Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'engine'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Ready to take your WordPress site to the next level with AI? With AI Engine, you can easily generate content, try out a variety of tasks like translation and correction in our fun AI Playground, add a ChatGPT-style chatbot to your website, track the AI usages, set limits, etc! [Hidden Content] [hide][Hidden Content]]
  2. Ready to take your WordPress site to the next level with AI? With AI Engine, you can easily generate content, try out a variety of tasks like translation and correction in our fun AI Playground, add a ChatGPT-style chatbot to your website, track the AI usages, set limits, etc! [Hidden Content] [hide][Hidden Content]]
  3. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. [Hidden Content] [hide][Hidden Content]]
  4. An Obfuscation-Neglect Android Malware Scoring System Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way. We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced. According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware. Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation. Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system. [hide][Hidden Content]]
  5. An Obfuscation-Neglect Android Malware Scoring System Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way. We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced. According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware. Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation. Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system. Changelog v22.3.1 New features Add a limit to the number of processes available for parallel analysis. Thank @PaulNicolasHunter for this work. (#311 and #315) Update analysis library for Rizin v0.3.0 and above. (#314) Dependency update Update pillow from 9.0.0 to 9.0.1. (#311) [hide][Hidden Content]]
  6. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. [Hidden Content] [hide][Hidden Content]]
  7. Wallpaper Engine Use stunning live wallpapers on your Windows desktop. Animate your own images to create new wallpapers or import videos and websites and share them with others! Optimized for Performance The core of Wallpaper Engine is highly optimized for performance. Wallpaper Engine will automatically pause when playing games or using maximized apps to ensure high system performance when you need it. Extensive Display Support Wallpaper Engine supports all monitor resolutions and aspect ratios (including all ultra-wide resolutions). It can handle even complex multi-monitor setups with ease. Large Selection of Wallpapers Create your own wallpapers and share them with the community or use one of the hundreds of thousands of wallpapers available for free on the Steam Workshop. Custom Tweaking Tweak various performance options and set up rules when certain apps are launched. On notebooks Wallpaper Engine can automatically pause when switching to battery power. Playlists and Slideshows Create playlists that change your wallpaper at a set interval, per time of day, when you log in to your computer or when you launch a certain application on your computer. LED Hardware Support Wallpaper Engine can take control of Corsair iCUE and Razer Chroma RGB hardware and match your LED lighting setup to your wallpaper. [Hidden Content] [hide][Hidden Content]]
  8. Night crawler is a project focused on designing an Internet of Things (IoT) search engine using some techniques to find devices in IPv4 blocks and then insert it into MongoDB. Features Banner Grabbing Whenever performing the intel-reconnaissance process during penetration testing or security auditing, we need to pay attention to the current web server’s exposed information. That’s where banner grabbing comes in. Banner grabbing is the act of getting software banner information (name and version), whether it’s done manually, or by using any OSINT tools that can do it for you automatically. FTP servers, web servers, SSH servers, and other system daemons often expose critical information about not only the software name but also about the exact versions and operating systems they’re running. Port Scanning Is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities. IP Geolocation IP Geolocation is the identification of the geographic location of a device, such as a mobile phone, gadget, laptop, server, and so on, by using an IP address. This search engine consumes an API to get the locations in JSON format. Screenshot Functions If it detects that a device has an HTTP service running, it sends a request to a server with Rendertron and saves a screenshot. [hide][Hidden Content]]
  9. DataLife Engine is a multifunctional Content Management System. Thanks to a very powerful news, articles, and users management system, DataLife Engine is designed primarily for the own mass media websites and blogs creation on the Internet. A wide variety of basic features of the engine, which are initially integrated into it, allows DataLife Engine to step further ahead of its nearest competitors in terms of the website creation. [Hidden Content] [hide][Hidden Content]]
  10. BeMusic is a multi-purpose music sharing and streaming platform. It can be used to create many different types of music related sites, including sites similar to soundcloud, mixcloud, spotify and more. [Hidden Content] [hide][Hidden Content]]
  11. DataLife Engine (DLE) — a content management system. Official site. Official website multiplayer CMS for news media organizations. The website engine. CMS DataLife Engine Features A short list of features that our content management system provides Convenience and simplicity You don't need programming languages to create a website. Everyone can afford their own website Security The security of your sites is our priority. Every effort is made to protect you from threats Speed The maximum speed of the site and the minimum load on the server, all this is done for your site Content A large number of convenient tools for filling your site with a variety of information Community Fill your site together with other visitors, and also communicate. Everything is there for this Independence Your site belongs only to you. You decide where to place it and how much hosting will cost [Hidden Content] [Hidden Content] [hide][Hidden Content]]
  12. A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time Domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. [hide][Hidden Content]]
  13. With the SongCharts script you can run your own fully automated song charts and music search engine website within minutes. Let your visitors search and download songs and discover the best new music hits with the top songs charts. [Hidden Content] [hide][Hidden Content]]
  14. phpSearch is a search engine platform based on Bing’s API, allowing users search the entire web or your own websites for web pages, images, videos and news. It has tons of filters to refine the search results, it comes with regional search, a light and dark interface and more. [Hidden Content] [hide][Hidden Content]]
  15. BeMusic is a multi-purpose music sharing and streaming platform. It can be used to create many different types of music related sites, including sites similar to soundcloud, mixcloud, spotify and more. [Hidden Content] [hide][Hidden Content]]
  16. What you'll learn How to get started with Cheat Engine How to hack a process memory Finding variables and pointers in memory Using data structures to hack health and ammo Hacking games to get invincibility and unlimited ammo Get a solid foundation in memory hacking Using Pointer Scanning to hack health Writing scripts to inject code to reload ammo Basic Assembly Language Use inline assembly (code caves) to inject code into process memory Do Array of Bytes (AOB) injection Use Freeze Method to verify memory addreses Use double pointer map scanning Use Range of Module Address and Offset Parameters to optimize pointer scans NOP, JMP and Reverse assembly code get unlimited ammo reload Creating Cheat Tables for Teleporting Hacking 3D coordinate Systems for Flying and more . . . This course includes: 3.5 hours on-demand video 14 downloadable resources Full lifetime access Access on mobile and TV Certificate of completion Requirements Basic knowledge of C/C++ and Assembly would be helpful, but not necessary PC running Windows 7 or 10 Description If you like playing games or reverse engineering, then this course is for you. Traditionally, reverse engineering has been done using familiar tools such as x64dbg, OllyDbg and IDA. This course will introduce you to another powerful tool commonly used in game hacking - called Cheat Engine (CE). This tool will allow you to modify in-game Health, Ammo, Position and more. Although youtube has plenty of tuts on Cheat Engine, they typically lack beginner-friendly explanation and personal guidance. In this course, I will take you by the hand as a complete beginner to become familiar with what is game hacking and reverse engineering. You will learn the difference between memory values vs. pointers, data structures, how to scan memory to tamper with it to become invincible plus have unlimited ammo, create Cheat Tables (shareable hacks), pointer scanning, writing scripts to inject code into process memory and more... By the end of this course, you should be able to apply your basic skills to hack an open source free game called Assault Cube - a 3D First Person Shooter (FPS) game. I have chosen this game because, it can be used as a standalone game - where you play against bots - and also because the game is totally free and open source - and is the standard game to use when first learning game hacking. Difference between memory hacking and file patching. In traditional reverse engineering, after we have managed to reverse it, we would patch the program file. However, not all programs can be patched, eg, packed programs cannot be patched. Here, Cheat Engine shines. Cheat Engine does not rely on patching programs, its main strength lies in memory hacking (process hacking). In Cheat Engine, we allow the program to be loaded into RAM memory first, then we hack it there. This course introduces you to the basics of Cheat Engine - so that you will be familiar with memory hacking using Cheat Engine. Throughout this course, I will be there for you - to answer all your questions and to guide and mentor you in game hacking and reverse engineering. Thank you and see you inside. Who this course is for: Anyone interested in learning game hacking Reverse engineering students looking for alternative ways to hack a running program Software or game developers who want to know game or app hacking works so that they can protect their software [Hidden Content] [hide][Hidden Content]]
  17. What you'll learn Debug programs with Cheat Engine Reverse engineer programs Solve CrackMe challenges Disassemble programs into assembly code Setting breakpoints and stepping through code Modify program behaviour Hacking and patching process memory Code Injection Writing Trainers (Loaders) Lua Scripting to hack memory Assembly scripting to do byte patching and more... This course includes: 2.5 hours on-demand video 10 downloadable resources Full lifetime access Access on mobile and TV Certificate of completion Requirements Windows PC Some Assembly or Lua background would help, but not mandatory Description If you had always wanted to learn how use hack a program's memory, to reverse engineer and debug software, then this is the course for you.This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. Traditionally, we use tools like x64dbg, OllyDbg for reverse engineering and debugging. Howevever, those tools have their limitations as they rely on file patching to modify program behaviour. But what if the files could not be patched. Here Cheat Engine shines. Cheat Engine is a memory hacking tool. It is used by Gamers to hack games in order to cheat. Cheat Engine's main strength is its memory scanning, code injection, or process patching. This course will equip you with the knowledge and skill to use Cheat Engine in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero. In this course we will learn Cheat Engine by hacking CrackMe challenges. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to disassemble programs into assembly code Dynamic Analysis Setting breakpoints and stepping through code Modify program behaviour Patching process memory Locating address to do memory patching Writing custom Memory Hackers (trainers) using Cheat Engine to hack and patch memory Creating Lua Scripts for process patching Break and Trace Cone Injection Direct Memory Patching and more... Prerequisites: Knowledge of Assembly would be helpful but not compulsory Windows PC Who this course is for: Beginners to Reverse Engineering Game Hackers who want to try their hand at hacking windows programs Programmers with want to learn debugging Students who want to know how programs work internally Anyone interested in learning how to hack and patch process memory [Hidden Content] [hide][Hidden Content]]
  18. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. [Hidden Content] [hide][Hidden Content]]
  19. What you'll learn Search engine optimization techniques Organic Marketing Google search engine Technical SEO Content writing & Marketing Off page optimization On-page Optimization Social Media Marketing Keyword and competitor research Lead generation Requirements NO special requirement Description Welcome to the World's best specialized SEO course ever. The course cover everything from theory to practical with case studies and examples. This is the only course in the world where you woll also learn about the technicalities of SEO and how to handle them. The content of this course is based on real world practices and checklists used by professionals in the SEO world. You will learn about Google Search engine Google algorithms Wordpress development Bootstrap Shopify Tools for SEO On-page optimization Technical SEO Off-page Optimization How to get a job in SEO? How to start your own digital marketing company? Who this course is for: Digital Marketing aspirants Beginners in SEO College students Businesses [Hidden Content] [hide][Hidden Content]]
  20. uEmu is a tiny cute emulator plugin for IDA based on unicorn engine. Supports following architectures out of the box: x86, x64, ARM, ARM64, MIPS, MIPS64 What is it GOOD for? Emulate bare-metal code (bootloaders, embedded firmware, etc) Emulate standalone functions What is it BAD for? Emulate complex OS code (dynamic libraries, processes, etc) Emulate code with many syscalls What can be improved? Find a way to emulate vendor-specific register access (like MSR S3_x, X0 for ARM64) Add more registers to track [hide][Hidden Content]]
  21. BeMusic is a multi-purpose music sharing and streaming platform. It can be used to create many different types of music related sites, including sites similar to soundcloud, mixcloud, spotify and more. [Hidden Content] [hide][Hidden Content]]
  22. phpSearch is a search engine platform based on Bing’s API, allowing users search the entire web or your own websites for web pages, images, videos and news. It has tons of filters to refine the search results, it comes with regional search, a light and dark interface and more. [Hidden Content] [hide][Hidden Content]]
  23. Searpy Search Engine Toolkit Support search engine Shodan Fofa Zoomeye Censys Dnsdb Google Baidu Bing 360so Goo Yahoo Changelog v2.3 fix some bugs add fofa_icon module [hide][Hidden Content]]
  24. Quark Engine An Obfuscation-Neglect Android Malware Scoring System Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way. We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced. According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware. Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation. Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system. [hide][Hidden Content]]
  25. HoundSploit HoundSploit is an advanced search engine for Exploit-DB developed in Python using Flask as a micro web framework, born with the aim of showing the user the most accurate search results. Features Effective version number filtering Advanced filtering Search suggestions with customization Syntax highlighting of the source code of exploits and shellcodes Downloading of the source code of exploits and shellcodes Highlighting of searched words in search results Check for updates (both for software and database) News in HoundSploit 2 Flask instead of Django SQLAlchemy instead of Django ORM The kernel of the search engine is the same used in hsploit, which is the CLI version of HoundSploit Dark and Light themes [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.