Search the Community

Showing results for tags 'and'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 138 results

  1. So you want to learn how to create apps for iOS? Well you are at the right place! We have built an impressive course that teaches you all fundamentals so you can build your own apps for iOS or apply for jobs! The course is structured so that it begins slowly, giving you the basic stuff that you need to move forward, and after each video you will understand more and more about developing apps for iOS and what are best practices. We take practical approach in teaching, so we are going to build real world apps that you can use for your portfolio or upload to the app store. You will also benefit from my super fast response if you have any issues that you are stuck with(I check Udemy forums every day if someone posts a question). Oh and I have created a FREE live chat room where all the students gather to help each other out so you will have help available to you 24/7. So what are you going to learn from this course: Basic And Advanced Features Of Swift Working With Table Views Auto Layout Object Oriented Programming In Depth Model View Controller(MVC) Concept Table Views Advanced Features Of Table Views Animations Playing Audio Maps And Geolocation Saving Data With NSCoding Saving Data With Core Data Core Data In Depth Such As Advanced Fetching, Sorting, NSBatchUpdateRequest, NSFetchedResultsController And Much More Working With JSON And APIs Downloading Images From The Web Saving Images In Core Data Working With Firebase And Much Much More Using what you obtain in this course, you will be equipped with more than enough knowledge in order to continue improving yourself in the field of app development and you can also use the same skills to create Mac OS Apps. If You ever had an idea for an awesome app, then enroll in this course and learn the tools that you need to develop Your next number ONE App!!! What is Your Risk By Taking This Course? Nothing!! If you are not satisfied with the course, I promise I will give you a full refund of your money NO Questions asked!! Enroll Now!! You Will Not Be Disappointed!! Who is this course for? Absolute Beginners In Coding Absolute Beginners In iOS Development Experienced iOS Developers Looking To Refresh Knowledge And Gain New Skills [Hidden Content]
  2. Hi peeps long time hope everyones well :) recently bought a mac and got into rooting again when i get 5 here and there lol Problem ive only got the knowlage on linux systems now on recon exploit privilidge root and then drop kit and clean ( My Kogs are rusty in command prompt cmd not terminal lol. Ive all ready got a scanner made in python and a exploit which successfully gets my foot through door into sys32 folder. Now im lost i know admin i go for not root with a local priv sploit but what rootkits are there what about logs ? whats out there for WINB0Xs ? x86 preferably ? Thanks in advance need
  3. Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks. The author is Adrian Vollmer (SySS GmbH). Disclaimer Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. [HIDE][Hidden Content]]
  4. Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan and on repeated scans. On repeated scan delta reporting ensures that findings only need to be judged when they first appear in the scan results or when their output changes. Seccubus 2.x is the only actively developed and maintained branch and all support for Seccubus V1 has officially been dropped. Seccubus V2 works with the following scanners: Nessus OpenVAS Skipfish Medusa (local and remote) Nikto (local and remote) NMap (local and remote) OWASP-ZAP (local and remote) SSLyze Medusa Qualys SSL labs testssl.sh (local and remote) [Hidden Content]
  5. Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment without even needing PowerShell for it's execution. In order to avoid the latest detection techniques (AMSI), most of the components were initially written on C#. Salsa Tools was publicly released by Luis Vacas during his Talk “Inmersión en la explotación tiene rima” which took place during h-c0n in 9th February 2019. [HIDE][Hidden Content]]
  6. FUD Win32 payload generator and listener Legal disclaimer: Usage of GetWin for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program Features FUD : Fully Undetectable No Need configure port forwarding, or install others programs, using only ssh and serveo.net. [HIDE][Hidden Content]]
  7. EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own. Download: [HIDE]. [Hidden Content]]
  8. [Hidden Content]
  9. Takes a python source code and transform it into an obfuscated python code, replace name of variables - classes - functions to random chars and defined length, removes comments, line breaks and add to each line a random script with an always differents values. Requirement Python >= 3.5 Files supported Files written in python 2.x and 3.x [HIDE][Hidden Content]]
  10. Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords. Supported Files RAR Files Legacy ZIP Files PDF Files Linux Shadow Files (zydra can find all the user’s password in the linux shadow file one after the other) [HIDE][Hidden Content]]
  11. Level23HackTool

    Visa And MasterCard x3

    [Hidden Content]
  12. web service and api attack examples and demonstration. [HIDE][Hidden Content]]
  13. Some of the true craftsmanship in the world we take for granted. One of these things is the common tools on Linux, like ps and ls. Even though the commands might be perceived as simple, there is more to it when looking under the hood. This is where ELF or the Executable and Linkable Format comes in. A file format that used a lot, yet truly understood by only a few. Let’s get this understanding with this introduction tutorial! [HIDE][Hidden Content]]
  14. CMS Detection And Exploitation Suite - Scan WordPress, Joomla, Drupal And Over 170 Other CMSs What is a CMS? A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples are: WordPress, Joomla, Drupal etc. Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version detection Backup files finder Admin page finder Core vulnerability detection Directory listing check Config leak detection Various other checks [HIDE][Hidden Content]]
  15. Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting shell and checking it works like all the other tools do, vulnx analyses the response with and recieve if shell success uploaded or no. vulnx is searching for urls with dorks. [HIDE][Hidden Content]] Features Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilites Auto shell injector Exploit dork searcher Exploits Joomla Com Jce Com Jwallpapers Com Jdownloads Com Weblinks Com Fabrik Com Jdownloads Index Com Foxcontact Com Blog Com Users Com Ads Manager Com Sexycontactform Com Media Mod_simplefileupload Com Facileforms Wordpress Simple Ads Manager InBoundio Marketing WPshop eCommerce Synoptic Showbiz Pro Job Manager Formcraft PowerZoom Download Manager CherryFramework Catpro Blaze SlideShow Wysija-Newsletters Drupal Add Admin Drupal BruteForcer Drupal Geddon2 PrestaShop attributewizardpro columnadverts soopamobile pk_flexmenu pk_vertflexmenu nvn_export_orders megamenu tdpsthemeoptionpanel psmodthemeoptionpanel masseditproduct blocktestimonial soopabanners Vtermslideshow simpleslideshow productpageadverts homepageadvertise homepageadvertise2 jro_homepageadvertise advancedslider cartabandonmentpro cartabandonmentproOld videostab wg24themeadministration fieldvmegamenu wdoptionpanel Opencart Opencart BruteForce
  16. jwt_tool.py is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the validity of a token Testing for the RS/HS256 public key mismatch vulnerability Testing for the alg=None signature-bypass vulnerability Testing the validity of a secret/key/key file Identifying weak keys via a High-speed Dictionary Attack Forging new token header and payload values and creating a new signature with the key or via another attack method [HIDE][Hidden Content]]
  17. [Hidden Content]
  18. [HIDE][Hidden Content]]
  19. Combos type: Mail/Pass Proxy: HQ/ Sock4 (Best) "More than 300 CPM" Recommended bots: 150-200 Custom = Without points (Free) [HIDE][Hidden Content]]
  20. Price : $194 FREE CUPON Course Language : English [HIDE][Hidden Content]] This course will teach you how hackers create malware and trojans. You will learn how to install the tools that hackers use to create malware. You will discover how to use additional addon programs that hackers will use to create malware. This course will take you on a journey of learning what malware is, how to create malware, how to upload malware to a server, and how a victim will install this malware on their machine and how you can get control over a victim's computer. This course is for educational purposes only and to show you how hackers use freely available tools to create nasty malware that is very difficult for the average user to detect. Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.