Search the Community

Showing results for tags 'web'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 70 results

  1. dEEpEst

    Web Vulnerability Scanners

    [Hidden Content]
  2. Vembu Storegrid Web Interface version 4.4.0 suffers from cross site scripting and information leakage vulnerabilities. View the full article
  3. Build a simple HTML text site Style web pages using CSS Program websites with JavaScript Build a Pipboy using Bootstrap Build and publish a Google Chrome Extension [HIDE]. [Hidden Content]]
  4. Version 1.0.0

    Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  5. View File Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) Master DarkNet & Deep Web - Secrets of The DarkNet (UDEMY) ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 09/03/19 Category Libro Online Password ********  
  6. This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services by sending a crafted request to the /node REST endpoint. As per SA-CORE-2019-003, the initial remediation was to disable POST, PATCH, and PUT, but Ambionics discovered that GET was also vulnerable (albeit cached). Cached nodes can be exploited only once. View the full article
  7. IP:PORT:USERNAME:PASSWORD / La ip se asigna automatica [Hidden Content]
  8. Web Wiz Forums version 12.01 suffers from a database disclosure vulnerability. View the full article
  9. Ip:Port:Username:Password [HIDE][Hidden Content]]
  10. The proxy IP that will be assigned to your requests. Automatic-Assigned IP Addresses Ip:Port:Username:Psssword [HIDE][Hidden Content]]
  11. dEEpEst

    Free web stresser

    FREE WEB STRESSER No Registration Needed [HIDE]. [Hidden Content]]
  12. dEEpEst

    Deep Web List Level 4

    [Hidden Content]
  13. Dr Web Security Space (android) Clave para 232 días [Hidden Content]
  14. itsMe?

    WYSIWYG Web Builder 14.3.2

    Features for advanced users: Login Tools/Page Password Protection. Built-in Content Management System with many plug-ins (guestbook, faq, downloads, photo album etc). Add custom HTML code with the HTML tools. JavaScript Events: Show/hide objects (with animation), timers, move objects, change styles etc. Layers: Sticky layer, Docking layer, Floating layer, Modal layer, Anchored layer, Strechable layer and more! jQuery Theme Manager, create your own themes for the built-in jQuery UI widgets. Style Manager (global styling, H1, H2, H3 etc). Master Frames and Master Objects: reuse common elements in your website. and much more! Create HTML5 / CSS3 websites today! HTML5 document type (optimized HTML5 output). HTML5 audio/video and YouTube HTML5 support. HTML5 forms: native form validation, new input types and options, web storage. HTML5 <canvas> and <svg> support in shapes and other drawing tools. CSS3 @font-face. Use non web safe fonts in all modern browsers. CSS3 opacity, border radius, box shadow. CSS3 gradients. Add cool gradient effects using native CSS3 (no images). CSS3 navigation menu. Create awesome menus without using JavaScript or images. CSS3 animations and transitions. Including support for 2D and 3D transforms! [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  15. Vulnerability Scanner – Audit Your Web Security with Acunetix Multi-threaded, lightning fast crawler and scanner that can crawl hundreds of thousands of pages without interruptions. Detects over 4500 web application vulnerabilities. Scans open-source software and custom-built applications. Detects critical vulnerabilities with 100% accuracy. Info: [Hidden Content] Links removed Pass: level23hacktools.com This new build reports sites that do not implement Content Security Policy (CSP) or Subresource Integrity (SRI) and detects Node.js source disclosure, Ghostscript RCE, SSRF in Paperclip and other vulnerabilities. This new build has a good number of updates and some important fixes. Below is a full list of updates. New Vulnerability Checks New check for Content Security Policy (CSP) not implemented New check for Subresource Integrity (SRI not implemented New check for Node.js web application source code disclosure New check for Ghostscript RCE via file upload New check for Paperclip Server-Side Request Forgery (SSRF) via file upload (CVE-2017–0889) New check for WPEngine _wpeprivate/config.json information disclosure New check for Cross-site Scripting in HTTP-01 ACME challenge implementation New check for npm log file disclosure New check for PHP-CS-Fixer cache file disclosure Multiple new WordPress and Joomla vulnerability checks. Updates License keys can now be updated via the Acunetix web UI Additional memory improvements Improved exclusion of parameters Multiple updates to existing vulnerability checks Improved CORS origin validation failure checks Improved Pickle Serialization check. Fixes Manual Intervention was not working after a paused scan is resumed Scans for some sites using Digest HTTP Authentication were stopping unexpectedly Additional fixes for issues causing scans exiting unexpectedly Fixed issue causing many product update requests when proxy authentication is incorrectly configured Fixed: Some backup files / folders were not being identified Fixed: Some vulnerabilities were incorrectly reported in the site root Fixed issue in similar page detection causing scans to take longer than expected Fixed issue causing valid sessions not to be identified correctly during the scan.
  16. CentOS Web Panel version 0.9.8.763 suffers from a cross site scripting vulnerability. View the full article
  17. Web Proxies Central is a program that let you use undetected yet list of proxies to surf the internet for fun or profit. What makes Web Proxies Central different from other programs or websites is the proxy scrapping method that retrieves undetected web proxies. This proxies don't have much traffic mainly because they are new and this is an advantage because they respond faster to page requests. Download: [hide][Hidden Content]] Virustotal: [hide][Hidden Content]]
  18. Indusoft Web Studio version 8.1 SP2 suffers from a remote code execution vulnerability. View the full article
  19. itsMe?

    Antenna Web Design Studio 6.59

    [HIDE][Hidden Content]] Pass: level23hacktools.com
  20. itsMe?

    Pinegrow Web Editor Pro 5.2

    Build websites faster with Pinegrow 5 a Mac, Windows and Linux web editor that lets you build responsive websites faster with live multi-page editing, CSS & SASS styling, CSS Grid editor and smart components for Bootstrap, Foundation and WordPress. Pinegrow is a desktop website builder that opens and saves standard HTML and CSS files. That means: Your work won’t be locked into a proprietary file format. Just open and edit your existing projects. You can use Pinegrow alongside other web development tools. You can build websites offline, without internet connection. New in 5.2 CSS Grid validation, usability improvements, WordPress builder enhancements and more. Learn more. [Hidden Content] [Hidden Content]
  21. SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 suffers from multiple cross site scripting vulnerabilities. View the full article
  22. dEEpEst

    Access Dark Web

    Access Dark Web There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers. If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.) If you're using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it's not safe
  23. itsMe?

    Pinegrow Web Editor Pro v5.1

    Info: [Hidden Content] Release 5.1 – 24. Jan, 2019 Open panels in floating windows and arrange them on multiple screens. Easily update Bootstrap, fixed Master pages, WordPress improvements, Starter Theme 2 update and more. [HIDE][Hidden Content]] Pass: level23hacltools.com
  24. R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based footprinting can be conducted quickly and thoroughly. Footprinting is the first phase of ethical hacking, its the collection of every possible information regarding the target. R3con1z3r is a passive reconnaissance tool with built-in functionalities which includes: HTTP header flag, Traceroute, Whois Footprinting, DNS information, Site on same server, Nmap port scanner, Reverse Target and hyperlinks on a webpage. The tool, after being provided with necessary inputs generates an output in HTML format. Report will be saved in .html file: [HIDE][Hidden Content]]
  25. [HIDhttps://github.com/koutto/jok3r#jok3r---network-and-web-pentest-frameworkE][/HIDE] Jok3r - Network and Web Pentest Framework Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests. Its main goal is to save time on everything that can be automated during network/web pentest in order to enjoy more time on more interesting and challenging stuff. To achieve that, it combines open-source Hacking tools to run various security checks against all common network services. Main features Toolbox management: Install automatically all the hacking tools used by Jok3r, Keep the toolbox up-to-date, Easily add new tools. Attack automation: Target most common network services (including web), Run security checks by chaining hacking tools, following standard process (Reconaissance, Vulnerability scanning, Exploitation, Account bruteforce, (Basic) Post-exploitation). Let Jok3r automatically choose the checks to run according to the context and knowledge about the target, Mission management / Local database: Organize targets by missions in local database, Fully manage missions and targets (hosts/services) via interactive shell (like msfconsole db), Access results from security checks. Jok3r has been built with the ambition to be easily and quickly customizable: Tools, security checks, supported network services... can be easily added/edited/removed by editing settings files with an easy-to-understand syntax.