Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'device'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 19 results

  1. I have a question, is there a device for penetration through the electrical circuit without any connection in the network? Does shop.hak5.org have a product that does this job? I hope you can help me to get an answer.
  2. Hours of Content: 5.5 Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smartphones and tablet that use a different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus and Firewall on their computers while the truth is that all the data is replicated on their smartphone or another android devices that is very easy to compromise. This course consist of three different parts, first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and the third part is how to hack using Android devices, finally I would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques. What are the requirements? Basic knowledge of computer hardware, software, and operating systems What am I going to get from this course? Learn Basic Hacking skills Learn Kali Linux Learn the major tools of Kali Linux Setup Testing lab Learn hot to hack Android devices Learn How to hack using Android devices Learn Exploitation techniques Learn Metasploit basics What is the target audience? You Penetration Testers Students who are intersted in learning Hacking skills speically in Android platform [Hidden Content] [hide][Hidden Content]]
  3. ETHICAL HACKING USING ANDROID DEVICE In This Course You Get Some Videos Tutorials For Learning Hacking Using Android Devices LINK - [Hidden Content]
  4. ABOUT TOOL : Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. AVAILABLE ON : Termux TESTED ON : Termux REQUIREMENTS : internet external storage permission storage 400 MB 1gb ram FEATURES : [+] Dangerous virus tool ! [+] Updated maintainence ! [+] Easy for beginners ! [+] Working virus tool for termux ! [hide][Hidden Content]]
  5. Legal disclaimer: Usage of Locator for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  6. Kill Android Device The application consumes all Android ram and replicates the same process again n again which causes other applications not to be executed resulting Android crash and a reboot is needed to fix your device. A kind of evil app for pranks. Works on every latest Android including Android 9. Fully undetectable from Play Protect and Other Antiviruses so don't upload on shits like VirusTotal or any. [Hidden Content]
  7. Many Cisco devices such as Cisco RV340, Cisco RV340W, Cisco RV345, Cisco RV345P, Cisco RV260, Cisco RV260P, Cisco RV260W, Cisco 160, and Cisco 160W suffer from having hard-coded credentials, known GNU glibc, known BusyBox, and IoT Inspector identified vulnerabilities. View the full article
  8. Advantage To Root Your Device [Hidden Content]
  9. Cisco Catalyst 3850 Series Device Manager version 3.6.10E suffers from a cross site request forgery vulnerability. View the full article
  10. Using open Adb ports we can exploit an Andriod device. you can find open ports here [Hidden Content] To find out how to access a local device --> [Hidden Content] Recent News (New Update v.1.2) Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery Status Get Current Activity [Hidden Content]
  11. On Microsoft Windows, the NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. View the full article
  12. Turn Android Device into a Web Server ✅Following are the steps: [Hidden Content]
  13. Email/User: Email Proxies: Yes Capture: Yes Recommended Bots: 150 Recommended OB ver: 1.0.0 [HIDE][Hidden Content]]
  14. Device Monitoring Studio version 8.10.00.8925 denial of service proof of concept exploit. View the full article
  15. FLIR Systems FLIR thermal traffic cameras suffers from a websocket device manipulation vulnerability. View the full article
  16. Faleemi Desktop Software version 1.8.2 suffers from a buffer overflow vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.