Search the Community

Showing results for tags 'engineering'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 31 results

  1. itsMe

    Reverse Engineering For Everyone!

    Wait, what's reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference being that scientific research is conducted into a natural phenomenon. [hide][Hidden Content]]
  2. Descripción del producto Dan Kaminsky is the Director of Penetration Testing for IOActive. Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. He is best known for his "Black Ops" series of talks at the well respected Black Hat Briefings conferences. He is also the only speaker who has attended and spoken at every single "Blue Hat" Microsoft internal training event. Dan focuses on design level fault analysis, particularly against massive-scale network applications. Dan regularly collects detailed data on the health of the worlwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan is one of the few individuals in the world to combine both technical expertise with executive level consulting skills and prowess. [Hidden Content] [hide][Hidden Content]]
  3. English | 2020 | ISBN-13 : 978-1800207974 | 322 Pages | EPUB | 15.81 MB Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project Key Features: Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Leverage a variety of plug-ins and extensions to perform disassembly, assembly, decompilation, and scripting Discover how you can meet your cybersecurity needs by creating custom patches and tools Book Description: Ghidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This book is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs. You'll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. You'll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, you'll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The book also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project. By the end of this Ghidra book, you'll have developed the skills you need to harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks. What you will learn: Get to grips with using Ghidra's features, plug-ins, and extensions Understand how you can contribute to Ghidra Focus on reverse engineering malware and perform binary auditing Automate reverse engineering tasks with Ghidra plug-ins Become well-versed with developing your own Ghidra extensions, scripts, and features Automate the task of looking for vulnerabilities in executable binaries using Ghidra scripting Find out how to use Ghidra in the headless mode Who this book is for: This SRE book is for developers, software engineers, or any IT professional with some understanding of cybersecurity essentials. Prior knowledge of Java or Python, along with experience in programming or developing applications, is required before getting started with this book. Table of Contents - Getting Started with Ghidra - Automating RE Tasks with Ghidra Scripts - Ghidra Debug Mode - Using Ghidra Extensions - Reversing Malware Using Ghidra - Scripting Malware Analysis - Using Ghidra Headless Analyzer - Auditing Program Binaries - Scripting Binary Audits - Developing Ghidra Plugins - Incorporating New Binary Formats - Analyzing Processor Modules - Contributing to the Ghidra Community - Extending Ghidra for Advanced Reverse Engineering [Hidden Content] [hide][Hidden Content]]
  4. What you'll learn Web Hacking Website defacement Tampering Cookies Hacking Admin Passwords Hack Bank Accounts to Transfer Money Stealing email mailing lists Reversing Encryption Tampering voting pages Hacking website database Tampering browser javascript to gain access How to crack software serial number keys Remove Nag Screen Reminders asking you to register Convert Trial Software to Fully Functional Software Extend 30-day Trial Period Software Learn Reverse Engineering and Assembly Language Browser Spoofing SQL Injection Attacks Port scanning Log Injection Attacks Computer Forensics Hacking Captchas Requirements Basic knowledge of HTML, Javascript and SQL Basic understanding of GET and POST requests A PC, Linux not required Basic knowledge in C, Assembly Language and Win32 API would be helpful but not mandatory Description If you want to learn ethical hacking & also reverse engineering the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack and also to reverse software. These websites typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn hacking and reversing. All you need is a PC. In this course I am only using a Windows PC to do ethical hacking and reverse engineering. The website we will be hacking is DefendTheWeb which is a popular hacker's playground where hackers play hacking games reminiscent of CTF (Capture the Flag) and learn at the same time. However, without some help and guidance you will find it quite challenging. Hence this course. I will walk through each level from Basic to Realistic. For the Reverse Engineering lessons, you will learn how to reverse CrackMe's. A CrackMe is a small program designed to test a programmer's reverse engineering skills. These CrackMe's typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn reverse engineering (reversing). Traditionally, reverse engineering is taught by first learning C/C++, assembly language and then debugging. Note that we do not crack software nor condone the act of cracking software. The crackme's we will be reversing is provided by CrackingLessons and Crackmes One which are a popular reverser's playground . Information on solving crackmes on the Internet is terse and unstructured. Hence this course. I will walk through each level just like in a classroom where you can follow along and ask questions in the Q & A section. All you need is a PC running Windows. Great way to learn Web Development, Information Technology (IT), Assembly programming and Reverse Engineering: If you had always wanted to learn HTML, Javascript, PHP, MySQL, etc, Assembly and Reverse Engineering, what better way than to learn how to hack websites ethically and reverse engineering. . This course is also a great stepping stone to other Reverse Engineering fields like malware analysis, exploits development and software testing. So let's get started in your journey of hacking & cracking to learn. This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start hacking the fun and easy way! Who this course is for: Web developers who have no knowledge on hacking Students who want to learn hacking the fun way by hacking real websites (legally) Those who enjoy computer games and want to try hacking as a game Programmers who want to level up their skill to reverse engineering software IT or computing students who want to know how software works internally [Hidden Content] [hide][Hidden Content]]
  5. Overview: NinjaDroid uses a modified version of the Androguard AXMLParser ([Hidden Content]) together with a series of other Python scripts (by Paolo Rovelli) based on aapt, keytool, string and such to extract a series of information from a given APK package, such as: APK file info (i.e. file size, MD5, SHA-1, SHA-256 and SHA-512); App info (e.g. app name, package name, version, lists of permissions, list of Activities/Services/BroadcastReceivers, etc...); Digital certificate info (e.g. validity, serial number, fingerprint MD5, SHA-1, SHA-256 and signture), including certificate issuer/owner info (e.g. name, email, company, country, etc...); All the strings hard-coded into the classes.dex file; The URLs and shell commands hard-coded into the classes.dex file; AndroidManifest file info (i.e. file size, MD5, SHA-1, SHA-256 and SHA-512); classes.dex file info (i.e. file size, MD5, SHA-1, SHA-256 and SHA-512); CERT.RSA/DSA file info (i.e. file size, MD5, SHA-1, SHA-256 and SHA-512); List of file entries (i.e. file name, file size, MD5, SHA-1, SHA-256 and SHA-512) in the APK package. Furthermore, NinjaDroid uses apktool ([Hidden Content]) and dex2jar ([Hidden Content]), together with other Python scripts in order to extract from an APK package: classes.dex file; translated .jar file (thanks to dex2jar); disassembled smali files (thanks to apktool); AndroidManifest.xml file (thanks to apktool); CERT.RSA file; assets/ and res/ folders together with their content (thanks to apktool); JSON and HTML report files, which contains all the extracted APK metadata. [hide][Hidden Content]]
  6. Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok Features: Get Device Information Without Any Permissions Access Location [SMARTPHONES] Os Password Grabber [WIN-10] Access Webcam Access Microphone Operating Systems Tested Kali Linux 2020 [hide][Hidden Content]]
  7. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Rebuild an APK in Debug mode for dynamic analysis Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac [hide][Hidden Content]]
  8. Features: Hacker Dashboard Hacker News [thehackernews.com/] New Exploits [Exploit-db.com] Hacking Tutorials Video [youtube.com] The Latest Prices OF Digital Currencies [Rials , Usd] Information Gathering Bypass Cloud Flare Cms Detect Trace Toute Reverse IP Port Scan IP location Finder Show HTTP Header Find Shared DNS Whois DNS Lookup Exploits Reference exploit-db.com Social Engineering [Support Ngrok] Get system Information with link Screen Captrue With Link Play Sound With Link [hide][Hidden Content]]
  9. APK Lab The ultimate Android RE experience right inside your VS Code. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac [hide][Hidden Content]]
  10. [hide][Hidden Content]]
  11. 10 downloads

    1000+ SOCIAL ENGINEERING METHODS Size :- 1.3MB File :- Rar Download- File Free download for Users PRIV8

    $100.00 PRIV8

  12. View File 1000+ Social Engineering Methods 1000+ SOCIAL ENGINEERING METHODS Size :- 1.3MB File :- Rar Download- File Free download for Users PRIV8 Submitter dEEpEst Submitted 25/11/20 Category Libro Online Password ********  
  13. r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. Radare project started as a forensics tool, a scriptable command line hexadecimal editor able to open disk files, but later support for analyzing binaries, disassembling code, debugging programs, attaching to remote gdb servers, … radare2 is portable. The main tool of the whole framework. It uses the core of the hexadecimal editor and debugger. radare2 allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on. It implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, and visualizing. It can be scripted with a variety of languages, including Python, Ruby, JavaScript, Lua, and Perl. Architectures: 6502, 8051, CRIS, H8/300, LH5801, T8200, arc, arm, avr, bf, blackfin, xap, dalvik, dcpu16, gameboy, i386, i4004, i8080, m68k, malbolge, mips, msil, msp430, nios II, powerpc, rar, sh, snes, sparc, tms320 (c54x c55x c55+), V810, x86-64, zimg, risc-v. File Formats: ELF, Mach-O, Fatmach-O, PE, PE+, MZ, COFF, OMF, TE, XBE, BIOS/UEFI, Dyldcache, DEX, ART, CGC, Java class, Android boot image, Plan9 executable, ZIMG, MBN/SBL bootloader, ELF coredump, MDMP (Windows minidump), WASM (WebAssembly binary), Commodore VICE emulator, Game Boy (Advance), Nintendo DS ROMs and Nintendo 3DS FIRMs, various filesystems. Operating Systems: Windows (since XP), GNU/Linux, OS X, [Net|Free|Open]BSD, Android, iOS, OSX, QNX, Solaris, Haiku, FirefoxOS Bindings: Vala/Genie, Python (2, 3), NodeJS, Lua, Go, Perl, Guile, php5, newlisp, Ruby, Java, OCaml, … radare2 v4.6 has been released. [hide][Hidden Content]]
  14. English | 2020 | ISBN: B08FDXVR2P | 107 Pages | PDF/AZW3 | 7.14 MB Do you want to learn a popular programming language in no time? Do you want to improve your skills in coding? Or do you want to learn coding to earn? If your answer to this question is yes, then keep reading! Java is a widely-used programming language on the Web and in computing applications. It is a free download solution that allows users to access the latest versions and implement updates. This particular programming language is present in the majority of today’s web applications and computing technologies. Java’s scalable characteristics make it suitable for deployment in a wide range of applications, including apps for small electronic devices like cell phones and software solutions for large scale operations such as data centers. The growing preference for deploying Java is attributable to its robust functional features and sound security credentials. [hide][Hidden Content]]
  15. Skeleton is a Social Engineering tool attack switcher Type: Phishing Tool Websites languages: English, French Attack Switcher for phishing: Facebook, Linkedin, Twitter, Pinterest, Google, Instagram, Microsoft, Netflix, Paypal, Wordpress, Amazon, Ebay, CyberghostVPN, NordVPN, ExpressVPN, ZenmateVPN, PCS, N26, Roblox, Steam, Binance, Etoro, Bittrex, Coinbase. DISCLAMER: Program for educational purposes!!! Your account security is our top priority! Protect your account by enabling 2FA. Skeleton 1.7 Ver:.....1.7 coder:...KURO-CODE BugFix, Script revision Add: Paypal, Wordpress, Amazon, Ebay, CyberghostVPN, NordVPN, ExpressVPN, ZenmateVPN, PCS, N26, Roblox, Steam, Binance, Etoro, Bittrex, Coinbase [hide][Hidden Content]]
  16. Reverse Engineering and Exploit Development Application Penetration Testing for Security Professionals What you'll learn Learn more about various reversing tools Learn more about common vulnerabilities and how to find them You will become more familiar with simple exploits, web exploitation, and ARM exploitation [Hidden Content] [hide][Hidden Content]]
  17. UEFI_RETool A tool for UEFI firmware reverse engineering. The tool consists of a plugin for IDA and a set of scripts for UEFI firmware analyzing. [hide][Hidden Content]]
  18. MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + .srt | Duration: 13 lectures (1 hour, 55 mins) | Size: 1.31 GB Created by Paul Chin | Last updated 6/2020 Learn how to how to reverse engineer and debug programs with x64dbg in 1 hour Homepage: [Hidden Content] What you'll learn Debug programs with x64dbg Reverse engineer programs Solve CrackMe challenges Disassemble programs into assembly code Setting breakpoints and stepping through code Modify program behaviour Patching programs Requirements Windows PC Some Assembly or C background would help, but not mandator [HIDE][Hidden Content]]
  19. A simple script to generate a hidden url for social engineering. Legal disclaimer: Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  20. dEEpEst

    Social Engineering

    [Hidden Content]
  21. w0rmxz

    All Reverse Engineering Tools 2.7

    All reverse engineering tools www.decompile.us: [HIDE]Download: [Hidden Content] Alternative: [Hidden Content]]
  22. Descripción In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons. [Hidden Content] [HIDE][Hidden Content]]
  23. Andromeda makes initial reverse engineering work of Android applications bit faster and easier. Compared to other alternatives, it's written in C/C++ and has a noticeable performance advantage. Video: [Hidden Content] Download: [HIDE][Hidden Content]]
  24. dEEpEst

    ​​Forward Engineering

    [Hidden Content]
  25. REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets You can hack and improve REDasm without any issues and limitations [HIDE][Hidden Content]]