Search the Community

Showing results for tags '2.0'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 62 results

  1. user32.sys = Stub [Hidden Content]
  2. itsMe

    Serial KeyGen 2.0

    Serial KeyGen – The program will allow you to easily do this by generating up to a million unique serial numbers and passwords of varying complexity. The program allows you to save the received keys in the following formats: JSON, XML, SQL, CSV and TXT. What’s New * Various bugs have been fixed and stability has been improved. * The speed of key generation has been increased. * Added key hashing. * Added support for specials. characters. * Added JSON and XML formats for storing keys. * Added new features for saving and copying keys to the clipboard. * Added the progress of the generation to the Taskbar. * Added “Counter” control for all numeric fields. * The logo and some elements of the program were redesigned. * Removed unnecessary functions, forms and components. * Corrections have been made in the translation. * Various minor improvements and improvements. [hide][Hidden Content]]
  3. Learn how to receive data directly from satellites and decode it What you'll learn L-band antenna and how to use it. Frequencies on L-band. Basics of satellites. What is Iridium satellite? How to hunt for Iridium satellite frequency. Decode voice data from Iridium satellite. Decode other data types from Iridium satellite. Find location of Iridium satellite. What is Inmarsat satellite? How to hunt for Inmarsat satellite signals. Decode email, aerospace, and other data from Inmarsat satellite. Creating your own SDR server. Requirements RTL-SDR Dongle (Find Details inside Course) Raspberry PI (Find Details inside Course) Description Have you ever thought of Sniffing satellites and receiving data directly from satellites? If YES! Then this course is for you. After a great response from our first course (SDR for Ethical Hackers and Security Researchers), We took it further deep and created this (Advance SDR for Ethical Hackers and Security Researchers 2.0) course. It is recommended that you should first take SDR for Ethical Hackers and Security Researchers course and then continue with this course but for those who directly want to start with this course make sure you watch appendix section of this course for basic references. In this course we are going to talk about satellites, different types of satellites receiving data from satellites and decoding it. We will start with Iridium satellite and look what is Iridium satellite? Then we will setup L-band antenna for receiving signals from Iridium satellite after receiving data we will see how we can decode that data including Voice data, GSM data, Pager data and other data. After that we will cover Inmarsat satellite and see what Inmarsat satellite is and how to receive Inmarsat satellite signals then will try to decode those signals using Scytale-C and JAERO. We will try to capture Voice data, Email data and Aerospace data from Inmarsat satellite. At last, we will see how to create our own Raspberry Pi based SDR server and how to hunt for signals using that Server. Who this course is for: Anyone Interested in Software Defined Radio. Anyone Interested in Learning the use of SDR in Security. Anyone Interested in receiving data directly from satellite. Anyone Interested in decoding satellite data. Anyone Interested in creating SDR server. [Hidden Content] [hide][Hidden Content]]
  4. Double your Instagram following ,Grow Instagram with Organic Targeted Followers from Scratch & convert into customers What you'll learn How to grow 0 to 10K followers in 2 months Optimize Instagram profile from scratch Create viral posts & stories Monetize your Instagram Page Show online presence through Instagram Requirements Must have Instagram in your mobile Description Welcome to Instagram Program 2.0. The complete guide on how to grow your Instagram from 0-10K in 3months. SUMMARY: The single, best way to succeed at Instagram is to build a community. Not a following. So you want to double your Instagram following? Why? Do you believe it will bring you more traffic to your website? More sales? Open up more and varied professional opportunities? So you can brag to your friends that you’re ‘instafamous’? Whatever your reason is. Instagram can change the entire trajectory of your business, brand, or blog. And even your life. It may seem silly that sharing a few images here and there can have the potential to blow things out of the water. In This Course we will discuss: Strategies I used to take multiple Instagram accounts from 0 to 100k+ followers - in 8 months. How I’ve been able to attract the attention of followers quickly. How I’ve been able to create content that drives engagement… Basics to the advanced strategies that will help you get the engagement your brand is looking for. Will teach you everything about Instagram you need to know. I will share my top secrets of Instagram growth with you. You are going to learn everything to start your own IG- page. You don't need any experience I will explain from scratch. Creating a highly Optimized Instagram profile. Creating Viral Posts and stories. Getting high engagement and traffic to your page Monetize your page with proven strategics I WANT YOU TO BE SUCCESSFUL SO I WANT TO MAKE ONE THING CLEAR! THIS COURSE CONTAINS VERY MUCH KNOWLEDGE THAT CAN HELP YOU VERY MUCH ON SUCCESSFULLY GROWING YOUR INSTAGRAM PAGE. AS WELL AS MAKING MUCH MONEY WHILE DOING IT. SO MAKE SURE TO TAKE NOTES AND SEE LECTURES AS OFTEN AS YOU NEED, UNTIL YOU IMPLEMENTED EVERYTHING AND FOUND YOUR WAY! ABOUT ME: I started my Instagram page and tested many strategies to grow my page. I read many ebooks, articles, watched youtube videos, and after being consistent and dedicated to my work and taking massive actions, I was able to grow my page to 10K in just 2 months from scratch. April 2020- 0 followers May 2020- 1K followers Mid-June - 10K followers ......... I run multiple pages with over 100K+ followers and I am also an Instagram mentor and manages social media accounts. From my first Instagram page, I made around $3000+ with less than 10K followers. So, without wasting any time, Let's get started, SEE YOU THEN. Who this course is for: Social media marketer who uses Instagram Instagram influencers who wants to grow their page /brand Individual/entrepreneurs who want to grow their page Digital marketers who wants to show online presence [Hidden Content] [hide][Hidden Content]]
  5. Web 2.0 Directory plugin provides an ability to build any kind of business directory site: classifieds, events directory, cars, bikes, boats and other vehicles dealers site, pets, real estate portal, wedding site, yellow pages. In other words – whatever you want. [Hidden Content] [hide][Hidden Content]]
  6. WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0 Follow The Instructions 1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ. 2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\ 3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ. 4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs. 5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!! ᴏʀ (1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ (2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1 (3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ [Hidden Content]
  7. itsMe

    Combo Tool v 2.0

    Added (Changelog): 1. New Custom Domain Email Extractor 2. Clean Combo (Combo Parsing) 3. Edu Mail Extractor (Improved) 4. Fast processing of files [hide][Hidden Content]]
  8. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.0 RC1 Re-branded 2.0 to give it a fresh look All documentation has moved to our docs site soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date. so-import-pcap is back! See the so-import-pcap docs here. Fixed issue with so-features-enable Users can now pivot to PCAP from Suricata alerts ISO install now prompts users to create an admin/sudo user instead of using a default account name The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet Fixed issue with disk cleanup Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files Locked down access to certain SSL keys Suricata logs now compress after they roll over Users can now easily customize shard counts per index Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS) Elastic nodes are now “hot” by default, making it easier to add a warm node later so-allow now runs at the end of an install so users can enable access right away Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity: 1-Low / 2-Medium / 3-High / 4-Critical Initial implementation of alerting queues: Low & Medium alerts are accessible through Kibana & Hunt High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis ATT&CK Navigator is now a statically-hosted site in the nginx container Playbook All Sigma rules in the community repo (500+) are now imported and kept up to date Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing) Updated UI Theme Once authenticated through SOC, users can now access Playbook with analyst permissions without login Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS Fixed issue with Wazuh authd registration service port not being correctly exposed Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot) Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from [Hidden Content] Added the ability to use custom Zeek scripts Renamed “master server” to “manager node” Improved unification of Zeek and Strelka file data [hide][Hidden Content]]
  9. itsMe

    Amber 2.0 - Reflective PE packer

    amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below. New Features x64 support added ! Support for MacOS and Windows (Currently supporting all major platforms) Assembly stubs rewritten External dependencies reduced to two C++ stubs converted to go All project converted into a go package [HIDE][Hidden Content]]
  10. itsMe

    Advance Phishing Tool 2.0

    TECHNIQUE When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him. AVAILABLE TUNNELLING OPTIONS LOCALHOST NGROK ([Hidden Content]) TESTED ON FOLLOWING:- Kali Linux - 2020.1a (version) Parrot OS - Rolling Edition (version) Ubuntu - 18.04 (version) Arch Linux Termux App Advance Phishing Tool 2.0 Add 16 New Phishing Pages with Latest Version Fix Ngrok Problem Add World First Tiktok Phishing Page [HIDE][Hidden Content]]
  11. DarksProtector is an app that allows you to protect all of your .NET apps for free and with the best obfuscation! I will push updates sometimes, so stay tuned! KoiVM/DarksVM finally fixed and improved! Protections · Add Junk · Anti De4Dot · Anti Debug · Anti Dump · Anti ILDasm · Anti Tamper · Calli Protection · Constant Disintegration · Constants · Control Flow · Fake Native · Hide Methods · Invalid Metadata · Locals to Fields + v2 · MD5 Checksum · Mid Reference Proxy · Mutate Constants · Mutations · Module Flood · Reference Proxy · Renamer · Resources + v2 · Stack Underflow · Virtualization (finally updated, sources here) · Type Scrambler Others features · Custom Renamer · Premade Presets · Project Manager (to save your preset) [HIDE][Hidden Content]]
  12. 1337day-Exploits

    ChaosPro 2.0 Buffer Overflow

    ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  13. Pony Stealer 2.0 Full Source + Builder + Panel Pony Stealer is a password stealer that can decrypt or unlock passwords for over 110 different applications including VPN, FTP, email, instant messaging, web browsers and much more. Pony Stealer once infects a PC it will turn the device into a botnet. Download: [HIDE][Hidden Content]] Password:
  14. 1337day-Exploits

    ChaosPro 2.0 SEH Buffer Overflow

    ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  15. Jobberbase version 2.0 suffers from a remote SQL injection vulnerability. View the full article
  16. Plexo Torresoft Alex Torres Software version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  17. BSI Advance Hotel Booking System version 2.0 suffers from a persistent cross site scripting vulnerability in booking_details.php. View the full article
  18. Master Data Online version 2.0 suffers from a cross site scripting vulnerability. View the full article
  19. Ultimate Loan Manager version 2.0 suffers from a persistent cross site scripting vulnerability. View the full article
  20. [Hidden Content]
  21. [HIDE][Hidden Content]]
  22. The program works through the RuCaptcha service. In order to use RuCaptcha, click on the "Additional settings" button, then insert the key, click on Balance, you will see your current balance. Then everything is like in a normal Brute, load the base, also load the proxy (if necessary), choose the type of proxy, expose streams, and timeout, press the start. If you find an account or you have an account with 2fa, you can drop me, make definitions on 2fa. [HIDE][Hidden Content]]
  23. [HIDE][Hidden Content]]
  24. itsMe

    Hulu Checker 2.0

    [HIDE][Hidden Content]]