Search the Community

Showing results for tags 'and'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 258 results

  1. [Hidden Content]
  2. [Hidden Content]
  3. [Hidden Content]
  4. dnSpy is a tool to reverse engineer .NET assemblies. It includes a decompiler, a debugger and an assembly editor (and more) and can be easily extended by writing your own extension. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies (eg. malware) without crashing. Features Assembly Editor Use C# or Visual Basic to edit any method, property and event Code editor has IntelliSense (code completion, signature help, quick info) Whole classes can be added to assemblies by adding C# and Visual Basic code Edit all metadata of types (classes), methods, properties, events, fields Add, remove, rename any type (class), method, property, event, field Edit, add, remove .NET resources and save them to disk The IL editor allows editing method bodies at the IL level: IL instructions, locals, exception handlers Debugger Debug any .NET assembly, no source code required Set breakpoints in any assembly, including framework assemblies, assemblies in the GAC and assemblies existing only in memory Memory window Output window Attach to process Locals window raw contents of locals (eg. decrypted byte arrays) can be saved to disk Call Stack window Threads window Modules window Modules (eg. decrypted in-memory modules) can be saved to disk Exception Settings Can debug dynamic assemblies Debugging CoreCLR assemblies is supported Decompile to C#, Visual Basic, IL Themes: blue, dark, light (and high contrast) Supports smaller screens (eg. laptops) Line height can be optimized for smaller screens Blank and non-alphanumeric lines are 75% the normal height No extra spacing between lines (saves 1 vertical pixel per line) Menu and toolbar share the same line Full screen mode (Shift+Alt+Enter) saves some vertical pixels High DPI support and per-monitor DPI-aware Translated to several languages Highly extensible Write your own extensions and add your own features All major features are already extensions (assembly editor, debugger, decompiler) Multiple tabs and tab groups Your screen is too big? Don’t cut it in half, add another vertical tab group and read two classes at once! The tabs and positions within the text editors are saved when you close dnSpy and restored at startup so you can continue where you left off Search assemblies Search for types (classes), methods, properties, events, fields Search for strings or numbers in code Assembly analyzer Find usages of types (classes), methods, properties, events, fields BAML to XAML decompiler Fast Highlighted references, keywords References under the caret are highlighted to make it easier to see all uses of the reference in the code Tab, Shift+Tab, Ctrl+Shift+Up, Ctrl+Shift+Down moves to the next or previous reference Alt+Down and Alt+Up moves to the next or previous definition (type (class), method, property, event, field) Structure visualizer Vertical guide lines shown between start and end of code blocks Different colors are used for different blocks, eg. loop, conditional, method, etc dnlib is used to read and write assemblies so it can handle obfuscated code (eg. malware) without crashing Go to commands: Entry point Assembly static initialization method (<Module>..cctor) Any metadata token Any metadata row Syntax highlighted tooltips with XML doc comments when hovering over a type (class), method, property, event, field Methods, properties and events are decompiled in source code order or a custom user-defined order Source code order means that related methods are usually next to each other, just like the programmer wanted Background images can be shown in the text editor Export to project decompiles all selected assemblies and creates a Visual Studio solution Multiple assemblies can be exported at the same time Creates a Visual Studio solution (supports VS2005 – VS-latest) and project files Supports WinForms and WPF classes (creates a code-behind .cs/.vb file and a WinForms .resx / WPF .xaml file) Converts .NET resources to .resx files Open from GAC Command line decompiler Supports Windows, Linux and Mac Syntax highlights output to the screen Scripting with C# REPL Call public dnSpy methods from scripts Script the debugger and other extensions Hex editor Method tokens and addresses are shown in comments and can be clicked to go to the raw metadata or IL bytes Metadata editor Collapse Assembly Explorer nodes command to quickly collapse unused nodes And more… [HIDE][Hidden Content]]
  5. How To Write Your Own C# Checkers And Find Login Apis [Hidden Content]
  6. [Hidden Content]
  7. Check if Windows 10 and if administrator privileges Can help for Option BypasUAC or (if Not Windows10 use vbs ...) [Hidden Content]
  8. XCat XCat is a command-line tool to exploit and investigate blind XPath injection vulnerabilities. It supports a large number of features: Auto-selects injections (run xcat injections for a list) Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval Built-in out-of-bound HTTP server Automates XXE attacks Can use OOB HTTP requests to drastically speed up retrieval Custom request headers and body Built-in REPL shell, supporting: Reading arbitrary files Reading environment variables Listing directories Uploading/downloading files (soon TM) [HIDE][Hidden Content]]
  9. [Hidden Content]
  10. [Hidden Content]
  11. Laravel 5.4 complete tutorial for Beginners and Intermediate An easy way to learn one of the widely used PHP Laravel 5.4. This is a tutorial series on Laravel 5.4 complete tutorial for Beginners and Intermediate. This course is designed to help the students to learn and understand some of the basic and advanced concepts that are used to design and develop a professional web application using Laravel 5.4. This course will boost the confidence of students and they will be confident enough to take the new challenges and perform better in their career. After watching this complete course students will get the immense confidence and knowledge to develop small and medium scale web application and web portals. [Hidden Content]
  12. [Hidden Content]
  13. [Hidden Content]
  14. Termux Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager. [Hidden Content] Secure. Access remote servers using the ssh client from OpenSSH. Termux combines standard packages with accurate terminal emulation in a beautiful open source solution. Feature packed. Take your pick between Bash, fish or Zsh and nano, Emacs or Vim. Grep through your SMS inbox. Access API endpoints with curl and use rsync to store backups of your contact list on a remote server. Customizable. Install what you want through the APT package management system known from Debian and Ubuntu GNU/Linux. Why not start with installing Git and syncing your dotfiles? Explorable. Have you ever sat on a bus and wondered exactly which arguments tar accepts? Packages available in Termux are the same as those on Mac and Linux - install man pages on your phone and read them in one session while experimenting with them in another. With batteries included. Can you imagine a more powerful yet elegant pocket calculator than a readline-powered Python console? Up-to-date versions of Perl, Python, Ruby and Node.js are all available. Ready to scale up. Connect a Bluetooth keyboard and hook up your device to an external display if you need to - Termux supports keyboard shortcuts and has full mouse support. Tinkerable. Develop by compiling C files with Clang and build your own projects with CMake and pkg-config. Both GDB and strace are available if you get stuck and need to debug. [Hidden Content]
  15. TBomb v1.7b An open-source SMS/call bomber for Linux And Termux. Note: The script requires working network connection to work. No balance will be deducted for using this script to send SMS/calls. While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum performance. Don't put spaces in between phone number (Ex- 99999 99999) Make sure you are using the latest version of TBomb Make sure you are using Python v3. Here's how you can check it. Type this command in your terminal. $ python -V If output looks like Python 3 - Congrats, Python 3 is installed properly. Do not use this to harm others. This script is only for educational purposes or to prank. None of the developers/contributors are responsible for the misuse of TBomb. Features: Lots of integrated SMS/call APIs Unlimited and super-fast bombing International bombing available Call bombing Frequent updates Automatic updating mechanism Easy to use and embed in code Usage: Run these commands to run TBomb [HIDE][Hidden Content]]
  16. Enumdb is a brute force and post exploitation tool for MySQL and MSSQL databases. When provided a list of usernames and/or passwords, it will cycle through each targeted host looking for valid credentials. By default, enumdb will use newly discovered credentials to search for sensitive information in the host’s databases via keyword searches on the table or column names. This information can then be extracted and reported to a .csv or .xlsx output file. See the Usage and All Options sections for more detailed usage and examples. The latest version, enumdb v2.0, has been adapted for larger environments: Keyword searches can now be conducted on table or column names to identify sensitive information. These terms can be customized at the top of enumdb.py. Threading has been added to expedite brute forcing and enumeration on larger networks. Enumdb no longer generates reports by default. Reporting (csv/xlsx) must be defined in the command line arguments. When extracting data for reports, users can now define a limit on the number of rows selected. The default value of 100, can be modified at the top of enumdb.py. Enumdb’s output formatting has been modified to provide more concise feedback when enumerating large amounts of data. Changelog v2.1 Reformat code structure [HIDE][Hidden Content]]
  17. [Hidden Content]
  18. dEEpEst

    Bin Hooq And Canva 

    [Hidden Content]
  19. [Hidden Content]