Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags '7.4'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 7 results

  1. Secure your files and folders Secure your confidential files and folders Vovsoft Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can password protect any secret or embarrassing files. Hide your files and folders from prying eyes. Set your password and lock your files. No one can access your files without your master password. File protection software If you are looking for an easy to use file hider or folder hider application for your desktop or laptop PC, you can rely on this program. It is suitable for file protection software and folder protection software needs. Password protect directories Hide Files supports NTFS, exFAT, FAT32 and FAT16 file system types, local hard drives, external hard drives, SSD drives, SD/MMC memory cards and USB flash disks. The ability to hide and encrypt batch files and open them in a few seconds is the expertise of this software. Hide Files can lock and unlock your gigabytes of data within seconds. It can password protect any directory on your PC. This software supports drag and drop from Windows Explorer and lost password recovery. Hide Files is able to stop locking process if any file or disk error occurs and helps you keep your important data. However it is always a good idea to back up important files and folders first. How to hide files and folders Add your files or folders by using the dedicated menu or drag & drop from Windows Explorer. Then, select the items you wish to hide and lock them by using the "Lock" button. Whenever you want them to reveal, all you need to do is use the "Unlock" button. [Hidden Content] [hide][Hidden Content]]
  2. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.4 Based on: Xbuntu 18.04.5 LTS Kernel: 5.9.1 System: 64bit Release date: 23.10.2020 Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare Code name: Stable + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23 + Firefox + Signal + Tor browser update + Added new information on panic room system information [hide][Hidden Content]]
  3. Additions: MkCheck - MikroTik Router Exploitation Framework. RouterSploit - Network Router Exploitation Framework. XSStrike - Cross Site Scripting detection suite. HoneyTel - TelNet-IoT-HoneyPot used to analyze collected botnet payloads. ACLight2 - Used to discover Shadow Admin accounts on an exploited system. SMBGhost - Now has a scanner, as well as an exploitative option. Overview Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM. Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test. [hide][Hidden Content]]
  4. YouPHPTube version 7.4 suffers from a remote code execution vulnerability. View the full article
  5. AllPlayer version 7.4 SEH unicode buffer overflow exploit. View the full article
  6. Synaccess netBooter NP-0801DU version 7.4 suffers from a cross site request forgery vulnerability. View the full article
  7. Seqrite End Point Security version 7.4 suffers from a weak file permission privilege escalation vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.