Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 77 results

  1. @.Root

    PACK RAT Windows

    [Hidden Content]
  2. Hello guys,i was searching for runpe that can work on windows 10, i have some old runpe and trying to run on windows 10, but it seems windows 10 are increased security, and runpe doesnt work now, can somebody share some runpe that work on windows 10 ? [Hidden Content]
  3. CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. This toolkit allows you to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team; some of the tools took years to complete, and all of the tools work in a straightforward manner. CQTools is the ultimate toolkit to have when delivering a penetration test. The tools work simply, and we use them in practice during our cybersecurity assignments. Come and have a look at how our CQTools can boost your penetration testing experience! [Hidden Content]
  4. Microsoft Windows PowerShell ISE will execute wrongly supplied code when debugging specially crafted PowerShell scripts that contain array brackets as part of the filename. This can result in ISE executing attacker supplied scripts pointed to by the filename and not the "trusted" PS file currently loaded and being viewed by a user in the host application. This undermines the integrity of PowerShell ISE allowing potential unexpected remote code execution. View the full article
  5. dEEpEst

    WINDOWS KEYS

    [Hidden Content]
  6. On Microsoft Windows, the LUAFV driver has a race condition in the LuafvPostReadWrite callback if delay virtualization has occurred during a read leading to the SECTION_OBJECT_POINTERS value being reset to the underlying file resulting in elevation of privilege. View the full article
  7. On Microsoft Windows, the LUAFV driver can confuse the cache and memory manager to replace the contents of privileged file leading to elevation of privilege. View the full article
  8. On Microsoft Windows, the NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. View the full article
  9. On Microsoft Windows, the LUAFV driver bypasses security checks to copy short names during file virtualization which can be tricked into writing an arbitrary short name leading to elevation of privilege. View the full article
  10. On Microsoft Windows, the LUAFV driver doesn't take into account a virtualized handle being duplicated to a more privileged process resulting in elevation of privilege. View the full article
  11. On Microsoft Windows, the LUAFV driver reuses the file's create request DesiredAccess parameter, which can include MAXIMUM_ACCESS, when virtualizing a file resulting in elevation of privilege. View the full article
  12. On Microsoft Windows, the SxS manifest cache in CSRSS uses a weak key allowing an attacker to fill a cache entry for a system binary leading to elevation of privilege. View the full article
  13. This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files. View the full article
  14. Microsoft Windows AppX deployment service privilege escalation exploit. View the full article
  15. Welcome to CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. [HIDE][Hidden Content]] Requirements Windows 7 Service Pack 1 or Windows 10 60 GB Hard Drive 2 GB RAM Installed Tools
  16. Microsoft Windows Win32k local privilege escalation proof of concept exploit. View the full article
  17. MSHTML only checks for the CLSID associated with VBScript when blocking in the Internet Zone, but doesn't check other VBScript CLSIDs which allow a web page to bypass the security zone policy. View the full article
  18. The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc). View the full article
  19. The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. View the full article
  20. dEEpEst

    WinDows 10 Activation Key 

    [Hidden Content]
  21. ToRat A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. Work in Progress... Setup [Hidden Content] Repository The important parts live in Client [Hidden Content] Server [Hidden Content] TLS certificate generator [Hidden Content] Current Features the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service) anonymity of client and server end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor smaller binary anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features Persistence and privilege escalation for Linux and Mac OS Support for Android and iOS Cat with support for .docx .pptx .od* .pdf files File-less Persistence on Windows [Hidden Content] ASCII-Art Welcome Message in server shell Download: [Hidden Content]
  22. Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: Runs on Windows, Linux/Unix, Mac OS X, ... Cracks LM and NTLM hashes. Free tables available for Windows XP and Vista/7. Brute-force module for simple passwords. Audit mode and CSV export. Real-time graphs to analyze the passwords. LiveCD available to simplify the cracking. Dumps and loads hashes from encrypted SAM recovered from a Windows partition. Free and open source software (GPL). [HIDE][Hidden Content]]
  23. [Hidden Content]
  24. To remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps: [Hidden Content]