Search the Community

Showing results for tags 'for'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 332 results

  1. The Only Wordlist You’ll Ever Need. All Hashes.org Found Lists from 2012-2020 combined into single stripped down wordlist with all special characters, numbers, and formatting removed. Good for using as a base wordlist in rule and mask-based attacks as Zip file is only 1.08GB compared to around 10GB before stripping down. Totals 368,629,572 lines sorted alphabetically with zero duplicates. This is just a wordlist(no emails or hashes). Size: 1.08GB [HIDE][Hidden Content]]
  2. [Hidden Content]
  3. In this course, we'll be looking at database management basics and SQL using the MySQL RDBMS. The course is designed for beginners to SQL and database management systems, and will introduce common database management topics. Throughout the course we'll be looking at various topics including schema design, basic C.R.U.D operations, aggregation, nested queries, joins, keys and much more. Contents (0:00) Introduction (2:36) What is a Database? (23:10) Tables & Keys (43:31) SQL Basics (52:26) MySQL Windows Installation (1:01:59) MySQL Mac Installation (1:15:49) Creating Tables (1:31:05) Inserting Data (1:38:17) Constraints (1:48:11) Update & Delete (1:56:11) Basic Queries (2:08:37) Company Database Intro (2:14:05) Creating Company Database (2:30:27 ) More Basic Queries (2:26:24) Functions (2:45:13) Wildcards (2:53:53) Union (3:01:36) Joins (3:11:49) Nested Queries (3:21:52) On Delete (3:30:05) Triggers (3:42:12) ER Diagrams Intro (3:55:53) Designing an ER Diagram (4:08:34) Converting ER Diagrams to Schemas [Hidden Content]
  4. Mastering Kali Linux for Advanced Penetration Testing Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain undetected and defeat modern infrastructures Explore red teaming techniques to exploit secured environment Book Description This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices. Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices. What you will learn Configure the most effective Kali Linux tools to test infrastructure security Employ stealth to avoid detection in the infrastructure being tested Recognize when stealth attacks are being used against your infrastructure Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network - the end users Who this book is for This third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, IT professional, or security consultant wanting to maximize the success of your infrastructure testing using some of the advanced features of Kali Linux. Prior exposure of penetration testing and ethical hacking basics will be helpful in making the most out of this book. About this book 325Pages 6 - 7Hours to read 88kTotal words [Hidden Content]
  5. Obfuscapk – A black-box obfuscation tool for Android apps. Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the decompiled smali code, resources and manifest. The obfuscated app retains the same functionality as the original one, but the differences under the hood sometimes make the new application very different from the original (e.g., to signature-based antivirus software). [HIDE][Hidden Content]]
  6. Fake Notifications for Wordpress - creating effective herd effects WordPress Plugin Fake Notifications – an effective marketing tool designed to stimulate the conversion of site visitors into customers. Create and place in the required location on your website animated notifications, showing to the visitor sham activity of the registered users, like logins to the site, ordering or subscriptions, mentioning on social networks and any other activity. Demo: [Hidden Content] [HIDE][Hidden Content]]
  7. snallygaster Tool to scan for secret files on HTTP servers what? snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: Attacking with HTTP Requests See the TESTS.md file for an overview of all tests and links to further information about the issues. [HIDE][Hidden Content]]
  8. Laravel 5.4 complete tutorial for Beginners and Intermediate An easy way to learn one of the widely used PHP Laravel 5.4. This is a tutorial series on Laravel 5.4 complete tutorial for Beginners and Intermediate. This course is designed to help the students to learn and understand some of the basic and advanced concepts that are used to design and develop a professional web application using Laravel 5.4. This course will boost the confidence of students and they will be confident enough to take the new challenges and perform better in their career. After watching this complete course students will get the immense confidence and knowledge to develop small and medium scale web application and web portals. [Hidden Content]
  9. dEEpEst

    Get RDP For 30 Days Free

    [Hidden Content]
  10. TBomb v1.7b An open-source SMS/call bomber for Linux And Termux. Note: The script requires working network connection to work. No balance will be deducted for using this script to send SMS/calls. While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum performance. Don't put spaces in between phone number (Ex- 99999 99999) Make sure you are using the latest version of TBomb Make sure you are using Python v3. Here's how you can check it. Type this command in your terminal. $ python -V If output looks like Python 3 - Congrats, Python 3 is installed properly. Do not use this to harm others. This script is only for educational purposes or to prank. None of the developers/contributors are responsible for the misuse of TBomb. Features: Lots of integrated SMS/call APIs Unlimited and super-fast bombing International bombing available Call bombing Frequent updates Automatic updating mechanism Easy to use and embed in code Usage: Run these commands to run TBomb [HIDE][Hidden Content]]
  11. 150K EmailPass For Netflix,Spotify,Gaming,Hulu,Porn Etc... HQ Combolist [HIDE][/HIDE][Hidden Content]]
  12. 67K Ultra Mail Access | Email:Pass Hits For Everything [HIDE][Hidden Content]]
  13. As topic stated that ned to know free or paid crypters or manualyy wor automated ways to crypt native language exe for bypassing AVs Thanks in ADVANCED...
  14. Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software. Trusty and Android run parallel to each other. Trusty has access to the full power of a device’s main processor and memory but is completely isolated. Trusty's isolation protects it from malicious apps installed by the user and potential vulnerabilities that may be discovered in Android. [Hide] [Hidden Content] [Hide]