Search the Community

Showing results for tags 'black'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 25 results

  1. Dark Fantasy v2.0.1 – Black Hat Hacking Tool Tools Included: ●Port Scanner: To know the open ports of a site. ●DDOS: To take down small websites with HTTP FLOOD. ●Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities) ●FTP Password Cracker: To hack file transferring of servers. ●Web Spider: To get all hidden urls for web application hacking. ●Email Scraper: To get all emails related to a webpage. ●IMDB Rating: Easy way to access the movie database. Use In VM Or RDP, Not Responsible For Anything Happens! Download Link: [Hidden Content]
  2. Introduction WPScan is a free and automated black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites. You can use it to remotely scan WordPress installations, to find vulnerabilities within the core version, plugins, and themes. It’s maintained by the WPScan Team. [hide][Hidden Content]]
  3. Black Hat Approach to Hacking Learn how a hacker hacks into the system and learn how to secure them from getting hacked. The Black Hat Approach to Hacking is a Computer skilled professional course where you learn all the basics of ethical hacking and countermeasures respectively. Learn the fundamentals of Ethical Hacking by enrolling in the Black Hat Approach to Hacking course. It helps you fully comprehend the technique by touching upon each and every concept in a detailed manner through the comprehensive modules designed by industry experts. By mastering the materials provided, you will gain the confidence to pursue the field on your own. Enroll in this course and get your Ethical Hacking certificate to gain the profound capabilities and skills needed to make your mark in the real-world. This course is for you if: You are a beginner wanting to learn about Ethical Hacking. You are an IT professional aspiring to understand Cyber Crimes. You are a web application penetration tester. You are an entrepreneur who wants to master information security. Source: [Hidden Content] Discount 100% here: [Hidden Content]
  4. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  5. Introduction WPScan is a free and automated black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites. You can use it to remotely scan WordPress installations, to find vulnerabilities within the core version, plugins, and themes. It’s maintained by the WPScan Team. WPScan is a black box WordPress vulnerability scanner. Changelog v3.7.6 Status code from responses are now displayed as interesting entries for KnownLocation finders Code updated to be compatible with ruby 2.7+ [HIDE][Hidden Content]]
  6. itsMe

    Black Leecher v1.3B

    Maj 1.3B : - Fix loading error Maj 1.3 : - Bug fix of "Text remover" in the combo manager - Modification of the "NordVPN" tab transformed in "Checkers" - Added the Spotify checker in the "Checkers" tab - Added the Hulu checker in the "Checkers" tab - Credit card checker temporarily down - YT logo & Web bottom right - Repair BIN CHECKER [HIDE][Hidden Content]]
  7. WPScan is a black box WordPress vulnerability scanner. Changelog v3.7.4 Fixed Incorrect wp-content detected from links in homepage – Ref #1412 Fixed exception raised by old version of activesupport in some cases – Ref #1419 WPScan can now run on Windows, thanks @Reelix – Ref wpscanteam/CMSScanner#114 Adds detection of WP, Plugins, Themes, Main Themes and their versions from 404 [HIDE][Hidden Content]]
  8. dEEpEst

    Black Leecher v1.1

    Features : 1. Proxy Checker & Graber 2. VCC Generator 3. Discord Token Graber 4.Combo Tools Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. Black Vision Command line Remote Access tool targeting Windows Systems. Download Maxmind GeoIP2 Database from here ; LINK Extract the file under blackvision/ How to use Install required modules pip3 install -r requirements.txt Run server git clone [Hidden Content] cd blackvision python3 main.py Generate Agent cd blackvision python3 generate.py Change Host/Port Open settings.ini. And change host, port. Commands Command Purpose transfer Transfer a NON Binary file. bsendfile Transfer a Binary File. kill Kill the connection info View Information of client. msgbox Send Messageboxes. exec Execute a Command on the remote Machine(s). exec-file Execute a file on the remote Machine(s). wanip View WAN IP of Remote Machine(s). hostname View Hostname of Remote Machine(s). username View Username of Remote Machine(s). monitoroff Turn of monitor of Remote Machine(s). monitoron Turn monitor back on. cdopen Eject CDROM of Remote Machine(s). cdclose Close CDROM of Remote Machine(s). playaudio Play Audio stream on Remote Machine(s). send Send commands to 1 client. (NO broadcast) keydump DUMP Keystroke buffer (Not added yet) Termux Compatibilty This app is compatible with Termux. Run it the same way you run it in Terminal. TODO Rewrite Agent in C. Fix sending file to single client. (Fixed) Fix multiple clients information saving. (Fixed) Add keylogging. Fix that args[3] does not get sent. (Fixed) Fix Broken connection problems. Video Example: [Hidden Content] Download: [Hidden Content]
  10. WPScan is a black box WordPress vulnerability scanner. Changelog v3.6.3 Fixed unhandled error when performing password attack against wp-login.php and a 302 response only contained one cookie – Ref #1378 [HIDE][Hidden Content]]
  11. itsMe

    Black Leecher v1.0.6B

    PROXY CHECKER & GRABER - VCC GENERATOR - DISCORD TOKEN GRABER - COMBO - proxy grabber and proxy checker - generate a mail/pas user/pass combo etc - CC grabber and Checker of CC with an integrated bin list ( ONLY FOR GET PREMIUM SHIT, NO FUCKING CARDING IT WILL NOT WORK - Token Discord - and a decrypter of MD5 [HIDE][Hidden Content]]
  12. itsMe

    BlackWorm v6.0 Black Ninja

    Software Name: Black Worm Version: 6.0 [ Black Ninja ] Software Job: Create a spreading worm with a GUI to control it dotNET Framework: 4.0 Server, 2.0 Client Source code author before developing: njQ8 [ jnRat ] Developer: Black.Hacker Credits: in the About Form What's New? 1. Full Data Transfer Encryption using Base64 2. Modified Icon Manager 3. Modified Plugin Manager 4. Modified Admin Checker 5. Modified Plugin Invoking 6. Modified Custom Plugin Invoking 7. DynuDNS Updater 8. NO-IP Automatic Updater 9. New About Page 10. Stable WatchDog to look after your client 11. Add to SchTask 12. Hard Install [ Stealth Mode ] 13. FileZilla Stealer 14. Clean Password Stealer [ Fixes ] 15. CPU,FireWall,Client Privileges,MUTEX Information 16. File Binder 17. Added More than 100 New Custom Icons 18. Modified Desktop Infection 19. New Port Settings 20. New MUTEX Format (bWorm[xxxxxx-12345]) 21. Listview Style 22. Remove Empty Subs and Functions 23. Process Manager With Custom Colors 24. Command Shell 25. Remote Powershell 26. Remote Desktop 27. Keylogger Manager 28. RSA Encryption With 4096bit Encryption Key for the Host and Port 29. Stable File Manager With a Downloading Large Files and Arabic Names Support 30. Critical Process 31. Updating Password Plugin 32. Added Product Serial Stealer 33. Service Manager with Full-Service Controller 34. Startup Manager 35. Victim Notification with XtremeRAT Sound 36. Simple IP Tracker 37. Infect ZIP & RAR Files [ PoC ] [ UnTested ] 38. Clients Groups [ Single and Multi-Manager ] 39. Upgrade Software DotNET Framework From 2.0 to 4.0 34. Small GUI Changes 41. Small Fixes to the Socket to be more stable 42. Multi Transfer 43. Bug Fixes To download any large files from the Target Device you need to Foreword The Port 6060 BlackWorm v6.0 Black Ninja + Source Code [Hidden Content] Server.exe
  13. WPScan is a black box WordPress vulnerability scanner. Changelog v3.5.5 Secunia Reference URL updated (via CMSScanner 0.5.3) Fixes an issue with the Password Attack via XMLRPC, where the Interface could be found as active when it was disabled – #1365 [HIDE][Hidden Content]]
  14. dEEpEst

    Black Window 10 v2

    Black Window 10 v2 Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and it offers the hacking part with a Cerberus Linux system! You can run both and it just works! Any update for Cerberus Linux will be available from apt update && apt upgrade for the windows user and Linux users! Tools Preinstalled Windows : Armitage Metasploit Fuzzbunch Dandensprits Ip hiders Wifi hacking Crackers Cypters and Binders Dork Scanners Dos+DDoser++Flooders Forensic Tools over 100 new KeyLoggers updated Misc. Web Tools over 50 new SQL Injection tools updated over 50 new Network Tools updated over 100 RAT’ s updated SMS & Email Bombers VPNs & Security Admin Page-Login Page Scanners Proxy Grabbers Resolvers Scripts & Source Codes Shells Vulnerable Scanners Worms, Malware, & Virus Makers Entire Elcomsoft Screenshot Preview : Linux: All tools from Cerberus os! 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6 EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client’s side to send an email to other users EPICHERO 0-day exploit (RCE) for Avaya Call Server ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003 ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010) ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010) ETERNALCHAMPION is a SMBv1 exploit ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003 ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067) ETRE is an exploit for IMail 8.10 to 8.22 ETCETERABLUE is an exploit for IMail 7.04 to 8.05 FUZZBUNCH is an exploit framework, similar to MetaSploit ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors EXPIREDPAYCHECK IIS6 exploit EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release EASYFUN WordClient / IIS6.0 exploit ESSAYKEYNOTE EVADEFRED Utilities: PASSFREELY utility which “Bypasses authentication for Oracle servers” SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE ERRATICGOPHERTOUCH Check if the target is running some RPC IISTOUCH check if the running IIS version is vulnerable RPCOUTCH get info about windows via RPC DOPU used to connect to machines exploited by ETERNALCHAMPIONS NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes. Scripts Arsenal and Wine Arsenal: 3vilTwinAttacker 911ar a2sv adminfinder AdminPage ADSLPT-WPA wifi-breaker aircracktest airfree-wt airgeddon Airlin airmode Airodump_Scan_Visualizer airport-sniffer airssl airstorm Airvengers agryfuzzer anonsurf anon-manager anonymizer anon-surf-start anon-surf-stop apfucker apk-payload-generator apt2 ARCANUS armitage asleap atscan autoDANE autohsgui automater AutoNessus autopixie auto-reaver autorelay avet backdoor-apk backdoorme backdoorppt BAF Base64ImageEncoder-Decoder BatchVirusGenerator Batch-Virus-Generator belkin4xx belkin-wpspin BinGoo BlackFilePumper BlindSqli BoopSuite Brutal BruteSploit brutespray BruteX BrutusV4.7 BTIHTMLEncoder-Decoder BTIMultiSiteChecker BTIReverseIPDomainCheck bully cangibrina kerbnmap Cewl anon-change-identity CHAOS chap2asleap chapcrack Chap-Crack CloudFail CloudFlareResolver CMSmap cobaltstrike cowpatty CpanelBruteReiluke crackle crackle CrackTheCAP probewpacracker credmap criptator crowbar crunch csrfpocmaker CVE-2017-0199 CVE-2017-7494 cybersac Dagon dedsploit DefacePageCreated dkmc dlinkdecrypter domainhunter DorkFinder Dorktools dotdotpwn doublepulsar-detection d-tect eapmd5hcgen EaST Ebowla EggShell ejacoolas erratasec Eternalblue-Doublepulsar-Metasploit escan EternalsExtensionSpoofer EvilAPDefender evil-droid ExploitOnCLI exploitpack exploits ExploitScanner Extension_Spoofer ezDataBase_Defacer ezsploit F.Society Fakear fakeAP fake-ap3.py FakeAp2 FakeImageExploiter fibercrunch Findsploit fipy firefox-ram gufw anonsurf fluxion gcat generadorDiccio genkeys genpmk Genpy getsploit GhostInTheNet Ghost-fisher gigawordlist Gloom-Framework Goohak hakkuframework Halcyon handshake-extractor HandShaker Hash-Buster hashcatgui hccap hellraiser HellWormsGenerator Her0xDa-Wps-Cracker HighLifeCrypter hostnamechanger hotspot_autologin HT-WPS-Breaker hydra-wizard Illusi0nCrypter Image+TextFileBinder ImageWorm InfamousTool Infoga Injectorist Insanity-Framework InstaBrute ipscan-win32-3_2 IpTool isf isthisipbad Jazztel-StopGo Joomla_Security_Scanner jsql-injection-v0_2_jar KatanaFramework killchain kimi koadic kwetza LALIN LANs.py LegionEliteProxiesGrabber leviathan LFiExploiter LFiFreak LFISuite liffy LinDrop litesploit mac2wepkey macchanger MakeWordlistForBrute Maskgen MassBleed MassDorkScanner massExpConsole Matroschka MaXIsploit md5crack mergedict Meterpreter_Paranoid_Mode-SSL MITMf mitm-rogue-WiFi-AP MooreRPortScanner morpheus morphHTA mpc ms17 msfvenom_custom_encoding netattack2 netdiscover-0.3-pre-beta7 netool-toolkit netsec-framework NetZapper NoSQLMap nps_payload nsa NSA-exploits nsa-gui NXcrypt ONO_Netgear_WPA2_Hack operative-framework OSPTF OWASP-Nettacker p0iz0nProxyProcessor pandora-manager pastezort pasv-agrsv PAYLOAD-MAKER PenBox penetrator-wps penmode pentesting-multitool pentestly pentest-machine PiWAT pixiewps Policygen portSpider PowerScript-KatanaFramework Pr0xYGrabber PRET ProPort ProxyFinder PureNetworks Pybelt PyBozoCrack pydictor python_gdork_sqli python-hacklib pyxiewps_WPS pyxiewps_WPShack-Python Quack reaver reaver.rd reaver-spoof reaver-webui reaver-wps-fork-t6x-master ReconDog RED_HAWK reGeorg riwifshell Rt2rtc Rtc2rt Rtgen Rtsort Rulegen saint scanless scapy-deauth scythian SEF sgen ShadowBatchVirusGenMOD shellsploit shocker ShockLabsFileBinder shodanwave SigPloit SimpleBinder simple-ducky smap smod Sn1per SPF SpiderMail SQLExploitScanner SqliColCount SQLiDumper sqlihelperv_2_7 sqli-scanner sqlitebrowser sqliv sqliscan SQL-nightmare anon-i2p-start Stitch anon-i2p-stop String-generator Struts2Shell Sublist3r SuperMicro-Password-Scanner TeraBitClient The-Auto-Pentest fatrat theharvestergui TNscan torghost tor_ip_switcher toriptables2 TPLink-AttackDictionary tplmap trape TripleX-Crypter Trity tulpar TuxCut 417 U-Cracker Umbrella V3n0M Vanquish varmacreaversav9-93 varmacscan2-8 VBSVirusMaker Vbswg Veil-Ordnance venomdroid3 Virus-O-Matic viSQL VMR-MDK w3af waidps WarChild WeBaCoo webpwn Webscan weeman wePWNise Wi-fEye wifiarnet wifiarp wifi-autopwner wifi_check wifi-contour wificurse wifidns wifi-hacker wifi-harvester wifi-honey wifijammer wifi-linux-rssi wifimonster wifiphisher wifiping WifiScanAndMap wifitap wifite wifite2 wifite-mod-pixiewps Wifite_ng wifuzz wiki_wordlist_generator Winpayloads wireless-ids wireless-info Wireless-Sniffer wirespy wlanreaver wordlist50 word-list-compress Wordlists wordpress-exploit-framework WormGen WPA2-HalfHandshake-Crack wpa-autopwn wpa-bruteforcer wpaclean Wpspin wpa-extractor wpaforhashcat wperf wps-connect wpscrack wpsdb WPSIG wpspin WPSPIN Wpspingenerator wps_scanner wsuxploit wwcleaner XAttacker xerosploit xerxes-dos xpath xsscrapy XssPy XSSTracer XSStrike zarp ZeusCrypter zirikatu Extra Tools: DandenSpritz FuzzBunch More tools: acccheck ace-voip Amap Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch Cookie Cadger copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX Faraday Fierce Firewalk fragroute fragrouter Ghost Phisher GoLismero goofile hping3 ident-user-enum InTrace iSMTP lbd Maltego Teeth masscan Metagoofil Miranda nbtscan-unixwiz Nmap ntop p0f Parsero Recon-ng SET smtp-user-enum snmp-check SPARTA sslcaudit SSLsplit sslstrip SSLyze THC-IPV6 theHarvester TLSSLed twofi URLCrazy Wireshark WOL-E Xplico Vulnerability Analysis BBQSQL BED cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch copy-router-config DBPwAudit Doona DotDotPwn HexorBase Inguma jSQL Lynis Nmap ohrwurm Oscanner Powerfuzzer sfuzz SidGuesser SIPArmyKnife sqlmap Sqlninja sqlsus THC-IPV6 tnscmd10g unix-privesc-check Yersinia Exploitation Tools Armitage Backdoor Factory BeEF cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch Commix crackle exploitdb jboss-autopwn Linux Exploit Suggester Maltego Teeth Metasploit Framework RouterSploit SET ShellNoob sqlmap THC-IPV6 Yersinia Wireless Attacks Aircrack-ng Asleap Bluelog BlueMaho Bluepot BlueRanger Bluesnarfer Bully coWPAtty crackle eapmd5pass Fern Wifi Cracker Ghost Phisher GISKismet Gqrx gr-scan hostapd-wpe kalibrate-rtl KillerBee Kismet mdk3 mfcuk mfoc mfterm Multimon-NG PixieWPS Reaver redfang RTLSDR Scanner Spooftooph Wifi Honey wifiphisher Wifitap Wifite Forensics Tools Binwalk bulk-extractor Capstone chntpw Cuckoo dc3dd ddrescue DFF diStorm3 Dumpzilla extundelete Foremost Galleta Guymager iPhone Backup Analyzer p0f pdf-parser pdfid pdgmail peepdf RegRipper Volatility Xplico Web Applications apache-users Arachni BBQSQL BlindElephant Burp Suite CutyCapt DAVTest deblaze DIRB DirBuster fimap FunkLoad Gobuster Grabber jboss-autopwn joomscan jSQL Maltego Teeth PadBuster Paros Parsero plecost Powerfuzzer ProxyStrike Recon-ng Skipfish sqlmap Sqlninja sqlsus ua-tester Uniscan Vega w3af WebScarab Webshag WebSlayer WebSploit Wfuzz WPScan XSSer zaproxy Stress Testing DHCPig FunkLoad iaxflood Inundator inviteflood ipv6-toolkit mdk3 Reaver rtpflood SlowHTTPTest t50 Termineter THC-IPV6 THC-SSL-DOS Sniffing & Spoofing Burp Suite DNSChef fiked hamster-sidejack HexInject iaxflood inviteflood iSMTP isr-evilgrade mitmproxy ohrwurm protos-sip rebind responder rtpbreak rtpinsertsound rtpmixsound sctpscan SIPArmyKnife SIPp SIPVicious SniffJoke SSLsplit sslstrip THC-IPV6 VoIPHopper WebScarab Wifi Honey Wireshark xspy Yersinia zaproxy Password Attacks acccheck Burp Suite CeWL chntpw cisco-auditing-tool CmosPwd creddump crunch DBPwAudit findmyhash gpp-decrypt hash-identifier HexorBase THC-Hydra John the Ripper Johnny keimpx Maltego Teeth Maskprocessor multiforcer Ncrack oclgausscrack PACK patator phrasendrescher polenum RainbowCrack rcracki-mt RSMangler SQLdict Statsprocessor THC-pptp-bruter TrueCrack WebScarab wordlists zaproxy Maintaining Access CryptCat Cymothoa dbd dns2tcp http-tunnel HTTPTunnel Intersect Nishang polenum PowerSploit pwnat RidEnum sbd U3-Pwn Webshells Weevely Winexe Hardware Hacking android-sdk apktool Arduino dex2jar Sakis3G smali Reverse Engineering apktool dex2jar diStorm3 edb-debugger jad javasnoop JD-GUI OllyDbg smali Valgrind YARA Reporting Tools CaseFile CutyCapt dos2unix Dradis KeepNote MagicTree Metagoofil Nipper-ng pipal Download: [Hidden Content] Password: [Hidden Content]
  15. New Update Features: * GPU overloading was fixed * replaced the oly proxy system with a new one * fixed the gui sizements over OSs [Hidden Content] Pass: level23hacktools.com
  16. Black Window Enterprise 10 v1 Codename : Arachni Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and it offers the hacking part with a Cerberus Linux system! You can run both and it just works! Any update for Cerberus Linux will be available from apt update && apt upgrade for the windows user and Linux users! Teaser Tools Preinstalled Windows Armitage Metasploit Fuzzbunch Dandensprits Ip hiders Wifi hacking Crackers Crypters and Binders Dork Scanners Dos+DDoser++Flooders Forensic Tools over 100 new KeyLoggers updated Misc. Web Tools over 50 new SQL Injection tools updated over 50 new Network Tools updated over 100 RAT’ s updated SMS & Email Bombers VPNs & Security Admin Page-Login Page Scanners Proxy Grabbers Resolvers Scripts & Source Codes Shells Vulnerable Scanners Worms, Malware, & Virus Makers Entire Elcomsoft DOWNLOAD [HIDE][Hidden Content]] zip pass is BlackWindowOs or ArachniOs please follow this tutorial to extract the iso from the zip file HOW TO INSTALL BLACK WINDOW V1
  17. dEEpEst

    Black Window

    ABOUT: BlackWidow is a python based web application spider to gather subdomains, URL's, dynamic parameters, email addresses and phone numbers from a target website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities. DEMO VIDEO: FEATURES: Automatically collect all URL's from a target website Automatically collect all dynamic URL's and parameters from a target website Automatically collect all subdomains from a target website Automatically collect all phone numbers from a target website Automatically collect all email addresses from a target website Automatically collect all form URL's from a target website Automatically scan/fuzz for common OWASP TOP vulnerabilities Automatically saves all data into sorted text files LINUX INSTALL: cp blackwidow /usr/bin/blackwidow cp injectx.py /usr/bin/injectx.py pip install -r requirements.txt USAGE: blackwidow -u [Hidden Content] - crawl target.com with 3 levels of depth. blackwidow -d target.com -l 5 -v y - crawl the domain: target.com with 5 levels of depth with verbose logging enabled. blackwidow -d target.com -l 5 -c 'test=test' - crawl the domain: target.com with 5 levels of depth using the cookie 'test=test' blackwidow -d target.com -l 5 -s y -v y - crawl the domain: target.com with 5 levels of depth and fuzz all unique parameters for OWASP vulnerabilities with verbose logging on. injectx.py -u [Hidden Content] -v y - Fuzz all GET parameters for common OWASP vulnerabilities with verbose logging enabled. SAMPLE REPORT: DOCKER: [hide]git clone [Hidden Content]] cd BlackWidow docker build -t blackwidow . docker run -it blackwidow # Defaults to --help Download: [hide][Hidden Content]]
  18. TheFOX

    Black W0RM

    Features Full Data Transfer Encryption using Base64 Modified Icon Manager Modified Plugin Manager Modified Admin Checker Modified Plugin Invoking Modified Custom Plugin Invoking DynuDNS Updater NO-IP Automatic Updater New About Page Stable WatchDog to look after your client Add to SchTask Hard Install [ Stealth Mode ] FileZilla Stealer Clean Password Stealer [ Fixes ] CPU,FireWall,Client Privileges,MUTEX Information File Binder Added More than 100 New Custom Icons Modified Desktop Infection New Port Settings New MUTEX Format (bWorm[xxxxxx-12345]) Listview Style Remove Empty Subs and Functions Process Manager With Custom Colors Command Shell Remote Powershell Remote Desktop Keylogger Manager RSA Encryption With 4096bit Encryption Key for the Host and Port Stable File Manager With a Downloading Large Files and Arabic Names Support Critical Process Updating Password Plugin Added Product Serial Stealer Service Manager with Full-Service Controller Startup Manager Victim Notification with XtremeRAT Sound Simple IP Tracker Infect ZIP & RAR Files [ PoC ] [ UnTested ] Clients Groups [ Single and Multi-Manager ] Upgrade Software DotNET Framework From 2.0 to 4.0 Small GUI Changes Small Fixes to the Socket to be more stable Multi Transfer Bug Fixes Download [Hidden Content]
  19. Version 1.0.0

    5 downloads

    Pack of 10 GB of video tutorials. Covers all basics of Ethical Hacking And how to use all the tools used in Hacking You can see the index in the images. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  20. View File Complete Ethical Hacking Course Beginner to Advanced - Black Radiator Pack of 10 GB of video tutorials. Covers all basics of Ethical Hacking And how to use all the tools used in Hacking You can see the index in the images. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 08/04/19 Category Libro Online Password ********  
  21. OpenBullet OpenBullet is a webtesting suite that allows to perform requests towards a target webapp and offers a lot of tools to work with the results. This software can be used for scraping and parsing data, automated pentesting, unit testing through selenium and much more. IMPORTANT! Performing (D)DoS attacks or credential stuffing on sites you do not own (or you do not have permission to test) is illegal! The developer will not be held responsible for improper use of this software. [Hidden Content]
  22. Good news? We cracked the latest version of Black Bullet where all crashes, CPU overloading, and UI fixs, a new theme feature and he optimized the checker for a fasteer speed and more of features in there! Hype Bad news? Config creation Saving is Broken in that crack. Why? Well some virtualization stuffs xD reverse engineers related (couldn't crack it that far lul). But don't worry you could use any old version of BB to make configs and all public configs would work like a charm ^^. Maybe I will fix this issue in the future who knows ^^ [HIDE][Hidden Content]]
  23. yoyohoneysinger

    Black Hat Hacking Course

    Download here [Hidden Content]
  24. Download: [hide][Hidden Content]] Password: level23hacktools.com