Search the Community

Showing results for tags 'windows'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 61 results

  1. MSHTML only checks for the CLSID associated with VBScript when blocking in the Internet Zone, but doesn't check other VBScript CLSIDs which allow a web page to bypass the security zone policy. View the full article
  2. The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc). View the full article
  3. The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. View the full article
  4. dEEpEst

    WinDows 10 Activation Key 

    [Hidden Content]
  5. ToRat A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. Work in Progress... Setup [Hidden Content] Repository The important parts live in Client [Hidden Content] Server [Hidden Content] TLS certificate generator [Hidden Content] Current Features the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service) anonymity of client and server end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor smaller binary anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features Persistence and privilege escalation for Linux and Mac OS Support for Android and iOS Cat with support for .docx .pptx .od* .pdf files File-less Persistence on Windows [Hidden Content] ASCII-Art Welcome Message in server shell Download: [Hidden Content]
  6. Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: Runs on Windows, Linux/Unix, Mac OS X, ... Cracks LM and NTLM hashes. Free tables available for Windows XP and Vista/7. Brute-force module for simple passwords. Audit mode and CSV export. Real-time graphs to analyze the passwords. LiveCD available to simplify the cracking. Dumps and loads hashes from encrypted SAM recovered from a Windows partition. Free and open source software (GPL). [HIDE][Hidden Content]]
  7. [Hidden Content]
  8. To remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps: [Hidden Content]
  9. @.Root

    Casper Rat Windows

    [Hidden Content]
  10. RoboForm is a password manager for Windows with some cool features: One Click Logins, Capture Passwords, InSync, Extensions for all browsers, Password generator, etc. RoboForm main usage is to keep passwords safe inside the program safe box but there are other ways to use this program. A cool and advanced way to use this program is to fill forms semi automatically. A user defines variables inside the program and every time the variable matches RoboForm will pop up asking the user if he/she wants to fill the form with the information you have set as a variable. I have used this method to advertise a site using chat boxes. Everytime the browser was inside a chat box it will prompt to send the variables data with one click. Multiplying the chat boxes for 1000 or 2000 then you have your advertising in 1000 to 2000 places. Aside it's initial configuration, RoboForm is fairly easy to use... Download: [hide][Hidden Content]] Download 2: [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  11. Do you interested in reading kindle books on PC and no idea about it; then the Kindle app allows you to read the books on PC. It is a user friendly application that provide the same environment as you experienced on Kindle. Therefore, the reader have a more screen for reading and navigation.
  12. [Hidden Content]
  13. Tech Viral TECH SCIENCE SECURITY HOW-TO TOP LIST GADGETS How to Computer How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 By Tushar Subhra Dutta - January 25, 2019 0 How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 We all know that the well-known Windows Defender is a security tool that the tech giant Microsoft includes by default in Windows 10. However, this does not mean that the tech giant Microsoft’s Windows users cannot use any other third-party security tools. As the presence of Windows Defender on Windows 10 is a clear indication that it is compatible with all the third-party security tools and can coexist at the same time in our Windows 10 system. However, since the latest Windows updates, users are simply receiving more and more Windows Defender notifications on their desktop or laptop. Yes, notifications that sometimes are important, but for many others they simply become annoying. While most users agree that the tech giant Microsoft’s well-known security tool, of course, Windows Defender notifications are displayed when it tries to report any type of threat, however, the vast majority of Windows Defender notifications do not provide information relevant to the user, hence, today we will show you a solution for it. So, now without wasting much time let’s explore the tutorial in which we will show you all below how to turn off the Windows Defender notifications in Windows 10. How to disable Windows Defender notifications in Windows 10? In this way, we will make sure that Windows Defender notifications will only be displayed to inform us that a threat could attack our system. First of all, you have to click on the start button. Then on the left side of the start menu simply click on the settings (gear icon). After that now you will get a Window like this. Now simply open the “Update & Security” option. After opening the above option you will get a new Window which is mentioned below. Then simply you have to click on the Windows Security option on the left side of your screen. Now after that simply click on the option “Open Windows Defender Security Centre”. Then simply click on the settings option on the left-lower side of your screen. Now here in this Window, you can simply disable all the Windows Defender notifications. That’s it, now you are done. Moreover, in these settings, we can simply find a general switch that simply deactivates the Windows Defender notifications, and along with the On/Off switch, it also features a set of different options to establish the type of notifications that we want to receive. As the account protection notifications are related to the dynamic blocking of Windows 10, while the Windows Firewall is shown when the firewall blocks an application on the computer. So, what do you think about this tutorial to disable Windows Defender notifications in Windows 10? If you liked this tutorial then do not forget to share this tutorial with your friends and family.
  14. Microsoft Windows has a flaw where a contact file can be leveraged with a malicious mailto: link to achieve code execution. View the full article
  15. Microsoft Windows VCF or Contact file URL manipulation arbitrary code execution proof of concept exploit. Tested on Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. Both x86 and x64 architectures were tested. View the full article
  16. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to the processing of ".contact" files node param which takes an expected website value, however if an attacker references an executable file it will run that instead without warning instead of performing expected web navigation. This is dangerous and would be unexpected to an end user. View the full article
  17. This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. It requires a CLSID string. View the full article
  18. A number of Partial Trust Windows Runtime classes expose the XmlDocument class across process boundaries to less privileged callers which in its current form can be used to elevate privileges and escape the Edge Content LPAC sandbox. View the full article
  19. The WinRT RestrictedErrorInfo does not correctly check the validity of a handle to a section object which results in closing an unrelated handle which can lead to an elevation of privilege. View the full article
  20. Microsoft Windows suffers from a COM Desktop Broker privilege escalation vulnerability. View the full article
  21. Microsoft Windows suffers from a Browser Broker cross session privilege escalation vulnerability. View the full article
  22. Microsoft Windows suffers from DSSVC MoveFileInheritSecurity privilege escalation vulnerabilities. View the full article
  23. Microsoft Windows suffers from a DSSVC CanonicalAndValidateFilePath security feature bypass vulnerability. View the full article