Search the Community

Showing results for tags 'extreme'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 11 results

  1. ZoneAlarm Extreme Security Stay safe with a complete premium protection. 100% Virus-Free, Guaranteed. Terms Powerful antivirus prevents malicious threats & attacks Legendary firewall safeguards your identity & online privacy Award-winning ransomware prevention new Real-time phishing protection for online shopping & banking [Hidden Content] What’s inside
  2. Crithit CritHit takes a single wordlist item and tests it one by one over a large collection of hosts before moving onto the next wordlist item. The intention of brute-forcing in this manner is to avoid low limit Web Application Firewall (WAF) bans and to allow brute forcing to run faster than it normally would when approaching any single host with multiple simultaneous requests. CritHit can perform multiple verifications of results using proxy lists, as well as filter out noise by baselining websites. Additionally, if looking for a specific item over a large number of websites (to cross-compare a vulnerability over more hosts) you can build and use –signatures to write only hosts containing specific data points to an output file. Best results can be sought from CritHit by using it as a quick “first pass” with a smaller (100 critical items) wordlist, a very large target list, and then deep-diving more directly with a project such as ffuf where results are found. [hide][Hidden Content]]
  3. ZoneAlarm Extreme Security Manténgase seguro con una protección prémium completa. 100% Sin Virus, Garantizado. Términos Potente antivirus que previene amenazas y ataques maliciosos Nuestro firewall protege su identidad y privacidad en línea Prevención de ransomware galardonada nuevo Protección contra phishing en tiempo real para compras y banca en línea [Hidden Content] [HIDE][Hidden Content]]
  4. Extreme Sistemas CMS versions as of 2019/05/08 suffer from a remote SQL injection vulnerability. View the full article
  5. AIDA64 Extreme version 5.99.5900 logging SEH buffer overflow exploit. View the full article
  6. AIDA64 Extreme Edition version 5.99.4800 local SEH buffer overflow exploit. View the full article
  7. Intel Extreme Tuning Utility version 6.4.1.23 suffers from code execution, privilege escalation, and denial of service vulnerabilities. View the full article
  8. Version 1.0.0

    0 downloads

    Extreme Exploits - Advanced Defenses Against Hardcore Hacks Introduction Welcome to Extreme Exploits: Advanced Defenses Against Hardcore Hacks. The goal of this book is to help you better understand and cope with emerging information security threats and to impart upon you the experience-proven concepts and techniques we have developed defending some of the world's most targeted networks and information assets. This book presents a different perspective on network and information security than previous titles. Many of the books available on the information security bookshelf disclose hacks and counter-hacks by pointing the reader to hundreds of scripts and downloadable utilities. Still others focus narrowly on one or two software packages and specific environments or scenarios. In many cases, these texts quickly grow obsolete as tools and tactics evolve. Our text aims to conceptualize the threats while getting at the core matter behind them and provide the reader with a deeper understanding of the tactics and technologies involved in both defense and aggression. Armed with this knowledge, you'll make better use of the myriad of tools available today, but you'll also have the ability to design new tools, techniques, and operational policies for the future. Audience This book is meant for security practitioners and systems and network administrators of all skill levels. If you're a fellow information assurance analyst, you'll be pleased to find that our focus is not how to locate and compile tools, but instead we discuss how tools should be used and exactly how they work. You won't find concatenated manual pages or regurgitated web content here. Many of the examples provided include the use of open source software, but the concepts being discussed are applicable to commercial software solutions, which makes this book useful to both large and small organizations. If you're a technical manager, you'll be pleased to find that our concise explanations of technology and techniques will help you navigate the jargon employed by software and equipment vendors and assist you in developing easily understandable synopses of threats and the countermeasures for your fellow managers. Likewise, our discussion of the concepts behind these defenses will make you a smarter buyer when it comes to information security solutions. Pay special attention to the "Checklist for Developing Defenses" section included at the end of every chapter. It provides a simple "To Do" list of the most important tactical actions you can take today that will help keep your network safe. We hope technical managers will ask their staff what is being done with regard to each and every checklist item, thereby raising awareness and sharing knowledge that may have great impact on the security of your organization.

    $10.00

  9. View File Extreme Exploits - Advanced Defenses Against Hardcore Hacks Extreme Exploits - Advanced Defenses Against Hardcore Hacks Introduction Welcome to Extreme Exploits: Advanced Defenses Against Hardcore Hacks. The goal of this book is to help you better understand and cope with emerging information security threats and to impart upon you the experience-proven concepts and techniques we have developed defending some of the world's most targeted networks and information assets. This book presents a different perspective on network and information security than previous titles. Many of the books available on the information security bookshelf disclose hacks and counter-hacks by pointing the reader to hundreds of scripts and downloadable utilities. Still others focus narrowly on one or two software packages and specific environments or scenarios. In many cases, these texts quickly grow obsolete as tools and tactics evolve. Our text aims to conceptualize the threats while getting at the core matter behind them and provide the reader with a deeper understanding of the tactics and technologies involved in both defense and aggression. Armed with this knowledge, you'll make better use of the myriad of tools available today, but you'll also have the ability to design new tools, techniques, and operational policies for the future. Audience This book is meant for security practitioners and systems and network administrators of all skill levels. If you're a fellow information assurance analyst, you'll be pleased to find that our focus is not how to locate and compile tools, but instead we discuss how tools should be used and exactly how they work. You won't find concatenated manual pages or regurgitated web content here. Many of the examples provided include the use of open source software, but the concepts being discussed are applicable to commercial software solutions, which makes this book useful to both large and small organizations. If you're a technical manager, you'll be pleased to find that our concise explanations of technology and techniques will help you navigate the jargon employed by software and equipment vendors and assist you in developing easily understandable synopses of threats and the countermeasures for your fellow managers. Likewise, our discussion of the concepts behind these defenses will make you a smarter buyer when it comes to information security solutions. Pay special attention to the "Checklist for Developing Defenses" section included at the end of every chapter. It provides a simple "To Do" list of the most important tactical actions you can take today that will help keep your network safe. We hope technical managers will ask their staff what is being done with regard to each and every checklist item, thereby raising awareness and sharing knowledge that may have great impact on the security of your organization. Submitter dEEpEst Submitted 20/09/18 Category Libro Online Password ********  
  10. Version 1.0.0

    1 download

    General description: Extreme Protector is made and improved for more than 1 year by experienced codder/reverser in this field for more than 6 years.It is a 100% private project never used nor released made as cryptographic and educational purposes.Code has been tested,modded and improved for many many times until every feature is working 100% together others features.Working on all Windows from Windows xp to Windows 10.Stub code is optimized,reduced,as fast as possible for efficiency and removed most dependencies to work properly on most windows,stub size goes from 32kb to 450kb.Protector or client is made in pure VB6 and the different stubs are made in pure VB6 and others one mixing VB6 with full ASM and C,i mean fully integrated ASM and C,not inline one,developed with ThunderVB,a powerful tool to mix perfectly ASM and C with VB6 with no limits.There are 11 stubs and here their characterictics: Pure VB6: 1-Basic(VB6):Only VB6 without anything 2-Basic + anti emulation-debug(VB6):Only VB6 with anti emulation. 3-Basic + invokes(VB6):Only VB6 with apis taken via asm inline invoke,most apis used are not declared in code. 4-Stub Inside Program P-Code:Basic(VB6) stub inside or mixed with real program VB6 source compiled in P-Code. 5-Stub Inside Program P-Code + anti emulation-debug:Basic + anti emulation-debug(VB6) stub inside or mixed with real program VB6 source compiled in P-Code. 6-Stub Inside Program Native Code-Small:Basic(VB6) stub inside or mixed with real program VB6 source compiled in Native-Code. VB6/C/ASM mixed: 7-Basic + ASM:Basic(VB6) stub with VB6 procedures replaced by pure ASM like instrt,len,mid,some strings,strptr,varptr,left,right,api calls among many others.This aplplies by default for next ASM stubs. 8-Basic + ASM + C + anti emulation + anti debug:Basic + ASM stub with anti emulation and debug made in VB6,C and ASM code. 9-Stub Inside Program Native Code-Small + ASM + C + anti emulation + anti debug:Basic + ASM + C + anti emulation + anti debug stub inside or mixed with real program VB6 source compiled in Native-Code. 10-Basic + ASM + C + anti emulation + anti debug + experimental compilation:Basic + ASM + C + anti emulation + anti debug stub with uncommon compilation parameters like custom DOS stub,sections merge etc.This is possible due to custom compilation parameters in C code and changing VB6 linker and compiler parameters in the VB6 project file. 11-Basic + ASM + C + anti emulation + anti debug + runpe nt simple:Basic + ASM + C + anti emulation + anti debug stub with nt apis runpe,most apis called by ASM code. Detailed information Stubs Features: Optional: +Advanced anti VBox/VMware:check 6 critical places with 2 methods to detect if the file is running under virtual machine. +Advanced anti Sandboxie:check process and dlls to detect if the file is running under sandboxie. +Advanced anti Analysis:check with 15 procedures to detect if the file is running under analisys environment. +9 different injections options +2 different storage file methods:End of File and Resources. +Fake error message: can selest if you dont want show the message when the file runs at startup. +Run as Admin:run file as with Admin privileges. +Install:can choose folder to install(user/alluser/commonprogramfiles/appdata/temp) with custom filename. +Hidden startup:run file every time system starts,the start key is hidden from msconfig. +Delay:Delay the execution of the file in seconds. +Binder that can run 2 files binded: Executable file wich is executed on memory.There are 9 different injections options. Any custom file wich is executed normally. For both binded files there are these options: +Anti Sandboxie +Anti VBox/VMWare +Pump bytes +Dont run the binded file at startup +2 different storage file methods:End of File or random resources Forced: +Anti Dump:3 different methods of anti dump(ASM/C) +Anti Emulation:many different methods of anti emulation(VB6/ASM/C) +Remove ZoneID:remove automatically ZoneID of the installed file when install option is activated(VB6/ASM). +Random RC4 password to decrypt the protected files. Client Features: +Clone assembly:can change protected file cloning information and icon from other PE files(exe,dll,scr,ocx). +Custom icon:can change the icon with any custom icon +2 different methods to clone information and icon or change custom icon you can choose: +Resource method:Resource Hacker method +Code method:With internal code +Add KBs:add random kilobytes to the protected file with 2 methods automatically: +If storage method is resources the extra kilobytes will be added to resources and if storage method is End of File the extra kilobytes will be added in the End of File.This apply to main file and 2 binded files too. +EOF:Detect automatically if the file to be protected has overlay and put that data to the protected file. +Realign EOF: Realign End of File data with headers. +Realign PE: Realign Portable Excutable Headers. +FixChecksum:Fix the checksum of the file. +Null Icon:Delete full icon of the protected file. +Null Info:Delete full Information of the protected file. +Zero EntryPoint:Set the EntryPoint of the file to 0. +Change OEP:Change Original EntryPoint to another place. +UPX:Compress the protected file with UPX. +Erase Paddings:Erase "XPADDING" strings from the resources. +Add Section:Add custom section to protected file. +No comdlg32.ocx dependence for working. +Autodetect if file is native or .NET and select automatically the proper injection for working properly.This apply for main file and binded executable file too. +Error proof:if something is wrong with your options before protect, protector will warning you or change/disable options to avoid errors in protection process. +RC4 encryption with different random password generated every protection. +ID and type resources are randomly generated every protection automatically. +Real random process to generate random strings, passwords etc. +Drag and drop for all fields. I Will sell only 1 copy exclusively to the highest bidder.I will provide you full source project with compiled binaries and all needed to compile if you need.Any question or whatever please ask me i will reply you as soon as possible. If you buy Extreme Protector you must accept these terms: 1- Extreme Protector is coded to protect legal files. 2- Illegal activities are not allowed. Before doing anything read about the laws of your country. 3- Extreme Protector was coded for educational purposes. 4- I am not responsible for any actions from you using Extreme Protector and their outputs. Screens

    $1,000.00

  11. View File Extreme Protector SRC (VB6/C/ASM) No Dependencies Compatible Native/.Net/x86/x64 General description: Extreme Protector is made and improved for more than 1 year by experienced codder/reverser in this field for more than 6 years.It is a 100% private project never used nor released made as cryptographic and educational purposes.Code has been tested,modded and improved for many many times until every feature is working 100% together others features.Working on all Windows from Windows xp to Windows 10.Stub code is optimized,reduced,as fast as possible for efficiency and removed most dependencies to work properly on most windows,stub size goes from 32kb to 450kb.Protector or client is made in pure VB6 and the different stubs are made in pure VB6 and others one mixing VB6 with full ASM and C,i mean fully integrated ASM and C,not inline one,developed with ThunderVB,a powerful tool to mix perfectly ASM and C with VB6 with no limits.There are 11 stubs and here their characterictics: Pure VB6: 1-Basic(VB6):Only VB6 without anything 2-Basic + anti emulation-debug(VB6):Only VB6 with anti emulation. 3-Basic + invokes(VB6):Only VB6 with apis taken via asm inline invoke,most apis used are not declared in code. 4-Stub Inside Program P-Code:Basic(VB6) stub inside or mixed with real program VB6 source compiled in P-Code. 5-Stub Inside Program P-Code + anti emulation-debug:Basic + anti emulation-debug(VB6) stub inside or mixed with real program VB6 source compiled in P-Code. 6-Stub Inside Program Native Code-Small:Basic(VB6) stub inside or mixed with real program VB6 source compiled in Native-Code. VB6/C/ASM mixed: 7-Basic + ASM:Basic(VB6) stub with VB6 procedures replaced by pure ASM like instrt,len,mid,some strings,strptr,varptr,left,right,api calls among many others.This aplplies by default for next ASM stubs. 8-Basic + ASM + C + anti emulation + anti debug:Basic + ASM stub with anti emulation and debug made in VB6,C and ASM code. 9-Stub Inside Program Native Code-Small + ASM + C + anti emulation + anti debug:Basic + ASM + C + anti emulation + anti debug stub inside or mixed with real program VB6 source compiled in Native-Code. 10-Basic + ASM + C + anti emulation + anti debug + experimental compilation:Basic + ASM + C + anti emulation + anti debug stub with uncommon compilation parameters like custom DOS stub,sections merge etc.This is possible due to custom compilation parameters in C code and changing VB6 linker and compiler parameters in the VB6 project file. 11-Basic + ASM + C + anti emulation + anti debug + runpe nt simple:Basic + ASM + C + anti emulation + anti debug stub with nt apis runpe,most apis called by ASM code. Detailed information Stubs Features: Optional: +Advanced anti VBox/VMware:check 6 critical places with 2 methods to detect if the file is running under virtual machine. +Advanced anti Sandboxie:check process and dlls to detect if the file is running under sandboxie. +Advanced anti Analysis:check with 15 procedures to detect if the file is running under analisys environment. +9 different injections options +2 different storage file methods:End of File and Resources. +Fake error message: can selest if you dont want show the message when the file runs at startup. +Run as Admin:run file as with Admin privileges. +Install:can choose folder to install(user/alluser/commonprogramfiles/appdata/temp) with custom filename. +Hidden startup:run file every time system starts,the start key is hidden from msconfig. +Delay:Delay the execution of the file in seconds. +Binder that can run 2 files binded: Executable file wich is executed on memory.There are 9 different injections options. Any custom file wich is executed normally. For both binded files there are these options: +Anti Sandboxie +Anti VBox/VMWare +Pump bytes +Dont run the binded file at startup +2 different storage file methods:End of File or random resources Forced: +Anti Dump:3 different methods of anti dump(ASM/C) +Anti Emulation:many different methods of anti emulation(VB6/ASM/C) +Remove ZoneID:remove automatically ZoneID of the installed file when install option is activated(VB6/ASM). +Random RC4 password to decrypt the protected files. Client Features: +Clone assembly:can change protected file cloning information and icon from other PE files(exe,dll,scr,ocx). +Custom icon:can change the icon with any custom icon +2 different methods to clone information and icon or change custom icon you can choose: +Resource method:Resource Hacker method +Code method:With internal code +Add KBs:add random kilobytes to the protected file with 2 methods automatically: +If storage method is resources the extra kilobytes will be added to resources and if storage method is End of File the extra kilobytes will be added in the End of File.This apply to main file and 2 binded files too. +EOF:Detect automatically if the file to be protected has overlay and put that data to the protected file. +Realign EOF: Realign End of File data with headers. +Realign PE: Realign Portable Excutable Headers. +FixChecksum:Fix the checksum of the file. +Null Icon:Delete full icon of the protected file. +Null Info:Delete full Information of the protected file. +Zero EntryPoint:Set the EntryPoint of the file to 0. +Change OEP:Change Original EntryPoint to another place. +UPX:Compress the protected file with UPX. +Erase Paddings:Erase "XPADDING" strings from the resources. +Add Section:Add custom section to protected file. +No comdlg32.ocx dependence for working. +Autodetect if file is native or .NET and select automatically the proper injection for working properly.This apply for main file and binded executable file too. +Error proof:if something is wrong with your options before protect, protector will warning you or change/disable options to avoid errors in protection process. +RC4 encryption with different random password generated every protection. +ID and type resources are randomly generated every protection automatically. +Real random process to generate random strings, passwords etc. +Drag and drop for all fields. I Will sell only 1 copy exclusively to the highest bidder.I will provide you full source project with compiled binaries and all needed to compile if you need.Any question or whatever please ask me i will reply you as soon as possible. If you buy Extreme Protector you must accept these terms: 1- Extreme Protector is coded to protect legal files. 2- Illegal activities are not allowed. Before doing anything read about the laws of your country. 3- Extreme Protector was coded for educational purposes. 4- I am not responsible for any actions from you using Extreme Protector and their outputs. Screens Submitter darkshadows Submitted 21/05/18 Category Files Password ********