Search the Community

Showing results for tags 'device'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 15 results

  1. ETHICAL HACKING USING ANDROID DEVICE In This Course You Get Some Videos Tutorials For Learning Hacking Using Android Devices LINK - [Hidden Content]
  2. ABOUT TOOL : Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. AVAILABLE ON : Termux TESTED ON : Termux REQUIREMENTS : internet external storage permission storage 400 MB 1gb ram FEATURES : [+] Dangerous virus tool ! [+] Updated maintainence ! [+] Easy for beginners ! [+] Working virus tool for termux ! [hide][Hidden Content]]
  3. Legal disclaimer: Usage of Locator for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  4. dEEpEst

    Kill Android Device [FUD]

    Kill Android Device The application consumes all Android ram and replicates the same process again n again which causes other applications not to be executed resulting Android crash and a reboot is needed to fix your device. A kind of evil app for pranks. Works on every latest Android including Android 9. Fully undetectable from Play Protect and Other Antiviruses so don't upload on shits like VirusTotal or any. [Hidden Content]
  5. [Hidden Content]
  6. Many Cisco devices such as Cisco RV340, Cisco RV340W, Cisco RV345, Cisco RV345P, Cisco RV260, Cisco RV260P, Cisco RV260W, Cisco 160, and Cisco 160W suffer from having hard-coded credentials, known GNU glibc, known BusyBox, and IoT Inspector identified vulnerabilities. View the full article
  7. dEEpEst

    ​​Advantage To Root Your Device

    Advantage To Root Your Device [Hidden Content]
  8. Cisco Catalyst 3850 Series Device Manager version 3.6.10E suffers from a cross site request forgery vulnerability. View the full article
  9. Using open Adb ports we can exploit an Andriod device. you can find open ports here [Hidden Content] To find out how to access a local device --> [Hidden Content] Recent News (New Update v.1.2) Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery Status Get Current Activity [Hidden Content]
  10. On Microsoft Windows, the NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. View the full article
  11. Turn Android Device into a Web Server Following are the steps: [Hidden Content]
  12. Device Monitoring Studio version denial of service proof of concept exploit. View the full article
  13. FLIR Systems FLIR thermal traffic cameras suffers from a websocket device manipulation vulnerability. View the full article
  14. Faleemi Desktop Software version 1.8.2 suffers from a buffer overflow vulnerability. View the full article