Search the Community

Showing results for tags 'and'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 214 results

  1. dEEpEst

    INE CCNA PPP and PPoE

    INE CCNA PPP and PPoE [Hidden Content]
  2. Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting each and every shell manually like all the other tools do, VulnX analyses the target website checking the presence of a vulnerabilitie if so the shell will be Injected.searching urls with dorks Tool. Features Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilities Auto shell injector Exploit dork searcher Ports Scan High Level Dns-Servers Dump Input multiple target to scan. Dorks Listing by Name& by ExploitName. Export multiple target from Dorks into a logfile. v1.9 Add Vulnx−Mode interactive mode Add Command Line Interface Class cli Add Dork Functionnality to Vulnx−Mode Fix DNSDUMP Functionnality [HIDE][Hidden Content]]
  3. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android Download: [Hidden Content] Pass: [Hidden Content]
  4. 3 downloads

    [Private] 1500+ Hacking And Cracking Tricks Methods ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  5. View File [PRIV8 FREE] 1500+ Hacking And Cracking Tricks Methods [Private] 1500+ Hacking And Cracking Tricks Methods ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 11/11/19 Category Libro Online Password ********  
  6. A simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed up his job (CPU intensive). Supported permutations: Capital Upper 1337 Append Prepend Additional functions: Test/Dry run Multiprocessing Multicore Possibility to adjust cores/processes number manually. Each generated password doesnt contain same word twice. [HIDE][Hidden Content]]
  7. Embed and hide any file in HTML Author: Arno0x0x What this tool does is taking a file (any type of file), encrypt it, and embed it into an HTML file as ressource, along with an automatic download routine simulating a user clicking on the embedded ressource. Then, when the user browses the HTML file, the embedded file is decrypted on the fly, saved in a temporary folder, and the file is then presented to the user as if it was being downloaded from the remote site. Depending on the user's browser and the file type presented, the file can be automatically opened by the browser. Point the target's browser to the html file and let the magic happen: Download: [HIDE][Hidden Content]]
  8. [HIDE]19.5k PAID COMBO | Netflix And More [%100 Hits] [Hidden Content]]
  9. Descripción In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons. [Hidden Content] [HIDE][Hidden Content]]
  10. dEEpEst

    Learn HTML5 and CSS3

    HTML and CSS are the basic programming languages for web development and design. They are beneficial to learn for developers, marketers, and people in many other disciplines. Learning HTML can be used for situations like formatting a blog or email, working with a CMS, embedding external content on your site, and creating usable content. Cascading Style Sheets or CSS are an important way to control how your Web pages look. CSS can control the fonts, text, colors, backgrounds, margins, and layout. But it can be very difficult to learn CSS, and some people would rather not learn it. By learning CSS you can modify pre-built templates so that they have your colors and styles. Thus you'll have a customized website without a lot of effort. Knowing how to modify the CSS will save you money when you find small problems that you can fix yourself. And as you practice, you'll be able to fix bigger and bigger problems. CSS gives you the opportunity to create sites that look very different from page to page, without a lot of extensive coding. This course going to cover: HTML Basic Tags. CSS - Selectors. CSS - Units & Color codes. CSS - Margin, Padding and Border. CSS - Display, Box-sizing & Positioning. CSS - Font Styling. CSS - Flexbox. CSS - Grid. CSS - Background Properties. CSS - Gradients. CSS - Transform, Transitions and Animations. Bonus - SASS. [Hidden Content]
  11. [Hidden Content]
  12. [HIDE][Hidden Content]]
  13. WeDefend - Check Proccess and Network Activity to against Remote Access Trojan WeDefend is application based on java programming language with several features as check proccess activity, network activity, file encryption, disk hider and folder lock to against and also protect user data from Remote Access Trojan malware in Windows operating system. Video: [Hidden Content] Download: [Hidden Content]
  14. WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. It is open for everyone and if you want to contribute or need help, take a look at the Wiki. Telemetry and data collection To capture and analyze network traffic for the telemetry option, QEMU virtual machines are used on the server virtualization management platform Proxmox VE based on : Windows 10 Pro 64bits with automatic updates enabled. Windows 8.1 Pro 64bits with automatic updates enabled. Windows 7 SP1 Pro 64bits with automatic updates enabled. Traffic dumps are clean every day and compared with the current rules to add/remove some hosts or firewall rules. Changelog v4.24.1 Update hosts for extra rules Update IPs for extra, spy and update rules [Hidden Content]
  15. Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to: Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing Audit VoIP network security Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX Identify the many vulnerabilities in any VoIP network Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense. [HIDE][Hidden Content]]
  16. Is a project that will help you without tedious search and registration to download Windows operating systems, Office applications, language packs, and virtual machines directly from Microsoft servers. Download [hide][Hidden Content]]
  17. About Pentest Tools Framework INFO: Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. Modules EXPLOIT ========= Exploit Name Rank Description -------------- ------- ------------- exploit/inject_html normal Inject Html code in all visited webpage exploit/robots normal robots.txt Detected exploit/jenkins_script_console good Jenkins-CI Script-Console Java Execution exploit/php_thumb_shell_upload good php shell uploads exploit/cpanel_bruteforce normal cpanel bruteforce exploit/joomla_com_hdflayer manual joomla exploit hdflayer exploit/wp_symposium_shell_upload good symposium shell upload exploit/joomla0day_com_myngallery good exploits com myngallery exploit/jm_auto_change_pswd normal vulnerability exploit/android_remote_access expert Remote Acces Administrator (RAT) exploit/power_dos manual Denial Of Service exploit/tp_link_dos normal TP_LINK DOS, 150M Wireless Lite N Router, Model No. TL-WR740N exploit/joomla_com_foxcontact high joomla foxcontact exploit/joomla_simple_shell high joomla simple shell exploit/joomla_comfields_sqli_rce high Joomla Component Fields SQLi Remote Code Execution exploit/inject_javascript normal Inject Javascript code in all visited webpage exploit/dns_bruteforce high Dns Bruteforce with nmap exploit/dos_attack normal hping3 dos attack exploit/shakescreen high Shaking Web Browser content exploit/bypass_waf normal bypass WAf exploit/enumeration high simple enumeration exploit/restrict_anonymous normal obtain credentials exploit/vbulletin high vBulletin v5.x 0day pre-auth RCE exploit exploit/openssl_heartbleed high dump openssl_heartbleed exploit/samba good Samba EXploits exploit/webview_addjavascriptinterface good Android Browser and WebView addJavascriptInterface Code Execution SCANNERS ======== Scanner Name Rank Description -------------- ------- ------------- scanner/ssl_scanning good SSL Vulnerability Scanning scanner/nmap_scanner normal port scanners nmap scanner/smb_scanning good scan vulnerable SMB server scanner/joomla_vulnerability_scanners high vulnerability scanner/joomla_scanners_v.2 good joomla scaning scanner/joomla_scanners_v3 normal joomla scaning scanner/jomscan_v4 good scan joomla scanner/joomla_sqli_scanners high vulnerability scanners scanner/lfi_scanners good lfi bug scan scanner/port_scanners manual port scan scanner/dir_search high directory webscan scanner/wordpress_user_scan good get wordpress username scanner/cms_war high FULL SCAN ALL WEBSITES scanner/usr_pro_wordpress_auto_find good find user pro vulnerability scanner/nmap_vuln normal vulnerability Scanner scanner/xxs_scaner normal Detected vulnerability xss scanner/spaghetti high Web Application Security Scanner scanner/dnslookup normal dnslookup scan scanner/domain_map normal scanner domain map scanner/dns_report normal dns report scanner/find_shared_dns normal find shared dns scanner/dns_propagation low dns propagation scanner/find_records normal find records scanner/cloud_flare normal cloud flare scanner/extract_links normal links extract scanner/web_robot normal web robots scanner scanner/enumeration normal http-enumeration [Hidden Content]
  18. Intensio-Obfuscator v1.0.6 What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with an always differents values Requirements Python >= 3.5 requirements.txt Steps usage Put your source code in directory dedicated at your project (directory source will scanned and obfuscated recursively) Create empty directory for output code obfuscated Read all the practices of coding that be ought respect absolutely required code format Modify your source code if it's necessary after have reading required code format Read malfunctions to be informed Obfuscate your code ! commands explained in README [HIDE][Hidden Content]]
  19. Make Money: Follow your passion and earn by 35 proven ways". If you have taken enough of working for and living on a single stream of income and want to follow your long forgotten passion and make money then this course is for you. In this course you are going to learn 35 methods by which you can make money online by following your passion all the methods which you will learn in this course can be applied from the comfort of your home. Yes, you read it right!! In this course you will learn everything you need to make money online by method aligned with your passion, you will be provided with full details of each and every method with a step-by-step process. You will be explained how these methods work and what are the skills required, for whom these methods are suitable for and you will also be provided with some tips. EXTRA TIP You may also have some unanswered questions during the course for this there is a comment section under each video where you can ask your questions, to get the most of the this course I will suggest you to read all the text which is provided and be ready with a pen and paper to write all the ideas, insights and key points which you will get to know about during the course, you are going to learn a lot, let's begin. NOTE This course is a sample of the original course. If you like this course and feel this valuable then please give it a review. Your review is really valuable and you will be provided with the full course. This course is a try so that everyone can make money by the ways they love. If this gets a success then the original course will be launched for very less cost. This course is 1 course that has 35 course in it. FOLLOW YOUR PASSION AND MAKE MONEY Enroll Now Make Some Extra Cash [Hidden Content]
  20. In this course you will learn all of python you need for being a good python developer. you will begin with learning that how you can have your best editor to work with. After that in first section you will learn all the basics of python like data-types, loops, conditionals, operators, file-handling, time-date, libraries and a lot. In addition you will also apply all you have learn in section-1 on practical working programs and games. Second section is about data-visualisation in which you will learn what is data science and how things work in that, and you will learn libraries like Matplotlib, seaborn, pandas, poorly and cufflinks for data visualisation and pandas, numpy for data analysis. you will also learn geo-plotting for visualising globe data. In addition you will built a large number of beautyfull plots and even 3-D plots to practice your skills. Then we will move to the project part of section-2 in which you will learn to create automatic plotter, base maps and big-data analysis project that actually analyse more than 60 million+ data. Third section is all about graphical and user interface. In which you will learn that how the desktop applications are made, you will learn about tkinter to built windows applications, then you will learn about database that how you can store your program data and where to store. After that we will move to a very interesting concept turtle graphics where you will learn how to make moving graphical things.Then this section is full of projects with actually working games and database applications. also project that will make you learn how to use keys to move your objects in games and in applications. This is not the end of the course time to time new data will be added to it. [Hidden Content]
  21. Below is a list of offshore and bulletproof hosting providers 2019 [Hidden Content]
  22. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android [Hidden Content]