Search the Community

Showing results for tags 'black'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 26 results

  1. Black Hat Approach to Hacking Learn how a hacker hacks into the system and learn how to secure them from getting hacked. The Black Hat Approach to Hacking is a Computer skilled professional course where you learn all the basics of ethical hacking and countermeasures respectively. Learn the fundamentals of Ethical Hacking by enrolling in the Black Hat Approach to Hacking course. It helps you fully comprehend the technique by touching upon each and every concept in a detailed manner through the comprehensive modules designed by industry experts. By mastering the materials provided, you will gain the confidence to pursue the field on your own. Enroll in this course and get your Ethical Hacking certificate to gain the profound capabilities and skills needed to make your mark in the real-world. This course is for you if: You are a beginner wanting to learn about Ethical Hacking. You are an IT professional aspiring to understand Cyber Crimes. You are a web application penetration tester. You are an entrepreneur who wants to master information security. Source: [Hidden Content] Discount 100% here: [Hidden Content]
  2. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  3. Introduction WPScan is a free and automated black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites. You can use it to remotely scan WordPress installations, to find vulnerabilities within the core version, plugins, and themes. It’s maintained by the WPScan Team. WPScan is a black box WordPress vulnerability scanner. Changelog v3.7.6 Status code from responses are now displayed as interesting entries for KnownLocation finders Code updated to be compatible with ruby 2.7+ [HIDE][Hidden Content]]
  4. itsMe

    Black Leecher v1.3B

    Maj 1.3B : - Fix loading error Maj 1.3 : - Bug fix of "Text remover" in the combo manager - Modification of the "NordVPN" tab transformed in "Checkers" - Added the Spotify checker in the "Checkers" tab - Added the Hulu checker in the "Checkers" tab - Credit card checker temporarily down - YT logo & Web bottom right - Repair BIN CHECKER [HIDE][Hidden Content]]
  5. WPScan is a black box WordPress vulnerability scanner. Changelog v3.7.4 Fixed Incorrect wp-content detected from links in homepage – Ref #1412 Fixed exception raised by old version of activesupport in some cases – Ref #1419 WPScan can now run on Windows, thanks @Reelix – Ref wpscanteam/CMSScanner#114 Adds detection of WP, Plugins, Themes, Main Themes and their versions from 404 [HIDE][Hidden Content]]
  6. dEEpEst

    Black Leecher v1.1

    Features : 1. Proxy Checker & Graber 2. VCC Generator 3. Discord Token Graber 4.Combo Tools Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. Black Vision Command line Remote Access tool targeting Windows Systems. Download Maxmind GeoIP2 Database from here ; LINK Extract the file under blackvision/ How to use Install required modules pip3 install -r requirements.txt Run server git clone [Hidden Content] cd blackvision python3 main.py Generate Agent cd blackvision python3 generate.py Change Host/Port Open settings.ini. And change host, port. Commands Command Purpose transfer Transfer a NON Binary file. bsendfile Transfer a Binary File. kill Kill the connection info View Information of client. msgbox Send Messageboxes. exec Execute a Command on the remote Machine(s). exec-file Execute a file on the remote Machine(s). wanip View WAN IP of Remote Machine(s). hostname View Hostname of Remote Machine(s). username View Username of Remote Machine(s). monitoroff Turn of monitor of Remote Machine(s). monitoron Turn monitor back on. cdopen Eject CDROM of Remote Machine(s). cdclose Close CDROM of Remote Machine(s). playaudio Play Audio stream on Remote Machine(s). send Send commands to 1 client. (NO broadcast) keydump DUMP Keystroke buffer (Not added yet) Termux Compatibilty This app is compatible with Termux. Run it the same way you run it in Terminal. TODO Rewrite Agent in C. Fix sending file to single client. (Fixed) Fix multiple clients information saving. (Fixed) Add keylogging. Fix that args[3] does not get sent. (Fixed) Fix Broken connection problems. Video Example: [Hidden Content] Download: [Hidden Content]
  8. WPScan is a black box WordPress vulnerability scanner. Changelog v3.6.3 Fixed unhandled error when performing password attack against wp-login.php and a 302 response only contained one cookie – Ref #1378 [HIDE][Hidden Content]]
  9. itsMe

    Black Leecher v1.0.6B

    PROXY CHECKER & GRABER - VCC GENERATOR - DISCORD TOKEN GRABER - COMBO - proxy grabber and proxy checker - generate a mail/pas user/pass combo etc - CC grabber and Checker of CC with an integrated bin list ( ONLY FOR GET PREMIUM SHIT, NO FUCKING CARDING IT WILL NOT WORK - Token Discord - and a decrypter of MD5 [HIDE][Hidden Content]]
  10. itsMe

    BlackWorm v6.0 Black Ninja

    Software Name: Black Worm Version: 6.0 [ Black Ninja ] Software Job: Create a spreading worm with a GUI to control it dotNET Framework: 4.0 Server, 2.0 Client Source code author before developing: njQ8 [ jnRat ] Developer: Black.Hacker Credits: in the About Form What's New? 1. Full Data Transfer Encryption using Base64 2. Modified Icon Manager 3. Modified Plugin Manager 4. Modified Admin Checker 5. Modified Plugin Invoking 6. Modified Custom Plugin Invoking 7. DynuDNS Updater 8. NO-IP Automatic Updater 9. New About Page 10. Stable WatchDog to look after your client 11. Add to SchTask 12. Hard Install [ Stealth Mode ] 13. FileZilla Stealer 14. Clean Password Stealer [ Fixes ] 15. CPU,FireWall,Client Privileges,MUTEX Information 16. File Binder 17. Added More than 100 New Custom Icons 18. Modified Desktop Infection 19. New Port Settings 20. New MUTEX Format (bWorm[xxxxxx-12345]) 21. Listview Style 22. Remove Empty Subs and Functions 23. Process Manager With Custom Colors 24. Command Shell 25. Remote Powershell 26. Remote Desktop 27. Keylogger Manager 28. RSA Encryption With 4096bit Encryption Key for the Host and Port 29. Stable File Manager With a Downloading Large Files and Arabic Names Support 30. Critical Process 31. Updating Password Plugin 32. Added Product Serial Stealer 33. Service Manager with Full-Service Controller 34. Startup Manager 35. Victim Notification with XtremeRAT Sound 36. Simple IP Tracker 37. Infect ZIP & RAR Files [ PoC ] [ UnTested ] 38. Clients Groups [ Single and Multi-Manager ] 39. Upgrade Software DotNET Framework From 2.0 to 4.0 34. Small GUI Changes 41. Small Fixes to the Socket to be more stable 42. Multi Transfer 43. Bug Fixes To download any large files from the Target Device you need to Foreword The Port 6060 BlackWorm v6.0 Black Ninja + Source Code [Hidden Content] Server.exe
  11. WPScan is a black box WordPress vulnerability scanner. Changelog v3.5.5 Secunia Reference URL updated (via CMSScanner 0.5.3) Fixes an issue with the Password Attack via XMLRPC, where the Interface could be found as active when it was disabled – #1365 [HIDE][Hidden Content]]
  12. dEEpEst

    Black Window 10 v2

    Black Window 10 v2 Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and it offers the hacking part with a Cerberus Linux system! You can run both and it just works! Any update for Cerberus Linux will be available from apt update && apt upgrade for the windows user and Linux users! Tools Preinstalled Windows : Armitage Metasploit Fuzzbunch Dandensprits Ip hiders Wifi hacking Crackers Cypters and Binders Dork Scanners Dos+DDoser++Flooders Forensic Tools over 100 new KeyLoggers updated Misc. Web Tools over 50 new SQL Injection tools updated over 50 new Network Tools updated over 100 RAT’ s updated SMS & Email Bombers VPNs & Security Admin Page-Login Page Scanners Proxy Grabbers Resolvers Scripts & Source Codes Shells Vulnerable Scanners Worms, Malware, & Virus Makers Entire Elcomsoft Screenshot Preview : Linux: All tools from Cerberus os! 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6 EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client’s side to send an email to other users EPICHERO 0-day exploit (RCE) for Avaya Call Server ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003 ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010) ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010) ETERNALCHAMPION is a SMBv1 exploit ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003 ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067) ETRE is an exploit for IMail 8.10 to 8.22 ETCETERABLUE is an exploit for IMail 7.04 to 8.05 FUZZBUNCH is an exploit framework, similar to MetaSploit ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors EXPIREDPAYCHECK IIS6 exploit EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release EASYFUN WordClient / IIS6.0 exploit ESSAYKEYNOTE EVADEFRED Utilities: PASSFREELY utility which “Bypasses authentication for Oracle servers” SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE ERRATICGOPHERTOUCH Check if the target is running some RPC IISTOUCH check if the running IIS version is vulnerable RPCOUTCH get info about windows via RPC DOPU used to connect to machines exploited by ETERNALCHAMPIONS NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes. Scripts Arsenal and Wine Arsenal: 3vilTwinAttacker 911ar a2sv adminfinder AdminPage ADSLPT-WPA wifi-breaker aircracktest airfree-wt airgeddon Airlin airmode Airodump_Scan_Visualizer airport-sniffer airssl airstorm Airvengers agryfuzzer anonsurf anon-manager anonymizer anon-surf-start anon-surf-stop apfucker apk-payload-generator apt2 ARCANUS armitage asleap atscan autoDANE autohsgui automater AutoNessus autopixie auto-reaver autorelay avet backdoor-apk backdoorme backdoorppt BAF Base64ImageEncoder-Decoder BatchVirusGenerator Batch-Virus-Generator belkin4xx belkin-wpspin BinGoo BlackFilePumper BlindSqli BoopSuite Brutal BruteSploit brutespray BruteX BrutusV4.7 BTIHTMLEncoder-Decoder BTIMultiSiteChecker BTIReverseIPDomainCheck bully cangibrina kerbnmap Cewl anon-change-identity CHAOS chap2asleap chapcrack Chap-Crack CloudFail CloudFlareResolver CMSmap cobaltstrike cowpatty CpanelBruteReiluke crackle crackle CrackTheCAP probewpacracker credmap criptator crowbar crunch csrfpocmaker CVE-2017-0199 CVE-2017-7494 cybersac Dagon dedsploit DefacePageCreated dkmc dlinkdecrypter domainhunter DorkFinder Dorktools dotdotpwn doublepulsar-detection d-tect eapmd5hcgen EaST Ebowla EggShell ejacoolas erratasec Eternalblue-Doublepulsar-Metasploit escan EternalsExtensionSpoofer EvilAPDefender evil-droid ExploitOnCLI exploitpack exploits ExploitScanner Extension_Spoofer ezDataBase_Defacer ezsploit F.Society Fakear fakeAP fake-ap3.py FakeAp2 FakeImageExploiter fibercrunch Findsploit fipy firefox-ram gufw anonsurf fluxion gcat generadorDiccio genkeys genpmk Genpy getsploit GhostInTheNet Ghost-fisher gigawordlist Gloom-Framework Goohak hakkuframework Halcyon handshake-extractor HandShaker Hash-Buster hashcatgui hccap hellraiser HellWormsGenerator Her0xDa-Wps-Cracker HighLifeCrypter hostnamechanger hotspot_autologin HT-WPS-Breaker hydra-wizard Illusi0nCrypter Image+TextFileBinder ImageWorm InfamousTool Infoga Injectorist Insanity-Framework InstaBrute ipscan-win32-3_2 IpTool isf isthisipbad Jazztel-StopGo Joomla_Security_Scanner jsql-injection-v0_2_jar KatanaFramework killchain kimi koadic kwetza LALIN LANs.py LegionEliteProxiesGrabber leviathan LFiExploiter LFiFreak LFISuite liffy LinDrop litesploit mac2wepkey macchanger MakeWordlistForBrute Maskgen MassBleed MassDorkScanner massExpConsole Matroschka MaXIsploit md5crack mergedict Meterpreter_Paranoid_Mode-SSL MITMf mitm-rogue-WiFi-AP MooreRPortScanner morpheus morphHTA mpc ms17 msfvenom_custom_encoding netattack2 netdiscover-0.3-pre-beta7 netool-toolkit netsec-framework NetZapper NoSQLMap nps_payload nsa NSA-exploits nsa-gui NXcrypt ONO_Netgear_WPA2_Hack operative-framework OSPTF OWASP-Nettacker p0iz0nProxyProcessor pandora-manager pastezort pasv-agrsv PAYLOAD-MAKER PenBox penetrator-wps penmode pentesting-multitool pentestly pentest-machine PiWAT pixiewps Policygen portSpider PowerScript-KatanaFramework Pr0xYGrabber PRET ProPort ProxyFinder PureNetworks Pybelt PyBozoCrack pydictor python_gdork_sqli python-hacklib pyxiewps_WPS pyxiewps_WPShack-Python Quack reaver reaver.rd reaver-spoof reaver-webui reaver-wps-fork-t6x-master ReconDog RED_HAWK reGeorg riwifshell Rt2rtc Rtc2rt Rtgen Rtsort Rulegen saint scanless scapy-deauth scythian SEF sgen ShadowBatchVirusGenMOD shellsploit shocker ShockLabsFileBinder shodanwave SigPloit SimpleBinder simple-ducky smap smod Sn1per SPF SpiderMail SQLExploitScanner SqliColCount SQLiDumper sqlihelperv_2_7 sqli-scanner sqlitebrowser sqliv sqliscan SQL-nightmare anon-i2p-start Stitch anon-i2p-stop String-generator Struts2Shell Sublist3r SuperMicro-Password-Scanner TeraBitClient The-Auto-Pentest fatrat theharvestergui TNscan torghost tor_ip_switcher toriptables2 TPLink-AttackDictionary tplmap trape TripleX-Crypter Trity tulpar TuxCut 417 U-Cracker Umbrella V3n0M Vanquish varmacreaversav9-93 varmacscan2-8 VBSVirusMaker Vbswg Veil-Ordnance venomdroid3 Virus-O-Matic viSQL VMR-MDK w3af waidps WarChild WeBaCoo webpwn Webscan weeman wePWNise Wi-fEye wifiarnet wifiarp wifi-autopwner wifi_check wifi-contour wificurse wifidns wifi-hacker wifi-harvester wifi-honey wifijammer wifi-linux-rssi wifimonster wifiphisher wifiping WifiScanAndMap wifitap wifite wifite2 wifite-mod-pixiewps Wifite_ng wifuzz wiki_wordlist_generator Winpayloads wireless-ids wireless-info Wireless-Sniffer wirespy wlanreaver wordlist50 word-list-compress Wordlists wordpress-exploit-framework WormGen WPA2-HalfHandshake-Crack wpa-autopwn wpa-bruteforcer wpaclean Wpspin wpa-extractor wpaforhashcat wperf wps-connect wpscrack wpsdb WPSIG wpspin WPSPIN Wpspingenerator wps_scanner wsuxploit wwcleaner XAttacker xerosploit xerxes-dos xpath xsscrapy XssPy XSSTracer XSStrike zarp ZeusCrypter zirikatu Extra Tools: DandenSpritz FuzzBunch More tools: acccheck ace-voip Amap Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch Cookie Cadger copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX Faraday Fierce Firewalk fragroute fragrouter Ghost Phisher GoLismero goofile hping3 ident-user-enum InTrace iSMTP lbd Maltego Teeth masscan Metagoofil Miranda nbtscan-unixwiz Nmap ntop p0f Parsero Recon-ng SET smtp-user-enum snmp-check SPARTA sslcaudit SSLsplit sslstrip SSLyze THC-IPV6 theHarvester TLSSLed twofi URLCrazy Wireshark WOL-E Xplico Vulnerability Analysis BBQSQL BED cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch copy-router-config DBPwAudit Doona DotDotPwn HexorBase Inguma jSQL Lynis Nmap ohrwurm Oscanner Powerfuzzer sfuzz SidGuesser SIPArmyKnife sqlmap Sqlninja sqlsus THC-IPV6 tnscmd10g unix-privesc-check Yersinia Exploitation Tools Armitage Backdoor Factory BeEF cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch Commix crackle exploitdb jboss-autopwn Linux Exploit Suggester Maltego Teeth Metasploit Framework RouterSploit SET ShellNoob sqlmap THC-IPV6 Yersinia Wireless Attacks Aircrack-ng Asleap Bluelog BlueMaho Bluepot BlueRanger Bluesnarfer Bully coWPAtty crackle eapmd5pass Fern Wifi Cracker Ghost Phisher GISKismet Gqrx gr-scan hostapd-wpe kalibrate-rtl KillerBee Kismet mdk3 mfcuk mfoc mfterm Multimon-NG PixieWPS Reaver redfang RTLSDR Scanner Spooftooph Wifi Honey wifiphisher Wifitap Wifite Forensics Tools Binwalk bulk-extractor Capstone chntpw Cuckoo dc3dd ddrescue DFF diStorm3 Dumpzilla extundelete Foremost Galleta Guymager iPhone Backup Analyzer p0f pdf-parser pdfid pdgmail peepdf RegRipper Volatility Xplico Web Applications apache-users Arachni BBQSQL BlindElephant Burp Suite CutyCapt DAVTest deblaze DIRB DirBuster fimap FunkLoad Gobuster Grabber jboss-autopwn joomscan jSQL Maltego Teeth PadBuster Paros Parsero plecost Powerfuzzer ProxyStrike Recon-ng Skipfish sqlmap Sqlninja sqlsus ua-tester Uniscan Vega w3af WebScarab Webshag WebSlayer WebSploit Wfuzz WPScan XSSer zaproxy Stress Testing DHCPig FunkLoad iaxflood Inundator inviteflood ipv6-toolkit mdk3 Reaver rtpflood SlowHTTPTest t50 Termineter THC-IPV6 THC-SSL-DOS Sniffing & Spoofing Burp Suite DNSChef fiked hamster-sidejack HexInject iaxflood inviteflood iSMTP isr-evilgrade mitmproxy ohrwurm protos-sip rebind responder rtpbreak rtpinsertsound rtpmixsound sctpscan SIPArmyKnife SIPp SIPVicious SniffJoke SSLsplit sslstrip THC-IPV6 VoIPHopper WebScarab Wifi Honey Wireshark xspy Yersinia zaproxy Password Attacks acccheck Burp Suite CeWL chntpw cisco-auditing-tool CmosPwd creddump crunch DBPwAudit findmyhash gpp-decrypt hash-identifier HexorBase THC-Hydra John the Ripper Johnny keimpx Maltego Teeth Maskprocessor multiforcer Ncrack oclgausscrack PACK patator phrasendrescher polenum RainbowCrack rcracki-mt RSMangler SQLdict Statsprocessor THC-pptp-bruter TrueCrack WebScarab wordlists zaproxy Maintaining Access CryptCat Cymothoa dbd dns2tcp http-tunnel HTTPTunnel Intersect Nishang polenum PowerSploit pwnat RidEnum sbd U3-Pwn Webshells Weevely Winexe Hardware Hacking android-sdk apktool Arduino dex2jar Sakis3G smali Reverse Engineering apktool dex2jar diStorm3 edb-debugger jad javasnoop JD-GUI OllyDbg smali Valgrind YARA Reporting Tools CaseFile CutyCapt dos2unix Dradis KeepNote MagicTree Metagoofil Nipper-ng pipal Download: [Hidden Content] Password: [Hidden Content]
  13. New Update Features: * GPU overloading was fixed * replaced the oly proxy system with a new one * fixed the gui sizements over OSs [Hidden Content] Pass: level23hacktools.com
  14. Black Window Enterprise 10 v1 Codename : Arachni Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and it offers the hacking part with a Cerberus Linux system! You can run both and it just works! Any update for Cerberus Linux will be available from apt update && apt upgrade for the windows user and Linux users! Teaser Tools Preinstalled Windows Armitage Metasploit Fuzzbunch Dandensprits Ip hiders Wifi hacking Crackers Crypters and Binders Dork Scanners Dos+DDoser++Flooders Forensic Tools over 100 new KeyLoggers updated Misc. Web Tools over 50 new SQL Injection tools updated over 50 new Network Tools updated over 100 RAT’ s updated SMS & Email Bombers VPNs & Security Admin Page-Login Page Scanners Proxy Grabbers Resolvers Scripts & Source Codes Shells Vulnerable Scanners Worms, Malware, & Virus Makers Entire Elcomsoft DOWNLOAD [HIDE][Hidden Content]] zip pass is BlackWindowOs or ArachniOs please follow this tutorial to extract the iso from the zip file HOW TO INSTALL BLACK WINDOW V1
  15. [Hidden Content]
  16. dEEpEst

    Black Window

    ABOUT: BlackWidow is a python based web application spider to gather subdomains, URL's, dynamic parameters, email addresses and phone numbers from a target website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities. DEMO VIDEO: FEATURES: Automatically collect all URL's from a target website Automatically collect all dynamic URL's and parameters from a target website Automatically collect all subdomains from a target website Automatically collect all phone numbers from a target website Automatically collect all email addresses from a target website Automatically collect all form URL's from a target website Automatically scan/fuzz for common OWASP TOP vulnerabilities Automatically saves all data into sorted text files LINUX INSTALL: cp blackwidow /usr/bin/blackwidow cp injectx.py /usr/bin/injectx.py pip install -r requirements.txt USAGE: blackwidow -u [Hidden Content] - crawl target.com with 3 levels of depth. blackwidow -d target.com -l 5 -v y - crawl the domain: target.com with 5 levels of depth with verbose logging enabled. blackwidow -d target.com -l 5 -c 'test=test' - crawl the domain: target.com with 5 levels of depth using the cookie 'test=test' blackwidow -d target.com -l 5 -s y -v y - crawl the domain: target.com with 5 levels of depth and fuzz all unique parameters for OWASP vulnerabilities with verbose logging on. injectx.py -u [Hidden Content] -v y - Fuzz all GET parameters for common OWASP vulnerabilities with verbose logging enabled. SAMPLE REPORT: DOCKER: [hide]git clone [Hidden Content]] cd BlackWidow docker build -t blackwidow . docker run -it blackwidow # Defaults to --help Download: [hide][Hidden Content]]
  17. TheFOX

    Black W0RM

    Features Full Data Transfer Encryption using Base64 Modified Icon Manager Modified Plugin Manager Modified Admin Checker Modified Plugin Invoking Modified Custom Plugin Invoking DynuDNS Updater NO-IP Automatic Updater New About Page Stable WatchDog to look after your client Add to SchTask Hard Install [ Stealth Mode ] FileZilla Stealer Clean Password Stealer [ Fixes ] CPU,FireWall,Client Privileges,MUTEX Information File Binder Added More than 100 New Custom Icons Modified Desktop Infection New Port Settings New MUTEX Format (bWorm[xxxxxx-12345]) Listview Style Remove Empty Subs and Functions Process Manager With Custom Colors Command Shell Remote Powershell Remote Desktop Keylogger Manager RSA Encryption With 4096bit Encryption Key for the Host and Port Stable File Manager With a Downloading Large Files and Arabic Names Support Critical Process Updating Password Plugin Added Product Serial Stealer Service Manager with Full-Service Controller Startup Manager Victim Notification with XtremeRAT Sound Simple IP Tracker Infect ZIP & RAR Files [ PoC ] [ UnTested ] Clients Groups [ Single and Multi-Manager ] Upgrade Software DotNET Framework From 2.0 to 4.0 Small GUI Changes Small Fixes to the Socket to be more stable Multi Transfer Bug Fixes Download [Hidden Content]
  18. This guide below was made by Ruri. New format for configs, this means you have to convert your old configurations to this one. Also there is a new structure to build configs, so now you can insantly switch from blocks to Loliscript with one click This guide will cover how to use Stacker, the OpenBullet Config editor, all the block types available for Config creation the inner workings of a bot when it executes a Config. Getting started First of all, you need to navigate to the Config Manager tab inside OpenBullet and create a Config, or edit an existing one. This will open up Stacker and allow access to the Other Options tab, which are Config-specific settings. Stacker Stacker's interface is divided in 3 areas: the Stack, the Block Info and the Debugger. The default view is the Blocks view, but it can be switched to the LoliScript view with the corresponding button. Any change made with one view will reflect in the other view, so you can switch from one to the other without losing data. LoliScript LoliScript is a custom scripting language made to expand the Block functionalities of OpenBullet. It's the format in which Configs are actually saved inside the file, and its documentation can be accessed with the Documentation button while in LoliScript view. In the LoliScript editor, there are automatic tooltips that will show the syntax of a block after you type its name. You can use Ctrl+S to save the Config. When switching to the Blocks view, LoliScript code that can't be translated into blocks will be displayed in a readonly block. Bot Behaviour A Bot (like the Debugger Bot or a Runner Bot) is a worker that contains some data and executes the Config's script until a stop condition is met. The Bot's Data includes the input data that will be tested against the website, the proxy in use (if any), the status, a log and a list of variables. The Bot's Status can be: NONE - if it's the end status, it will mark the hit as ToCheck ERROR - prints the exception info in the log and then behaves like BAN SUCCESS - if it's the end status, it will mark the hit as Success FAIL - marks the input data as invalid BAN - bans the proxy and retries the input data RETRY - retries the input data CUSTOM - marks the input data as custom The Bot starts with the NONE Status and executes the script, line by line, from top to bottom, as long as the status is NONE or SUCCESS. If the Status changes to any other value, the Bot will end the script execution and return a result. Variables Variables can be defined via blocks or LoliScript instructions, and can be of 3 types: Single, List and Dictionary. Their value can be replaced inside Blocks fields at runtime by using a special syntax that references to their unique name. Single variables hold a single string value. Their value can be accessed with the syntax <SINGLE> where in this case SINGLE is the variable's name. List variables hold a list of string values. Their values can be accessed with the syntax <LIST> where 'i' is the index of the element inside the list that you want to retrieve. If you want to target all items (in Blocks that support it) use the syntax <LIST Dictionary variables hold a list of string value pairs. Their values can be accessed by key with the syntax <DICT(key)> (use <DICT(*)> to get all the values) and their keys can be accessed by value with the syntax <DICT{key}> (use <DICT{*}> to get all the keys). Variables also need be marked for Capture if you want them to be saved inside a hit. Variables can be hidden and not be normally editable by the user nor displayed, like in the case of HEADERS, COOKIES, SOURCE etc. In order to exploit all the potential that variables offer, take a look at the Utility Block and to LoliScript commands like SET and DELETE. There are some hidden variables that are automatically set and cannot be overwritten normally (you can do it with the SET command in LoliScript). These variables are not displayed in the debugger Data tab and they are listed below, along with their type: ADDRESS (Single): the URL of the last HTTP response or the URL displayed in the browser's current page. RESPONSECODE (Single): the response code of the last HTTP response. SOURCE (Single): the response source of the last HTTP response (the data after the headers, encoded in ASCII) or of the current page in the browser. COOKIES (Dictionary): the name and value of all cookies saved during HTTP communications (both sent and received). HEADERS (Dictionary): the name and value of the headers of the last HTTP response. Blocks Blocks are visual representation of some LoliScript directives. They are also the actual classes that are built and processed at runtime. There are buttons to add, remove, disable/enable, clone, move one or more blocks and save the config. Click on a block to display its info in the dedicated area. To select multiple blocks at once, hold down the Ctrl button and click on the blocks you want to select. If a block is disabled it will skipped when the Config runs. Blocks can be copied and pasted by using the Ctrl+C and Ctrl+V shortcuts. The label of a block will help you understand which block does what, and it's also essential when using the JUMP directive in LoliScript. When you add a block, a menu with all the available blocks will be displayed. The blocks in the bottom part are meant to be used in Configs that work with selenium. Request Block The Request block allows you to perform requests and work with the response from the server. The POST Data, which is the content sent in the request body below the headers, can be broken into multiple lines by using the linebreak character \n. When the response source is not important, you can untick 'Read Response Source' and the SOURCE variable will not be set, saving CPU time. When we expect a file response from the server (e.g. when downloading a zip file), the file will be saved to the File Path defined in the block. For multipart content requests, there is a syntax that needs to be followed, hover on the textbox in order to see it. Both Custom Cookies and Custom Headers must be defined with the syntax Name: Value. Cookies sent/received will be stored inside a cookie jar and sent on every following request. The cookies value can be updated but the cookies cannot be deleted unless you use the ClearCookies function inside the Function Block or the DELETE command in LoliScript. The response will be parsed and divided into chunks and inserted into variables. The response headers will be inserted inside the dictionary variable HEADERS The response cookies will be inserted inside the dictionary variable COOKIES (the previous cookies will not be deleted) The response code will be inserted inside the single variable RESPONSECODE The response source will be inserted inside the single variable SOURCE The response address (after the redirects) will be inserted inside the variable ADDRESS When a request fails, the bot status will be changed to ERROR. Utility Block The Utility block allows you to work with variables or files and to convert values. KeyCheck Block The KeyCheck block allows to modify the Status of the Bot by verifying sets of keys. The block will first check the Global Ban Keys defined in the proxy settings. The Ban on 4xx option is used to change the Bot's status to BAN in case the last response had a response code of the 4th category (e.g. unauthorized, forbidden, not found). The Ban if no key found option will change the Bot's status to BAN if no KeyChain was triggered; if it's disabled, it will keep the previous Bot status. A KeyCheck block is made of KeyChains. KeyChains are checked in order, from top to bottom, and the checks don't stop as soon as one of them is triggered so the bottom one can override the ones above it. This is why you should pay attention to the order of KeyChains. KeyChains can be checked in OR or AND mode. The OR mode will make the KeyChain trigger if any of the keys is triggered. The AND mode will make the KeyChain trigger if all of the keys are triggered. Particular attention goes to the Exists condition, as it will trigger the key if and only if any variable replacement was successfully performed in the textbox left to it. This is very useful to check if a variable was set or not by another block. Parse Block The Parse block allows you to parse data from a page with many different parsing methods and store it into a Single or List variable. The supported parsing algorithms are LR, CSS, JSON and REGEX. LR (Left and Right strings) allows to parse text between two strings CSS (CSS Selector) allows to get an element's attribute from an HTML page JSON (JavaScript Object Notation) allows to get the value of a JSON-serialized object REGEX (REGular EXpression) is an advanced parsing method. You need to use grouping. Learn more about it here If you tick recursive, all the instances that meet the parsing criteria will be put inside a List variable; otherwise only the first match will be taken and put into a Single variable. The parsed string (or list of strings) will then be inserted into a variable with the name chosen in the textbox and, if 'is capture' is ticked, it will be marked for Capture. Function Block The Function block provides a lot of functions for working with variables of Single or List type. This block also accepts as input list variables with a jolly index (e.g. <LIST which means that the function will be executed on each element of the List variable. The output string (or list of strings) will then be inserted into a variable with the name chosen in the textbox and, if 'is capture' is ticked, it will be marked for Capture. ReCaptcha Block The ReCaptcha block allows to solve a reCaptcha challenge through captcha solving services. The url represents the url of the page where the captcha appears, while the sitekey can be found inside the page source or set automatically with the corresponding button. The solved challenge will be inserted in a Single variable with the given variable name. Captcha Block The Captcha block allows to solve an image captcha challenge through captcha solving services. The url represents the link to download the captcha image. If the page shows the captcha as a base64-encoded image in its source you can use that value and tick the corresponding box. You can also use a selenium screenshot in case you need to solve a captcha when using selenium (first you need to screenshot the correct element using the Element Action block). The solved challenge will be inserted in a Single variable with the given variable name. BypassCF Block The BypassCF Block allows to solve a Cloudflare challenge and bypass the anti-ddos page. If you have a 2captcha api key and it detects that the Cloudflare challenge needs to be solved with a reCaptcha, it will use your account to solve it. 2captcha is the only supported solver. The url is the url of the Cloudflare-protected page. The user-agent is also essential for solving the challenge. TCP Block The TCP block allows to communicate with a server without being forced to use the HTTP protocol. The server's response will be stored inside the variable with the given variable name. Remember to disconnect from the host before the Bot terminates or it will waste resources. Navigate Block The Navigate block will navigate to a page with the opened selenium browser. You can set a timeout for the page load, which is very useful when using slow proxies. BrowserAction Block The BrowserAction bock lets you interact with the selenium browser itself. Notes: The SendKeys action can accept the inputs <ENTER>, <TAB> <BACKSPACE> and <ESC>. If you want to chain these with themselves or other text (very useful to compile a form quickly) you can separate them with || for example <TAB>||Hello World!||<TAB>||<ENTER> ElementAction Block The ElementAction block lets you interact with elements on the page inside the selenium browser. The element can be targeted thanks to one of the available locators: id, class, name, tag, selector and xpath. ExecuteJS Block The ExecuteJS block lets you execute JavaScript code inside the selenium browser. Variable replacement will be performed inside the script's text before running it, so you can use the normal variable syntax. The Debugger The Debugger lets you test your Config before running it with an actual Wordlist. You can set a test data (along with the corresponding type that is required for slicing the data and setting up the correct variables) and a test proxy (even with auth or chain) that can be enabled with the checkbox to the left of the proxy type selector. Step-by-step (SBS) mode will let you execute one line at a time when running the LoliScript code. The Debugger offers 3 tabs: Data, Log and HTML View. The Data tab shows information about the Bot's Data such as the Status and the non-hidden Variables. The Log tab shows information printed by each block or LoliScript command, along with some timing information and errors. You can also easily perform searches inside the log, or clear it with rightclick > Clear. The HTML View tab shows the content of the SOURCE hidden variable inside a (very old) browser to help visualize if the request bot landed on the correct page of the website. GO READ GUIDE HERE! [Hidden Content]
  19. Version 1.0.0

    4 downloads

    Pack of 10 GB of video tutorials. Covers all basics of Ethical Hacking And how to use all the tools used in Hacking You can see the index in the images. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  20. View File Complete Ethical Hacking Course Beginner to Advanced - Black Radiator Pack of 10 GB of video tutorials. Covers all basics of Ethical Hacking And how to use all the tools used in Hacking You can see the index in the images. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 08/04/19 Category Libro Online Password ********  
  21. OpenBullet OpenBullet is a webtesting suite that allows to perform requests towards a target webapp and offers a lot of tools to work with the results. This software can be used for scraping and parsing data, automated pentesting, unit testing through selenium and much more. IMPORTANT! Performing (D)DoS attacks or credential stuffing on sites you do not own (or you do not have permission to test) is illegal! The developer will not be held responsible for improper use of this software. [Hidden Content]
  22. Good news? We cracked the latest version of Black Bullet where all crashes, CPU overloading, and UI fixs, a new theme feature and he optimized the checker for a fasteer speed and more of features in there! Hype Bad news? Config creation Saving is Broken in that crack. Why? Well some virtualization stuffs xD reverse engineers related (couldn't crack it that far lul). But don't worry you could use any old version of BB to make configs and all public configs would work like a charm ^^. Maybe I will fix this issue in the future who knows ^^ [HIDE][Hidden Content]]
  23. yoyohoneysinger

    Black Hat Hacking Course

    Download here [Hidden Content]