Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 290 results

  1. What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined then all chars to their hexadecimal value Delete all comments, all spaces lines Padding random snippets code/functions/classes with an always differents values CHANGELOG of Intensio-Obfuscator project 05-30-2020 [update] isse template file [update] documentation for code compatibility documentation [HIDE][Hidden Content]]
  2. QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking. Features: Port Forwarding using Ngrok [HIDE][Hidden Content]]
  3. Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Changelog v05-11-2020 [upgrade] to version 1.0.9.2 [fix] issue #46 – improve detect multiple lines code of Replace string to string and Padding scripts features [add] new parameter to define manually base indentation of python source code [HIDE][Hidden Content]]
  4. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Features Features Descriptions remove comment Remove all comments (this feature is executed by default) remove space line Remove all spaces line (this feature is executed by default) correction padding empty class/function Adding padding to empty classes and functions, if the class or function contains only comments, the default feature remove comments will leave a class or function empty, this will avoid generating an error (this feature is executed by default) replace string to string mixed Replace all names of variables/classes/functions to random strings with a length defined padding script Adding padding of random scripts after each line replace file name Replace all files name to random strings with a length defined replace string to hex Replace all chars to their hexadecimal value correction remove pyc file Remove all pyc file in the output directory (this feature is executed by default) mixerlevel lower Generate random strings of 32 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel medium Generate random strings of 64 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel high Generate random strings of 128 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified replace string to string mixed -> -rts, –replacetostr, padding script -> -ps, –paddingscript, replace file name -> -rfn, –replacefilename, replace string to hex -> -rth, –replacetohex features can be executed separately Changelog v05-09-2020 [upgrade] to version 1.0.9 [fix] issue #26 [fix] issue #23 [fix] regex in delete comments feature which could generate bad behavior with certain type of case involving quotes strings [fix] bad detection when the variable had a value on multiple line in replace string to string feature [update] henceforth it’s possible to launch tool without obfuscation argument as [-rts, -ps, -rfn, -rth] [add] execution time of Intensio-Obfuscator tool [HIDE][Hidden Content]]
  5. scrack

    ProstoStealer + source code

    [HIDE][Hidden Content]]
  6. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. Demo: [Hidden Content] [HIDE][Hidden Content]]
  7. Overview Lighthouse is a code coverage plugin for IDA Pro. The plugin leverages IDA as a platform to map, explore, and visualize externally collected code coverage data when symbols or source may not be available for a given binary. This plugin is labelled only as a prototype and IDA / Qt code example for the community. Changelog v0.9 + Features |- Added support for ‘module+offset’ style coverage files / traces |- Added a coverage cross-reference dialog, like git-blame for coverage hits |- Theme subsystem for custom user defined Lighthouse themes and colors |- Added a fallback ‘Module Selector’ dialog to pick which ‘binary’ to load coverage for |- Complete refactor for native Binary Ninja 2.0 support, multiple databases |- Updated to fully support IDA 7.0 -> 7.4 |- Python 2/3 compatible for all platforms & disassemblers |- Faster, more accurate database painting subsystem + Minor Changes |- Extensible coverage parser interface makes it easier to load custom coverage formats |- Added support for absolute address (bb, or instr.) style coverage files / traces |- Updated the drcov coverage parser to support newer revisions |- Batch loading no longer loads all files into memory before aggregating data |- Decompilation views in IDA will now refresh coverage paint automatically |- Lighthouse is now ‘accessible’ through the disassembler console, with lighthouse.get_context(…) |- Significantly improved the database painter performance and stability in IDA |- Improved the performance for caching database metadata |- Support ‘interleaved’ instruction coverage in capable disassemblers (Binary Ninja) |- ‘Forcefully’ clearing database paint will now block with a waitbox while running |- Double clicking a function in the coverage table will now jump to the ‘first’ block with coverage |- Added a simple check against GitHub to notify when a new version of Lighthouse is available |- Removed the ‘range’ syntax from the composition grammar — nobody used it anyway |- IDA should now close faster than it previously did after using Lighthouse |- Deprecated support for IDA 6.8 -> 6.95 |- Tons of other minor improvements and code cleanup + UI |- Lighthouse now ships with two default themes, one ‘Light’ and one ‘Dark’ |- Unless the user specifies a theme preference, Lighthouse will pick which one it thinks is best |- Reduced the font size of Lighthouse on macOS by 1pt, text should look a bit less comical |- The coverage overview will more consistently snap to the right-side of the disassembler on open |- Horizontal scrolling in the coverage table is now ‘per-pixel’ vs ‘per-column’ (less jumpy…) |- Changed column sizing for the coverage table, ‘Function Name’ will also stretch by default now |- Improved the coverage shell so that text selection (click+drag) actually works |- Improved overall consistency with opening / closing the coverage combobox |- Improved the combobox and coverage shell styling to look a bit sharper |- Lighthouse error messages should be less likely to look bungled on other platforms |- Continue to improve cross-platform & cross-disassembler UI consistency |- Added tooltips to the coverage overview table header + Bugfixes |- A partially executed basic block should no longer appear fully painted in graph views |- Fixed a bug that could prompt the user ‘several’ times for a coverage name when saving a composition |- Lighthouse will now attempt to rebase itself should the user ‘rebase’ their IDB (IDA only) |- Fixed a bug where the Aggregate set symbol ‘*’ was simply unusable in the coverage shell |- The drcov parser could fail to extract module filenames when parsing a log collected on a different OS |- Fixed some edge cases to improve the stability of metadata collection (caching) |- Fixed a bug where deleted / undefined functions would persist in the coverage table after refresh |- Using the shell to jump to sub_… function names did not work in Binary Ninja due to case sensitivity |- Fixed bug that caused ‘renamed’ functions to lose their navigability (click to jump) in the table + BINJA KNOWN ISSUES |- Highlighting the newly released Binary Ninja HLIL is not yet supported |- Lighthouse will not properly spin down its threads and resources after closing a bndb / bv |- Live rebasing of Lighthouse is *not* supported in Binja — rebase first, and then open Lighthouse [HIDE][Hidden Content]]
  8. [HIDE][Hidden Content]]
  9. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Changelog v03-16-2020 [upgrade] to version 1.0.8.2 [update] StringGenerator function to reduce the process of string replacement when -rts, --replacetostr is called [update] move any line feed (\n) after disabling the color [HIDE][Hidden Content]]
  10. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Features Features Descriptions remove comment Remove all comments (this feature is executed by default) remove space line Remove all spaces line (this feature is executed by default) correction padding empty class/function Adding padding to empty classes and functions, if the class or function contains only comments, the default feature remove comments will leave a class or function empty, this will avoid generating an error (this feature is executed by default) replace string to string mixed Replace all names of variables/classes/functions to random strings with a length defined padding script Adding padding of random scripts after each line replace file name Replace all files name to random strings with a length defined replace string to hex Replace all chars to their hexadecimal value correction remove pyc file Remove all pyc file in the output directory (this feature is executed by default) mixerlevel lower Generate random strings of 32 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel medium Generate random strings of 64 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel high Generate random strings of 128 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified replace string to string mixed -> -rts, –replacetostr, padding script -> -ps, –paddingscript, replace file name -> -rfn, –replacefilename, replace string to hex -> -rth, –replacetohex features can be executed separately Changelog v1.0.8.1 (03-10-2020) [Update] StringGenerator function that change method of generate number (ramdom.random() => random.SystemRandom() that use urandom) [Remove] intensio_error.py file, that contained useless feature to improve verbosity type of error during the reading of Intensio-Obfuscator code [Remove] simple obfuscation removed, previous parameter hard obfuscation is used by default for strings obfuscation now [Remove] parameter -mlvl, --mixerlevel to control obfuscation level of strings generated (simple by default or hard) ## 02-01-2020 [HIDE][Hidden Content]]
  11. WhatsRCE This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution) Auto install GCC (no harm command, you can see this is open-source) Saving to .GIF file How To Use ? [Hidden Content]
  12. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transform it into an obfuscated python code What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length and obfuscation level defined then all chars to their hexadecimal value Delete all comments, all spaces lines Padding random scripts with an always differents values Changelog v1.0.8 Upgrade] to version 1.0.8 [Update] -m, -mixerlevel become -mlen, --mixerlength to control length of random strings generated [Update] redefine all colors without external library [Fix] issue # 14 [Fix] issue # 28 [Add] new paramter -mlvl, --mixerlevel to control obfuscation level of strings generated (simple by default or hard) [HIDE][Hidden Content]]
  13. A builder for your Clipper with a bunch of cool features. [Hidden Content]
  14. [Hidden Content]
  15. [HIDE][Hidden Content]]
  16. [Hidden Content]
  17. F B I

    Apple Code 47k

    [Hidden Content]
  18. The probably most powerful SQLi Dumping Panel named SIB! This panel is faster than SQLi Dumper and many other sqli tools. [HIDE][Hidden Content]] [Tutorial] How to install SIB 6.0 / 7.5 panel. SQLi Injection panel [Hidden Content]
  19. [Hidden Content]
  20. Iɴʙᴏx Mᴀɪʟᴇʀ ɢᴜɪᴅᴇ: sᴛᴇᴘ 1: ʙᴜʏ/ᴄᴀʀᴅ ʏᴏᴜʀsᴇʟғ ᴀ ʜᴏsᴛɪɴɢ sᴛᴇᴘ 2: ɢᴏ ᴛᴏ ᴄᴘᴀɴᴇʟ->> ғɪʟᴇ ᴍᴀɴᴀɢᴇʀ sᴛᴇᴘ 3: ᴜᴘʟᴏᴀᴅ ᴛʜɪs ɪɴʙᴏx ᴍᴀɪʟᴇʀ sᴛᴇᴘ 4: ᴛʀʏ ᴛᴏ sᴇɴᴅ ᴍᴇssᴀɢᴇ ᴡɪᴛʜ ɪᴛ ᴛᴏ ᴠɪᴄᴛɪᴍ [HIDE][Hidden Content] Mirror: [Hidden Content]]
  21. BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1. [Hidden Content]
  22. [Hidden Content]
  23. Apache Solr version 8.2.0 suffers from a remote code execution vulnerability. View the full article