Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 291 results

  1. watermark_disabler Disabling "Activate Windows" watermark made simple, the code in this repository is a PoC, and has not been tested above Windows 10 1803. How does this work? The function responsible for drawing whole desktop including the watermark is xxxDesktopPaintCallback located in win32kfull.sys. Both of the approaches used by this project were found while analyzing functions further down in the callstack. [hide][Hidden Content]]
  2. This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world. [hide][Hidden Content]]
  3. Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! Changelog v0.1.4.1 fix js engine bugs. [hide][Hidden Content]]
  4. scrack

    Cerberus Source Code

    v2 version. Flipper. Since our team (before that the team) ran this business cleanly, as beautifully as possible, we will complete it beautifully. For 70% of clients, financial obligations have already been closed. We ask you to unsubscribe the rest in the LAN or in telegrams, do not forget to write your toad, the license key and the server ip. This is necessary in order for me to make sure that you are the owner of the license. It is also desirable to attach the apk file. Sources to be torn apart, especially for xss.is Cerberus v1 + Cerberus v2 + install scripts + admin panel + sql db [hide][Hidden Content]]
  5. [hide][Hidden Content]]
  6. itsMe

    exeJoinerX Source Code

    Join your two exe files [hide][Hidden Content]]
  7. [hide][Hidden Content]]
  8. itsMe

    E-Clipper Source Code

    [hide][Hidden Content]]
  9. Software Protector AdrenaHeart = The Stub AdrenaEncapsulate = The Builder AdrenaWeb = The Website [hide][Hidden Content]]
  10. English | 2020 | ASIN: B08FJD63MX | 113 Pages | PDF/AZW3/Kindle | 26.3 MB Are you looking for a proven and secure career path for your kid? Maybe he or she is already interested in computer programming or just loves to use a computer for some free time activities? What about a book that would make you and your kid engage, have fun, and learn at the same time? If you answered “Yes” to at least one of these questions, then keep reading… LEARNING PROGRAMMING HAS NEVER BEEN EASIER! PROBABLY THE FASTEST WAY TO MASTER ONE OF THE MOST WIDELY USED CODING LANGUAGES IN THE WORLD… It is not a secret that the world is leading more and more towards science and technology, and the demand for IT and computer programming professionals are higher than ever before! What is the best way to start? I believe that mastering a powerful programming language is one of the best skills you could learn! Which one should you choose? My choice is definitely PYTHON - one of the most popular and widely used programming languages around the world! And it is not as difficult as it may sound… if you are already in computer programming or know a thing or two about Python, you know what I am talking about… If presented correctly, even Your Kids Can Easily Learn It! As young as 7 or 8 years old, sometimes even younger! Inside this book, you’ll find a perfect introduction to Python Programming that will make your kid excited every time he or she sits down in from of the computer. Not to play games – but to learn! [hide][Hidden Content]]
  11. English | 2020 | ISBN: B08FDXVR2P | 107 Pages | PDF/AZW3 | 7.14 MB Do you want to learn a popular programming language in no time? Do you want to improve your skills in coding? Or do you want to learn coding to earn? If your answer to this question is yes, then keep reading! Java is a widely-used programming language on the Web and in computing applications. It is a free download solution that allows users to access the latest versions and implement updates. This particular programming language is present in the majority of today’s web applications and computing technologies. Java’s scalable characteristics make it suitable for deployment in a wide range of applications, including apps for small electronic devices like cell phones and software solutions for large scale operations such as data centers. The growing preference for deploying Java is attributable to its robust functional features and sound security credentials. [hide][Hidden Content]]
  12. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  13. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Changelog 07-25-2020 [update] project not maintained anymore [hide][Hidden Content]]
  14. itsMe

    C# To C++ Code Converter [Cracked]

    C# to C++ Converter C# to C++ Converter produces great C++ code, saving you hours of painstaking work and valuable time. Key Benefits Saves valuable time Accurate and comprehensive Easy to use Safe - your code never leaves your machine Responsive customer support 15 day money-back guarantee Flexible - converts snippets, files, projects, solutions, and folders from C# to C++ Fast - tens of thousands of lines converted from C# to C++ per minute Helpful conversion comments Excellent educational tool for C# developers learning C++ Numerous conversion and formatting options [Hidden Content] [hide][Hidden Content]]
  15. BurpCrypto Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! [hide][Hidden Content]]
  16. [hide][Hidden Content]]
  17. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Todo Version 1.x.x-x: Code optimization Fix issues Improved features already present Add other functionalities [hide][Hidden Content]]
  18. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Changelog 07-14-2020 [upgrade] to version 1.0.10.0 [fix] issue #51 (release on PyPI) [update] change directory name of examples to obfuscation_examples [update] change directory name of exclude to exclude_examples [add] core/utils/intensio_exclude.py file to store all words excluded by default [add] new parameter --excludewords to specify a file to exclude words for -rts, --replacetostr feature [add] new parameter --excludefiles to specify a file to exlude files for -rfn, --replacefilename feature [remove] old release version directory [hide][Hidden Content]]
  19. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Changelog 07-09-2020 [upgrade] to version 1.0.9.9 [fix] issue #53 [fix] issue #44 with pull request #52 [hide][Hidden Content]]
  20. CryDroid v1.1 Android Crypter/Decrypter source code for researchers. Features: Encryption extensions: txt, png, bmp, jpg, mp3, mp4, mpeg, doc, docx, etc (edit app/crypter.part3 to add more) Encrypter/Decrypter using Custom Password [HIDE][Hidden Content]]
  21. EvilOffice v1.0 - Inject Macro and DDE code into Excel and Word documents (reverse shell) Features: Inject malicious Macro on formats: docm, dotm, xlsm, xltm Inject malicious DDE code on formats: doc, docx, dot, xls, xlsx, xlt, xltx Python2/Python3 Compatible Tested: Win10 (MS Office 14.0) Requirements: Microsoft Office (Word/Excel) pywin32: python -m pip install -r requirements.txt Forwarding requirements: Ngrok Authtoken (for TCP Tunneling): Sign up at: [Hidden Content] Your authtoken is available on your dashboard: [Hidden Content] Install your auhtoken: ./ngrok authtoken <YOUR_AUTHTOKEN> [HIDE][Hidden Content]]
  22. What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined then all chars to their hexadecimal value Delete all comments, all spaces lines Padding random snippets code/functions/classes with an always differents values CHANGELOG of Intensio-Obfuscator project 05-30-2020 [update] isse template file [update] documentation for code compatibility documentation [HIDE][Hidden Content]]
  23. QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking. Features: Port Forwarding using Ngrok [HIDE][Hidden Content]]
  24. Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Changelog v05-11-2020 [upgrade] to version 1.0.9.2 [fix] issue #46 – improve detect multiple lines code of Replace string to string and Padding scripts features [add] new parameter to define manually base indentation of python source code [HIDE][Hidden Content]]
  25. Intensio-Obfuscator Intensio-Obfuscator tool takes a python source code and transforms it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with a length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with always different values Features Features Descriptions remove comment Remove all comments (this feature is executed by default) remove space line Remove all spaces line (this feature is executed by default) correction padding empty class/function Adding padding to empty classes and functions, if the class or function contains only comments, the default feature remove comments will leave a class or function empty, this will avoid generating an error (this feature is executed by default) replace string to string mixed Replace all names of variables/classes/functions to random strings with a length defined padding script Adding padding of random scripts after each line replace file name Replace all files name to random strings with a length defined replace string to hex Replace all chars to their hexadecimal value correction remove pyc file Remove all pyc file in the output directory (this feature is executed by default) mixerlevel lower Generate random strings of 32 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel medium Generate random strings of 64 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified mixerlevel high Generate random strings of 128 chars when -rts, –replacetostr or -ps, –paddingscripts or -rfn, –replacefilesname or -rth, –replacetohex parameter are specified replace string to string mixed -> -rts, –replacetostr, padding script -> -ps, –paddingscript, replace file name -> -rfn, –replacefilename, replace string to hex -> -rth, –replacetohex features can be executed separately Changelog v05-09-2020 [upgrade] to version 1.0.9 [fix] issue #26 [fix] issue #23 [fix] regex in delete comments feature which could generate bad behavior with certain type of case involving quotes strings [fix] bad detection when the variable had a value on multiple line in replace string to string feature [update] henceforth it’s possible to launch tool without obfuscation argument as [-rts, -ps, -rfn, -rth] [add] execution time of Intensio-Obfuscator tool [HIDE][Hidden Content]]