Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 319 results

  1. BurpCrypto Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! Changelog v0.1.6 opt js support. add Get PlainText to all panel. [hide][Hidden Content]]
  2. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  3. Descripción del producto Dan Kaminsky is the Director of Penetration Testing for IOActive. Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. He is best known for his "Black Ops" series of talks at the well respected Black Hat Briefings conferences. He is also the only speaker who has attended and spoken at every single "Blue Hat" Microsoft internal training event. Dan focuses on design level fault analysis, particularly against massive-scale network applications. Dan regularly collects detailed data on the health of the worlwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan is one of the few individuals in the world to combine both technical expertise with executive level consulting skills and prowess. [Hidden Content] [hide][Hidden Content]]
  4. [Hidden Content]
  5. Description HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows by virtualizing an already running system using Intel VT-x and Intel PT. This debugger aims not to use any APIs and software debugging mechanisms, but instead, it uses Second Layer Page Table (a.k.a. Extended Page Table or EPT) extensively to monitor both kernel and user executions. HyperDbg comes with features like hidden hooks, which is as fast as old inline hooks, but also stealth. It mimics hardware debug registers for (read & write) to a specific location, but this time entirely invisible for both Windows kernel and the programs, and of course without any limitation in size or count! Using TLB-splitting, and having features such as measuring code coverage and monitoring all mov(s) to/from memory by a function, makes HyperDbg a unique debugger. Although it has novel features, HyperDbg tries to be as stealth as possible. It doesn’t use any debugging APIs to debug Windows or any application, so classic anti-debugging methods won’t detect it. Also, it resists the exploitation of time delta methods (e.g., RDTSC/RDTSCP) to detect the presence of hypervisors, therefore making it much harder for applications, packers, protectors, malware, anti-cheat engines, etc. to discover the debugger. Unique Features First Release (v0.1.0.0) Classic EPT Hook (Hidden Breakpoint) [link][link] Inline EPT Hook (Inline Hook) [link][link] Monitor Memory For R/W (Emulating Hardware Debug Registers Without Limitation) [link][link] SYSCALL Hook (Disable EFER & Handle #UD) [link][link] SYSRET Hook (Disable EFER & Handle #UD) [link][link] CPUID Hook & Monitor [link] RDMSR Hook & Monitor [link] WRMSR Hook & Monitor [link] RDTSC/RDTSCP Hook & Monitor [link] RDPMC Hook & Monitor [link] VMCALL Hook & Monitor [link] Debug Registers Hook & Monitor [link] I/O Port (In Instruction) Hook & Monitor [link] I/O Port (Out Instruction) Hook & Monitor [link] MMIO Monitor Exception (IDT < 32) Monitor [link][link] External-Interrupt (IDT > 32) Monitor [link][link] Running Automated Scripts [link] Transparent-mode (Anti-debugging and Anti-hypervisor Resistance) [link] Running Custom Assembly In Both VMX-root, VMX non-root (Kernel & User) [link] Checking For Custom Conditions [link][link] Script Engine [link][link][link] VMX-root Compatible Message Tracing [link] Powerful Kernel Side Scripting Engine [link][link] Event Forwarding (#DFIR) [link][link] Transparent Breakpoint Handler Various Custom Scripts [link] [hide][Hidden Content]]
  6. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Rebuild an APK in Debug mode for dynamic analysis Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac [hide][Hidden Content]]
  7. [Hidden Content]
  8. [hide][Hidden Content]]
  9. This is the new SIB Netsky Project Sib Panel Full Setup Ebook [Hidden Content] [hide][Hidden Content]]
  10. Cppcheck is a static analysis tool for C/C++ code. It provides a unique code analysis to detect bugs and focuses on detecting undefined behavior and dangerous coding constructs. The goal is to detect only real errors in the code (i.e. have very few false positives). Features Unique code analysis that detects various kinds of bugs in your code. Both command line interface and graphical user interface are available. Cppcheck has a strong focus on detecting undefined behaviour. Undefined behaviour Dead pointers Division by zero Integer Overflows Invalid bit shift operands Invalid conversions Invalid usage of STL Memory management Null pointer dereferences Out of bounds checking Uninitialized variables Writing const data Changelog v2.3 Improved C++ parser: types wrong operands in ast better simplification of templates Improved clang import, various fixes. Improved value flow analysis Fixed false positives Improved configuration in library files boost.cfg googletest.cfg qt.cfg windows.cfg wxwidgets.cfg Added several Misra rules: 6.1 6.2 7.2 7.4 9.2 10.2 15.4 Added platforms: elbrus e1c+ pic pic8 mips [hide][Hidden Content]]
  11. Version Compatibility IPS 4.5 This plugin will hide LINKS, CODE, IMAGES and [.HIDE.] in forum posts automatically. Members can use REACTIONS or REPLY to see the hidden content. Features: Select content to hide: images, external links, code, [.hide.] tag, attachments Option to specify groups can bypass the hidden content. REACTIONS or Reply to see the hidden content. Supports Clubs. [Hidden Content] [hide][Hidden Content]]
  12. APK Lab The ultimate Android RE experience right inside your VS Code. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac [hide][Hidden Content]]
  13. [hide][Hidden Content]]
  14. [hide][Hidden Content]]
  15. Source Code vb Mini Tool For Get Information About Bin Number [hide][Hidden Content]]
  16. Source Code vb Tool For Edit Combo File [ By aliilapro ] [hide][Hidden Content]]
  17. Source Code C# Mini Tool For Grabb Proxy [ Http-Socks4-Socks5 ] [hide][Hidden Content]]
  18. PHP Tools for Visual Studio Turn Visual Studio into a powerful PHP development environment [Hidden Content] [Hidden Content]
  19. [hide][Hidden Content]]
  20. Author: Archer Last Update: 2020.10.02 [hide][Hidden Content]]
  21. [Hidden Content]
  22. The World's Most Powerful Code Editor Build Environment Build or compile your project, then double-click on an error message in the Build window to jump to that location. Errors and warnings are marked with an icon in the left margin. In addition, the overview bar, positioned alongside the vertical scrollbar, marks the position of errors and warnings relative to the current scroll position in the document. To quickly scroll a marked location into view, you can drag the scrollbar slider to the mark, or click on the mark itself. Debugging SlickEdit's integrated debugging provides a convenient and easy to use front-end for many debuggers. Set breakpoints, step, inspect the stack, view variables/members - all the features you expect from a debugger. SlickEdit supports debugging for: GNU C/C++, Java, WinDbg, Clang C/C++ LLDB, Google Go, Python, Perl, Ruby, PHP, XCode, Scala, C# using Mono, Visual Basic using Mono, and Android JVM/NDK. [Hidden Content] [hide][Hidden Content]]
  23. Live Demo: [Hidden Content] [hide][Hidden Content]]
  24. BurpCrypto Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! [hide][Hidden Content]]