Search the Community

Showing results for tags '2.0'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 59 results

  1. Web 2.0 Directory plugin provides an ability to build any kind of business directory site: classifieds, events directory, cars, bikes, boats and other vehicles dealers site, pets, real estate portal, wedding site, yellow pages. In other words – whatever you want. [Hidden Content] [hide][Hidden Content]]
  2. WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0 Follow The Instructions 1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ. 2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\ 3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ. 4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs. 5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!! ᴏʀ (1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ (2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1 (3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ [Hidden Content]
  3. itsMe

    Combo Tool v 2.0

    Added (Changelog): 1. New Custom Domain Email Extractor 2. Clean Combo (Combo Parsing) 3. Edu Mail Extractor (Improved) 4. Fast processing of files [hide][Hidden Content]]
  4. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.0 RC1 Re-branded 2.0 to give it a fresh look All documentation has moved to our docs site soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date. so-import-pcap is back! See the so-import-pcap docs here. Fixed issue with so-features-enable Users can now pivot to PCAP from Suricata alerts ISO install now prompts users to create an admin/sudo user instead of using a default account name The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet Fixed issue with disk cleanup Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files Locked down access to certain SSL keys Suricata logs now compress after they roll over Users can now easily customize shard counts per index Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS) Elastic nodes are now “hot” by default, making it easier to add a warm node later so-allow now runs at the end of an install so users can enable access right away Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity: 1-Low / 2-Medium / 3-High / 4-Critical Initial implementation of alerting queues: Low & Medium alerts are accessible through Kibana & Hunt High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis ATT&CK Navigator is now a statically-hosted site in the nginx container Playbook All Sigma rules in the community repo (500+) are now imported and kept up to date Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing) Updated UI Theme Once authenticated through SOC, users can now access Playbook with analyst permissions without login Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS Fixed issue with Wazuh authd registration service port not being correctly exposed Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot) Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from [Hidden Content] Added the ability to use custom Zeek scripts Renamed “master server” to “manager node” Improved unification of Zeek and Strelka file data [hide][Hidden Content]]
  5. itsMe

    Amber 2.0 - Reflective PE packer

    amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below. New Features x64 support added ! Support for MacOS and Windows (Currently supporting all major platforms) Assembly stubs rewritten External dependencies reduced to two C++ stubs converted to go All project converted into a go package [HIDE][Hidden Content]]
  6. itsMe

    Advance Phishing Tool 2.0

    TECHNIQUE When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him. AVAILABLE TUNNELLING OPTIONS LOCALHOST NGROK ([Hidden Content]) TESTED ON FOLLOWING:- Kali Linux - 2020.1a (version) Parrot OS - Rolling Edition (version) Ubuntu - 18.04 (version) Arch Linux Termux App Advance Phishing Tool 2.0 Add 16 New Phishing Pages with Latest Version Fix Ngrok Problem Add World First Tiktok Phishing Page [HIDE][Hidden Content]]
  7. user32.sys = Stub [HIDE][Hidden Content]]
  8. DarksProtector is an app that allows you to protect all of your .NET apps for free and with the best obfuscation! I will push updates sometimes, so stay tuned! KoiVM/DarksVM finally fixed and improved! Protections · Add Junk · Anti De4Dot · Anti Debug · Anti Dump · Anti ILDasm · Anti Tamper · Calli Protection · Constant Disintegration · Constants · Control Flow · Fake Native · Hide Methods · Invalid Metadata · Locals to Fields + v2 · MD5 Checksum · Mid Reference Proxy · Mutate Constants · Mutations · Module Flood · Reference Proxy · Renamer · Resources + v2 · Stack Underflow · Virtualization (finally updated, sources here) · Type Scrambler Others features · Custom Renamer · Premade Presets · Project Manager (to save your preset) [HIDE][Hidden Content]]
  9. 1337day-Exploits

    ChaosPro 2.0 Buffer Overflow

    ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  10. Pony Stealer 2.0 Full Source + Builder + Panel Pony Stealer is a password stealer that can decrypt or unlock passwords for over 110 different applications including VPN, FTP, email, instant messaging, web browsers and much more. Pony Stealer once infects a PC it will turn the device into a botnet. Download: [HIDE][Hidden Content]] Password:
  11. 1337day-Exploits

    ChaosPro 2.0 SEH Buffer Overflow

    ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  12. Jobberbase version 2.0 suffers from a remote SQL injection vulnerability. View the full article
  13. Plexo Torresoft Alex Torres Software version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  14. BSI Advance Hotel Booking System version 2.0 suffers from a persistent cross site scripting vulnerability in booking_details.php. View the full article
  15. Master Data Online version 2.0 suffers from a cross site scripting vulnerability. View the full article
  16. Ultimate Loan Manager version 2.0 suffers from a persistent cross site scripting vulnerability. View the full article
  17. [Hidden Content]
  18. [HIDE][Hidden Content]]
  19. The program works through the RuCaptcha service. In order to use RuCaptcha, click on the "Additional settings" button, then insert the key, click on Balance, you will see your current balance. Then everything is like in a normal Brute, load the base, also load the proxy (if necessary), choose the type of proxy, expose streams, and timeout, press the start. If you find an account or you have an account with 2fa, you can drop me, make definitions on 2fa. [HIDE][Hidden Content]]
  20. [HIDE][Hidden Content]]
  21. itsMe

    Hulu Checker 2.0

    [HIDE][Hidden Content]]
  22. WordPress Satoshi theme version 2.0 suffers from cross site request forgery and remote file upload vulnerabilities. View the full article
  23. WordPress Antena_Ri Institute theme version 2.0 suffers from an open redirection vulnerability. View the full article
  24. JetAudio jetCast Server version 2.0 log directory local SEH alphanumeric encoded buffer overflow exploit. View the full article