Search the Community

Showing results for tags 'and'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 374 results

  1. Dear members! We are pleased to offer you our service for providing VDS and dedicated servers for a wide range of tasks around the world! Our sales and customer support specialists are ready to answer any of your questions regarding the services provided. Who we are: a professional team that provides VDS / VPS hosting and ar dedicated servers. In almost all data centers, we have our own racks in which our servers are located. Experience in this area for about 4 years. Our servers are ideally suited for any tasks requiring increased anonymity and stability. Including Pentest and any related software. Technical support is ON-LINE 24 hours a day (through tickets on the website) and are ready to come to your aid in resolving issues on servers, VDS / VPS within their competence. All prices, countries and other additional information you can get on our website in the TOR. To order services, use our site in the TOR (via TOR-browser): [Hidden Content] Terms of Service (TOS): What is strictly forbidden to be placed on our servers, regardless of their physical location: 1. Any content whose purpose is to cause direct or indirect harm (damage) to the Russian Federation and CIS countries. 2. Any content in one way or another related to terrorism or the financing of terrorism (extremism). 3. Any content containing pornographic material (except in countries where this is officially permitted by local laws). 4. Child porn is prohibited in any form and is punishable by the immediate shutdown of the server without a refund and backups. 5. Any content related to the sale or distribution of narcotic drugs or their precursors, as well as propaganda for the distribution of these drugs. 6. Any type of illegal activity against government / financial networks and institutions, regardless of country. 7. Posting content for the purpose of selling or distributing weapons and explosives. 8. The boorish attitude towards the employees of our service may lead to a denial of service. - The client is responsible for the content that he places on the server and for the possible consequences of its use. - All our servers are provided without administration. You get full access and use the server as you see fit. - The client himself must monitor the backups on his server (s), in the event of a hard disk failure or any other circumstances of force majeure, our service will not reimburse - You do not have any direct or indirect losses that could arise as a result of a hard drive failure for any of the reasons. - Our task is to change your HDD for a new one, and we will do this in the shortest possible time, but we won’t bear it for the lost profit due to the failure of it. - Payment for services is made for 1 calendar month (minimum period), we do not rent equipment weekly and do not return MoneyBack if you personally want to cancel the services ahead of schedule. - Payment for services is accepted exclusively in BTC. This agreement is a mini-offer and takes effect after you have completed the order and received the service. If you do not like any of our rules, just do not place an order. For any kind of advice regarding the purchase of services, please use our PRE-SALES contacts: telegram: [Hidden Content] jabber (CONSULT): [email protected] OR consult[doT]exploit.im SUPPORT (24/7) jabber: [email protected] All orders and technical support are carried out exclusively through our website in the TOR: [Hidden Content] This top is for advertising purposes only, so we kindly ask you not to flood here, but to leave only feedback on the use of our services.
  2. WP-Hide Explained The convenient way to hide your WordPress from being visible through the code. A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code. Provide a clean method for removing any WordPress fingerprints including themes and plugins. No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved. WP HIDE PRO now available! The plugin not only allow to change default urls of you WordPress, but it hide/block defaults! All other similar plugins just change the slugs, but the defaults are still accessible, obviously revealing the WordPress. [Hidden Content] [hide][Hidden Content]]
  3. About this book Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. [Hidden Content] [hide][Hidden Content]]
  4. GDBFrontend GDBFrontend is an easy, flexible and extension able gui debugger. Changelog v0.5.1 beta Added 32-bit and ARM Gotty executables. Added dark theme. Clear prev symbols while connecting gdbserver. Made it possible to stop execution while remote target running. Check if GDB is installed before run. Fix inner LinkedListVisualizer close event bubbles. Redirect /terminal to /terminal/. Send SIGKILL to process group. Various enhancements. [hide][Hidden Content]]
  5. GDBFrontend is an easy, flexible and extension able gui debugger. Changelog v0.5 beta Added dark theme. gdbfrontend-dark Clear prev symbols while connecting gdbserver. Made it possible to stop execution while remote target running. Check if GDB is installed before run. Fix inner LinkedListVisualizer close event bubbles. Redirect /terminal to /terminal/. Send SIGKILL to process group. Various enhancements. [hide][Hidden Content]]
  6. AmyMovie theme is a fully responsive WordPress theme designed for Movie websites. The various, modern and professional interface with clean code will make your Movie sites powerful, attractive and easy-to-use. You are easy to import movie data from IMDb and TMDb website. And with amazing showtime features, visitor can spend only some seconds to get the Movie Schedules in the different cinemas. [Hidden Content] [hide][Hidden Content]]
  7. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.6.7 Add: Option –auth for HTTP authentification. Exemple –auth admin:admin Fixed: Bugs [hide][Hidden Content]]
  8. What you'll learn Get a fundamental understanding of the Python programming language. Acquire the background and skills of Python to apply for Python programming jobs Understand the memory management of Python Get a good grasp on multithreading, concurrent programming and parallel programming Can move to more advanced topics such as algorithms or machine learning Requirements Working computer and internet - setup and installation instructions are included for each platform (Mac and Windows) Description Join us and become a Python Programmer, learn one of most requested skills of 2021! This course is about the fundamental basics of Python programming language. Whether you have never programmed before, already know basic syntax, or want to learn about the advanced features of Python, this course is for you! You can learn about the hardest topics in programming: memory management, multithreading and object-oriented programming. So these are the topics you will learn about: 1.) Basics of Python installing Python and the integrated development environment (IDE) basic operations conditional statements loops 2.) Functions what are functions in Python positional and keyword arguments return and yield recursion 3.) Data Structures how to measure the performance of data structures? data structures introduction lists tuples dictionaries and sets 4.) Object-Oriented Programing (OOP) what is the advantages and disadvantages of OOP? classes and objects constructors inheritance polymorphism 5.) Memory Management stack memory and heap memory memory management in Python 6.) Handling Files (I/O) read files and write files 7.) Exceptions exceptions and errors how to deal with exception try-except-finally blocks 8.) Multithreading and Concurrent Programming what are threads and processes? synchronization locks deadlocks and livelocks inter-thread communication 9.) Parallel Programming multithreading and parallel programming what is the Global Interpreter Lock (GIL)? 10.) Lambda Expressions what is functional programming? why to learn lambda expressions? anonymous functions filter map reduce 11.) NumPy real array data structures in Python lists and arrays comparison NumPy fundamentals You will get lifetime access to 110+ lectures plus slides and source codes for the lectures! This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you'll get your money back. So what are you waiting for? Learn Python in a way that will advance your career and increase your knowledge, all in a fun and practical way! Who this course is for: Students or beginners with no previous programming experience looking to obtain the skills to get their first programming job If you are an expert Python programmer with decades of programming experience, then this course is not for you [Hidden Content] [hide][Hidden Content]]
  9. What you'll learn How to leverage TikTok, Instagram & Youtube for profits How to set up your profile the RIGHT way How to build your strategy for maximum profits How to make brands beg YOU for promotions How to build a loyal audience that will follow you for life The secrets other Influencers are ignorant about Requirements Basic social media knowledge Description This course will teach you everything you need to know to become an influencer in the digital world. It covers Instagram, Youtube and TikTok platforms. You will learn how to choose the right niche for you and how to concentrate on a single audience. The course will cover the following: Instagram -Instagram fundamentals -How Instagram algorithm works and how to use it to your advantage -The differences between business and creator accounts -Creating an impactful Instagram Bio -The importance of hashtags and how to use them -The importance of captions -Strategies to be more effective -Instagram metrics -How to analyse your audience -How to configure branded content ads -Connecting with other Influencers -How to contact brands YouTube -How to create YouTube account -What do you need to become a YouTuber -How to define the theme of the channel -How to set your goals -The importance of consistency -How to analyse your data -Metrics to be reviewed in your channel -Strategies to contact and work with different brands -How to prepare the ground for a great conquest TikTok -The fundamentals of TikTok -How does TikTok work -Getting a Pro account -What videos you should create for best conversions -Developing different strategies for TikTok -How to get more followers -Tips for better use of hashtags -Followers hack -How to analyse your data -When and how to contact brands Who this course is for: Social media enthusiasts Bloggers Travellers Young Students [Hidden Content] [hide][Hidden Content]]
  10. Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices. [Hidden Content] [hide][Hidden Content]]
  11. 50 Projects in 50 Days - HTML/CSS and JavaScript This is the main repository for all of the projects in the course. [Hidden Content]
  12. Windows For Windows, IPBan is supported on Windows Server 2008 or equivalent or newer. Windows XP and Server 2003 are NOT supported. Extract the IPBan.zip (inside is IPBanWindows.zip) file to a place on your computer. Right-click on all the extracted files and select properties. Make sure to select “unblock” if the option is available. You MUST make this change to the local security policy to ensure IP addresses show up: Change Local Security Policy -> Local Policies -> Audit Policy and turn failure logging on for “audit account logon events” and “audit logon events”. From an admin command prompt: auditpol /set /category:”Logon/Logoff” /success:enable /failure:enable For Windows Server 2008 or equivalent, you should disable NTLM logins and only allow NTLM2 logins. On Windows Server 2008, there is no way to get the ip address of NTLM logins. Use secpol -> local policies -> security options -> network security restrict NTLM incoming NTLM traffic -> deny all accounts. To run as a Windows service run “sc create IPBAN type= own start= auto binPath= c:\path\to\service\IPBan.exe DisplayName= IPBAN”. The service needs a file system, event viewer, and firewall access, so please run as SYSTEM to ensure permissions. To run as a console app, simply run IPBan.exe and watch console output. If you want to run and debug code in Visual Studio, make sure to run Visual Studio as administrator. Visual Studio 2017 or newer is required, along with .net core 2.1.1. The community edition is free. Linux IPBan is currently supported on Ubuntu 16.X – 18.X. For other Linux or MAC, you may need to adjust some of the instructions and add config file entries for the appropriate log files to parse. SSH into your server as root. If using another admin account name, substitute all root user instances with your account name. Changelog v1.5.9 Add process to run on unban option [hide][Hidden Content]]
  13. What you'll learn History of Android Android Ecosystem Android Architecture Android Software Stack Android Run time (ART) Analysis of APK file Structure in Android Studio Android's Security Model Application Sandboxing Permissions and Selinux Developer overview for Android apps Creating an Android virtual device Android Components Developing a basic android app Connect Emulator or real device and Kali Rooting Basics Reverse Engineering an APK file Information Gathering Repackaging and Resigning an APK Static Analysis with MobSF Root Detection Obfuscation Techniques OWASP Mobile Top 10 Vulnerabilities Android Pentesting on vulnerable mobile apps Requirements 4 GB (Gigabytes) of RAM or higher (8 GB recommended) 64-bit system processor is mandatory 10 GB or more disk space Enable virtualization technology on BIOS settings, such as “Intel-VTx” All items referenced in this course are Free A strong desire to understand hacker tools and techniques A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world Nothing else! It’s just you, your computer and your ambition to get started today At the end of the course you will learn; History of Android Android Ecosystem Android Architecture Android Software Stack Android Run time Analysis of APK file Structure in Android Studio Android's Security Model Application Sandboxing Permissions and Selinux. Developer overview for Android apps Create an Android virtual device Android Components Developing a basic android app Connect Emulator or real device and Kali Rooting basics Reverse Engineering an APK file Information Gathering, Repackaging and Resigning an APK Static Analysis with MobSF Root Detection and Obfuscation Techniques. OWASP Mobile Top 10 Vulnerabilities Android Pentesting on vulnerable mobile apps [Hidden Content] [hide][Hidden Content]]
  14. What you'll learn Basics of Web Security Background knowledge of HTTP, SSL and other basic topics Methods which hacker uses to exploit websites Requirements Basic knowledge of computer is required Description Welcome to the course on "Web Security and Web Hacking for Beginners". This course is designed for beginners who wants to start their journey in web security and web hacking. You will start with no hands on experience in web security and by end of this course you will have deeper understanding of web security. You will also be able to design new applications with security in mind, significantly lowering the risk and cost associated with deploying new applications. This course if for anyone who wants to Hunt down web, security professional, Developer, Ethical Hacker, Penetration Tester. The course has both practical and theory session. The practical session includes how you can start with the penetration testing of the websites. For that we use Kali Linux and DVWA as our environment. If you already have knowledge of basics of web security and basic attacks then I would recommend you to take our course on OWASP or advanced version of Web security course. Udemy gives 30 days money guarantee, so if you are not satisfied with the course then you will get full refund of your course. There are hundreds of courses out there, so why take this course? This course is basically designed by taking into account that you don't have idea about web security and you want to learn basic concept and then directly jump into action. Concepts like URL, HTTP, HTTPs etc. are explained to make student comfortable with the concept that we are going to use and then jump directly to action content like SQL injection, XSS, DDoS, etc. We want to make sure that you learn basics at the same time you don't miss action while learning basics. What if I didn't understood any part of the course? If you didn't understood any part of the course then directly write it to the instructor. They will make sure to explain you that part and at the same time if required then they will upload any more videos which can help to clear of the doubts. I need mentors on the web security, do instructor provide that? Anyone who takes this course can also get the mentorship access from the instructor which will help you to clear of your doubts about your career in security field or explore other dimensions. I have some additional question, not mentioned in the above question section. We love dogs and cats but certainly we don't bite. So feel free to ask any question you like even if you think that is the dumbest question you can think of. Who this course is for: Anyone wants to start career in web security Developers who wants to have understanding of web security Entrepreneurs who wants to save their online assets [Hidden Content] [hide][Hidden Content]]
  15. With My Social Network you can easily and simply create your own personal social network. With My Social Network you can publish posts, read the posts of friends, to have a personal conversation with your friends in real time, and more. My Social Network application is built in Android Studio. The server side is built on object oriented php with a MySQL database. Installation of the server part is done quickly in a few simple steps. [Hidden Content] [hide][Hidden Content]]
  16. [hide][Hidden Content]]
  17. PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement. PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Other notable features of PoshC2 include: Highly configurable payloads, including default beacon times, jitter, kill dates, user agents and more. A large number of payloads generated out-of-the-box which are frequently updated and maintained to bypass common Anti-Virus products. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. A modular format allowing users to create or edit C#, PowerShell or Python3 modules which can be run in-memory by the Implants. Notifications on receiving a successful Implant, such as via text message or Pushover. A comprehensive and maintained contextual help and an intelligent prompt with contextual auto-completion, history and suggestions. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic even when communicating over HTTP. Client/Server format allowing multiple team members to utilise a single C2 server. Extensive logging. Every action and response is timestamped and stored in a database with all relevant information such as user, host, implant number etc. In addition to this the C2 server output is directly logged to a separate file. Changelog v7.2 New Report template & style Updates to support Slack Notifications Add ability to chain SharpPBind implants to an arbitrary depth Fix Sharpsocks on Docker Misc minor fixes [hide][Hidden Content]]
  18. What you'll learn Test apps and websites online as freelancers from scratch. Know the different types of bugs they can find in websites and how they can diagnose these bugs. Requirements very good English reading,writing needed. No technical skills needed. Description The course is made for different people: 1- The new testers who want to understand the Utest platform and so other freelance hiring software websites. 2- Mothers who don't have time to go to work. 3- University students who want to work from home and save time to study. 4- Freelancers who need a side freelance job with 200-400$ income to encourage them to continue in their freelance field. 5- Anyone who wants to work from home. [Hidden Content] [hide][Hidden Content]]
  19. Token-Hunter Collect OSINT for GitLab groups and members and search the group and group members’ snippets, issues, and issue discussions for sensitive data that may be included in these assets. The information gathered is intended to compliment and inform the use of additional tools such as TruffleHog or GitRob, which search git commit history using a similar technique of regular expression matching. How the tool works Start by providing a group ID for a specific group on GitLab. You can find the group ID underneath the group name in the GitLab UI. Token-Hunter will use the GitLab group ID to find all associated projects for that group and, optionally, the groups members personal projects. Configure the tool to look for sensitive data in assets related to the projects it finds. Token-Hunter uses the same set of regular expressions as TruffleHog with a few additions for GitLab specific tokens. Token-Hunter depends on these easily configurable regular expressions for accuracy and effectiveness. Currently, the tool supports GitLab snippets, issues, and issue discussions with plans for future expansion to other assets. The tool is intended to be very configurable to allow for efficient discovery of sensitive data in the assets you’re specifically interested in. [hide][Hidden Content]]
  20. itsMe

    Windows 10 Tricks And Tips

    Overview: Windows 10 is packed with brilliant features and apps that aim to make your computing experience as compelling as possible. But while Windows 10 is absolutely accessible to newcomers and veterans alike, some of its more powerful features may not be immediately apparent. That’s where Windows 10 Tips, Tricks & Apps comes in. We’ll talk you through how to get the most out of Microsoft’s built-in apps, how to tweak the OS to fit your needs, how to solve issues and which of the thousands of apps available from the Windows Store are really worth your time. [hide][Hidden Content]]
  21. Connect your Twitch account and the plugin will automatically fill the name of the channel and the stream status (online/offline) of the livestream box. [Hidden Content] [hide][Hidden Content]]
  22. Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.6.6 Faster Updated: Less FP with bypass forbidden function Updated: Less errors in principal script Updated: Little modifications in report Fixed: Style and system bugs Added: Auto resize relative to window [hide][Hidden Content]]
  23. The tool is under development. What this tool will explore upon a successful build: Reverse Proxying Sites. Bypassing many limitations during 2FA phishing Capturing POST and JSON request on the fly Forcing Elements in Requests Javascript Injection Cookies Capturing even those from javascript YAML Configuration files. Idea borrowed from evilginx2 Allowing Proxies to be used for each individual upcoming connection Direct DOM element values capturing before form submission or any other event 2FA Bypassed Auto-Cert generation. [hide][Hidden Content]]
  24. Hello, I'm looking for an hacker or a dumper that got fresh and private dB for selling me mailist (leads). If you have French private database, please contact me on telegram : @labavette or PM
  25. Website analyzer and SEO audit tool Search engine optimization (SEO) or organic search marketing, refers to software designed to improve the ranking of websites in search engine results pages (SERP) without paying for placement. These products provide insights through features, such as keyword analysis and backlink tracking to identify the best strategies for improving search relevance. On-site SEO checker tool SEO Checker is an easy to use website crawler, able to crawl both small and very large websites efficiently, while allowing you to find broken links, analyze the results in real-time, gather on-page SEO data, distinguish internal and external links, check dofollow and nofollow links, analyze titles, META descriptions, headers and various tags. SEO Checker provides you full lists of sitemap, links, internal backlinks, H1 and H2 headers. If you check the "Show Options" feature, it will reveal methods that can further help you when you do a website check. You can modify "connection timeout", "response timeout", "browser agent", "ignore extensions" and "ignore URLs". [Hidden Content] [hide][Hidden Content]]