Search the Community

Showing results for tags 'the'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 64 results

  1. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  2. Build a simple HTML text site Style web pages using CSS Program websites with JavaScript Build a Pipboy using Bootstrap Build and publish a Google Chrome Extension [HIDE]. [Hidden Content]]
  3. This is a write up detailing the root cause of the kernel privilege escalation vulnerabilities Microsoft patched on March 12, 2019. View the full article
  4. AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim's desktop without his consent, and even control it on request. For its correct operation, it is necessary to comply with the requirements described in the user guide. Requirements Powershell 4.0 or higher Changes Version 4.8 • Compatibility with Powershell 4.0 • Automatic copy of the content to the clipboard (passwords, hashes, dumps, etc.) • Automatic exclusion in Windows Defender (4 different methods) • Remote execution without password for PSexec, WMI and Invoke-Command • New available attack: DCOM Passwordless Execution • New available module: Remote Access / Metasploit Web Delivery • New module available: Remote VNC Server (designed for legacy environments) • Autocomplete the host, user and password fields by pressing Enter • It is now possible to run the tool without administrator privileges with the -noadmin parameter *The rest of the changes can be consulted in the CHANGELOG file Use This application can be used locally, remotely or to pivot between computers. Thanks to the additional modules, it is possible to dump hashes and passwords, obtain a remote shell, upload and download files or even recover the history of RDP connections or passwords of wireless networks. One line execution: powershell -ep bypass "cd $env:temp ; iwr [Hidden Content] -outfile AutoRDPwn.ps1 ; .\AutoRDPwn.ps1" The detailed guide of use can be found at the following link: [Hidden Content] [HIDE][Hidden Content]]
  5. tool that save all the domains in different text files like this: gmail.com freenet.fr ziggo.nl etc. So all the email domains will be sorted in a .txt list with the domain. It is an pretty simple tool, but really useful. [HIDE][Hidden Content]]
  6. Version 1.0.0

    Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  7. View File Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 09/03/19 Category Libro Online Password ********  
  8. [Hidden Content]
  9. Unlock the Micro SD/Memory Card STEPS [Hidden Content]
  10. itsMe?

    PlayTube

    With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  11. Going1up The Newspaper CMS 1998-2019 version 1.x suffers from an open redirection vulnerability. View the full article
  12. The Complete Unity Indie Game Developer Course Learn how to make games by creating a FULL top down RPG and publishing it to the world. [Hidden Content]
  13. The Complete YouTube Course 2017: Go from Beginner to Expert Become a Professional YouTuber and monetize your passion with this complete guide to making it with your own videos! [Hidden Content]
  14. The only way to use Tor Network Safely What is Tor ? "Tor is short for The Onion Router (thus the logo) and was initially a worldwide network of servers developed with the U.S. Navy that enabled people to browse the internet anonymously. Now, it's a non-profit organization whose main purpose is the research and development of online privacy tools. " What Tor is good for ? "If you want to be anonymous—say, if you live under a dictatorship, you're a journalist in an oppressive country, or a hacker looking to stay hidden from the government—Tor is one of the easiest ways to anonymize your traffic, and it's free. It's far from perfect, though (we'll get to that in a moment).On a more general level, Tor is useful for anyone who wants to keep their internet activities out of the hands of advertisers, ISPs, and web sites. That includes people getting around censorship restrictions in their country, police officers looking to hide their IP address, or anyone else who doesn't want their browsing habits linked to them. Tor's technology isn't just about browsing anonymously. It can also host web sites through its hidden services that are only accessible by other Tor users. It's on one of these hidden service sites that something like The Silk Road exists to traffic drugs." The best way to use Tor Safety Is " Tails " What's the difference Between Tails and Tor browser? Tails : Tails is an operating system built on Linux it uses only Tor to send its Internet traffic, and it has almost all the tools you need for dark web use pre-installed and ready. It has PDP software has electron which is a Bitcoin wallet it has pgp encryption for emails it has Tor has everything you need to be completely anonymous on the dark web and it can be ran from a USB or DVD and can be used on almost any computer. Tor Browser : Tor Browser is a web browser based on Mozilla Firefox and configured to protect your anonymity. Given the popularity of Firefox, you might have used it before and its user interface is like any other modern web browser. How to install Tails ? You can follow the steps from the official website : [HIDE][Hidden Content]] Good Tips : - Dont use it on Carding ! - Do not use VPN or Proxy to connect Tor Network - Don't trust any files from unknown website
  15. 0x1

    Payloads All The Things

    Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! [Hidden Content] Source & Ref [hide][Hidden Content]]
  16. Common Sense Security Strategies in the Digital World You’ve been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you’re on a vacation and suddenly your credit card is declined or you’re in the airport and your flight is canceled. Maybe you’re traveling through an airport and someone skims your credit card and starts making transactions while you’re in the air. What would you do? How long would it take you to respond? How many times have you received a phone call that says you have to pay some portion of a bitcoin (BTC), or a webcam video of you doing something inappropriate is going to be sent to all your contacts. These are just a few of the scenarios that can and do happen in our increasingly connected world. With the Samsung Pay and Apple Pay, mobile payments that can be performed with your cell phone, Apple Watch, or Android Wear watch and the increasing number of Mobile devices and Internet of Things (IoT) devices security is paramount for everyone no matter what your career field or socioeconomic status. The purpose of this article is to give you some common sense tips to protect yourself and also give you the ability to help your friends and family stay safe online as well. Part 1: Facebook: [Hidden Content] Part 2: Email [Hidden Content] Part 3: Passwords and Password vaults [Hidden Content] Part 4: Location, Google Maps, Waze, [Hidden Content] Part 5: App downloads [Hidden Content] Part 6: Two Factor Authentication (2FA) and Multi-Factor Authentication (MFA) [Hidden Content]
  17. [Hidden Content] APEX 2, The all in one checker. APEX FREE MODULES: Netflix Spotify Hulu Parsec Zenmate APEX PRO MODULES: Netflix Spotify Crunchyroll Fortnite Parsec Email Minecraft VyprVPN Wish Zenmate HideMyAss Reddit Roblox PornHub Hulu NordVPN IPVanish ExpressVPN TunnelBear MyFreeCams BitDefender CashApp Dominos CA Dominos UK
  18. TOR for Browser v3.1.6 (demo) is a tool to surf the internet completly anonymous by using 2 incapsulations. How to use: 1) Select a number from Circuit 1 2) Select a number from Circuit 2 3) Select Access type 4) Type the site to visit 5) Hit Go! There is in each Circuit 20 proxy servers. This proxy servers must be combined using Circuit 1 and Circuit 2. Using this will increase the anonymity of the connection. Also there is two options in Access: Restricted - Blocks Cookies, JavaScript and Objects Unrestricted - Allow Cookies, JavaScript and Objects Download: [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  19. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content]_(Updated_20-01-2019).zip Virus Scan [Hidden Content]
  20. Ojooo Wad is a plataform that connects advertisers to users by viewing ads. The user view 16 ads per day and can make money by clicking and inviting people to Ojooo. Visit and register [hide][Hidden Content]]
  21. dEEpEst

    The term payload

    [Hidden Content]
  22. electrify

    The best hacker link directory

    Hacker Link [Hidden Content] Link Base [Hidden Content] Scene Link List [Hidden Content]
  23. List of terms used in the field of hacking. 🚩Adware − Adware is software designed to force pre-chosen ads to display on your system. 🚩Attack − An attack is an action that is done on a system to get its access and extract sensitive data. 🚩Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. 🚩Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate. 🚩Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks. 🚩Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in. 🚩Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold. 🚩Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information. 🚩Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features. 🚩Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. 🚩DDoS − Distributed denial of service attack. 🚩Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 🚩Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system. 🚩Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall. 🚩Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email. 🚩Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb. 🚩Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. 🚩Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks. 🚩Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients. 🚩Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.
  24. Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game. Rapid7 announced the release of Metasploit 5.0, the new version includes several new important features and, the company believes it will easier to use and more powerful. Metasploit is the most widely used penetration testing framework and it has more than 1500+ modules that deliver functionalities covering every phase of a penetration test, making the life of a penetration tester comparatively easier. Most important changes introduced in the Metasploit 5.0 include new database and automation APIs, evasion modules and libraries, language support, improved performance. Metasploit 5.0 is currently available from its official GitHub project. Rapid7 says it’s in the process of informing third-party developers that Metasploit 5.0 is stable – Linux distributions such as Kali and ParrotSec are shipped with Metasploit. [Hidden Content]