Search the Community

Showing results for tags 'browser'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 20 results

  1. [Hidden Content]
  2. dEEpEst

    Tor Browser for Android

    [Hidden Content]
  3. Xiaomi Mi Browser version 10.5.6-g and Mint Browser version 1.5.3 suffer from a URL spoofing vulnerability. View the full article
  4. dEEpEst

    Browser Hijacker Virus

    [Hidden Content]
  5. 0x1

    TOR Browser 0day

    TOR Browser 0day : JavaScript Exploit ! Works on Firefox versions 41 - 50 The critical vulnerability is believed to affect multiple Windows versions of the open source Firefox web browser as far back as Firefox version 41, and up to Firefox version 50. When exploit opened by a Firefox or Tor Browser with Javascript enabled on a Windows computer, it leverage a memory corruption vulnerability in the background to make direct calls to kernel32.dll, which allows malicious code to be executed on computers running Windows. [Hidden Content] Download [hide][Hidden Content]] Ref : [hide][Hidden Content]]
  6. electrify

    Simple Browser detection in JavaScript

    A simple method developed in JavaScript to detect browser type and version Browser Info.html <script> // Identify Browsers // By default browsers use misleading information, the solution is specify the version if (navigator.userAgent.indexOf("Firefox/54") != -1) {alert('Using Firefox v54');} if (navigator.userAgent.indexOf("rv:11.0") != -1) {alert('Using IE v11');} if (navigator.userAgent.indexOf("Version/5.1.7") != -1) {alert('Using Safari v5.1.7');} if (navigator.userAgent.indexOf("Edge/14") != -1) {alert('Using Edge v14');} if (navigator.userAgent.indexOf("OPR") != -1) {alert('Using Opera 46.0');} if (navigator.userAgent.indexOf("Chrome/59") != -1) {alert('Using Chrome v59');} </script> Download: [Hidden Content] Virus Scan: [Hidden Content]
  7. TOR for Browser v3.1.6 (demo) is a tool to surf the internet completly anonymous by using 2 incapsulations. How to use: 1) Select a number from Circuit 1 2) Select a number from Circuit 2 3) Select Access type 4) Type the site to visit 5) Hit Go! There is in each Circuit 20 proxy servers. This proxy servers must be combined using Circuit 1 and Circuit 2. Using this will increase the anonymity of the connection. Also there is two options in Access: Restricted - Blocks Cookies, JavaScript and Objects Unrestricted - Allow Cookies, JavaScript and Objects Download: [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  8. TOR for Browser is a html page that asks for a website and automaticaly using a simple math anonymize the connection by proxy. It connections possibilities is limited in this release to 9 diferent ip combinations in a chain limited to 3. The Priv version which costs €97.99 EUR includes 5000 ips with a chain almost unlimited. Download (Preview Version) [Hidden Content] Virus Scan [Hidden Content]
  9. [HIDE][Hidden Content]] dotPeek can decompile any .NET assemblies into equivalent C# code and optionally show the underlying IL code. Libraries, executables and more dotPeek can work with a variety of formats, such as libraries (.dll), executables (.exe), and metadata files (.winmd). dotPeek can also decompile .baml files, enabling you to reconstruct XAML UI definitions. In addition to traditional assemblies and executables, you can have dotPeek open archives (.zip, .vsix, or .nupkg) and folders. You can also find and load NuGet packages (and their dependencies) from any online package source, or load packages listed in a packages.config file in your Visual Studio project. What′s New in dotPeek This page outlines what has changed in recent versions of dotPeek. Highlights include support for Portable PDB files and SourceLink, a metadata viewer, an assembly dependency diagram and navigation improvements.
  10. Microsoft Windows suffers from a Browser Broker cross session privilege escalation vulnerability. View the full article
  11. There is a new simple method to mine Bitcoin for everyone and it's called CryptoTab Browser. CryptoTab started as a website that paid users to mine bitcoin, with the success of the website they launched addons for browsers and they kept growing. With bitcoin mining requiring a lot of hardware and a lot of software configurations to work CryptoTab came up with a solution. The solution was launch a clean chrome instalation with CryptoTab addon and tweaked for maximum extraction. To take advantage of CryptoTab Browser all the user require is left the browser open or surf using this browser. All the mining is made in the background. No pools, no configs, just your email... During my tests with CryptoTab Browser i left it mining for 14 consecutives days and made $0.201 cents. That's aproximately $0.01 to $0.02 per day. That's not much but considering that the computer will be turn on during this period with or without mining that's quite an achivement. The minimum withdraw is 0.00001 BTC and i got a much higher amount so i cash out to my crypto wallet. Download & Install [Hidden Content]
  12. Register & Install [Hidden Content]
  13. hakanonymos

    keylogger browser

    Hello , i have a keylogger extension chrome, Mozilla source code and tutoriel one youtub code source github
  14. Tor Browser versions prior to 8.0 are affected by an information disclosure vulnerability that allows remote attackers to bypass the intended anonymity feature and discover a client IP address. The vulnerability affects Windows users only and needs user interaction to be exploited. View the full article
  15. 1337day-Exploits

    Exploits Tor Browser 7.x NoScript Bypass

    Tor Browser version 7.x suffers from a NoScript bypass vulnerability. View the full article
  16. This write up holds the details for the Tor Browser information disclosure vulnerability as discussed in CVE-2017-16541. Version 7.0.8 is affected. View the full article
  17. PHP File Browser Script 1 suffers from a directory traversal vulnerability. View the full article
  18. Epiphany Web Browser version 3.28.1 suffers from a denial of service vulnerability. View the full article