Jump to content

Search the Community

Showing results for tags 'collection'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Download and Read Unlimited E-Books Online | for 2022 Collection [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]
  2. Traditional Fonts Collection Licensed. Royalty-Free. Ready for any project. Our Traditional Fonts Collection comes with unique and professionally created fonts that represent a modern take on traditional fonts and makes a great addition to any font library. What’s Included The Creative Fonts Traditional Collection is a unique, hand selected group of fonts. Each font is categorized into themed sets that you can view in more detail below. Classic Fonts Cursive Fonts Creativity Fonts Designer Fonts Cool Fonts Handwriting Fonts [Hidden Content] [Hidden Content]
  3. 5 downloads

    11GB THE COLLECTION OF MOST VALUABLE & PREMIUM Mix Categorized Courses of :- Python 3 C Programming C++ Graphics Design Software Testing JavaScript Vue.js Cyber Security Node.js Video Editing SEO Affiliate Marketing HTML CSS Django Laravel MySQL Database Wordpress Beginners Game Designing AR VR Java with OOP WordPress Theme Development Game Development Angular 8 React Digital Marketing Qt 5 C++ Data Structure and Algorithm Geometry 3D Animation Maya App Development Link : Download Free for users PRIV8
    From $110 PRIV8
  4. View File 11GB THE COLLECTION OF MOST VALUABLE & PREMIUM 11GB THE COLLECTION OF MOST VALUABLE & PREMIUM Mix Categorized Courses of :- Python 3 C Programming C++ Graphics Design Software Testing JavaScript Vue.js Cyber Security Node.js Video Editing SEO Affiliate Marketing HTML CSS Django Laravel MySQL Database Wordpress Beginners Game Designing AR VR Java with OOP WordPress Theme Development Game Development Angular 8 React Digital Marketing Qt 5 C++ Data Structure and Algorithm Geometry 3D Animation Maya App Development Link : Download Free for users PRIV8 Submitter dEEpEst Submitted 25/09/22 Category Libro Online Password ********  
  5. Table of contents 🚀 How to use? 📺 Playlists 🗓 EPG 🗄 Database 👨‍💻 API 📚 Resources 💬 Discussions 🛠 Contribution ⚖ Legal © License [hide][Hidden Content]]
  6. View File Ethical Hacking Courses Collection Udemy Ethical Hacking Courses Collection Udemy + Bug Bounty Android Hacking + Bud Bounty Hunting Guide to an Advanced Earning Method + Bug Bounty Hunting Offensive Approach to Hunt Bugs + Bug Bounty Web Hacking + CISSP full Course 2020 + Hands on Penetration Testing Labs + Learn Cracking WI-FI passwords keys WEP, WPA WPA2 + Learn Python & Ethical Hacking from Scratch + Masters in Ethical Hacking with Android + Practical Bug Bounty + Practical Ethical Hacking RedTeam Blueprint – A unique guide to Ethical Hacking + Splunk Hands on the Complete Data Analytics + The Complete Ethical Hacking Course + The Complete Hacking Course, by Gerri Banfield + The Complete Namp No-Nonsense Course + Wi-Fi EthicalHacking with Kail + Windows Privilege Escalation for Begineers + Windows Privilege Escalation for OSCP & Beyond! Submitter dEEpEst Submitted 14/07/22 Category Libro Online Password ********  
  7. 3 downloads

    Ethical Hacking Courses Collection Udemy + Bug Bounty Android Hacking + Bud Bounty Hunting Guide to an Advanced Earning Method + Bug Bounty Hunting Offensive Approach to Hunt Bugs + Bug Bounty Web Hacking + CISSP full Course 2020 + Hands on Penetration Testing Labs + Learn Cracking WI-FI passwords keys WEP, WPA WPA2 + Learn Python & Ethical Hacking from Scratch + Masters in Ethical Hacking with Android + Practical Bug Bounty + Practical Ethical Hacking RedTeam Blueprint – A unique guide to Ethical Hacking + Splunk Hands on the Complete Data Analytics + The Complete Ethical Hacking Course + The Complete Hacking Course, by Gerri Banfield + The Complete Namp No-Nonsense Course + Wi-Fi EthicalHacking with Kail + Windows Privilege Escalation for Begineers + Windows Privilege Escalation for OSCP & Beyond!
    $110 PRIV8
  8. OneForAll is a powerful subdomain collection toolsubdomain collection The importance of information collection in penetration testing is self-evident. Subdomain collection is an essential and very important part of information collection. At present, there are many open-source tools for subdomain collection on the Internet, but there are always some of the following problems: Not powerful enough,there are not enough interfaces to collect subdomains automatically, and there are no functions such as automatic subdomain resolve, verification, FUZZ, and information expansion. Not friendly enough,although the command line module is more convenient, but when there are a lot of optional parameters and the operation to be implemented is complex, using command line mode is a bit unfriendly. If there is a good interaction, With a highly operable front end, the experience will be much better. Lack of maintenance,Many tools have not been updated once in years, what issues and PR are, do not exist. Efficiency issues,do not take advantage of multi-process, multi-threading and asynchronous cooperation technology, the speed is slow. 👍Features Powerful collection capability,For more information, please see collection module description. Collect subdomains using certificate transparency (there are currently 6 modules: censys_api,certspotter,crtsh,entrust,google,spyse_api) General check collection subdomains (there are currently 4 modules: domain transfer vulnerability exploitationaxfr, cross-domain policy file cdx, HTTPS certificate cert, content security policy csp, robots file robots, and sitemap file sitemap. Check NSEC record, NSEC3 record and other modules will be added later). Collect subdomains using web crawler files (there are currently 2 modules: archirawl, commoncrawl, which is still being debugged and needs to be added and improved). Collect subdomains using DNS datasets (there are currently 23 modules: binaryedge_api, bufferover, cebaidu, chinaz, chinaz_api, circl_api, dnsdb_api, dnsdumpster, hackertarget, ip138, ipv4info_api, netcraft, passivedns_api, ptrarchive, qianxun, rapiddns, riddler, robtex, securitytrails_api, sitedossier, threatcrowd, wzpc, ximcx) Collect subdomains using DNS queries (There are currently 5 modules: collecting subdomains srv by enumerating common SRV records and making queries, and collecting subdomains by querying MX,NS,SOA,TXT records in DNS records of domain names). Collect subdomains using threat intelligence platform data (there are currently 6 modules: alienvault, riskiq_ api, threatbook_ api, threatkeeper , virustotal, virustotal_ api, which need to be added and improved). Use search engines to discover subdomains (there are currently 18 modules: ask, baidu, bing, bing_api, duckduckgo, exalead, fofa_api, gitee, github, github_api, google, google_api, shodan_api, so, sogou, yahoo, yandex, zoomeye_api), except for special search engines in the search module. General search engines support automatic exclusion of search, full search, recursive search. Support subdomain blasting,This module has both conventional dictionary blasting and custom fuzz mode. It supports batch blasting and recursive blasting, and automatically judges pan-parsing and processing. Support subdmain verification,default to enable subdomain verification, automatically resolve subdomain DNS, automatically request subdomain to obtain title and banner, and comprehensively determine subdomain survival. Support subdomain takeover,By default, subdomain takeover risk checking is enabled. Automatic subdomain takeover is supported (only Github, remains to be improved at present), and batch inspection is supported. Powerful processing feature,The found subdomain results support automatic removal, automatic DNS parsing, HTTP request detection, automatic filtering of valid subdomains, and expansion of Banner information for subdomains. The final supported export formats are rst, csv, tsv, json, yaml, html, xls, xlsx, dbf, latex, ods. Very fast,collection module uses multithreaded calls, blasting module uses massdns, the speed can at least reach 10000pps under the default configuration, and DNS parsing and HTTP requests use asynchronous multiprogramming in subdomain verification. Multithreaded check subdomain takeover risk. Good experience,Each module has a progress bar, and the results of each module are saved asynchronously. [hide][Hidden Content]]
  9. 4 downloads

    15 Earn Via Facebook Ads paid Courses Collection Size: 50GB+ Download: Free for users PRIV8
    $110 PRIV8
  10. View File 15 Earn Via Facebook Ads paid Courses Collection 15 Earn Via Facebook Ads paid Courses Collection Size: 50GB+ Download: Free for users PRIV8 Submitter dEEpEst Submitted 01/06/22 Category Libro Online Password ********  
  11. AWS Recon A multi-threaded AWS inventory collection tool. The creators of this tool have a recurring need to be able to efficiently collect a large amount of AWS resource attributes and metadata to help clients understand their cloud security posture. There are a handful of tools (e.g. AWS Config, CloudMapper, CloudSploit, Prowler) that do some form of resource collection to support other functions. But we found we needed broader coverage and more details at a per-service level. We also needed a consistent and structured format that allowed for integration with our other systems and tooling. Enter AWS Recon, multi-threaded AWS inventory collection tool written in plain Ruby. Though most AWS tooling tends to be dominated by Python, the Ruby SDK is quite mature and capable. The maintainers of the Ruby SDK have done a fantastic job making it easy to handle automatic retries, paging of large responses, and threading huge numbers of requests. Changelog v0.5.21 Add S3 bucket object ownership (ref). [hide][Hidden Content]]
  12. Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by automatically: executing Kali Linux tools (e.g., dnsrecon, gobuster, hydra, nmap, etc.) querying publicly available APIs (e.g., Censys.io, Haveibeenpwned.com, Hunter.io, Securitytrails.com, DNSdumpster.com, Shodan.io, etc.) storing the collected data in a central rational database (see next section) providing an interface to query and analyze the gathered intelligence After the execution of each Kali Linux tool or querying APIs, KIS analyses the collected information and extracts as well as reports interesting information like newly identified user credentials, hosts/domains, TCP/UDP services, HTTP directories, etc. The extracted information is then internally stored in different PostgreSql database tables, which enables the continuous, structured enhancement and re-use of the collected intelligence by subsequently executed Kali Linux tools. [hide][Hidden Content]]
  13. Summitsoft Creative Fonts – The creative team at SummitType Foundry, a division of Summitoft, designs and builds every typeface in our collection. Each font is unique and cannot be found anywhere else, making Creative Fonts a great source for your unique projects. Features Traditional Font • Collection The Traditional Font Collection includes unique fonts such as classic, cursive, creative, designer, cool, and handwritten fonts. A remarkable collection of fonts • Collection Wonderful Fonts Collection includes unique fonts, such as science fiction, funny, sports, fantastic, game and comic fonts. Collection of seasonal fonts • The seasonal font collection includes unique fonts and pictures such as Christmas, Spring, Halloween, Classroom, Valentine’s Day and Wedding. High quality and uniqueness • All of our creative fonts are OpenType, the industry standard used by Microsoft® and Adobe®. This means they remain sharp and crisp at any size. Complete character sets • Each creative font contains a complete character set as well as all international and foreign language symbols and special characters. [Hidden Content] [hide][Hidden Content]]
  14. Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by automatically: executing Kali Linux tools (e.g., dnsrecon, gobuster, hydra, nmap, etc.) querying publicly available APIs (e.g., Censys.io, Haveibeenpwned.com, Hunter.io, Securitytrails.com, DNSdumpster.com, Shodan.io, etc.) storing the collected data in a central rational database (see next section) providing an interface to query and analyze the gathered intelligence After the execution of each Kali Linux tool or querying APIs, KIS analyses the collected information and extracts as well as reports interesting information like newly identified user credentials, hosts/domains, TCP/UDP services, HTTP directories, etc. The extracted information is then internally stored in different PostgreSql database tables, which enables the continuous, structured enhancement and re-use of the collected intelligence by subsequently executed Kali Linux tools. Additional features are: pre-defined dependencies between Kali Linux tools ensure that relevant information like SNMP default community strings or default credentials is known to KIS before trying to access the respective services remembering the execution status of each Kali Linux tool and API query ensures that already executed OS commands are not automatically executed again data imports of scan results of external scanners like Masscan, Nessus, or Nmap supporting the intelligence collection based on virtual hosts (vhost) using a modular approach that allows the fast integration of new Kali Linux tools parallel Kali Linux command execution by using a specifiable number of threads enables users to kill Kali commands via the KIS user interface in case they take too long access public APIs to enhance data with OSINT [hide][Hidden Content]]
  15. 6 downloads

    Advanced Ethical Hacking : Network and Web PenTesting Courses Collection PART : 1 What you'll learn? Network Hacking Wireless Hacking Router Hacking Mobile Phones Hacking And Many More........ -------------------------------------------------------------- Requirements:- VirtualBox 8 GB RAM for setting up the Labs Wireless Router At the end, we require you to please, have DISCIPLINE. Do not try to attack what you don't own and/or what you are not allowed to. Download Link: Free for users PRIV8
    $110 PRIV8
  16. View File Advanced Ethical Hacking : Network and Web PenTesting Courses Collection [7GB] Advanced Ethical Hacking : Network and Web PenTesting Courses Collection PART : 1 What you'll learn? Network Hacking Wireless Hacking Router Hacking Mobile Phones Hacking And Many More........ -------------------------------------------------------------- Requirements:- VirtualBox 8 GB RAM for setting up the Labs Wireless Router At the end, we require you to please, have DISCIPLINE. Do not try to attack what you don't own and/or what you are not allowed to. Download Link: Free for users PRIV8 Submitter dEEpEst Submitted 31/10/21 Category Libro Online Password ********  
  17. SpoolSploit A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. Summary SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relaying machine accoun [hide][Hidden Content]]
  18. View File 800GB+ Collection Of IT Stuff 800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup Submitter dEEpEst Submitted 31/07/21 Category Libro Online Password ********  
  19. 16 downloads

    800GB+ Collection Of IT Stuff *In This Course You Will Get Books , Video Tutorials , Softwares About Hacking And More.. Download Link: Free for users PRIV8 * no backup
    $110 PRIV8
  20. 11 downloads

    Full Trading Course Collection Be A Pro Trader With This Course *Learn Trading Basic To Advance , And Trade Like Pro Never Lose You Money While Trading. Download Link: Free for users PRIV8
    $110 PRIV8
  21. View File 938GB Full Trading Course Collection Be A Pro Trader With This Course Full Trading Course Collection Be A Pro Trader With This Course *Learn Trading Basic To Advance , And Trade Like Pro Never Lose You Money While Trading. Download Link: Free for users PRIV8 Submitter dEEpEst Submitted 25/07/21 Category Libro Online Password ********  
  22. IPTV Collection of publicly available IPTV channels from all over the world. Internet Protocol television (IPTV) is the delivery of television content over Internet Protocol (IP) networks. [hide][Hidden Content]]
  23. 30 downloads

    HACKPACK | PREMIUM STUFF'S | MASSIVE COLLECTION This Hack Pack Includes 13 GB Of Hacking Tutorials ,Tools ,BlackHat Guides , Accounts ,Bombers ,BotNet Etc.. LINK - Download Free for users PRIV8 tools must be run in a secure environment, they are also not backed up
    $110 PRIV8
  24. View File Hackpack | Premium Stuff'S | Massive Collection HACKPACK | PREMIUM STUFF'S | MASSIVE COLLECTION This Hack Pack Includes 13 GB Of Hacking Tutorials ,Tools ,BlackHat Guides , Accounts ,Bombers ,BotNet Etc.. LINK - Download Free for users PRIV8 tools must be run in a secure environment, they are also not backed up Submitter dEEpEst Submitted 24/06/21 Category Files Password ********  
  25. 14 downloads

    6TB Of Courses Collection Contains Social Media Marketing, Influencing, Youtube Growth And Many Other Courses Link: Free Download for users PRIV8 File without backup
    $110 PRIV8

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.