Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'creating'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 9 results

  1. [Hidden Content]
  2. Creating a complex Config (Tokens) Part 1 Creating a complex Config (Tokens) Part 2 [hide][Hidden Content]]
  3. Social Media Vlogging: Creating Engaging Authentic Videos Do you want to become a social media vlogger? Do you want to use social media platforms such as Facebook, LinkedIn and Instagram to grow your personal brand and find new audiences? Social media vloggers post short, authentic video messages to their audience on a daily or weekly basis. If you want to become a YouTuber, vlogger, blogger, podcaster or social media influencer you need to use social media vlogging to grow your audience. On this course you will learn how to… Use lights, cameras and easy/cheap sound tech to ensure your videos look and sound great How to look a pro on camera – costume, communication skills and scripting Discover how to work social media vlogging into your weekly workflow to ensure you are consistent and successful. This course is specifically for people who are looking for practical advice on how to use consumer tech to create quality authentic videos on a regular basis. I’m looking forward to teach you. Lets start learning. To take part in this course you will need… Smartphone, tablet or computer with a camera and access to the internet A microphone and tripod/selfie stick are also useful Loads of creative ideas and energy [Hidden Content] [Hidden Content]
  4. Creating a Dev Environment in AWS with Terraform by Philip Afable If you work in Azure development, this course from CloudSkills.io can show you some best practices for setting up a development environment in AWS. Instructor Philip Afable introduces you to Terraform and shows you how to download and start using it. Philip covers the Lambda function, including how to set it up, write it, troubleshoot it, and update it. He explains how to create a Simple Queue Service (SQS) queue and link this new queue to your Lambda function. Philip concludes with how you can use WorkSpaces and manage regions in your development and production environments. Note: This course was created by CloudSkills.io. We are pleased to host this training in our library. [Hidden Content] [hide][Hidden Content]]
  5. A helper utility for creating shellcodes. Cleans MASM file generated by MSVC gives refactoring hints.creating shellcodes Changelog v0.2 Contains: masm_shc.exe runshc32.exe runshc64.exe BUGFIX fixed bug in inlining of string lists ( Issue #1 ) [hide][Hidden Content]]
  6. Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices. [Hidden Content] [hide][Hidden Content]]
  7. Introduction Pixload is an advanced set of tools that allows you to hide payloads within image files by either creating or injecting the intended payload into the desired image. Pixload: Image Payload Creating & Injecting Tools This set of tools has the ability to give you an access to some sophisticated hacking functions. Through it, you can create Polyglot files that can be used to sidestep the standard CSP security procedures by injecting the necessary attack scripts into a given image file. Polyglot files can be very effective when exploiting browsers such as Firefox, IE11, Edge, and Safari. One of the advantages of this type of exploit is that it can allow you to deploy attack files in the form of JavaScript or image files. The payloads which have been deployed can also be easily extracted without applying any external script during an attack. With Pixload you can also be able to exploit server-side misconfigurations by scripting malicious codes into the available system files.Through GD file manipulation PHP shells can be restructured in the form of PNG and IDAT chunks. Features: Bypassing CSP using polyglot JPEGs Encoding Web Shells in PNG IDAT chunks Hidden malvertising attacks (with Polyglot images) XSS payload revisiting (in PNG and IDAT chunks) XSS Facebook upload (Wonky and PNG content) [hide][Hidden Content]]
  8. [Hidden Content] In this video I showcase usage of the Setoolkit, available in Kali Linux. I go into how to create and use the credential harvester, inorder to help you understand how to make a phishing website. MrTech
  9. Creating SQLi Private Combo - Advanced guide [HIDE][Hidden Content]] Pass: level23hacktools.com
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.