Search the Community

Showing results for tags 'for'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 588 results

  1. FaceLive – Live Stream Broadcaster Plugin for WordPress is a Facebook Live Video streaming tool which allows you to go live on Facebook with pre-recorded videos. You can go live directly on your account/page/group or create a live event for the stream, to increase views. Facebook live stream broadcaster plugin is ideal for increasing your Facebook account/page/group views count in no time, with the help of your WordPress blog. It uses the Facebook native PHP API to boost your Facebook account/page/group’s traffic! [Hidden Content] [hide][Hidden Content]]
  2. Learn how to enumerate and exploit WordPress CMS What you'll learn Enumerate WordPress Enumerate Users , Themes , Plugins in WordPress Bruteforce Attacks using XMLRPC , Python , BurpSuite and Hydra Bruteforce Attacks using Metasploit Exploit Themes , Plugins and Pop a Shell Shell Upload using Metasploit Requirements No Prerequisites needed but web and python fundamentals are optional Description This course teaches you how to enumerate WordPress CMS. Wordpress cms is one of most popular cms to build blogs , shopping websites and more Wordpress comes with lot of 3rd party plugins and themes so does vulnerabilities and misconfigurations We need to know how hackers attack wordpress thus protecting ourself from the attacks We will see how to enumerate and bruteforce with python , burp , wpscan , metasploit etc tools like wpscan does awesome job at enumeration and also at bruteforce attacks thus testing our password security Metasploit have some auxiliary scanners and wordpress exploits to test aganist wordpress we can script our code in python to bruteforce the login credentials and hence some what faster than burp community edition Burp professional edition have the option of multi threading thus testing passwords faster but in this course we will not discuss about professional edition as it is not free we will also get the reverse shell from the vulnerable wordpress machine Bonus video includes how we attack a Drupal CMS using droopescan we can use droopescan to scan wordpress , joomla , drupal , moodle etc but for wordpress we better use wpscan first later we see some try hack me writeup which involves pentesting wordpress cms and exploiting it after this course you can try mrrobot room from tryhackme and test your skills Who this course is for: Anyone who is interested in Pentesting Anyone who wants to learn how to pentest Wordpress or any other CMS [Hidden Content] [hide][Hidden Content]]
  3. smartbrute The smart password spraying and bruteforcing tool for Active Directory Domain Services. [hide][Hidden Content]]
  4. Expiry = 2022-10-17 winner will receive via pm
  5. Description In this course we will learn about the basic Kotlin programming and we will learn how to build android app using Kotlin. This is a project based so whatever we learn we will implement in our android project. If you have never written a code before then this is a perfect course to get your hand dirty. You will learn android development from ground up, so if you have not written a code before or have not done any development but want to learn programming and android development this is a great place to start. This course is for beginner android development and programming. If you are experienced programmer or android developer then this course may not be suitable for you or you may not learn much from this course but if you are an experienced programmer and want to learn android development this is a great course for you. This course section will be updated on time to time you can always come back and check for the new section. This will be the complete course for your android development journey. If you have any problem with the course lecture you can directly contact me on my email address. Please check out my more android development course from my profile page. Who this course is for: Beginner Android Developer Beginner Kotlin Programmer Any one who want to learn Android development Any one who want to learn programming Requirements Willness to learn Basic of computer skill [hide][Hidden Content]]
  6. Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Features Fast scan Low RAM and CPU usage Identify Joomla version Config files detection Open-Source [hide][Hidden Content]]
  7. Protect your online content from being copied. Just install a small plugin on your website and Content Protector for WordPress defend web content from being plagiarized. [Hidden Content] [hide][Hidden Content]]
  8. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.8.6 Fixed: Any bugs: Thread modification, header parameters, bypass forbidden & any others… Added: google module in requirements/setup Updated: Deleted degoogle modules/script, google dork works now with the “googlesearch” module Updated: A little style modification Updated: Default thread now 30 [hide][Hidden Content]]
  9. Blog Designer is an effective and user friendly way to beautify your blog pages on your websites. It’s very popular plugin for website’s WordPress blog to attract more clients as well as more blog visitors. Blog Designer makes your blog section more intuitive with no coding skill. It’s very easy to manage for beginners to website developers. [Hidden Content] [hide][Hidden Content]]
  10. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Changelog v2.3.61 FIX: Airgap link to Release Notes #4685 FIX: CyberChef unable to load due to recent Content Security Policy restrictions #4885 FIX: Suricata dns.response.code needs to be renamed to dns.response.code_name #4770 UPGRADE: alpine 3.12.1 to latest for Fleet image #4823 UPGRADE: Elastic 7.13.4 #4730 UPGRADE: Zeek 4.0.3 #4716 [hide][Hidden Content]]
  11. PassFab for RAR – Quickly recover forgotten passwords from encrypted RAR archives (*.rar) created by any applications, including the latest version of WinRAR. Unlock any password-protected RAR archive no matter what compression and encryption algorithm is used. Features Brute-force Attack • Try all combinations of password. It requires maximum time and it is usually used when you have no idea of the password. Brute-force with Mask Attack • Use this attack when you still remember part of your password, you can set approximate minimum and maximum length of the password and more Dictionary Attack • Find the password based on a built-in or self-created dictionary. It is the quickest type. Recover Fast with GPU & Multi-core CPU • Recover RAR password at high speed by using advanced SSE technology and new search algorithm. Also, it allows you to accelerate RAR password recovery speed with Multi-core CPUs, NVIDIA CUDA GPUs and ATI OpenCL GPUs. [Hidden Content] [hide][Hidden Content]]
  12. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]
  13. Complete Methodology for Ethical Hacking, Pentesting & Bug Bounties with Live Attacks What you'll learn Recon Target Expansion Content Discovery Fuzzing CMS Identification Certificate Transparency Visual Recon Github Recon Custom Wordlists Mindmaps Bug Bounty Automation Bash Scripting Bug Bounty Roadmap Report Writing Shodan for Exploitation Subdomain Enumeartion DNS Dumpster FFUF & WFUZZ Project Discovery Subjack for Bug bounties Amass for Bug bounties Dirsearch for Bug bounties Masscan for Bug bounties Nmap for Bug bounties CTF Recon Methodologies ASN Identification TLS Cert Extraction Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory & Internet Connection Operating System: Windows / OS X / Linux Description Welcome to Recon for Bug Bounty, Pentesting & Ethical Hacking. This course starts with the Basics of Recon & Bug Bounty Hunting Fundamentals to Advance Exploitation. This course starts with basics with Web and Web Server Works and how it can be used in our day to day life. We will also learn about DNS, URL vs URN vs URI and Recon for Bug Bounties to make our base stronger and then further move on to Target Expansion, Content Discovery, Fuzzing CMS Identification, Certificate Transparency, Visual Recon , Github Recon , Custom Wordlists , Mind maps, Bug Bounty Automation, Bug Bounty Platforms with practicals. This course covers All the Tools & Techniques for Penetration Testing & Bug Bounties for a better understanding of what’s happening behind the hood. The course also includes in depth approach towards any target and increases the scope for mass hunting and success. With this course, we will learn Target Selection Techniques for Host, Subnet Scans & Host Discovery, Content Discovery, Subdomain Enumeration Horizontal & Vertical, CMS Identification, Fuzzing the target for finding web vulnerabilities like XSS, Open Redirect, SSRF, Sql Injection etc. How to increase the scope and take screenshots for large number for hosts for better visualisation. We will also learn How to use Shodan for Bug Bounties to find critical vulnerabilities in targets. We will also see Github Recon to find sensitive information for targets like API keys from GitHub Repositories. Next we will see How to perform Automation for daily day to day tasks and easier ways to run tools, We will also see How to write Bug Bounty & pentesting Reports. We will also cover mind maps by other hackers for a better approach towards any target and also we will see mindmap created by us. We will also see Bug Bounty Platforms and how to kick start our journey on them. Here's a more detailed breakdown of the course content: In all the sections we will start the fundamental principle of How the scan works and How can we perform Exploitation. In Introduction, We will cover What is Web, What are Web Servers, DNS and We will also learn about DNS and How DNS works and also How DNS is important in our day to day life.We will also see the difference between URL, URN and URI, We will also see the complete breakdown of URL to understand better. We will also learn about Bug-Bounty Hunting and Understand the Importance of Recon in Bug-Bounty Hunting and Pentesting. Before starting the journey, We will see Top-10 rules for Bug-Bounty Hunting and we will understand the psychology of the Hackers. In Shodan for Bug-Bounties we will start with the installation of Shodan and we will learn about Shodan Queries such as Info, Count downloads and many more and will run them from our command line. We will also learn Host Enumeration, Parse dataset, Search Queries, Scan commands using Shodan. The Section cannot be completed without learning about Shodan GUI which is very simple and easily understandable. We will also see Shodan Images, Exploits , Report generation and alot more. In the end, we will see the summary and revision of the section to remember the important queries and key points. We will see live hunting with Shodan and understand about latest CVE’s and perform exploits. We will see Jenkins Exploitation Logs, Jenkins Exploitation Credentials, ADB under Shodan LIVE Hunting. In Certificate Transparency for Subdomain Enumeration we will learn about crt[dot]sh, wildcards of crt[dot]sh and We will learn automation for crt[dot]shto enumerate subdomains for a target. We will also learn about Shodan, Censys for Subdomain Enumeration, We will learn about Google and Facebook Certificate Transparency. We will also learn to find out Subdomains using DNS Dumpster and enumerate all the DNS records as well as save the hosts in a xlsx format. We will also see the workflow for dnsdumpster to know about the whole target server from its DNS records like A, CNAME, MX, TXT etc. In Scope Expansion we will learn about ASN Lookup, Pentest tools, VirusTotal. We will also learn about some awesome tools like Sublister, Subfinder, knockpy, Asset Finder, Amass, Findomain, Sublert, Project Discovery Nmmapper and a lot more. We will also understand how to use them effectively for expanding the scope to walk on less travelled road and achieve success in bug bounties In DNS Enumeration for Bug-Bounties we will learn and understand about DNS Dumpster, DNS Goodies, Altdns, Massdns, Vertical & Horizontal Correlation (Viewdns.info) and enumerate the subdomains from the recursive DNS. We will start with Introduction to Fuzzing, Its importance and Step by Step process, We will see fuzzing practically on LAB and LIVE websites to understand better. We will Learn, Understand and Use tools like Wfuzz and FFUF and also see how we can perform recursive fuzzing on the target. We will also perform HTTP Basic Auth Fuzz to crack the login of the dashboards and also do Login Authentication Cracking with the help of useful wordlists. We will utilise some of the wordlists like Seclists, FuzzDB, Jhaddix All.txt and will also see how to make our own custom wordlists for the targets. Content Discovery covers tools like Dirsearch, Gobuster which will be helpful for finding out sensitive endpoints of the targets like db.conf or env files which may contain the DB username and passwords. Also sensitive information like periodic backups or source code and can also be identified which can lead to compromise of the whole server. In CMS Identification we will learn and understand about Wappalyzer, Builtwith, Netcraft, Whatweb, Retire.js As Banner Grabbing and identifying information about the target is the foremost step, we will identify the underlying technologies which will enable us to narrow down the approach which will lead to success. In WAF Identification we will see WAF Detection with Nmap, WAF Fingerprinting with Nmap, WafW00f vs Nmap. We will know, If there are any firewalls running on the target and accordingly send our payloads to the targets and throttle our requests so we can evade them successfully. The Mindmaps for Recon and Bug-Bounty section will cover the approach and methodology towards the target for pentesting and bug bounty. A strong and clear visual building block visual representation will help in performing the attack process with more clarity and will help in knowing the next steps. The Bug-Bounty Platforms section contains a Roadmap of How to start your Bug-Bounty Journey on different Platforms like Hackerone, Bugcrowd, Integrity, Synack, It also covers how to Report Private RVDP Programs. With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible. Notes: This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed. Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility. Who this course is for: Anybody interested in learning website & web application hacking / penetration testing Any Beginner who wants to start with Penetration Testing Any Beginner who wants to start with Bug Bounty Hunting Trainer who are willing to start teaching Pentesting Any Professional who working in Cyber Security and Pentesting Ethical Hackers who wants to learn How OWASP Works Beginners in Cyber Security Industry for Analyst Position SOC person who is working into a corporate environment Developers who wants to fix vulnerabilities and build secure applications [Hidden Content] [hide][Hidden Content]]
  14. Java for Absolute Beginners Java Tutorial for Absolute Beginners. Learn Java For Free. Go from Beginner to Expert in Java. You will be able to learn write code using Java Programming language. Learn Java in Simplest way possible Learn about Datatypes in Java Learn about Conditional Execution using If/ElseIf/Else Learn about Switch Conditional Execution Learn about Arrays in Java Learn about Looping in Java Learn about String Interpolation in Java Learn about Methods in Java Learn about Different types of Java Methods Learn about Getters/Setters in Java Learn about Static Variables & Constants Learn about Java Packages Learn about methods of String/Integer Class Learn about Regular Expressions in Java Learn about OOP in Java Learn about Java OOP Inheritance Learn about Java OOP Encapsulation Learn about Overloading & Overriding Learn about Interface & Abstract Class Learn about Array List/linkedList/Vector Learn about Access Modifiers Learn about Java File IO Types - Byte Stream/Character Stream Learn about JUnit Testing Framework Learn about Maven Build Tool Create Java Project using Maven Build Tool [Hidden Content]
  15. CommandoVM – a fully customized, Windows-based security distribution for penetration testing and red teaming. Installed Tools Active Directory Tools Remote Server Administration Tools (RSAT) SQL Server Command Line Utilities Sysinternals Command & Control Covenant PoshC2 WMImplant WMIOps Developer Tools Dep Git Go Java Python 2 Python 3 (default) Ruby Ruby Devkit Visual Studio 2017 Build Tools (Windows 10) Visual Studio Code Evasion CheckPlease Demiguise DefenderCheck DotNetToJScript Invoke-CradleCrafter Invoke-DOSfuscation Invoke-Obfuscation Invoke-Phant0m Not PowerShell (nps) PS>Attack PSAmsi Pafishmacro PowerLessShell PowerShdll StarFighters Exploitation ADAPE-Script API Monitor CrackMapExec CrackMapExecWin DAMP EvilClippy Exchange-AD-Privesc FuzzySec’s PowerShell-Suite FuzzySec’s Sharp-Suite Generate-Macro GhostPack Rubeus SafetyKatz Seatbelt SharpDPAPI SharpDump SharpRoast SharpUp SharpWMI GoFetch Impacket Invoke-ACLPwn Invoke-DCOM Invoke-PSImage Invoke-PowerThIEf Kali Binaries for Windows LuckyStrike MetaTwin Metasploit Mr. Unikod3r’s RedTeamPowershellScripts NetshHelperBeacon Nishang Orca PSReflect PowerLurk PowerPriv PowerSploit PowerUpSQL PrivExchange Ruler SharpExchangePriv SharpExec SpoolSample UACME impacket-examples-windows vssown Information Gathering ADACLScanner ADExplorer ADOffline ADRecon BloodHound dnsrecon Get-ReconInfo GoWitness Nmap PowerView Dev branch included SharpHound SharpView SpoolerScanner Networking Tools Citrix Receiver OpenVPN Proxycap PuTTY Telnet VMWare Horizon Client VMWare vSphere Client VNC-Viewer WinSCP Windump Wireshark Password Attacks ASREPRoast CredNinja DSInternals Get-LAPSPasswords Hashcat Internal-Monologue Inveigh Invoke-TheHash KeeFarce KeeThief LAPSToolkit MailSniper Mimikatz Mimikittenz RiskySPN SessionGopher Reverse Engineering DNSpy Flare-Floss ILSpy PEview Windbg x64dbg Utilities 7zip Adobe Reader AutoIT Cmder CyberChef Gimp Greenshot Hashcheck Hexchat HxD Keepass MobaXterm Mozilla Thunderbird Neo4j Community Edition Pidgin Process Hacker 2 SQLite DB Browser Screentogif Shellcode Launcher Sublime Text 3 TortoiseSVN VLC Media Player Winrar yEd Graph Tool Vulnerability Analysis AD Control Paths Egress-Assess Grouper2 NtdsAudit zBang Web Applications Burp Suite Fiddler Firefox OWASP Zap Subdomain-Bruteforce Wordlists FuzzDB PayloadsAllTheThings SecLists Changelog v2021.2 – July 14, 2021 Require users to disable Defender before installing Too many issues arise from Defender magically turning itself back on. Disabling defender with the preconfig script has been unreliable since Win10 1909. removed update requirement (legacy requirement for Windows 7. Windows 7 support was removed last year) Added support for Windows 10 20H2 and 21H1 Removed vcpython27 #204 updated proxycap install args #203, #200. #196 updated sqlitebrowser.fireeye to remove newly created desktop shortcuts #200 Closed issues #203, #204, #202, #200, #196, #195, #192, #191, #190, #189, #188, #186, #185, #184, #177, #175, #174, #170, #169, #160, #134, #133 [hide][Hidden Content]]
  16. [Hidden Content]
  17. Recon The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my own recognition script with all the tools I use most in this step. All construction of this framework is based on the methodologies of @ofjaaah and @Jhaddix. These people were my biggest inspirations to start my career in Information Security and I recommend that you take a look at their content, you will learn a lot! Feature ASN Enumeration metabigor Subdomain Enumeration Assetfinder Subfinder Amass Findomain Sublist3r Knock SubDomainizer GitHub Sudomains RapidDNS Riddler SecurityTrails Alive Domains httprobe httpx WAF Detect wafw00f Domain organization Regular expressions Subdomain Takeover Subjack DNS Lookup Discovering IPs dnsx DNS Enumeration and Zone Transfer dnsrecon dnsenum Favicon Analysis favfreak Shodan Directory Fuzzing ffuf Google Hacking Some Dorks that I consider important CredStuff-Auxiliary Googler GitHub Dorks Jhaddix Dorks Credential Stuffing CredStuff-Auxiliary Screenshots EyeWitness Port Scan Masscan Nmap Naabu Link Discovery Endpoints Enumeration and Finding JS files Hakrawler Waybackurls Gospider ParamSpider Vulnerabilities Nuclei ➔ I used all the default templates 403 Forbidden Bypass Bypass-403 XSS XSStrike Gxss LFI Oneliners gf ffuf RCE My GrepVuln function Open Redirect My GrepVuln function SQLi Oneliners gf sqlmap [hide][Hidden Content]]
  18. Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows What you'll learn Reverse Engineering Assembly Language Remnux Linux IDA Windows IDA File, Strings and Hexeditor Analysis Converting Data, Renaming Labels and Variables Inserting Comments Creating Data Structures Decompiling Binary to C code Debugging using IDA Patching Files Register and Memory Analysis Python Scripting For Reversing Algorithms Creating Keygens Cracking Windows Crackmes Reversing Jumps Using NOPs to disable instructions Extending Trial Period beyond 30 days Intermodular Call Method Dynamic Analysis to Confirm Algorithms Linux and Windows API Algorithm Analysis and Testing Creating Keygens Setting breakpoints and stepping through code and more Requirements Basic Assembly Language , C Programming and Python would be useful Windows PC Familiar with basic Linux commands Description If you are a beginner to Reverse Engineering and want to learn how to use IDA Pro to reverse engineer and analyze Linux and Windows programs, then this is the course for you. In this course, you will a CTF (Capture The Flag) game -for Linux whilst learning reverse engineering. This makes learning fun and exciting.This will teach you all the basic skills for reversing on IDA, eg, how to rename labels, insert comments, convert data, create functions and analyze assembly code. We will use the Free version of IDA so that anyone can follow along without spending money to buy the Pro version. After that we will move to Windows and Reverse Engineer five Windows Crackme's. IDA Pro is one of the most widely used Disassembler for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn IDA by solving Linux and windows CrackMe. A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally. This course will equip you with the knowledge and skill to use IDA in addition to whatever other tools you might already be familiar with. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics. I will start off with showing you how to install Oracle Virtual Box. Then, installing Remnux Linux in the Virtual Box followed by IDA for Linux. Then, we will reverse engineer Linux executable files. In a later section, we will move to installing IDA on Windows and continue learning how to reverse engineer windows files using IDA. By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries using IDA. What you will learn: How to disassemble programs into assembly code How to decompile programs to C code Static Analysis Dynamic Analysis using IDA's Debugger Patch files using IDA Understand Linux and Windows API's Identify entry points and functions Using NOPs and Reversing Jumps Reverse Crackmes and Patch them Learn to Assemble Instructions and Patch Bytes Algorithm Analysis and Testing Using Python to create solutions and keygens to crackmes and more Suitable for: Anyone interested to learn to use IDA for Reverse Engineering Linux and Windows executable files. Students thinking of getting into Reverse Engineering or Malware Analysis as a Career Path Prerequisite: Assembly Language, C Programming and Python would be helpful Windows PC Basic Linux Commands Who this course is for: Anyone interested to learn to use IDA for Reverse Engineering Linux & Windows executables Students thinking of getting into Reverse Engineering or Malware Analysis as a Carreer Path [Hidden Content] [hide][Hidden Content]]
  19. As the name explains, this plugin makes it fast and easy to capture subscribers right from your WordPress site by simply providing them a freebies to download through email after successful subscription. If you don’t have any freebies to offer then you can even use our plugin just as a subscription plugin too. Choice is simply yours!! [Hidden Content] [hide][Hidden Content]]
  20. WP Guard is a powerful WordPress security plugin that will protect your website from hackers, attacks and other threats. It will protect your website from SQLi Attacks (SQL Injections), XSS Vulnerabilities, Proxy Visitors, VPN Visitors, TOR Visitors, Spam, Malicious Files (Viruses) and many other types of threats. [Hidden Content] [hide][Hidden Content]]
  21. Learn how to receive data directly from satellites and decode it What you'll learn L-band antenna and how to use it. Frequencies on L-band. Basics of satellites. What is Iridium satellite? How to hunt for Iridium satellite frequency. Decode voice data from Iridium satellite. Decode other data types from Iridium satellite. Find location of Iridium satellite. What is Inmarsat satellite? How to hunt for Inmarsat satellite signals. Decode email, aerospace, and other data from Inmarsat satellite. Creating your own SDR server. Requirements RTL-SDR Dongle (Find Details inside Course) Raspberry PI (Find Details inside Course) Description Have you ever thought of Sniffing satellites and receiving data directly from satellites? If YES! Then this course is for you. After a great response from our first course (SDR for Ethical Hackers and Security Researchers), We took it further deep and created this (Advance SDR for Ethical Hackers and Security Researchers 2.0) course. It is recommended that you should first take SDR for Ethical Hackers and Security Researchers course and then continue with this course but for those who directly want to start with this course make sure you watch appendix section of this course for basic references. In this course we are going to talk about satellites, different types of satellites receiving data from satellites and decoding it. We will start with Iridium satellite and look what is Iridium satellite? Then we will setup L-band antenna for receiving signals from Iridium satellite after receiving data we will see how we can decode that data including Voice data, GSM data, Pager data and other data. After that we will cover Inmarsat satellite and see what Inmarsat satellite is and how to receive Inmarsat satellite signals then will try to decode those signals using Scytale-C and JAERO. We will try to capture Voice data, Email data and Aerospace data from Inmarsat satellite. At last, we will see how to create our own Raspberry Pi based SDR server and how to hunt for signals using that Server. Who this course is for: Anyone Interested in Software Defined Radio. Anyone Interested in Learning the use of SDR in Security. Anyone Interested in receiving data directly from satellite. Anyone Interested in decoding satellite data. Anyone Interested in creating SDR server. [Hidden Content] [hide][Hidden Content]]
  22. Statistical Deobfuscation for Android DeGuard reverses the process of obfuscation performed by Android obfuscation tools. This enables numerous security analyses, including code inspection and predicting libraries. [hide][Hidden Content]]
  23. SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercises and would be reminded to take prior permission from the targeted organization to avoid legal implications. Main Features Web tracker code generation – track your website visits and form submissions independently Create and schedule Phishing mail campaigns Combine your phishing site with an email campaign for centrally tracking An independent “Simple Tracker” module for quick tracking an email or web page visit Advance report generation – generate reports based on the tracking data you needed Custom tracker images and dynamic QR codes in messages Track phishing message replies Changelog v1.2.1 Features & Enhancements: Some performance improvements Bug fixes: Fixed page response delay caused by mail-reply check on the dashboard pages Fixed issue with session expiration [hide][Hidden Content]]
  24. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.8.4 Fixed: Better display of live lines Added: A new file to manage the modules to launches [hide][Hidden Content]]
  25. Sell with a Facebook shop on your Facebook page with Shopify for Facebook monetization and use Facebook ads for traffic What you'll learn Set up a Facebook page Create a shop right on your Facebook page Run ads to your products Create custom audiences Set up your Facebook Pixel Run retargeting ads Requirements It helps if you have at least a tiny ad budget Description Create a shop on your Facebook page and make sales right on Facebook or on your own site like a Shopify site. Get a full walkthrough and accomplish the following: Create a Facebook page Set up a shop on your Facebook page Run Facebook ads to your Facebook page Run Facebook retargeting ads to your Facebook page You can follow along with what I share on my screen through the whole course and accomplish everything I do in just one day or a few days. DOING COMMERCE RIGHT ON YOUR FACEBOOK PAGE Many people don't know this, but Facebook is moving in the direction of letting people set up entire stores on their Facebook pages. You can check out right on Facebook or send people to your online store like Shopify. It's a great opportunity if you are selling anything online. UNDERSTAND THE INS AND OUTS OF FACEBOOK ADS While I'll be showing you how to set up your ads, you will reach a good comfort level using Facebook ads and understands different details there. That will empower you to run any kinds of ads in the future. TAKE ADVANTAGE OF FACEBOOK MONETIZATION Make your business one of the first in your niche to take advantage of Facebook monetization with a shop, run Facebook ads to your shop, and use this channel to beat competition. Invest in your future! Enroll today! Who this course is for: Marketers and business owners, especially people selling online [Hidden Content] [hide][Hidden Content]]