Search the Community

Showing results for tags 'the'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 190 results

  1. Sngine is a PHP Social Network Platform is the best way to create your own social website or online community. Launch it in just 1 minute with ultimate features. It’s fast, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  2. Yoast SEO is the most complete WordPress SEO plugin. It handles the technical optimization of your site & assists with optimizing your content. Demo: [Hidden Content] [HIDE][Hidden Content]]
  3. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler html CSS Javascripts Internal Links External Links Images robots sitemaps Links inside Javascripts Links from Wayback Machine from Last 1 Year DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver crt.sh ThreatCrowd AnubisDB ThreatMiner Facebook Certificate Transparency API Auth Token is Required for this source, read Configuration below Traceroute Protocols UDP TCP ICMP Directory Searching Support for File Extensions Directories from Wayback Machine from Last 1 Year Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv [Hidden Content]
  4. A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests Every section contains the following files, you can use the _template_vuln folder to create a new chapter: README.md - vulnerability description and how to exploit it Intruder - a set of files to give to Burp Intruder Images - pictures for the README.md Files - some files referenced in the README.md You might also like the Methodology and Resources folder : Methodology and Resources Active Directory Attack.md Cloud - AWS Pentest.md Cloud - Azure Pentest.md Cobalt Strike - Cheatsheet.md Linux - Persistence.md Linux - Privilege Escalation.md Metasploit - Cheatsheet.md Methodology and enumeration.md Network Pivoting Techniques.md Network Discovery.md Reverse Shell Cheatsheet.md Subdomains Enumeration.md Windows - Download and Execute.md Windows - Mimikatz.md Windows - Persistence.md Windows - Post Exploitation Koadic.md Windows - Privilege Escalation.md Windows - Using credentials.md CVE Exploits [HIDE][Hidden Content]]
  5. SocialPwned SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks like Instagram, Linkedin, and Twitter to find the possible credential leaks in PwnDB. The purpose of this tool is to facilitate the search for vulnerable targets during the phase of Footprinting in Ethical Hacking. It is common for employees of a company to publish their emails in social networks, either professional or personal, so if these emails have their credentials leaked, it is possible that the passwords found have been reused in the environment to be audited. If it’s not the case, at least you would have an idea of the patterns that follow this target to create the passwords and be able to perform other attacks with a higher level of effectiveness. [HIDE][Hidden Content]]
  6. Sngine is the leading social network software packed with amazing and customizable features. A wide range of available settings allows you to configure the system to suit your needs. You may also easily disable features you do not need. Demo: [Hidden Content] [HIDE][Hidden Content]]
  7. Yoast SEO is the most complete WordPress SEO plugin. It handles the technical optimization of your site & assists with optimizing your content. Demo: [Hidden Content] [HIDE][Hidden Content]]
  8. "Print My Shell" is a python script, wrote to automate the process of generating various reverse shells based on PayloadsAllTheThings and Pentestmonkey reverse shell cheat sheets. Using this script you can easily generate various types of reverse shells without leaving your command line. This script will come in handy when you are playing CTF like challenges. Available Shell Types Bash Perl Ruby Golang Netcat Ncat Powershell Awk Lua Java Socat Nodejs Telnet Python [HIDE][Hidden Content]]
  9. NEX-Forms is a high quality and simple to use drag and drop/single click form creator offering a wide range of customizability, flexibility, design and usability that will make online form building a walk in the park. Do you have a need to easily create and customize professional and awesome looking forms on your WordPress website?...This forms builder is the one you need! Demo: [Hidden Content] [HIDE][Hidden Content]]
  10. Learn Cyber Security core concepts such as hacking, viruses, Encryption, Trojan, Spyware, Bots & Botnets, DMZ & more What you’ll learn Learn how to keep your kids and parents safe from cyber criminal actions. Understanding basic concepts and terminologies used in information security and cyber security. Bulletproof your online accounts (email, social media, etc.) and all the personal data that you’ve stored online. Understanding , Identifying & Preventing Malware. Learning about the most dangerous hacking attacks and their prevention. Learn About Browser Security Learning About BFA (Brute Force Attack) , IP Spoofing, Url Spoofing, LDAP Injection, SQL Injection, MIMA, Phishing Attacks and much more. Busting biggest cyber security Myths. Discover how cyber attacks work, How to avoid virus infections and How you can counteract their malicious consequences. Requirements Willingness to learn. You should know how to use a computer. You should know how to use an internet. Headphones / Earphones / Speakers ( OPTIONAL) . Description I know why you are here. You are an intelligent and curious guy always searching words like firewalls, encryption, viruses and malware sound but couldn’t get a satisfactory answer but don’t worry we have a course right for you that teaches you all the basics of both information and cyber security in a fun relaxed manner. This course is made in such a way that it fits absolutely perfect for you. It doesn’t matter if you don’t know anything about cyber security, because this course will help you understand what it’s all about. Even if you know the basics, you might still discover tips and tricks that really make a difference. So if you love gadgets, apps and everything that the Internet has to offer – you need this course! Remember: in the online world, with great opportunities come great threats as well. This course serves as an introduction to the exciting field of cyber security. As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cyber security. In this course, you will gain an overview of the cyber security landscape. PERFECT FOR COMPLETE BEGINNERS This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. What will you learn SECTION 1 (CYBER SECURITY COURSE) & SECTION 2 (CYBER SECURITY COURSE) will cover basic terminologies and hacking methodology and also learn about grey,blue,black,red,white hat hackers. SECTION 3 (CYBER SECURITY COURSE) Phishing Brute Force Attack DoS & DDoS Attacks Bots and Botnets SQL Injection LDAP Injection MITM URL Spoofing IP Spoofing and much more Then moving forward we will learn about Malware their types like viruses, trojan , spywares, ransomware etc. in SECTION -3 (CYBER SECURITY COURSE). SECTION 4 (CYBER SECURITY COURSE) Antivirus DMZ Encryption HoneyPots 2FA ( 2 Factor Authentication )and much more AND ALSO THERE IS A SMALL GIFT/SURPRISE FROM MY SIDE IN HERE ( You will love it !!!! ) JOB OUTLOOK Exciting career opportunities as security analyst, security engineer, security architect, forensics investigator, cybersecurity specialist, and more! Cyber security positions are expected to rise 6 million globally by 2019 (source: Forbes, January 2016) If you are already in the IT field, expect a 9% raise in pay for security expertise (source: Forbes, January 2016) Median salary for information security analyst for 2015 is $90,000 (source: US Bureau of Labor Statistics) THE DEMAND FOR CYBER SECURITY EXPERTS IS INCREASING AT A VERY HIGH RATE !!!!!!!!THEY ARE SEARCHING EXPERTS LIKE YOU …… This course will prove to be a steeping milestone in your cyber security & Ethical hacking career and by the end of this course you would be familiar with so many terminologies and would have gained sufficient knowledge that can help to jump start your career as an information security professional. So, what are you waiting for??????? Enroll now and fulfill all your dreams. DhabaleshwarWho this course is for: I created this course for everyone who wants to learn how to stay safe online. Students who want to learn the basics of computer and cyber security. Students who want to become IT or Cyber Security Experts. [HIDE][Hidden Content]]
  11. The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick one of the most famous social engineers in the world popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. * Examines social engineering, the science of influencing a target to perform a desired task or divulge information * Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access * Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers now you can do your part by putting to good use the critical information within its pages. [Hidden Content]
  12. Sngine is a PHP Social Network Platform is the best way to create your own social website or online community. Launch it in just 1 minute with ultimate features. It’s fast, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  13. Grow Your Email List, Website Traffic, and Social Media Followers with Viral Giveaways & Contests Demo: [Hidden Content] [HIDE][Hidden Content]]
  14. #1 Email Opt-In & Lead Generation Plugin. Guaranteed Increase in Subscribers & Conversions! Demo: [Hidden Content] [HIDE][Hidden Content]]
  15. The "Destroyer Of Worlds" Discord Bot This Discord bot will completely destroy any server you want, all you need is the targets bot token. - Features - Deletes all channels Deletes all voice channels Bans all members Creates invite link in the console [Hidden Content]
  16. THE BEST MONEY MAKING METHOD OF OUR GENERATION [Hidden Content]
  17. Allows One To Identify And Fingerprint Web Application Firewall (WAF) Products Protecting A Website The Web Application Firewall Fingerprinting Tool. — From Enable Security How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is. If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks. For further details, check out the source code on our main repository. [HIDE][Hidden Content]]
  18. [Hidden Content]
  19. [Hidden Content]
  20. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]