Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'engineer'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 8 results

  1. Credits: C_J Hello everyone! This is a continuation of part 1 of the Using Social Engineer Toolkit tutorial. Lets continue! The purpose why i am the use of mobile phone (android)? Let see how the web page displayed in my integrated android browser. So, I am gaining access to my Kali Linux webserver on 192.168.43.99 in the browser. And here is the page: See? It seems so real, there aren’t any security problems displayed on it. The URL bar displaying the title alternatively the URL itself. We understand the silly will apprehend this as the original Google page. So, i bring my cell smartphone, and stroll into my buddy, and communicate to him as though i failed to login to Google and act if I am thinking if Google crashed or errored. I deliver my telephone and ask him to try to login the usage of his account. He doesn’t trust my phrases and at once starts offevolved typing in his account statistics as though not anything will manifest badly here. Haha. He already typed all the required forms, and let me to click the Sign in button. I click the button… Now It is loading… And then we got Google search engine main page like this. Once the victim clicks the Sign in button, it will send the authentication information to our listener machine, and it is logged. Nothing is going on, i tell him, the Sign In button remains there, you did not login even though. And then i’m beginning again the phising page, at the same time as some other friend of this silly coming to us. Nah, we were given every other sufferer. Until i cut the communicate, then i go returned to my table and check the log of my SEToolkit. And if you followed it correctly you should have a username and password highlighted in red. And we are done! Thank you for viewing this tutorial. tools:
  2. Credits: C_J Hello everyone. I have recently installed the SEToolkit and King Phisher and thought it would be useful if I showed you guy’s how to do it to if you wanted to learn these tools. Lets get started! Installing the tool: Here are the commands to properly install the SEToolkit from GitHub. sudo apt-get install git git clone [Hidden Content] set/ cd set pip install -r requirements.txt Next you will go into your terminal and type setoolkit It will then open the terms and agreements. If you want to use the tool you will type Y into the prompt. You will then encounter a menu that shows you the following In this tutorial you will type in the first option (1) and hit enter. In the next part of the menu you will see the following: you will then select the second option which is Website Attack Vectors. You will then select number 3 from the menu below: Further options are narrower, SET has pre-formatted phishing page of popular websites, such Google, Yahoo, Twitter and Facebook. Now choose number 1. Web Templates . Because, my Kali Linux PC and my mobile phone were in the same Wi-Fi network, so just input the attacker ( my PC ) local IP address. And hit ENTER. PS: To check your device IP address, type: ‘ifconfig’ Alright so far, we have set our method and the listener IP address. In this options listed pre-defined web phising templates as i mentioned above. Because we aimed Google account page, so we choose number 2. Google. Hit ENTER. Now, SET starts my Kali Linux Webserver on port 80, with the fake Google account login page. Our setup is done. Now i am ready walking into my friends room to login into this phishing page using my mobile phone. Tools:
  3. View File Learn how to Reverse Engineer Apps & Softwares via this detailed Course Learn how to Reverse Engineer Apps & Softwares via this detailed Course * Learn How To Crack Software Legally And More.. Download Link: Free for users PRIV8 Submitter dEEpEst Submitted 28/04/22 Category Libro Online Password ********  
  4. 10 downloads

    Learn how to Reverse Engineer Apps & Softwares via this detailed Course * Learn How To Crack Software Legally And More.. Download Link: Free for users PRIV8
    $110 PRIV8
  5. Ghidra is a free and open-source Software for Reverse Engineering of executable program(Binary) including Mobile Apps. Ghidra supports installation on multiple OS platforms inc. Windows, Linux and MacOS. [hide][Hidden Content]]
  6. What you'll learn Android Malware Reverse Engineering How to Create a Ransomware Decryption Tool Mobile Security Static Analysis Dynamic Analysis Android App development fundamentals Requirements Basic IT knowledge Description This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security. In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals. This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general. The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs. Course outline: -Course Requirements -Intro to Android -Course/Lab Setup -Developing a Basic Android App -Analyzing Android Apps -Case Study: Analyzing an actual ransomware and developing a decryption tool Who this course is for: Students interested in Cyber Security and Android Reverse Engineering [Hidden Content] [hide][Hidden Content]]
  7. LinuxAcademy – AWS Certified DevOps Engineer – Professional Level [Hidden Content]
  8. AIDA64 Engineer version 5.99.4900 Load from file field SEH buffer overflow exploit. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.