Search the Community

Showing results for tags 'collection'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 58 results

  1. SpoolSploit A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. Summary SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relaying machine accoun [hide][Hidden Content]]
  2. View File 800GB+ Collection Of IT Stuff 800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup Submitter dEEpEst Submitted 31/07/21 Category Libro Online Password ********  
  3. 10 downloads

    800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup

    $100.00 PRIV8

  4. 8 downloads

    Full Trading Course Collection Be A Pro Trader With This Course *Learn Trading Basic To Advance , And Trade Like Pro Never Lose You Money While Trading. Download Link: Free for users PRIV8

    $100.00 PRIV8

  5. View File 938GB Full Trading Course Collection Be A Pro Trader With This Course Full Trading Course Collection Be A Pro Trader With This Course *Learn Trading Basic To Advance , And Trade Like Pro Never Lose You Money While Trading. Download Link: Free for users PRIV8 Submitter dEEpEst Submitted 25/07/21 Category Libro Online Password ********  
  6. IPTV Collection of publicly available IPTV channels from all over the world. Internet Protocol television (IPTV) is the delivery of television content over Internet Protocol (IP) networks. [hide][Hidden Content]]
  7. 11 downloads

    HACKPACK | PREMIUM STUFF'S | MASSIVE COLLECTION This Hack Pack Includes 13 GB Of Hacking Tutorials ,Tools ,BlackHat Guides , Accounts ,Bombers ,BotNet Etc.. LINK - Download Free for users PRIV8 tools must be run in a secure environment, they are also not backed up

    $100.00 PRIV8

  8. View File Hackpack | Premium Stuff'S | Massive Collection HACKPACK | PREMIUM STUFF'S | MASSIVE COLLECTION This Hack Pack Includes 13 GB Of Hacking Tutorials ,Tools ,BlackHat Guides , Accounts ,Bombers ,BotNet Etc.. LINK - Download Free for users PRIV8 tools must be run in a secure environment, they are also not backed up Submitter dEEpEst Submitted 24/06/21 Category Files Password ********  
  9. dEEpEst

    6TB Of Courses Collection

    13 downloads

    6TB Of Courses Collection Contains Social Media Marketing, Influencing, Youtube Growth And Many Other Courses Link: Free Download for users PRIV8 File without backup

    $100.00 PRIV8

  10. View File 6TB Of Courses Collection 6TB Of Courses Collection Contains Social Media Marketing, Influencing, Youtube Growth And Many Other Courses Link: Free Download for users PRIV8 File without backup Submitter dEEpEst Submitted 08/06/21 Category Libro Online Password ********  
  11. MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats. The new version of MagicRecon has a large number of new tools to automate as much as possible the process of collecting data from a target and searching for vulnerabilities. It also has a menu where the user can select which option he wants to execute. This new version also has the option of "Install dependencies" with which the user can easily install all the tools and dependencies that are needed to run MagicRecon. The script code has been made in a modular way so that any user can modify it to their liking. With MagicRecon you can easily find: Sensitive information disclosure. Missing HTTP headers. Open S3 buckets. Subdomain takeovers. SSL/TLS bugs. Open ports and services. Email spoofing. Endpoints. Directories. Juicy files. Javascript files with senstive info. CORS missconfigurations. Cross-site scripting (XSS). Open Redirect. SQL Injection. Server-side request forgery (SSRF). CRLF Injection. Remote Code Execution (RCE). Other bugs. [hide][Hidden Content]]
  12. 12 downloads

    Collection List: Bug Bounty Android Hacking Bud Bounty Hunting Guide to an Advanced Earning Method Bug Bounty Hunting Offensive Approach to Hunt Bugs Bug Bounty Web Hacking CISSP full Course 2020 Hands on Penetration Testing Labs Learn Cracking WI-FI passwords keys WEP, WPA WPA2 Learn Python & Ethical Hacking from Scratch Masters in Ethical Hacking with Android Practical Bug Bounty Practical Ethical Hacking RedTeam Blueprint – A unique guide to Ethical Hacking Splunk Hands on the Complete Data Analytics The Complete Ethical Hacking Course The Complete Hacking Course, by Gerri Banfield The Complete Namp No-Nonsense Course Wi-Fi EthicalHacking with Kail Windows Privilege Escalation for Begineers Windows Privilege Escalation for OSCP & Beyond! Download: Free for users PRIV8

    $100.00 PRIV8

  13. View File Udemy Cyber Security Course Collection Collection List: Bug Bounty Android Hacking Bud Bounty Hunting Guide to an Advanced Earning Method Bug Bounty Hunting Offensive Approach to Hunt Bugs Bug Bounty Web Hacking CISSP full Course 2020 Hands on Penetration Testing Labs Learn Cracking WI-FI passwords keys WEP, WPA WPA2 Learn Python & Ethical Hacking from Scratch Masters in Ethical Hacking with Android Practical Bug Bounty Practical Ethical Hacking RedTeam Blueprint – A unique guide to Ethical Hacking Splunk Hands on the Complete Data Analytics The Complete Ethical Hacking Course The Complete Hacking Course, by Gerri Banfield The Complete Namp No-Nonsense Course Wi-Fi EthicalHacking with Kail Windows Privilege Escalation for Begineers Windows Privilege Escalation for OSCP & Beyond! Download: Free for users PRIV8 Submitter dEEpEst Submitted 16/04/21 Category Libro Online Password ********  
  14. 1 ) DCOM Lateral Movement A quick PoC that uses DCOM (ShellWindows) via beacon object files for lateral movement. You can either specify credentials or use the current user. To use the current user, just leave the domain, username, and password empty. A short article can be about using COM objects in C can be found here. 2 ) WMI Lateral Movement – Win32_Process Create Similar concepts to the previous one, but an interesting learning experience. Code adopted from CIA Vault 8. This method uses the class Win32_Process. 3 ) WMI Lateral Movement – Event Subscription This one uses WMI events for lateral movement. Most of the heavy lifting was done by wumb0in 4 ) On-demand C2 This is an implementation of an on-demand C2 using dotnet BOF. The beacon will enter a sleep state until an email with a given word (in subject or body) is provided. This way your beacon will only call home ONLY when you want it to call home. When the beacon calls home, it will call home with whatever sleep time configured in the malleable profile. When you are done, you can run the BOF again, and the beacon will sleep until you send another email. As an extra, the email with the given word will be deleted before the user gets notified about it. [hide][Hidden Content]]
  15. Stealers list Currently this stealers are aviable: Telegram session stealer ( Based on telegram-stealer ) Chrome stealers: Passwords stealer History stealer Cookies stealer Steam session stealer SSH key stealer Guideline Register FTP server Start build.py Follow the instructions Wait while script is compiling Send file to victim and get files on server [hide][Hidden Content]]
  16. massExploitConsole a collection of tools with a cli ui Disclaimer Please use this tool only on authorized systems, I’m not responsible for any damage caused by users who ignore my warning I do not own the code of adapted exploits or tools exploits are adapted from other sources, please refer to their author info Please note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugs Feature an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) google page crawler with gecko and Firefox (not fully working) a simple Baidu crawler (multi-threaded) censys host scan Changelog v2.3.3 proxy_pool fix [hide][Hidden Content]]
  17. OneForAll is a powerful subdomain collection toolsubdomain collection The importance of information collection in penetration testing is self-evident. Subdomain collection is an essential and very important part of information collection. At present, there are many open-source tools for subdomain collection on the Internet, but there are always some of the following problems: Not powerful enough,there are not enough interfaces to collect subdomains automatically, and there are no functions such as automatic subdomain resolve, verification, FUZZ, and information expansion. Not friendly enough,although the command line module is more convenient, but when there are a lot of optional parameters and the operation to be implemented is complex, using command line mode is a bit unfriendly. If there is a good interaction, With a highly operable front end, the experience will be much better. Lack of maintenance,Many tools have not been updated once in years, what issues and PR are, do not exist. Efficiency issues,do not take advantage of multi-process, multi-threading and asynchronous cooperation technology, the speed is slow. Features Powerful collection capability,For more information, please see collection module description. Collect subdomains using certificate transparency (there are currently 6 modules: censys_api,certspotter,crtsh,entrust,google,spyse_api) General check collection subdomains (there are currently 4 modules: domain transfer vulnerability exploitationaxfr, cross-domain policy file cdx, HTTPS certificate cert, content security policy csp, robots file robots, and sitemap file sitemap. Check NSEC record, NSEC3 record and other modules will be added later). Collect subdomains using web crawler files (there are currently 2 modules: archirawl, commoncrawl, which is still being debugged and needs to be added and improved). Collect subdomains using DNS datasets (there are currently 23 modules: binaryedge_api, bufferover, cebaidu, chinaz, chinaz_api, circl_api, dnsdb_api, dnsdumpster, hackertarget, ip138, ipv4info_api, netcraft, passivedns_api, ptrarchive, qianxun, rapiddns, riddler, robtex, securitytrails_api, sitedossier, threatcrowd, wzpc, ximcx) Collect subdomains using DNS queries (There are currently 5 modules: collecting subdomains srv by enumerating common SRV records and making queries, and collecting subdomains by querying MX,NS,SOA,TXT records in DNS records of domain names). Collect subdomains using threat intelligence platform data (there are currently 6 modules: alienvault, riskiq_ api, threatbook_ api, threatkeeper , virustotal, virustotal_ api, which need to be added and improved). Use search engines to discover subdomains (there are currently 18 modules: ask, baidu, bing, bing_api, duckduckgo, exalead, fofa_api, gitee, github, github_api, google, google_api, shodan_api, so, sogou, yahoo, yandex, zoomeye_api), except for special search engines in the search module. General search engines support automatic exclusion of search, full search, recursive search. Support subdomain blasting,This module has both conventional dictionary blasting and custom fuzz mode. It supports batch blasting and recursive blasting, and automatically judges pan-parsing and processing. Support subdmain verification,default to enable subdomain verification, automatically resolve subdomain DNS, automatically request subdomain to obtain title and banner, and comprehensively determine subdomain survival. Support subdomain takeover,By default, subdomain takeover risk checking is enabled. Automatic subdomain takeover is supported (only Github, remains to be improved at present), and batch inspection is supported. Powerful processing feature,The found subdomain results support automatic removal, automatic DNS parsing, HTTP request detection, automatic filtering of valid subdomains, and expansion of Banner information for subdomains. The final supported export formats are rst, csv, tsv, json, yaml, html, xls, xlsx, dbf, latex, ods. Very fast,collection module uses multithreaded calls, blasting module uses massdns, the speed can at least reach 10000pps under the default configuration, and DNS parsing and HTTP requests use asynchronous multiprogramming in subdomain verification. Multithreaded check subdomain takeover risk. Good experience,Each module has a progress bar, and the results of each module are saved asynchronously. [hide][Hidden Content]]
  18. OneForAll is a powerful subdomain collection tool The importance of information collection in penetration testing is self-evident. Subdomain collection is an essential and very important part of information collection. At present, there are many open-source tools for subdomain collection on the Internet, but there are always some of the following problems: Not powerful enough,there are not enough interfaces to collect subdomains automatically, and there are no functions such as automatic subdomain resolve, verification, FUZZ, and information expansion. Not friendly enough,although the command line module is more convenient, but when there are a lot of optional parameters and the operation to be implemented is complex, using command line mode is a bit unfriendly. If there is a good interaction, With a highly operable front end, the experience will be much better. Lack of maintenance,Many tools have not been updated once in years, what issues and PR are, do not exist. Efficiency issues,do not take advantage of multi-process, multi-threading and asynchronous cooperation technology, the speed is slow. Features Powerful collection capability,For more information, please see collection module description. Collect subdomains using certificate transparency (there are currently 6 modules: censys_api,certspotter,crtsh,entrust,google,spyse_api) General check collection subdomains (there are currently 4 modules: domain transfer vulnerability exploitationaxfr, cross-domain policy file cdx, HTTPS certificate cert, content security policy csp, robots file robots, and sitemap file sitemap. Check NSEC record, NSEC3 record and other modules will be added later). Collect subdomains using web crawler files (there are currently 2 modules: archirawl, commoncrawl, which is still being debugged and needs to be added and improved). Collect subdomains using DNS datasets (there are currently 23 modules: binaryedge_api, bufferover, cebaidu, chinaz, chinaz_api, circl_api, dnsdb_api, dnsdumpster, hackertarget, ip138, ipv4info_api, netcraft, passivedns_api, ptrarchive, qianxun, rapiddns, riddler, robtex, securitytrails_api, sitedossier, threatcrowd, wzpc, ximcx) Collect subdomains using DNS queries (There are currently 5 modules: collecting subdomains srv by enumerating common SRV records and making queries, and collecting subdomains by querying MX,NS,SOA,TXT records in DNS records of domain names). Collect subdomains using threat intelligence platform data (there are currently 6 modules: alienvault, riskiq_ api, threatbook_ api, threatkeeper , virustotal, virustotal_ api, which need to be added and improved). Use search engines to discover subdomains (there are currently 18 modules: ask, baidu, bing, bing_api, duckduckgo, exalead, fofa_api, gitee, github, github_api, google, google_api, shodan_api, so, sogou, yahoo, yandex, zoomeye_api), except for special search engines in the search module. General search engines support automatic exclusion of search, full search, recursive search. Support subdomain blasting,This module has both conventional dictionary blasting and custom fuzz mode. It supports batch blasting and recursive blasting, and automatically judges pan-parsing and processing. Support subdmain verification,default to enable subdomain verification, automatically resolve subdomain DNS, automatically request subdomain to obtain title and banner, and comprehensively determine subdomain survival. Support subdomain takeover,By default, subdomain takeover risk checking is enabled. Automatic subdomain takeover is supported (only Github, remains to be improved at present), and batch inspection is supported. Powerful processing feature,The found subdomain results support automatic removal, automatic DNS parsing, HTTP request detection, automatic filtering of valid subdomains, and expansion of Banner information for subdomains. The final supported export formats are rst, csv, tsv, json, yaml, html, xls, xlsx, dbf, latex, ods. Very fast,collection module uses multithreaded calls, blasting module uses massdns, the speed can at least reach 10000pps under the default configuration, and DNS parsing and HTTP requests use asynchronous multiprogramming in subdomain verification. Multithreaded check subdomain takeover risk. Good experience,Each module has a progress bar, and the results of each module are saved asynchronously. [hide][Hidden Content]]
  19. Andriller CE (Community Edition) Andriller – is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. Features Automated data extraction and decodingThis feature allows importing individual App database files for automated parsing of the data. There are decoders mainly for Android and some for Apple iOS Apps. Once successfully decoded, reports will be shown on your web browser. Databases can be exported from mainstream forensic tools, such as XRY, UFED Cellebite, Oxygen Forensic, and imported into Andriller for individual decoding. The output from Andriller offers cleaner output data. Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (backup.ab files)This will parse folder structures from Android filesystems and will produce Andriller style reports. These could be exports of the filesystem from raw image files, or from ‘adb pull /data’ extractions, or unpacked ‘.tar’ files content.Tarball Files This will parse and decode nanddroid backup files such as ‘data.tar’ (including concatenated files), and will produce Andriller style reports. Nanddroid tarball backups are usually produced by custom recoveries, such as ClockWorkMod and TWRP.Android Backup Files This will parse and decode ‘backup.ab’ files, and will produce Andriller style reports. Selection of individual database decoders for Android apps Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right key file) Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) Unpacking the Android backup files Screen capture of a device’s display screen Changelog v3.5.2 Switched timeouts to wrapt_timeout_decorator to fix bug with Python 3.8 [hide][Hidden Content]]
  20. Collection List: Bug Bounty Android Hacking Bud Bounty Hunting Guide to an Advanced Earning Method Bug Bounty Hunting Offensive Approach to Hunt Bugs Bug Bounty Web Hacking CISSP full Course 2020 Hands on Penetration Testing Labs Learn Cracking WI-FI passwords keys WEP, WPA WPA2 Learn Python & Ethical Hacking from Scratch Masters in Ethical Hacking with Android Practical Bug Bounty Practical Ethical Hacking RedTeam Blueprint – A unique guide to Ethical Hacking Splunk Hands on the Complete Data Analytics The Complete Ethical Hacking Course The Complete Hacking Course, by Gerri Banfield The Complete Namp No-Nonsense Course Wi-Fi EthicalHacking with Kail Windows Privilege Escalation for Begineers Windows Privilege Escalation for OSCP & Beyond! [hide][Hidden Content]]
  21. 29 downloads

    Mega Collection Of Courses ✓Affiliate Marketing ✓Email Marketing ✓Instagram Marketing ✓Cryptocurrency Courses ✓Dropshipping ✓E-commerce Courses ✓Facebook Advertising ✓Funnel Building ✓Messenger Bot Building ✓Personal Brand Building ✓Google Adwords ✓SEO Courses ✓Ebooks ✓Amazon FBA ✓Social Media Marketing Size: 1.3TB Link: FREE DOWNLOAD FOR USERS PRIV8

    $100.00 PRIV8

  22. View File Mega Collection Of Courses [1.3TB] Mega Collection Of Courses ✓Affiliate Marketing ✓Email Marketing ✓Instagram Marketing ✓Cryptocurrency Courses ✓Dropshipping ✓E-commerce Courses ✓Facebook Advertising ✓Funnel Building ✓Messenger Bot Building ✓Personal Brand Building ✓Google Adwords ✓SEO Courses ✓Ebooks ✓Amazon FBA ✓Social Media Marketing Size: 1.3TB Link: FREE DOWNLOAD FOR USERS PRIV8 Submitter dEEpEst Submitted 23/08/20 Category Libro Online Password ********  
  23. 32 downloads

    ×50 Paid Hacking EBook Collection Contains Best EBooks For Hacking, Pentesting, Programming and Money-Making Methods. Download Link : Free download for Users PRIV8

    $100.00 PRIV8

  24. View File ​×50 Paid Hacking EBook Collection ×50 Paid Hacking EBook Collection Contains Best EBooks For Hacking, Pentesting, Programming and Money-Making Methods. Download Link : Free download for Users PRIV8 Submitter dEEpEst Submitted 19/08/20 Category Libro Online Password ********  
  25. 21 Files - PDF [hide][Hidden Content]]