Search the Community

Showing results for tags 'for'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 164 results

  1. OSINT Tool For Scraping Dark Websites Tested On Kali Linux 2019.2 Ubuntu 18.04 Nethunter Arc Linux [HIDE][Hidden Content]]
  2. The usage of runtime packers by malware authors is very common, as it is a technique that helps to hinder analysis. Furthermore, packers are a challenge for antivirus products, as they make it impossible to identify malware by signatures or hashes alone. In order to be able to analyze a packed malware sample, it is often required to unpack the binary. Usually, this means, that the analyst will have to manually unpack the binary by using dynamic analysis techniques (Tools: OllyDbg, x64Dbg). There are also some approaches for automatic unpacking, but they are all only available for Windows. Therefore when targeting a packed Windows malware the analyst will require a Windows machine. The goal of our project is to enable platform-independent automatic unpacking by using emulation. Supported packers UPX: Cross-platform, open source packer ASPack: Advanced commercial packer with a high compression ratio PEtite: Freeware packer, similar to ASPack FSG: Freeware, fast to unpack Any other packers should work as well, as long as the needed API functions are implemented in Unipacker. For packers that aren’t specifically known you will be asked whether you would like to manually specify the start and end addresses for emulation. If you would like to start at the entry point declared in the PE header and just emulate until section hopping is detected, press Enter [HIDE][Hidden Content]]
  3. Raccoon Offensive Security Tool for Reconnaissance and Information Gathering Features DNS details DNS visual mapping using DNS dumpster WHOIS information TLS Data - supported ciphers, TLS versions, certificate details and SANs Port Scan Services and scripts scan URL fuzzing and dir/file detection Subdomain enumeration - uses Google dorking, DNS dumpster queries, SAN discovery and bruteforce Web application data retrieval: CMS detection Web server info and X-Powered-By robots.txt and sitemap extraction Cookie inspection Extracts all fuzzable URLs Discovers HTML forms Retrieves all Email addresses Scans target for vulnerable S3 buckets and enumerates them for sensitive files Detects known WAFs Supports anonymous routing through Tor/Proxies Uses asyncio for improved performance Saves output to files - separates targets by folders and modules by files Roadmap and TODOs Expand, test, and merge the "owasp" branch with more web application attacks and scans (#28) Support more providers for vulnerable storage scan (#27) Add more WAFs, better detection OWASP vulnerabilities scan (RFI, RCE, XSS, SQLi etc.) Support multiple hosts (read from file) Rate limit evasion IP ranges support CIDR notation support More output formats (JSON at the very least) About Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file. As most of Raccoon's scans are independent and do not rely on each other's results, it utilizes Python's asyncio to run most scans asynchronously. Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments. For more options - see "Usage". Installation For the latest stable version: pip install raccoon-scanner # To run: raccoon [OPTIONS] Please note Raccoon requires Python3.5+ so may need to use pip3 install raccoon-scanner. You can also clone the GitHub repository for the latest features and changes: git clone [Hidden Content] cd Raccoon python install # Subsequent changes to the source code will not be reflected in calls to raccoon when this is used # Or python develop # Changes to code will be reflected in calls to raccoon. This can be undone by using python develop --uninstall # Finally raccoon [OPTIONS] [TARGET] macOS To support Raccoon on macOS you need to have gtimeout on your machine. gtimeout can be installed by running brew install coreutils. Docker # Build the docker image docker build -t evyatarmeged/raccoon . # Run a scan, As this a non-root container we need to save the output under the user's home which is /home/raccoon docker run --name raccoon evyatarmeged/raccoon:latest -o /home/raccoon Prerequisites Raccoon uses Nmap to scan ports as well as utilizes some other Nmap scripts and features. It is mandatory that you have it installed before running Raccoon. OpenSSL is also used for TLS/SSL scans and should be installed as well. Usage Usage: raccoon [OPTIONS] TARGET Options: --version Show the version and exit. -d, --dns-records TEXT Comma separated DNS records to query. Defaults to: A,MX,NS,CNAME,SOA,TXT --tor-routing Route HTTP traffic through Tor (uses port 9050). Slows total runtime significantly --proxy-list TEXT Path to proxy list file that would be used for routing HTTP traffic. A proxy from the list will be chosen at random for each request. Slows total runtime -c, --cookies TEXT Comma separated cookies to add to the requests. Should be in the form of key:value Example: PHPSESSID:12345,isMobile:false --proxy TEXT Proxy address to route HTTP traffic through. Slows total runtime -w, --wordlist TEXT Path to wordlist that would be used for URL fuzzing -T, --threads INTEGER Number of threads to use for URL Fuzzing/Subdomain enumeration. Default: 25 --ignored-response-codes TEXT Comma separated list of HTTP status code to ignore for fuzzing. Defaults to: 302,400,401,402,403,404,503,504 --subdomain-list TEXT Path to subdomain list file that would be used for enumeration -sc, --scripts Run Nmap scan with -sC flag -sv, --services Run Nmap scan with -sV flag -f, --full-scan Run Nmap scan with both -sV and -sC -p, --port TEXT Use this port range for Nmap scan instead of the default --vulners-nmap-scan Perform an NmapVulners scan. Runs instead of the regular Nmap scan and is longer. --vulners-path TEXT Path to the custom nmap_vulners.nse script.If not used, Raccoon uses the built-in script it ships with. -fr, --follow-redirects Follow redirects when fuzzing. Default: False (will not follow redirects) --tls-port INTEGER Use this port for TLS queries. Default: 443 --skip-health-check Do not test for target host availability --no-url-fuzzing Do not fuzz URLs --no-sub-enum Do not bruteforce subdomains --skip-nmap-scan Do not perform an Nmap scan -q, --quiet Do not output to stdout -o, --outdir TEXT Directory destination for scan output --help Show this message and exit. Screenshots Web application data including vulnerable S3 bucket: HTB challenge example scan: Nmap vulners scan results: Results folder tree after a scan: Contributing Any and all contributions, issues, features and tips are welcome. Download: [HIDE][Hidden Content]]
  4. This is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the public Internet vulnerable to this vulnerability, so many are to expect a worm soon like WannaCry and notPetya. Therefore, scan your networks and patch (or at least, enable NLA) on vulnerable systems. This is a command-line tool. You can download the source and compile it yourself, or you can download one of the pre-compiled binaries for Windows or macOS from the link above. [HIDE][Hidden Content]]
  5. [Hidden Content]
  6. EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own. Download: [HIDE]. [Hidden Content]]
  7. WebLord WL-Nuke Coppermine for PHP-Nuke version 1.3.1c suffers from a remote SQL injection vulnerability. View the full article
  8. Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...) Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest. This script uses some webpages generated by SocialFish Tool ([Hidden Content]) Instagram webpage generated by An0nUD4Y (@its_udy) ([Hidden Content]) Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Pinterest +1 customizable Features: Port Forwarding using Ngrok or Serveo Legal disclaimer: Usage of Shellphish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  9. [Hidden Content]
  10. franckings

    Best Crypter for Botnet

    Hello guys I need an advice on the best crypter for botnet.
  11. This archive contains all of the 198 exploits added to Packet Storm in May, 2019. View the full article
  12. [Hidden Content]
  13. dEEpEst

    Tor Browser for Android

    [Hidden Content]
  14. Versionscan - A PHP Version Scanner For Reporting Possible Vulnerabilities Versionscan is a tool for evaluating your currently installed PHP version and checking it against known CVEs and the versions they were fixed in to report back potential issues. PLEASE NOTE: Work is still in progress to adapt the tool to linux distributions that backport security fixes. As of right now, this only reports back for the straight up version reported. [HIDE][Hidden Content]]
  15. Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. View the full article
  16. Level23HackTool

    Exploit for Shell Upload +Deface

    [Hidden Content]
  17. Email/User=Email Proxies=YES you need hq proxies if you want high cpm Capture=nothing had no account yet Cpm: +2k with hq proxies and with proxyscrape proxies only 20 or something [HIDE][Hidden Content]]
  18. Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) [HIDE][Hidden Content]]
  19. dEEpEst


    FREE 20GB FOR WINDSCRIBE VPN! How to get free 20gb? [Hidden Content]
  20. Brutex is a shell based open source tool to make your work faster. It combines the power of Nmap, Hydra and DNSenum. This tool will automatically run an nmap scan to your target and then it will brute force all the open services for you, such as FTP, SSH and more using Hydra. BruteX ABOUT: Automatically brute force all services running on a target Open ports Usernames Passwords INSTALL: ./ USAGE: brutex target <port> DOCKER: docker build -t brutex . docker run -it brutex target <port> DEMO VIDEO: Download: [HIDE][Hidden Content]]
  21. Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms. Details Trigmap can performs several tasks using Nmap scripting engine (NSE): Port Scan Service and Version Detection Web Resources Enumeration Vulnerability Assessment Common Vulnerabilities Test Common Exploits Test Dictionary Attacks Against Active Services Default Credentials Test [HIDE][Hidden Content]]
  22. is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the validity of a token Testing for the RS/HS256 public key mismatch vulnerability Testing for the alg=None signature-bypass vulnerability Testing the validity of a secret/key/key file Identifying weak keys via a High-speed Dictionary Attack Forging new token header and payload values and creating a new signature with the key or via another attack method [HIDE][Hidden Content]]