Search the Community

Showing results for tags '[c]'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 4 results

  1. You can make reverse shells ^-^ TCPPortFlooder is simple TCP flooder. If you want to flood target and you have linux machine use "TCPPortFlooder_Linux" If you want to flood target and you have windows machine use "TCPPortFlooder_Windows" [hide][Hidden Content]]
  2. itsMe

    BrowseSpy [C]

    Code developed to steal certain browser config files (history, preferences, etc) BrowseSpy Be sure to change the ftp variables throughout the code, these variables contain the username, password, & IP address of the FTP server which receives the files. This code will do the following: Copy itself into the %TMP% directory & name itself ursakta.exe Add a registry entry to execute itself each time the user logs in Verify which browser the user is using (Chrome, Firefox or Brave) Search for files within the Chrome, Firefox, or Brave browser directories Create a directory on our FTP server then send the files in the browser's directory to the FTP server [hide][Hidden Content]]
  3. What is aSYNcrone? aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN packet intensively to the destination. Specifications Internal random IP generator Using threads and faster prepare and sending SYN packets Different IP Identification number [hide][Hidden Content]]
  4. itsMe

    Mendax-Binder [C]

    A Useful and Efficient File Binder A useful and efficient file binder. I created this for educational purposes after researching some file binding techniques on some old forum posts. Not only can it bind two exes (Windows only), but this program also obfuscates ths two exes. Its output file is usually fully undetectable among 68.7% of the antivirus software used on VirusTotal. How it Works This program always binds itself to the two other files. This way, when the binded application runs, the program first checks if the application is correctly binded. If it is, it runs the two applications. Usage Both CLI and GUI are supported. Here are the CLI options: -1: First input file -2: Second input file -o: Name for the output file -h: Displays this help message -v: Displays version number -s: Silent mode Users can either choose to download the executable from the releases section, clone the repo, or compile mendax.c with MinGW's gcc. When compiling the GUI, make sure to have already compiled mendax.c and link mendax_binder.c with all the .o files. Remember to use the -mwindows option to. Before using the GUI, rememeber that I did not include many features to it; it was meant to be as minimalistic and efficient as possible. By running or downloading this program, you agree to the terms of the disclaimer below. For users who want to bind more than two files, you can just bind the binded files on top of each other for now. Also, icons can be added using 3rd party tools like Resource Hacker. [HIDE][Hidden Content]]