Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'domain '.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Domain parser for IPAddress.com Reverse IP Lookup. Writen in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that are hosted on a shared hosting server or finding out which websites are hosted on the same IP address as a particular website. [hide][Hidden Content]]
  2. TMail is a simple to use, fast and mobile-ready temporary email system with an impressive feature set. It takes just 4 min to install TMail on your server [Hidden Content] [hide][Hidden Content]]
  3. TMail is a simple to use, fast and mobile-ready temporary email system with an impressive feature set. It takes just 4 min to install TMail on your server [Hidden Content] [hide][Hidden Content]]
  4. Domain Tools Script is a powerful PHP-based script that consists of many amazing Domain & IP Tools it allows you to search domain names instantly. It has a built-in whois domain tool, domain generator tool, hostname & IP lookup tool, domain DNS records tool. It is built with a fully responsive design based on Latest Bootstrap to ensure that your website will look absolutely flawless and beautiful on every mobile and desktop device. It also has strong cross-browser support. It verifies domain availability by doing a DNS query to get search results as fast as possible. You make money when someone buys domain names through one of your affiliate referral links. You can also earn through Google Adsense or similar platforms. There is a lot more to discover for you & we have great plans for future updates. [Hidden Content] [hide][Hidden Content]]
  5. Masky is a python library providing an alternative way to remotely dump domain users’ credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX, NT hashes, and TGT on a larger scope. This tool does not exploit any new vulnerability and does not work by dumping the LSASS process memory. Indeed, it only takes advantage of legitimate Windows and Active Directory features (token impersonation, certificate authentication via Kerberos & NT hashes retrieval via PKINIT). A blog post was published to detail the implemented technics and how Masky works. [hide][Hidden Content]]
  6. DNS tool that displays information about your domain. Features common records scanning (use -scan) validate DNSSEC chain (use -debug to see more info) change query speed for scanning (default 10 queries per second) diagnostic of your domain (similar to intodns.com, dnsspy.io) For implemented checks see #1 Changelog v1.0.2 571912b Fix missing vendor 9f664f6 Update README bbb2351 Update dependencies 384b1ec Add support for BIMI (#11) 9023c2c Add latest to install command [hide][Hidden Content]]
  7. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  8. Domain Tools Script is a powerful PHP-based script that consists of many amazing Domain & IP Tools it allows you to search domain names instantly. It has a built-in whois domain tool, domain generator tool, hostname & IP lookup tool, domain DNS records tool. It is built with a fully responsive design based on Latest Bootstrap to ensure that your website will look absolutely flawless and beautiful on every mobile and desktop device. It also has strong cross-browser support. It verifies domain availability by doing a DNS query to get search results as fast as possible. You make money when someone buys domain names through one of your affiliate referral links. You can also earn through Google Adsense or similar platforms. There is a lot more to discover for you & we have great plans for future updates. [Hidden Content] [hide][Hidden Content]]
  9. DNS tool that displays information about your domain. Features common records scanning (use -scan) validate DNSSEC chain (use -debug to see more info) change query speed for scanning (default 10 queries per second) diagnostic of your domain (similar to intodns.com, dnsspy.io) For implemented checks see #1 [hide][Hidden Content]]
  10. [Hidden Content] [Hidden Content]
  11. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  12. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  13. Domain Tools Script is a powerful PHP-based script that consists of many amazing Domain & IP Tools it allows you to search domain names instantly. It has a built-in whois domain tool, domain generator tool, hostname & IP lookup tool, domain DNS records tool. It is built with a fully responsive design based on Latest Bootstrap to ensure that your website will look absolutely flawless and beautiful on every mobile and desktop device. It also has strong cross-browser support. It verifies domain availability by doing a DNS query to get search results as fast as possible. You make money when someone buys domain names through one of your affiliate referral links. You can also earn through Google Adsense or similar platforms. There is a lot more to discover for you & we have great plans for future updates. [Hidden Content] [hide][Hidden Content]]
  14. DNS tool that displays information about your domain. Features common records scanning (use -scan) validate DNSSEC chain (use -debug to see more info) change query speed for scanning (default 10 queries per second) diagnostic of your domain (similar to intodns.com, dnsspy.io) For implemented checks see #1 Changelog v1.0 34caf34 Release v1.0.0 7416ac2 Update vendor c5ae22c Fix some linting issues b7942a4 Update vendor 2de2751 Add support for CHAOS to get server version 43682c0 Refactor 9ceb7c2 Remove SOA error. Closes #5 f71b750 Fix JSON output dd0a6d8 Move DNSSEC to check. More refactor 336c734 Fix panic 9070745 Refactor into library. WIP d39e3af Update vendor 3912c82 Clean up based on linters [hide][Hidden Content]]
  15. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  16. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  17. smartbrute The smart password spraying and bruteforcing tool for Active Directory Domain Services. [hide][Hidden Content]]
  18. Hosting Billing is a client management and invoicing system for web hosting and domain registration resellers. It comes packed with features that are designed to automate your daily tasks, saving you time and money. [Hidden Content] [hide][Hidden Content]]
  19. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  20. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  21. RemotePotato0 Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Briefly: It abuses the DCOM activation service and triggers an NTLM authentication of the user currently logged on in the target machine. It is required you have a shell in session 0 (e.g. WinRm shell or SSH shell) and that a privileged user is logged on in session 1 (e.g. a Domain Admin user). Once the NTLM type1 is triggered we set up a cross-protocol relay server that receives the privileged type1 message and relays it to a third resource by unpacking the RPC protocol and packing the authentication over HTTP. On the receiving end, you can set up a further relay node (eg. ntlmrelayx) or relay directly to a privileged resource. [hide][Hidden Content]]
  22. TMail is a simple to use, fast and mobile ready temporary email system with impressive feature set. It takes just 4 min to install TMail on your server. [Hidden Content] [hide][Hidden Content]]
  23. What is this? Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other an how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a password-cracking project by storing/looking up/reporting hashes/passowrds/users. [hide][Hidden Content]]
  24. [Hidden Content]
  25. jackdaw Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other a how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a password-cracking project by storing/looking up/reporting hashes/passwords/users. Features Data acquisition via LDAP LDAP enumeration phase acquires data on AD info, User, Machine, OU, Group objects which will be represented as a node in the graph, and as a separate table in the DB. Additionally, all aforementioned objects’ Security Description will be parsed and the ACLs for the DACL added to the DB. This, together with the membership information will be represented as edges in the graph. Additionally, custom SQL queries can be performed on any of the aforementioned data types when needed. via SMB SMB enumeration phase acquires data on shares, localgroups, sessions, NTLM data via connecting to each machine in the domain (which is acquired via LDAP) via LSASS dumps (optional) The framework allows users to upload LSASS memory dumps to store credentials and extend the session information table. Both will be used as additional edges in the graph (shared password and session respectively). The framework also uses this information to create a password report on weak/shared/cracked credentials. via DCSYNC results (optional) The framework allows users to upload impacket’s DCSYNC files to store credentials. This is used as additional edges in the graph (shared password). The framework also uses this information to create a password report on weak/shared/cracked credentials. via manual upload (optional) The framework allows manually extending the available DB in every aspect. Example: when user-session information on a given computer is discovered (outside of the automatic enumeration) there is a possibility to manually upload these sessions, which will populate the DB and also the resulting graph Graph The framework can generate a graph using the available information in the database and plot it via the web UI (nest). Furthermore, the graph generation and path calculations can be invoked programmatically, either by using the web API (/ui endpoint) or the graph object’s functions. Anomalies detection The framework can identify common AD misconfigurations without graph generation. Currently only via the web API. User User anomalies detection involves the detection of insecure UAC permissions and extensive user description values. This feature set is expected to grow in the future as new features will be implemented. Machine Machine anomalies detection involves detection of insecure UAC permissions, non-mandatory SMB singing, outdated OS version, out-of-domain machines. This feature set is expected to grow in the future as new features will be implemented. Password cracking The framework is not performing any cracking, only organizing the hashes and the cracking results currently main focus is on impacket and aiosmb’s dcsync results !NT and LM hashes only! Sample process is the following: Harvesting credentials as a text file via impacket/aiosmb or as memory dumps of the LSASS process via whatever tool you see fit. Upload the harvested credentials via the API Poll uncracked hashes via the API Crack them (hashcat?) Upload the results to the framework via the API Generate a report on the cracked/uncracked users and password strength and password sharing note from the author: This feature was implemented for both attackers and defenders. Personally I don’t see much-added value on either side since at the point one obtained the NT hash of a user it’s just as good as the password… Nonetheless, more and more companies are performing password strength exercises, and this feature would help them. As for attackers: it is just showing off at this point, but be my guest. Maybe scare management for extra points. Changelog v0.2.24 new release, lot of fixes, even more features [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.