Jump to content
LeVeL23HackTools

Search the Community

Showing results for tags '2.0'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

  1. Serial KeyGen – The program will allow you to easily do this by generating up to a million unique serial numbers and passwords of varying complexity. The program allows you to save the received keys in the following formats: JSON, XML, SQL, CSV and TXT. What’s New * Various bugs have been fixed and stability has been improved. * The speed of key generation has been increased. * Added key hashing. * Added support for specials. characters. * Added JSON and XML formats for storing keys. * Added new features for saving and copying keys to the clipboard. * Added the progress of the generation to the Taskbar. * Added “Counter” control for all numeric fields. * The logo and some elements of the program were redesigned. * Removed unnecessary functions, forms and components. * Corrections have been made in the translation. * Various minor improvements and improvements. [hide][Hidden Content]]
  2. Learn how to receive data directly from satellites and decode it What you'll learn L-band antenna and how to use it. Frequencies on L-band. Basics of satellites. What is Iridium satellite? How to hunt for Iridium satellite frequency. Decode voice data from Iridium satellite. Decode other data types from Iridium satellite. Find location of Iridium satellite. What is Inmarsat satellite? How to hunt for Inmarsat satellite signals. Decode email, aerospace, and other data from Inmarsat satellite. Creating your own SDR server. Requirements RTL-SDR Dongle (Find Details inside Course) Raspberry PI (Find Details inside Course) Description Have you ever thought of Sniffing satellites and receiving data directly from satellites? If YES! Then this course is for you. After a great response from our first course (SDR for Ethical Hackers and Security Researchers), We took it further deep and created this (Advance SDR for Ethical Hackers and Security Researchers 2.0) course. It is recommended that you should first take SDR for Ethical Hackers and Security Researchers course and then continue with this course but for those who directly want to start with this course make sure you watch appendix section of this course for basic references. In this course we are going to talk about satellites, different types of satellites receiving data from satellites and decoding it. We will start with Iridium satellite and look what is Iridium satellite? Then we will setup L-band antenna for receiving signals from Iridium satellite after receiving data we will see how we can decode that data including Voice data, GSM data, Pager data and other data. After that we will cover Inmarsat satellite and see what Inmarsat satellite is and how to receive Inmarsat satellite signals then will try to decode those signals using Scytale-C and JAERO. We will try to capture Voice data, Email data and Aerospace data from Inmarsat satellite. At last, we will see how to create our own Raspberry Pi based SDR server and how to hunt for signals using that Server. Who this course is for: Anyone Interested in Software Defined Radio. Anyone Interested in Learning the use of SDR in Security. Anyone Interested in receiving data directly from satellite. Anyone Interested in decoding satellite data. Anyone Interested in creating SDR server. [Hidden Content] [hide][Hidden Content]]
  3. WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0 Follow The Instructions 1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ. 2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\ 3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ. 4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs. 5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!! ᴏʀ (1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ (2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1 (3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ [Hidden Content]
  4. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.0 RC1 Re-branded 2.0 to give it a fresh look All documentation has moved to our docs site soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date. so-import-pcap is back! See the so-import-pcap docs here. Fixed issue with so-features-enable Users can now pivot to PCAP from Suricata alerts ISO install now prompts users to create an admin/sudo user instead of using a default account name The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet Fixed issue with disk cleanup Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files Locked down access to certain SSL keys Suricata logs now compress after they roll over Users can now easily customize shard counts per index Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS) Elastic nodes are now “hot” by default, making it easier to add a warm node later so-allow now runs at the end of an install so users can enable access right away Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity: 1-Low / 2-Medium / 3-High / 4-Critical Initial implementation of alerting queues: Low & Medium alerts are accessible through Kibana & Hunt High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis ATT&CK Navigator is now a statically-hosted site in the nginx container Playbook All Sigma rules in the community repo (500+) are now imported and kept up to date Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing) Updated UI Theme Once authenticated through SOC, users can now access Playbook with analyst permissions without login Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS Fixed issue with Wazuh authd registration service port not being correctly exposed Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot) Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from [Hidden Content] Added the ability to use custom Zeek scripts Renamed “master server” to “manager node” Improved unification of Zeek and Strelka file data [hide][Hidden Content]]
  5. amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below. New Features x64 support added ! Support for MacOS and Windows (Currently supporting all major platforms) Assembly stubs rewritten External dependencies reduced to two C++ stubs converted to go All project converted into a go package [HIDE][Hidden Content]]
  6. TECHNIQUE When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him. AVAILABLE TUNNELLING OPTIONS LOCALHOST NGROK ([Hidden Content]) TESTED ON FOLLOWING:- Kali Linux - 2020.1a (version) Parrot OS - Rolling Edition (version) Ubuntu - 18.04 (version) Arch Linux Termux App Advance Phishing Tool 2.0 Add 16 New Phishing Pages with Latest Version Fix Ngrok Problem Add World First Tiktok Phishing Page [HIDE][Hidden Content]]
  7. ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  8. Pony Stealer 2.0 Full Source + Builder + Panel Pony Stealer is a password stealer that can decrypt or unlock passwords for over 110 different applications including VPN, FTP, email, instant messaging, web browsers and much more. Pony Stealer once infects a PC it will turn the device into a botnet. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
  10. Jobberbase version 2.0 suffers from a remote SQL injection vulnerability. View the full article
  11. Plexo Torresoft Alex Torres Software version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  12. BSI Advance Hotel Booking System version 2.0 suffers from a persistent cross site scripting vulnerability in booking_details.php. View the full article
  13. Master Data Online version 2.0 suffers from a cross site scripting vulnerability. View the full article
  14. Ultimate Loan Manager version 2.0 suffers from a persistent cross site scripting vulnerability. View the full article
  15. WordPress Satoshi theme version 2.0 suffers from cross site request forgery and remote file upload vulnerabilities. View the full article
  16. WordPress Antena_Ri Institute theme version 2.0 suffers from an open redirection vulnerability. View the full article
  17. JetAudio jetCast Server version 2.0 log directory local SEH alphanumeric encoded buffer overflow exploit. View the full article
  18. jetCast Server version 2.0 denial of service proof of concept exploit. View the full article
  19. PHPads version 2.0 based on Pixelledads version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  20. OpenSkos Simple Knowledge Organization System version 2.0 suffers from a database configuration file disclosure vulnerability. View the full article
  21. AnMing MP3 CD Burner version 2.0 denial of service proof of concept exploit. View the full article
  22. Jobberbase CMS version 2.0 suffers from a remote SQL injection vulnerability. View the full article
  23. Features of the bot: - Graber cards - Spam on user contacts - Calling the number - Forwarding incoming calls - Launching user applications - Automatic withdrawal of fake notifications, with taken bank icons - Interception, block-deleting incoming SMS, sending, including short numbers - Download all user application names - Graber contacts - Screen locker - Launch pages in the browser - Launch user applications - Search for Bank applications - Browser history graber - Socks5 module - Sending USSD - Geolocation - Spam by number base Admin panel: Detailed statistics on countries, app, url histories, selerians, etc. The ability to issue commands to a particular bot, group, as well as all newcomers. Search by imei, sorting by installed applications, online bots, seler, countries. Cleaning of old logs. Separate statistics for traffic. Jabber notification. There is a possibility to load their injections, with the admin panel. Search by SMS, logs. Searching for links by history. The statistics for the tasks that have been issued are fulfilled. Etc. Additional info: The size of the bot is 150 kb. Stable work on Android 4-7. For basic work, root rights are not required. Request admin rights. To change the phone password, you need the admin rights (requested when installing). Change the password to Android Nougat (Android 7) version in part. Sending and intercepting SMS on all versions, deleting up to 4.4, downloading all SMS from 4.4, block SMS over 4.4 via SMS manager / Screen Locker (when locked via SMS manager, SMS is not seen only by the Holder). Permanent withdrawal of bank (fake) notifications with bank icons, the text can be set with the admin panel when you click on the message the injection is started. In the presence of injections of euro countries, they are bundled with a bot. An additional functional is possible. Android Bot Loki We want to offer a bot of our own developments. A completely new bot engine, the wishes of the customers are part of the functions of are automated, advanced functionality. Bot features: - Card grabber - Phone contacts spam - Custom numbers spam - Call to number - Incoming call forwarding - Start user applications - Automatic invoke fake notifications with custom icons - Catch, block, delete incoming SMS. Sent new SMS - Get list of user applications - Contact grabber - Screen locker - Web application browser - Bank applications searching - Browser history grabber - Socks5 module - Geolocation Admin panel: Detalized statistics of countries, app, history, sellers etc ... Ability for send command to one, list , or only new bots. IMEI search. Sort by installed applications, online, sellers, countries. Cleanup old logs Dedicated statistics for sellers. Jabber notifications. Admin panel have an ability to upload your own injects. SMS, logs searching. History links searching. Task statistiks. Additional information: Bot size: 150kb Bot is working with Android 4-7 Root permissions is NOT required for common actions. There are request for getting root permissions Root permissions required for Image phone password changing Phone password changing for All Android Nougat (All Android 7) of Post Send and catch statement SMS works on all All Android versions, the delete works only for 4.4, download and block SMS works All Android 4.4 and newest Permanent display bank notifications with custom text from admin panel. Bot have injects for euro countries. \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ Loki admin panel install instructions: apt-get update && apt-get upgrade -y apt-get install apache2 libapache2-mod-php5 mysql-server php5 php5-mysql -y apt-get install default-jre default-jdk -y Debian 7: apt-get install ia32-libs lib32z1 lib32ncurses5 -y Debian 8: dpkg --add-architecture i386 apt-get update apt-get install libstdc++6:i386 libgcc1:i386 zlib1g:i386 libncurses5:i386 lib32z1 lib32ncurses5 Next: wget [Hidden Content] wget -O apktool.jar [Hidden Content] chmod +x ~/apktool.jar chmod +x ~/apktool mv ~/apktool.jar /usr/local/bin/ mv ~/apktool /usr/local/bin/ Next: unpack loki.tar to new dir. something like that: tar xf loki.tar -C /var/www/ change files owner: chown -R www-data:www-data /var/www/ Run: mysql create database loki; grant all privileges on loki.* to [email protected] identified 'DB_PASSWORD'; grant all privileges on loki.* to [email protected] identified by 'DB_PASSWORD'; quit import bd file loki4dev.sql: mysql loki < /var/www/site/loki4dev.sql mysql -u root -pbolonka1 loki </var/www/site/loki4dev.sql Edit: /var/www/site/db.php and enter mysql database access: db: loki db user: loki db password: DB_PASSWORD DONE!!!! address admin panel [Hidden Content] or [Hidden Content] login with name bot4fun and password J1HPbmr ...................................................................... Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  24. SphereFTP server version 2.0 suffers from a remote denial of service vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.