Search the Community

Showing results for tags 'and'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 119 results

  1. jwt_tool.py is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the validity of a token Testing for the RS/HS256 public key mismatch vulnerability Testing for the alg=None signature-bypass vulnerability Testing the validity of a secret/key/key file Identifying weak keys via a High-speed Dictionary Attack Forging new token header and payload values and creating a new signature with the key or via another attack method [HIDE][Hidden Content]]
  2. [Hidden Content]
  3. [HIDE][Hidden Content]]
  4. Combos type: Mail/Pass Proxy: HQ/ Sock4 (Best) "More than 300 CPM" Recommended bots: 150-200 Custom = Without points (Free) [HIDE][Hidden Content]]
  5. Price : $194 FREE CUPON Course Language : English [HIDE][Hidden Content]] This course will teach you how hackers create malware and trojans. You will learn how to install the tools that hackers use to create malware. You will discover how to use additional addon programs that hackers will use to create malware. This course will take you on a journey of learning what malware is, how to create malware, how to upload malware to a server, and how a victim will install this malware on their machine and how you can get control over a victim's computer. This course is for educational purposes only and to show you how hackers use freely available tools to create nasty malware that is very difficult for the average user to detect. Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.
  6. [HIDE][Hidden Content]] What is Dracos? Dracos is Penetration OS from Indonesian and the system built based on LFS / Linux From Scratch. Dracos is a lightweight linux because for desktop use DWM (Dynamic Window Manager) and suitable for Pentester. Dracos environment almost all using CLI (Command Line Interface), Why? Because to familiarize the user using CLI and easy to used. Curently Dracos has reached version 2.0 Codename Leak and previous version is 1.0 Codename Vairusa. Dracos don’t have package manager, but the next version will be present called Venomizer. Lightweight and Powerful Penetration Testing OS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering. Open Source Everyone can use, copy, study, modify, and redistribute. Performance Dracos is built to be fast, strong, and powerfull OS. Safe & Secure We don't collect any your sensitive personal data. Security Tools Dracos Linux provides to penetration testing and packed with a ton of security tools including : Information gathering Vulnerability Assessment Exploitation Testing Wireless, Bluetooth & Radio Attack Social Engineering MITM / Man In The Middle Attack Stress Testing Forensics Malware Analysis Maintaining Access Reverse Engineering Covering Track Etc
  7. [HIDE][Hidden Content]]
  8. Web Crawler, Scanner, and Analyzer Framework (Shell-Script based) Bashter is a tool for scanning a Web-based Application. Bashter is very suitable for doing Bug Bounty or Penentration Testing. It is designed like a framework so you can easily add a script for detect vulnerability. [HIDE][Hidden Content]]
  9. xMrxKanex

    Hey, Im new and need help!

    Hello everybody, I want to install a Possum Bot on a Discord Server, but it doesnt work. I used this tutorial. After i got the Link at Step 9, i cant select a Server. Does anybody have experience with a Possum Bot and can help me out A bot that will allow you to "hack" ANY discord server. # Features * `Get full control of the server.` * `Ban everyone in a matter of seconds.` * `More features coming soon!` # Commands * !myakish - to get admin perms. * !arturdebil - to ban everyone on the server. # Dependencies. * Node v10.13.0 or higher , you can get it [here]([Hidden Content]) # Installation To install this bot follow these simple steps. 1. Download and un-zip the repo. 2. Install node.js you can get it [here.]([Hidden Content]) 3. Open cmd or terminal if your using mac. 4. Type in `cd` and drag and drop the possumbot folder into the console. Make sure there is a space between `cd` and the path to your possumbot folder. 5. Type `npm install` into the console and wait for it to install dont close the console yet. If it doesnt work make sure you have node.js installed you can install it [here.]([Hidden Content]) If it still doesnt work restart your console. 6. Open your browser and go to [discord.com/developers]([Hidden Content]) And create a new application and customize it to your likings. You should see something like thcis. ![You should see something like this.]([Hidden Content]) Navigate to the bot settings And copy the token. After you copied the token proceed to the next step. ![]([Hidden Content]) 7. Open the possumbot folder and navigate to `botsettings.json` open it using a text editor like notepad for windows or textedit for mac. It should look like this ![]([Hidden Content]) 8. Paste your token into the token field. Dont remove the "". 9. Open your console (You should already be in your possumbot folder). Type `node bot.js` into the console. The bot should now be activated. 10. A link will be generated in the console use it to invite the bot.
  10. Introduction SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine and many features for penetration testers. SQLMap is capable of databases fingerprinting, fetching data from the databases, accessing the database file systems, running different commands on the target server, etc. SQLmap: Automatic SQL Injection Tool This very powerful exploitation tool is developed in Python an it’s FREE to use. It requires Python version 2.6.x or 2.7.x. and comes preinstalled on Kali Linux, but can be run on any platform. Features SQLmap have many features divided into 3 groups: GENERIC FEATURES FINGERPRINT AND ENUMERATION FEATURES TAKEOVER FEATURES We’ll list some of them here: Full support for:MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems. Full support for six SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query, stacked queries and out-of-band. Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. Support to enumerate users, password hashes, privileges, roles, databases, tables and columns. Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack. Support to dump database tables entirely, a range of entries or specific columns as per user’s choice. The user can also choose to dump only a range of characters from each column’s entry. Support to search for specific database names, specific tables across all databases or specific columns across all databases’ tables. This is useful, for instance, to identify tables containing custom application credentials where relevant columns’ names contain string like name and pass. Capable to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. Ability to establish an out-of-band stateful TCP connection between the attacker machine and the database server underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user’s choice. Support for database process’ user privilege escalation via Metasploit’s Meterpreter getsystem command. [HIDE][Hidden Content]]
  11. [Hidden Content]
  12. Architect is the most powerful and easy to use site and html builder not only on codecanyon, but probably on the internet as well. It has all the features you would except from a site builder, while also offering exclusive ones like themes & templates, closely integrated code editors, the best visual css and image editor around and much more. Demo: [Hidden Content] [Hidden Content]
  13. Cutter is a free and open-source GUI for radare2 reverse engineering framework. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. [HIDE][Hidden Content]]
  14. Insanity-Framework THIS PROJECT ARE CLOSED NOW - FEEL FREE TO CONTINUE IT Copyright 2017 Insanity Framework (IF) 2.0 END Written by: * Alisson Moretto - 4w4k3 Special Thanks to Thomas Perkins - Ekultek Insanity Payload consists of encrypting your code and decrypting it in memory, thus avoiding a possible av signature, also has the ability to wait long enough to bypass a running sandbox. **NOTE: Insanity payloads may experience a 1 minute delay while connecting, this is necessary in order to bypass most avs and sandboxes. ** Twitter: @4w4k3Official DISCLAIMER: "DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." Taken from LICENSE. INSTALLATION OF DEPENDENT LIBRARIES cd Insanity-Framework chmod +x install.sh ./install.sh That's it Features Bypass most AV and Sandboxes. Remote Control. Payload Generation. Some Phishing methods are included on payloads generated. Detect Virtual Machines. Multiple Session disabled. Persistence and others features can be enabled. Bypass UAC. Memory Injection. Needed dependencies apt wine wget Linux sudo access python2.7 python 2.7 on Wine Machine pywin32 on Wine Machine VCForPython27 on Wine Machine Tested on: Kali Linux - SANA Kali Linux - ROLLING Ubuntu 14.04-16.04 LTS Debian 8.5 Linux Mint 18.1 Black Arch Linux Cloning: git clone [Hidden Content] Running: sudo python insanity.py If you have another version of Python: sudo python2.7 insanity.py Screenshot: More in Screens Contribute: Send me more features if you want it 😄 I need your help for Insanity to become better! Things needed to be improved and future updates: File Transfer (FTP) Webcam Snaps and Streaming Keylogging Print Screens Download: [HIDE][Hidden Content]]
  15. [HIDE][Hidden Content]]
  16. EasySploit v3.1 (Linux) - Metasploit automation (EASIER and FASTER than EVER) Options: (1) Windows --> test.exe (payload and listener) (2) Android --> test.apk (payload and listener) (3) Linux --> test.py (payload and listener) (4) MacOS --> test.jar (payload and listener) (5) Web --> test.php (payload and listener) (6) Scan if a target is vulnerable to ms17_010 (7) Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue) (8) Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec) (9) Exploit Windows with a link (HTA Server) (10) Contact with me - My accounts [Hidden Content]
  17. Register of firms and organizations of Ukraine. 04.16.2019. 1.681 kk Records: 1 681 836 Format: Cronos Date: 16/04/2019 Language: Ukrainnian Field: State EDRPOU code Name Short name Location Main activity (KVED) Name of the head Head's surname The name of the head The patronymic of the head Date of verification of the record Link: [HIDE][Hidden Content]]
  18. Oracle Business Intelligence and XML Publisher versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from an XML external entity injection vulnerability. View the full article
  19. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  20. Email/User: Email Proxies: Yes Capture: Yes Recommended Bots: any Last checked: day posted [HIDE][Hidden Content]]
  21. Xrax was coded in a way to make it extremely fast, using private APIs of the sites available for cracking. Xrax supports 50+ modules including (Fortnite with CAPTURE, Netflix - 2 APIs - both don't lock accounts, Dominos, League of Legends - all countries, pornhub, wwe and many many more) Xrax also has it's own proxy scraper and proxy checker to make your work even easier. If you are a database dumper yourself, using Xrax you can dehash your databases using the MD5 dehasher. Here are the things you get for free using Xrax as your checker: - Crack accounts using 50+ modules with full capture (no account lock, fast cracking); - Scrape Proxies in a blink of an eye; - Insanely fast proxy checker; - Scrape and check, then use the proxies in click of a button; - Dehash MD5; - Combo editors - Split combos, Combine combos, Duplicate remover , Randomize combos. [HIDE][Hidden Content]]
  22. Email/User: Email/User Proxies: Yes Capture: Captures Username, Followers, Bits, Prime, If Prime is available, and when Prime is available. Also Sends File Output to Folder. Recommended Bots: 50-500 [HIDE][Hidden Content]]
  23. Now with OpenBullet 1.2 You get a more stable UI And The Ability to create a share your configs without fair of someone changing taking credits from you You can even whitelist LoliKeys user in your config or even use an external API where you can freely add/remove Users Loli Keys A new brand config type called loliX, it will generated automatically when saving a .loli config, it's totally encrypted and safe, none can edit it as well Go ahead and start using OpenBullet 1.2 You will be able to share your .loliX configs without having any fair and save the .loli somewhere safe ^^ BRAND NEW: Now you can whitelist your customers Loli Keys so no one will be able to use your config unless they pay you! NOTE: Using both Local Whitelisting and API server of Loli Keys will result in bugs so use one of em and not both! 1.2.1.3 -Removed the Anti-debuggers as it caused several crashes. -Fixed a Crash issue on the config manager. -Content-Type header now can be used for GET Request as well (Make sure to write something in the PostData if you wan't it empty use " {} ") -Re-optimized several methods to prevent any upcoming crashes. -Added a Launcher with Auto-Updater. [HIDE][Hidden Content]]