUID3NUM

    A standalone python script which utilizes python's built-in modules to find SUID bins, separate default bins from custom bins, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! Demo Description A standalone script supporting both python2 & python3 to find out all SUID binaries in machines/CTFs and do the following List all Default SUID Binaries (which ship with linux/aren't exploitable) List all Custom Binaries (which don't ship with packages/vanilla installation) List all custom binaries found in GTFO Bin's (This is where things get interesting) Try and exploit found custom SUID binaries which won't impact machine's files Why This? Because LinEnum and other enumeration scripts only print SUID binaries & GTFO Binaries, they don't seperate default from custom, which leads to severe head banging in walls for 3-4 hours when you can't escalate privs Works on Python (2.6-7.*) Python (3.6-7.*) Download && Demo Ascii [Hidden Content]