Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'chrome'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. 5 BEST CHROME EXTENSIONS FOR HACKERS 1. Tamper Data The Tamper Data extension ([Hidden Content]) provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser. 2. Hackbar The HackBar extension ([Hidden Content]) assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs, 3. Open Port Check Tool The Open Port Check Tool extension ([Hidden Content]) helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion. 4. Request Maker Hackers find the Request Maker extension ([Hidden Content]) useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool. 5. Penetration Testing Kit The Chrome-based Penetration Testing Kit ([Hidden Content]) contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
  2. 5 BEST CHROME EXTENSIONS FOR HACKERS 1. Tamper Data The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser. 2. Hackbar The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs, 3. Open Port Check Tool The Open Port Check Tool extension helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion. 4. Request Maker Hackers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool. 5. Penetration Testing Kit The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
  3. EvilSelenium is a new project that weaponizes Selenium to abuse Chrome. The current features right now are: Steal stored credentials (via autofill) Steal cookies Take screenshots of websites Dump Gmail/O365 emails Dump WhatsApp messages Download & exfiltrate files Add SSH keys to GitHub Or extend the existing functionality to suit your needs (e.g. Download files from the user’s GDrive/OneDrive). [hide][Hidden Content]]
  4. Chromepass – Hacking Chrome Saved Passwords Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved passwords Send a file with the login/password combinations remotely (email or reverse-http) Custom icon Completely undetectable by AntiVirus Engines AV Detection! The new client build methodology, practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion. An example of the latest scans (note: within 10-12 hours we go from 0-2 detections to 32 detections so run the analysis on your own builds): [Hidden Content] Changelog v4.1 Fixed dependency issues Recreated the server (in rust) [hide][Hidden Content]]
  5. How to always open Chrome browser in safe and anonymous mode? ✓Normally, all your web browsing information is saved, including cookies, passwords, and even the URL of the site you visited. * If you don't want this to happen and always browse the web anonymously and this information is not saved + Do the following steps * ShortCut from the Chrome browser on your desktop * Right-click on Chrome shortcuts and tap Properties * Come on the Shortcut tab * Find the target path Go to the end and close a space (Space) and write this phrase incognito- * In this case, every time you open the browser, it is in safe mode.
  6. Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass SmartScreen/Defender) Legal disclaimer: Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [hide][Hidden Content]]
  7. A simple Chrome Stealer / Chrome Recovery for Windows 7+. Native. Written in C++. Orphic META - Free Google Chrome Stealer / Password Recovery - GMAIL ONLY Features - View your own Chrome Passwords. - Generate Stub to get someone else's. - Receive Via Gmail. - Message Box. [HIDE][Hidden Content]] Server Scan [Hidden Content]
  8. [Hidden Content]
  9. Chrome suffers from a use-after-free vulnerability due to a double call to IndexedDBConnection::Close. View the full article
  10. Chrome suffers from a use-after-free vulnerability in ~LevelDBIteratorImpl. View the full article
  11. Google Chrome suffers from an issue where it will leak all passwords for a given domain. View the full article
  12. JS execution inside ScriptForbiddenScope can lead to a use-after-free condition in Google Chrome. View the full article
  13. Google Chrome suffers from a use-after-free vulnerability in AudioWorkletGlobalScope::Process. View the full article
  14. Chrome Web Store Escritorio Remoto de Chrome ofrecido por Chrome Remote Desktop Release Managers Para descargar la aplicación o la extensión en tu ordenador, inicia sesión en Chrome y habilita la sincronización o envíate un recordatorio (39282) Aplicaciones de oficina 0 usuarios Descripción general De Google Accede a otros ordenadores o permite que otro usuario acceda a tu ordenador de forma segura a través de Internet. Chrome Remote Desktop allows users to remotely access another computer through Chrome browser or a Chromebook. Computers can be made available on an short-term basis for scenarios such as ad hoc remote support, or on a more long-term basis for remote access to your applications and files. All connections are fully secured. Chrome Remote Desktop is fully cross-platform. Provide remote assistance to Windows, Mac and Linux users, or access your Windows (XP and above) and Mac (OS X 10.6 and above) desktops at any time, all from the Chrome browser on virtually any device, including Chromebooks. For information about privacy, please see the Google Privacy Policy and the Chrome Privacy Policy. For help or troubleshooting please click here: [Hidden Content] Stay tuned for future updates! [Hidden Content]
  15. Google Chrome suffers from a use-after-free vulnerability in WasmMemoryObject::Grow. View the full article
  16. Chrome V8 has an issue where JSCallReducer::ReduceArrayIndexOfIncludes in turbofan fails to insert Map checks. View the full article
  17. This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful. View the full article
  18. Chrome suffers from an integer overflow vulnerability in NewFixedDoubleArray. View the full article
  19. Google Chrome version 73.0.3683.103 V8 JavaScript Engine out-of-memory in invalid table size denial of service proof of concept exploit. View the full article
  20. Chrome suffers from a use-after-free vulnerability in FileChooserImpl. View the full article
  21. Chrome version 73.0.3683.86 stable exploit for chromium issue 941743, tested on Windows 10 x64, which leverages a flaw in the V8 javascript engine. View the full article
  22. Chrome suffers from an internal object leak vulnerability in ReadableStream. View the full article
  23. Chrome suffers from a type confusion vulnerability in JSPromise::TriggerPromiseReactions. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.