Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'code'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Using fibers to run in-memory code in a different and stealthy way. Description A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the priority-based scheduling mechanism built into Windows. Fibers are often called lightweight threads. For more detailed information about what are and how fibers work consult the official documentation. Fibers allow to have multiple execution flows in a single thread, each one with its own registers' state and stack. On the other hand, fibers are invisible to the kernel, which makes them a stealthier (and cheaper) method to execute in-memory code than spawning new threads. Advantages The use of fibers may be advantageous for some types of payloads (like a C2 beacon) for some of these reasons: Fibers allow to run in-memory code without the need of using the instructions JMP or CALL from the loader pointing to unbacked memory regions. This execution is performed without the creation of new threads, preventing the generation of callbacks from the kernel that can be collected by an EDR. The payload fiber's stack can be hidden when the payload enters on an alertable state or when it needs to wait for a pending I/O operation. This is done using a control fiber with a normal stack that runs code from disk. This "hiding" is cheaper and easier to implement that the regular thread stack spoofing process. The fibers are invisible to the kernel and all the switching procedure happens on user space, which makes it easier to hide from an EDR. [hide][Hidden Content]]
  2. Bulk Telegram Account Creator Software Import unlimited registered account Auto generate API id & hash High Quality USA Registered Account [Hidden Content] [hide][Hidden Content]]
  3. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  4. contents this is the server side code written in nodejs for screenshotting Tor websites. The code itself is just a puppeteer that connects to tor websites through a TOR proxy (which I setup on a different server. See the image below for instructions on how to setup a tor proxy) Its written as a docker img that fetches a list of tor sites from Amazon DynamoDB (you can replace this with SQL), then crawls each one and takes screenshot of them all. Stores it on S3 then exists. This project was run once a day on Azure Container Instances. the lambdasubmitsite.js is redundant actually and can be ignore. Its a rest endpoint (aws lambda) to receive user submitted Tor sites. setup tor proxy in the code you can see the following line const config_tor_proxies = ["18.130.24.239:56826", "18.130.24.239:56824"] I setup two instances of Tor and port 56826 and 56824. One is also sufficient. [Hidden Content]
  5. jsleak is a tool to find secret , paths or links in the source code during the recon. It is easy-to-use command-line tool designed to uncover secrets and links in JavaScript files or source code. Features: Discover secrets in JS files such as API keys, tokens, and passwords. Identify links in the source code. Complete Url Function Concurrent processing for scanning of multiple Urls Check status code if the url is alive or not [Hidden Content]
  6. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  7. Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you’ll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is For Software support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques. [Hidden Content]
  8. this program string crypter detects and decrypts the strings it encrypts when the load and autodetect button is pressed, good luck 🙂 [hide][Hidden Content]] [Hidden Content]
  9. Webster v1.0 - ChatGPT Clone Text to Code Q&A Blog Generator Grammar Summarise Translate SEO Page Builder Webster is a chatGPT Clone and Google Clone Website. Which includes features like Q&A, Grammar correction, Summarizing for a 2nd grader, Natural Language to OpenAI API, Text to command, English to other languages, Natural Language to Stripe API, SQL translate, Parse unstructured data, Classification, Python to Natural Language, Movie to Emoji, Calculate Time Complexity, Translate programming languages, Advanced tweet classifier, Explain code, Keywords, Factual answering, Ad from product description, Product name generator, TL;DR summarization, Python bug fixer, Spreadsheet creator, jаvascript helper chatbot, ML/AI Language model tutor, Science fiction book list maker. This webster can undertand 50+ langugaes in user can ask, this also have voice reply in 50+ langugaes & speech to text in 50+ langugaes with day and night mode. For more info about the app scroll down. [Hidden Content] [hide][Hidden Content]]
  10. GitHub says unknown attackers have stolen encrypted code-signing certificates for its Desktop and Atom applications after gaining access to some of its development and release planning repositories. [Hidden Content]
  11. Description Learn how to build and work on an entire web application with a client side, proxy including middleware, and a database with ChatGPT and 10x your productive levels as a programmer. No matter how you cut it, the bottom line is that ChatGPT is an excellent way to optimize, refactor, and increase productivity to your code and I’m super excited to show you how and why this can be highly beneficial for you. This course demonstrates how to leverage the power of chatGPT as a tool for your next job in additional to stackOverFlow and Documentations to build scripts and simplifies tackling difficult code tasks and take your coding skills to the next level. ChatGPT is not a replacement, but an enhancing tool and an incredibly powerful tool when it comes to programming and analyzing code, and ignoring the utility now or at the very least not giving it a proper test run could very well be missing out early on gaining the advantage In this course we will build an entire application with user sent into our own database and build a Complete chatGPT Web Developer application by learning the best in demand skills taught by renown engineer and full stack developer Clarian North. We will use libraries such as React and Axios on the front end while leveraging Express and Mongoose on the back end. We will even build Join in early on an exciting technology implementing global changes to multiple industries and businesses. This course is designed with the latest web technology in demand job tools including React, Node.js, Express.js, MongoDB, and best conventions in 2023 as well as teaches the very latest Web Development techniques and version of React with hooks. — Join a live online school and community of mentors and developers for supportive chatGPT discussions, debugging, hackathons and more! Level up with a curriculum by an instructor who has worked and consulted in the tech and entertainment industry for top brands and SF valley from Solana to NEAR as well as independent projects which have gone viral all over the world. His modules are taught and supported by some of the biggest companies in the world with over 100,000 enrollments worldwide. This course is also flexible and you can move through sections at different paces depending on your entry skill level: The “beginner” path (full course for total coding beginners into programming and web development) and the “experienced path” (condensed version for those enrolled with prior web development and programming experience) – you are free to choose the path which serves your goals and time requirements the most! 🙂 — ChatGPT is changing the way developers can code and is set to be a very disruptive technology of the future with AI and you can build and learn how to use them in order to shape the future of modern digital art, gaming, and web applications. This course teaches you how to build an entire application from total scratch as well as some of the most modern and best employable tools out there for Web Development. We code along step by step with ChatGPT as our guide by diving into all the key industry standard fundamentals, discover an impressive sum of techniques and examples as well as expose you to advanced concepts and the best practices and proper conventions along the way. You will be provided with clear and deep dives into theory, project case studies and many examples, including tons of assignments and exercises and build an impressive Web Application Portfolio Project for interviews that most other online resources right now are seriously lacking 🙂 This is the most complete ChatGPT for Programming focused course on Udemy. It’s an all-in-one topic by topic focused approach that will take you from the very fundamentals of Smart Contracts and programming, all the way to building an impressive and functional final project fully compliant with industry standards. Welcome to “The Complete ChatGPT Web Development Fullstack – Javascript Learning to code with chatGPT (Generative Pre-trained Transformer) can greatly enhance a developer’s ability to build full stack applications using technologies like React and MongoDB. Firstly, chatGPT provides a level of natural language processing (NLP) capabilities that can greatly benefit the overall user experience of the application. With chatGPT, developers can easily integrate features such as language understanding, text generation, and conversation flow in their applications. These can be used to create chatbot functionality, personalized content, and much more. Additionally, chatGPT can also improve the efficiency and accuracy of certain tasks in the development process. For example, chatGPT can be used to automatically generate code snippets, which can save developers a significant amount of time and reduce the chance of errors. Furthermore, using chatGPT in conjunction with React and MongoDB allows for the creation of highly dynamic and personalized web applications. React is a popular JavaScript library for building user interfaces, and MongoDB is a powerful NoSQL database. Together, they can provide a fast and efficient way to build complex and responsive web applications. In summary, learning to code with chatGPT can greatly enhance a developer’s ability to create user-friendly and efficient full stack applications using React and MongoDB, which can greatly benefit a developer in today’s job market. This course will teach you coding with ChatGPT and Web Development in a clear project driven way, adhering to employable skill expectation and the best practices you need. You will learn all the key fundamentals as well as advanced concepts and related topics to turn you into a Web Developer that can tackle any problem with ChatGPT. No matter if you know nothing about coding or if you already got some basic Web Developer knowledge (not required – the flexibility on how to navigate through the course is included inside), you will get tons of useful ChatGPT knowledge out of this course! Our goal with this course is to teach you the working skills you need to start working as a junior or mid level developer at a job with added confidence from AI coding, get a job in the tech space, or innovate the world at your own choosing with your new found powers. With these skills you can apply for both Web Development (Front End) & Express server (Back end) jobs, use it in your own projects or simply enhance your portfolio as a developer – whatever your goal is: This course will take you there! The world is shifting more and more towards learning and working at home. This is an opportunity for you to start learning the most in demand skills, showcase those coding development skills, and gain the experiences you need to develop your passion into something real. ——– This is the definitive ChatGPT Developer course. After completing the final project, you will have extensively gone through the following tools and technologies: What’s in this course? • Introductions to the key job market tools you need for building Apps: JavaScript, React, MongoDB, MongoDB Atlas, Node, Express, Axios, React Routing, Mongoose and much more • All the core basics: How to ask the right questions and analyze code using ChatGPT for optimal results • Web Development under the hood: JSON & API Calls, Clusters and Cluster Management, Collections and Database CRUD, CSS, animations • Working with events and state management to build scalable applications • Gain clear knowledge of how ChatGPT under the hood for analysis, code compiling, debugging and more. • Building Website & Application Fundamentals: HTML, CSS, Javascript including JavaScript Animations • React Hooks • Reading Documents and Implementing Libraries like Web3 with ChatGPT • How to debug Applications using chatGPT • Introduction to ChatGPT, its capabilities, and use cases • Sending Http requests & handling transitional States + Responses • Handling forms and state updates • Setting up a development environment for building a full stack application with React and MongoDB • Understanding and utilizing React components, hooks, and the virtual DOM with ChatGPT • Building a frontend with React, including user interface and user experience design principles with ChatGPT • Implementing user requests and responses with MongoDB • Building and connecting to a MongoDB database using Mongoose • Creating, reading, updating, and deleting data in a MongoDB database using Mongoose and React • Learning Modern JavaScript and promises including Async-Await & Axios with ChatGPT • Building Advanced CSS including Animations • Troubleshooting and debugging techniques for full stack applications • And so much more – scroll through our full curriculum to see the full breakdown of lessons and projects! This course is a focused employable bootcamp into coding on projects with ChatGPT And in case if you are wondering if you need any experience to get started – You do not need any web development or programming knowledge to get started! This course requires zero prior knowledge to get started! Some basic web development skills including Javascript would definitely move you through the course at a much faster pace than others, however, this course includes introductory sections (they are purely optional) so that we all move through the key lessons together regardless of our skill level! Please see the full curriculum, the free preview videos and whenever you’re ready… Looking forward to seeing you in the lessons! Who this course is for: Take this course if want to gain confidence as a developer for jobs with ChatGPT and modern Web Development Technology Take this course if you already know JavaScript and are just curious about the technologies. This course includes expert topics! Take this course if you’re interested in seeing what the hype is all about ChatGPT and decide its use case for yourself Take this course if you want to get started with programming: ChatGPT & Javascript is an awesome way to get your feet wet Take this course if are interested in working on a project in the future and entering the industry Take this course if you want to develop a portfolio project that you can breakdown for employable prospects with a clear and concrete understanding Requirements No programming experience needed. You will learn everything you need to know inside. *Basic JavaScript & Web Development is a plus! [Hidden Content] [hide][Hidden Content]]
  12. Proxies: Yes Bots: 100 Combo: Any Capture: Storage / Validity [hide][Hidden Content]]
  13. CUPON Code BlackFriday LvL23HT -50% Cupon code: 50%BLACKFRIDAYLVL23HT
  14. 66qrcode is the ultimate QR Code generator. 66qrcode is the most performant, lightweight & easy to use digital QR Code maker software. [Hidden Content] [hide][Hidden Content]]
  15. The Most Accurate and Reliable Source Code Converters Convert between VB.NET, C#, Java, C++, & Python, while saving countless hours of painstaking work and valuable time. What we get in the archive: Tangible.Software.Solutions.Java.to.VB.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.VB.to.Java.Converter.Premium.Edition.v22.2.12.x64-DVT Tangible.Software.Solutions.Java.to.Python.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.VB.to.CPlusPlus.Converter.Premium.Edition.v22.2.12.x64-DVT Tangible.Software.Solutions.Java.to.CPlusPlus.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.Java.to.CSharp.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.Instant.CSharp.Premium.Edition.v22.2.12.x64-DVT Tangible.Software.Solutions.Instant.VB.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.CSharp.to.Java.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.CPlusPlus.to.Java.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.CPlusPlus.to.Python.Converter.Premium.Edition.v22.3.1.x64-DVT Tangible.Software.Solutions.CPlusPlus.to.VB.Converter.Premium.Edition.v22.2.9.x64-DVT Tangible.Software.Solutions.CPlusPlus.to.CSharp.Converter.Premium.Edition.v22.2.17.x64-DVT Tangible.Software.Solutions.CSharp.to.CPlusPlus.Converter.Premium.Edition.v22.2.17.x64-DVT [Hidden Content] [hide][Hidden Content]]
  16. This plugin will hide LINKS, CODE, IMAGES and [ HIDE ] in forum posts automatically. Members can use REACTIONS or REPLY to see the hidden content. Features: Select content to hide: images, external links, code, [ hide ] tag, attachments Option to specify groups can bypass the hidden content. REACTIONS or Reply to see the hidden content. Supports Clubs. [Hidden Content] [hide][Hidden Content]]
  17. What does HTTP Response Status Code Says? List Of Most Commonly Shown Status Code Along With Their Saying 100 : Continue 101 : Switching Protocol 102: Processing (WebDAV) 103 : Early Hints 200: OK 201 : Created 202 : Accepted 203 : Non-Authoritative Information 204 : No Content 205 : Reset Content 206 : Partial Content 207 : Multi-Status (WebDAV) 208 : Already Reported (WebDAV) 226 : IM Used (HTTP Delta encoding) 300 : Multiple Choice 301 : Moved Permanently 302 : Found 303 : See Other 304 : Not Modified 305 : Use Proxy 306 : unused 307 : Temporary Redirect 308 : Permanent Redirect 400 : Bad Request 401 : Unauthorized 402 : Payment Required . 403 : Forbidden 404 : Not Found 405 : Method Not Allowed 406 : Not Acceptable 407 : Proxy Authentication Required 408 : Request Timeout 409 : Conflict 410 : Gone 411 : Length Required 412 : Precondition Failed 413 : Payload Too Large 414 : URI Too Long 415 : Unsupported Media Type 416 : Range Not Satisfiable 417 : Expectation Failed 418 : I'm a teapot 421 : Misdirected Request 422 : Unprocessable Entity (WebDAV) 423 : Locked (WebDAV) 424 : Failed Dependency (WebDAV) 425 : Too Early 426 : Upgrade Required 428 : Precondition Required 429 : Too Many Requests 431 : Request Header Fields Too Large 451 : Unavailable For Legal Reasons 500 : Internal Server Error 501 : Not Implemented 502 : Bad Gateway 503 : Service Unavailable 504 : Gateway Timeout 505 : HTTP Version Not Supported 506 : Variant Also Negotiates 507 : Insufficient Storage (WebDAV) 508 : Loop Detected (WebDAV) 510 : Not Extended 511 : Network Authentication Required HTTP Response Status Codes Indicates Whether A Specific HTTP Request Has Been Successfully Completed ==============================
  18. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  19. FindFunc is an IDA PRO plugin to find code functions that contain a certain assembly or byte pattern, reference a certain name or string, or conform to various other constraints. This is not a competitor to tools like Diaphora or BinNavi, but it is ideal to find a known function in a new binary for cases where classical bindiffing fails. Filtering with Rules The main functionality of FindFunc is letting the user specify a set of “Rules” or constraints that a code function in IDA PRO has to satisfy. FF will then find and list all functions that satisfy ALL rules (so currently all Rules are in an AND-conjunction). Exception: Rules can be “inverted” to be negative matches. Such rules thus conform to “AND NOT”. FF will schedule the rules in a smart order to minimize processing time. Feature overview: Currently, 6 Rules are available, see below Code matching respects Addressing-Size-Prefix and Operand-Size-Prefix Aware of function chunks Smart scheduling of rules for performance Saving/Loading rules from/to file in simple ascii format Several independent Tabs for experimentation Copying rules between Tabs via clipboard (same format as a file format) Advanced copying of instruction bytes (all, opcodes only, all except immediate) Button “Search Functions” clears existing results and starts a fresh search, “Refine Results” considers only results of the previous search. Advanced Binary Copying A secondary feature of FF is the option to copy binary representation of instructions with the following options: copy all -> copy all bytes to the clipboard copy without immediate -> blank out (AA ?? BB) any immediate values in the instruction bytes opcode only -> will blank out everything except the actual opcode(s) of the instruction (and prefixes) Changelog v1.4 new: clone tab option to clone rule + result list (right click on tab) new: add advanced copy menu: mask all but opcode and immediate guard against empty or invalid input when editing middle-click copies the resp. cell in rules and result tables to clipboard allow pasting immediates directly (0xABC or ABCh for hex, else dec) immediate-rules are now serialized in hex representation inverted rules now have red font-color rename button ‘Search Functions’ to ‘Find Functions’ – branding! 😉 [hide][Hidden Content]]
  20. GitGuardian Shield: protect your secrets with GitGuardian GitGuardian shield (ggshield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets, as well as other potential security vulnerabilities or policy breaks. GitGuardian shield uses our public API through py-gitguardian to scan and detect potential secrets on files and other text content. Only metadata such as call time, request size, and scan mode is stored from scans using GitGuardian shield, therefore secrets and policy breaks incidents will not be displayed on your dashboard and your files and secrets won’t be stored. You’ll need an API Key from GitGuardian to use ggshield. Currently supported integrations Azure Pipelines Bitbucket Pipelines Circle CI Orbs Docker Drone GitHub Actions GitLab Jenkins Pre-commit hooks Pre-push hooks Pre-receive hooks Travis CI Changelog v1.4.2 Add dead link checker action by @RemakingEden in #303 Adjust link-check run & fix last broken link by @commjoen in #304 Challenge 18: New challenge – MD5 hashing by @RemakingEden in #298 Bump peter-evans/create-issue-from-file from 3 to 4 by @dependabot in #306 Challenge 18-pre-alpha fixes by @commjoen in #305 [hide][Hidden Content]]
  21. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  22. FindFunc is an IDA PRO plugin to find code functions that contain a certain assembly or byte pattern, reference a certain name or string, or conform to various other constraints. This is not a competitor to tools like Diaphora or BinNavi, but it is ideal to find a known function in a new binary for cases where classical bindiffing fails. Filtering with Rules The main functionality of FindFunc is letting the user specify a set of “Rules” or constraints that a code function in IDA PRO has to satisfy. FF will then find and list all functions that satisfy ALL rules (so currently all Rules are in an AND-conjunction). Exception: Rules can be “inverted” to be negative matches. Such rules thus conform to “AND NOT”. FF will schedule the rules in a smart order to minimize processing time. Feature overview: Currently, 6 Rules are available, see below Code matching respects Addressing-Size-Prefix and Operand-Size-Prefix Aware of function chunks Smart scheduling of rules for performance Saving/Loading rules from/to file in simple ascii format Several independent Tabs for experimentation Copying rules between Tabs via clipboard (same format as a file format) Advanced copying of instruction bytes (all, opcodes only, all except immediate) Button “Search Functions” clears existing results and starts a fresh search, “Refine Results” considers only results of the previous search. Advanced Binary Copying A secondary feature of FF is the option to copy binary representation of instructions with the following options: copy all -> copy all bytes to the clipboard copy without immediate -> blank out (AA ?? BB) any immediate values in the instruction bytes opcode only -> will blank out everything except the actual opcode(s) of the instruction (and prefixes) [hide][Hidden Content]]
  23. DDWPasteRecon Pastesites are websites that allow users to share plain text through public posts called “pastes.” Once attackers compromise the external perimeter and gain access to the internal resources they release the part of data on the “paste” sites like pastebin or hastebin. As these hackers or malicious groups publish dumps on such sites other users can see sensitive information through paste sites. With various malicious groups now using these services as communication channels, temporary storage or sharing, and various other sources being used to trade POC code, I thought it would be a good idea to have an easy tool to help organisations Blue and Red Teams to have visibility into these sites via Google dorks. DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, and password hashes. It also allows members of SOC & Blue Team to gain situational awareness of the organisation’s web exposure on the pastesites. It Utilises Google’s indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats. [hide][Hidden Content]]
  24. Obfuscation Detection Automatically detect obfuscated code and other state machines Scripts to automatically detect obfuscated code and state machines in binaries. Implementation is based on IDA 7.4+ (Python3). Check out the following blog posts for more information on the Binary Ninja implementation: Automated Detection of Control-flow Flattening Automated Detection of Obfuscated Code Referenced Repository Note: Due to the recursive nature of plotting a dominator tree of every found function within the binary, the implementation and runtime overhead is expensive. As such, the flattening heuristic is omitted when the binary loaded has more than 50 functions. Functions will be skipped if the ctree structure is too large (more than 50 nodes) to prevent crashes. Changelog v1.7 Support for IDA 7.4+ (Including 7.7 onwards) Added version check for deprecated API functions [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.