Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'army'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 9 results

  1. Introducing “Monster Tools” – the ultimate web application for all your digital needs! This innovative code offers a comprehensive suite of tools for everyday use, SEO optimization, Image Optimization, Developer Tools, Website Management Tools, and more. With Monster Tools, you can create your very own web application that streamlines your online operations, increases your visibility, and takes your business to the next level. [Hidden Content] [hide][Hidden Content]]
  2. Introducing “Monster Tools” – the ultimate web application for all your digital needs! This innovative code offers a comprehensive suite of tools for everyday use, SEO optimization, Image Optimization, Developer Tools, Website Management Tools, and more. With Monster Tools, you can create your very own web application that streamlines your online operations, increases your visibility, and takes your business to the next level. [Hidden Content] [hide][Hidden Content]] ### Changelog # All notable changes to this project will be documented in this file. ## [1.4.0] - 2023-03-29 ### Note # To implement tools on the homepage, we have to overwrite any previous changes made to the homepage content. We apologize in advance for any inconvenience this may cause. ### Added # Added new Google Vision Driver for OCR tools. # Added dark mode support for auth pages. (login, register and password reset) # Added new admin page to show deleted users. # Added new admin page to manage homepage supported tools. # The homepage tools now process results on same page. ### Fixed # Fixed issue on Categories edit throwing error messages. # Fixed tools edit page not updating other language contents. # Fixed "No hint path defined for [sitemap]" issue on Sitemap Generator. # Fixed admin transactions page. # fixed Admin menu not appearing on mobile devices. # Correction of Text to Binary tool conversion. # Footer Menu widget list layout display Bug fixes. # Favorite button for guest redirect to login page now. # Auth pages light version integration. # Article rewrite openAi logn text response issue fixes. # Fixed plan options box not changing properties values on update.
  3. Introducing “Monster Tools” – the ultimate web application for all your digital needs! This innovative code offers a comprehensive suite of tools for everyday use, SEO optimization, Image Optimization, Developer Tools, Website Management Tools, and more. With Monster Tools, you can create your very own web application that streamlines your online operations, increases your visibility, and takes your business to the next level. [Hidden Content] [hide][Hidden Content]]
  4. Introducing “Monster Tools” – the ultimate web application for all your digital needs! This innovative code offers a comprehensive suite of tools for everyday use, SEO optimization, Image Optimization, Developer Tools, Website Management Tools, and more. With Monster Tools, you can create your very own web application that streamlines your online operations, increases your visibility, and takes your business to the next level. [Hidden Content] [hide][Hidden Content]]
  5. proxify Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering, and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain name) into burp or any other proxy by simply setting the upstream proxy to proxify. Features Simple and modular code base making it easy to contribute. HTTP and SOCKS5 support for upstream proxy Native MITM support Full traffic dump (request/responses) Traffic Match / Filter with DSL language Traffic Match and Replace support Traffic replay in Burp Changelog v0.0.6 Fix for cert endpoint not working + Internal engine by @Mzack9999 in #82 [hide][Hidden Content]]
  6. CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve its functionality and allowing it to evade most endpoint protection/IDS/IPS solutions. CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques. Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfiguration, and simulate attack scenarios. CrackMapExec is developed by @byt3bl33d3r This repository contains the following repositories as submodules: Impacket Pywinrm Pywerview PowerSploit Invoke-Obfuscation Invoke-Vnc Mimikittenz NetRipper RandomPS-Scripts SessionGopher Mimipenguin Changelog v5.1.7dev 💫 Features 💫 Add module MachineAccountQuota.py to retrieves the MachineAccountQuota domain-level attribute related to the current user @p0dalirius Add module get-desc-users Get the description of each users and search for password in the description @nodauf Add module mssql_priv to enumerate and exploit MSSQL privileges @sokaRepo Add option --password-not-required to retrieve the user with the flag PASSWD_NOTREQD @nodauf Add custom port for WinRM Switch from gevent to asyncio Shares are now logged in the database and can be queried You can now press enter while a scan is being performed and CME will give you a completion percentage and the number of hosts remaining to scan Add better error message on LDAP protocol Add more options to LDAP option --groups option --users option --continue-on-success Add additional Info to LDAP Kerberoasting Account Name Password last set Last logon Member of Bump lsassy to latest version 2 Add new option --amsi-bypass to bypass AMSI with your own custom code Add module LAPS to retrieve all LAPS passwords Add IPv6 support Add improvment when testing null session for the output Remove thirdparty folder 🥳 🔧 Issues 🔧 Fix spelling mistakes Rename options EXT and DIR to EXCLUDE_EXTS EXCLUDE_DIR on spider_plus module Fix MSSQL protocol (command exec with powershell and enum) thanks @Dliv3 Fix module Wireless Fix issue with --pass-pol for Maximum password age Fix encoding issue with spider option [hide][Hidden Content]]
  7. Proxify Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering, and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain name) into burp or any other proxy by simply setting the upstream proxy to proxify. Features Simple and modular code base making it easy to contribute. HTTP and SOCKS5 support for upstream proxy Native MITM support Full traffic dump (request/responses) Traffic Match / Filter with DSL language Traffic Match and Replace support Traffic replay in Burp [hide][Hidden Content]]
  8. CRACKMAPEXEC CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve it’s functionality and allowing it to evade most endpoint protection/IDS/IPS solutions. CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques. Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfiguration, and simulate attack scenarios. CrackMapExec is developed by @byt3bl33d3r This repository contains the following repositories as submodules: Impacket Pywinrm Pywerview PowerSploit Invoke-Obfuscation Invoke-Vnc Mimikittenz NetRipper RandomPS-Scripts SessionGopher Mimipenguin Changelog v5.1.1dev 💫 Features 💫 Switched from Pipenv to Poetry for development and dependency management. Now has Windows binaries! [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.