Search the Community

Showing results for tags 'for'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 144 results

  1. Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) [HIDE][Hidden Content]]
  2. dEEpEst

    FREE 20GB FOR WINDSCRIBE VPN!

    FREE 20GB FOR WINDSCRIBE VPN! How to get free 20gb? [Hidden Content]
  3. Brutex is a shell based open source tool to make your work faster. It combines the power of Nmap, Hydra and DNSenum. This tool will automatically run an nmap scan to your target and then it will brute force all the open services for you, such as FTP, SSH and more using Hydra. BruteX ABOUT: Automatically brute force all services running on a target Open ports Usernames Passwords INSTALL: ./install.sh USAGE: brutex target <port> DOCKER: docker build -t brutex . docker run -it brutex target <port> DEMO VIDEO: Download: [HIDE][Hidden Content]]
  4. Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms. Details Trigmap can performs several tasks using Nmap scripting engine (NSE): Port Scan Service and Version Detection Web Resources Enumeration Vulnerability Assessment Common Vulnerabilities Test Common Exploits Test Dictionary Attacks Against Active Services Default Credentials Test [HIDE][Hidden Content]]
  5. jwt_tool.py is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the validity of a token Testing for the RS/HS256 public key mismatch vulnerability Testing for the alg=None signature-bypass vulnerability Testing the validity of a secret/key/key file Identifying weak keys via a High-speed Dictionary Attack Forging new token header and payload values and creating a new signature with the key or via another attack method [HIDE][Hidden Content]]
  6. Hi I need some help . I try to download Kali from Torrent and i can't it is just show with the PDF icon and do notthing . If i try with the HTTP it work's good. Where i have to go in my comp to fix that pls .
  7. [HIDE][Hidden Content]]
  8. [Hidden Content]
  9. dEEpEst

    Best Sites For Proxies

    [Hidden Content]
  10. How to search for Security Vulnerabilities in a website using GoLismero in Kali Linux [HIDE][Hidden Content]]
  11. This archive contains all of the 204 exploits added to Packet Storm in April, 2019. View the full article
  12. InstaShow is a premium WordPress Instagram feed for creating charming galleries of Instagram images. Take the advantage of an all-new multipurpose responsive Instagram feed for displaying various photos from Instagram with great number of possibilities to determine necessary resources and to set up additional filters. Demo: [Hidden Content] [Hidden Content]
  13. Cutter is a free and open-source GUI for radare2 reverse engineering framework. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. [HIDE][Hidden Content]]
  14. [Hidden Content]
  15. [HIDE][Hidden Content]]
  16. Am in need of good IP SMTP senders please can anyone including the administrator help me out with where i can get good IP SMTP senders? Your help will be appreciated. Thanks!
  17. Swapnil Pathak is an cybersecurity enthusiast and a student with broad interests in computer systems, IoT and software security. [Hidden Content]
  18. Hello and thank you for your time and consideration into my inquiry. I am using EZCrack V1.7 multi-purpose cracking tool and I have a considerable list of credentials and mass-sourced E-mail addresses but I am unsure as to A. what type of file extension i should be saving the combolist as, and, B. what type of formatting for the aforementioned filetype I should be using. I have tried quite a few different input methods and various file extensions with no success as of yet. Not really much in the way of non-shady, probably edging closer to totally falsified claims about how to create combolists. All the deeplink searches tend to steer me to sites that claim to show how to format + create them but are actually just links to buy premade lists which I don't believe I need. Any and all insight concerning my inquiry would be greatly appreciated. Happy Hunting and Best of Luck
  19. This E-book is for the people who considered as an advance pentester and was wanting to do more pentesting with Kali Linux. Be aware, this book is for advance users so if you are not familiar with Kali Linux for the most part, don't read this ebook (maybe) [HIDE][Hidden Content]]
  20. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  21. [Hidden Content]
  22. Flutter - a framework developed by Google - allows you to learn one language (Dart) and build beautiful native mobile apps in no time. Flutter is a SDK providing the tooling to compile Dart code into native code and it also gives you a rich set of pre-built and pre-styled UI elements (so called widgets) which you can use to compose your user interfaces. Flutter is extremely trending and gets used for major Google apps like their Adwords app - it's now marked as "ready for production", hence now is the time to jump in and learn it! This course will teach Flutter & Dart from scratch, NO prior knowledge of either of the two is required! And you certainly don't need any Android or iOS development experience since the whole idea behind Flutter is to only learn one language. You'll learn Flutter not only in theory but we'll build a complete, realistic app throughout this course. This app will feature both all the core basics as well as advanced features like using Google Maps, the device camera, adding animations and more! With Flutter, you'll be able to write code only once and ship your apps both to the Apple AppStore and Google Play. Use Google's Material Design to build beautiful, yet fully customizable, apps in no time with almost zero effort. You can use the rich widget suite Flutter provides to add common UI elements like buttons, switches, forms, toolbars, lists and more - or you simply build your own widgets - Flutter makes that a breeze, too. Here's what's included in the course: Detailed setup instructions for both macOS and Windows A thorough introduction to Flutter, Dart and the concept behind widgets An overview of the built-in widgets and how you may add your own ones Debugging tips & tricks Page navigation with tabs, side drawers and stack-based navigation State management solutions Handling and validating user input Adding Google Maps Using native device features like the camera Adding beautiful animations & page transitions How to publish your app to the app stores And more! [Hidden Content]
  23. This course covers the Architecture of Redshift, Columnar vs Row oriented databases, Introduce you to the AWS VPC, IAM role and S3 bucket creation. You can master the SQL with best practices and learn a few admin activities which help to build a effective data warehouse. This course introduces the compression/encoding techiniques. You can learn to implement Workload management and monitor and tune long running queries. Who is this course for? Redshift beginners or Data warehousing beginners curious about AWS Redshift [HIDE]. [Hidden Content]]
  24. [Hidden Content]