Jump to content

Search the Community

Showing results for tags 'for'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

  1. A script for generating common revshells fast and easy. Especially nice when in need of PowerShell and Python revshells, which can be a PITA getting correctly formated. [hide][Hidden Content]]
  2. FoneDog Toolkit for iOS is a set of tools to repair your iPhone and iPad back to the normal state without losing data when you encounter iTunes error codes, iPhone stuck in recovery mode, Apple logo, etc. This software will detect your device is in normal state or not. You have two modes to edit your iPhone / iPad back to the normal state. The standard mode of the vendor will repair your equipment without loss of data advanced Mode of improvement will repair your device when standard mode fails, but all your device data will be deleted. [Hidden Content] [Hidden Content]
  3. TweakNow WinSecret Plus for Windows 10 – TweakNow WinSecret for Windows 10 allows users to explore the hidden settings in Windows 10. This app is specifically geared for Windows 10, grouping numerous registry settings and delivering them from an easy and safe user interface. With TweakNow WinSecret for Windows 10, you can move the Windows taskbar to the top and change the taskbar size by editing the registry value. With any app modifying the registry, it is strongly advised to have a backup to restore from in the advent of an issue. TweakNow WinSecret for Windows 10 makes the process easier than directly doing it via Regedit, potentially creating critical problems for a novice user. TweakNow WinSecret for Windows 10 gives you a smooth platform to perform these tweaks in a more controlled environment. TweakNow WinSecret for Windows 10 is a solid option for those that want to improve their overall experience while on Windows 10 through a simple and easy-to-navigate app. Features Auto Dark Automatically change app and system theme mode to light or dark Auto Wallpaper Changer Updates your background every day or hour with beautiful images from Bing homepage Folder Size Analyzer Figure out which files or folders who taking up your hard drive space Find Duplicate Find and remove duplicate files Process Manager View detail information about all running processes and change priority level for specified process Secure Delete Completely and securely delete sensitive file from your hard drive Smart Shortcut Automatically specified priority level for your favourite apps System Information Show detail information about your system Track Cleaner Protect your privacy by eliminating traces of your digital activities Transparent Taskbar Make your Windows 10 Taskbar completely transparent Troubleshooter Fix problem with Internet connection, icon, thumbnail, and Microsoft Store Windows Secret Safely and easily explore Windows 11 hidden settings [Hidden Content] [hide][Hidden Content]]
  4. TweakNow WinSecret Plus for Windows 11 – This app is specifically geared for Windows 11, grouping numerous registry settings and delivering them from an easy and safe user interface. With TweakNow WinSecret for Windows 11, you can move the Windows taskbar to the top and change the taskbar size by editing the registry value. With any app modifying the registry, it is strongly advised to have a backup to restore from in the advent of an issue. TweakNow WinSecret for Windows 11 makes the process easier than directly doing it via Regedit, potentially creating critical problems for a novice user. TweakNow WinSecret for Windows 10 gives you a smooth platform to perform these tweaks in a more controlled environment. TweakNow WinSecret for Windows 11 is a solid option for those that want to improve their overall experience while on Windows 10 through a simple and easy-to-navigate app. Features Auto Dark Automatically change app and system theme mode to light or dark Auto Wallpaper Changer Updates your background every day or hour with beautiful images from Bing homepage Folder Size Analyzer Figure out which files or folders who taking up your hard drive space Find Duplicate Find and remove duplicate files Process Manager View detail information about all running processes and change priority level for specified process Secure Delete Completely and securely delete sensitive file from your hard drive Smart Shortcut Automatically specified priority level for your favourite apps System Information Show detail information about your system Track Cleaner Protect your privacy by eliminating traces of your digital activities Transparent Taskbar Make your Windows 10 Taskbar completely transparent Troubleshooter Fix problem with Internet connection, icon, thumbnail, and Microsoft Store Windows Secret Safely and easily explore Windows 11 hidden settings [Hidden Content] [hide][Hidden Content]]
  5. S3cret Scanner: Hunting For Secrets Uploaded To Public S3 Buckets S3cret Scanner tool is designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets in public S3 buckets. Can be executed as a scheduled task or On-Demand Automation workflow The automation will perform the following actions: List the public buckets in the account (Set with ACL of Public or objects can be public) List the textual or sensitive files (i.e. .p12, .pgp and more) Download, scan (using truffleHog3), and delete the files from the disk, once done evaluating, one by one. The logs will be created in the logger.log file. [hide][Hidden Content]]
  6. About the Product Updates for the new version of Photoshop CC2023 are available! Please download the archive from the page and reinstall the panel. DETAILED PRESENTATION IN ONE PAGE: [Hidden Content] SUPPORT PHOTOSHOP CS6, CC2014 - CC2022, CC2023 Version for Mac m1, m2 chips please see here [Hidden Content] The Ultimate Retouch Panel has been developing for 3 years. This is not the last update because there are more and more new retouching tools and techniques. After version 2.0 I started to listen to my clients (both photographers and retouchers). They gave me many ideas of what to add to the panel from their points of view. So the Ultimate Retouch Panel is a product of not the developer only, but of many people from all over the world also. This fact makes the product unique, relevant, and very flexible. At the moment there are more than 200 useful functions of the panel. It can become an essential part of your workflow and keeps you away from boring technical Photoshop settings and give you more time to focus on your work. [Hidden Content] [hide][Hidden Content]]
  7. K7 Scanner for Virus & BOTs comes with scanner Antivirus award-winning run in parallel with any Antivirus software which is currently installed on your PC. Technology Deep Scanning of it helps to remove BOT and Virus at high risk.Scans and remove BOTS, and Ransomware is high risk (including WannaCry). The features of K7 Scanner for Virus & BOTs Scan and remove BOTS, and Ransomware is high risk Run seamless with apps Anti-virus your existing No need to install. Can run from a USB drive. [hide][Hidden Content]]
  8. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM. [hide][Hidden Content]]
  9. 300+ Powerful Features You Must Have in Excel Kutools-for-Excel Kutools for Excel is a powerful add-in that frees you from performing time-consuming operations in Excel, such as combining sheets quickly, merging cells without losing data, pasting to only visible cells, counting cells by color and so on. 300+ powerful features / functions for Excel 2021, 2019, 2016, 2013, 2010, 2007 or Office 365! [Hidden Content] [hide]Kutools for Excel 26.10 [Hidden Content]]
  10. Why PhoneRescue®? 100% Secure and World's Top Success Rate PhoneRescue firmly believes that data loss is just temporary, since it has successfully saved over 5,700,000 iOS and Android users from data disasters. Now, all your lost data can be safely retrieved and you're definitely the only person who can access them. Easiest Operation with Straightforward Workflow With intuitive UI, straightforward workflow, and step-by-step wizard, PhoneRescue makes complicated data recovery as plain as a few clicks. It asks no tech knowledge at all and even your grandparents can easily get back what's lost all by themselves. Widest Coverage of Files and Possibilities PhoneRescue is the world's ONLY software that recovers data & files up to 31 types, covering photos, messages and all your irreplaceable essentials. Multiple solutions are also available to ensure you retrieve what you want, under any conditions. The Best Results Come from the Best Ever Technologies PhoneRescue knows quicker work gives a better chance of recovery. So, it applies the best technologies to give you the fastest scan, instant preview, and lightning recovery. Now, you're able to save lost data before they're overwritten and gone forever. [Hidden Content] [Hidden Content]
  11. A position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap for any allocations from Beacon and encrypts entries before sleep. Code Obfuscation and Encryption Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE). Return Address Spoofing at Execution Certain WinAPI calls are executed with a spoofed return address (InternetConnectA, NtWaitForSingleObject, RtlAllocateHeap). Sleep Without Sleep Delayed execution using WaitForSingleObjectEx. RC4 Encryption All encryption is performed with SystemFunction032. Known Issues Not compatible with loaders that rely on the shellcode thread staying alive. [hide][Hidden Content]]
  12. efiXplorer – IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: every time we focus on the last versions of IDA and Decompiler because trying to use the most recent features from new SDK releases. That means we tested only on recent versions of Hex-Rays products and do not guarantee stable work on previous generations. Why not IDApython: all code developed in C++ because it’s a more stable and performant way to support a complex plugin and get the full power of the most recent SDK’s features. Supported Platforms: Win, Linux, and OSX (x86/x64). [hide][Hidden Content]]
  13. Linux File Systems for Windows by Paragon Software Linux File Systems for Windows by Paragon Software is a unique tool which gives you full access to Linux volumes within Windows. Just plug your hard disk with ExtFS/Btrfs/XFS partitions into your PC and instantly work with any media on the Linux partitions. Stable Operation Fail-safe operability across compatible hardware and software systems for both general-purpose and specialized applications Data Safety Protection of data integrity and prevention of accidental data corruption and possible loss Guaranteed Performance Steady throughput and balanced goodput with effective flow control, reduced overheads, and congestion avoidance Efficient Use Thrifty usage of processor, memory, and disk resources [Hidden Content]# [hide][Hidden Content]]
  14. A free silent (hidden) native cryptocurrency miner capable of mining ETH, ETC, XMR, RTM and much more, with many features suited for mining silently. This miner can mine all the following algorithms and thus any cryptocurrency that uses one of them: List of algorithms Main Features Native C++ - Miner installer/injector and watchdog now coded fully in C++ with no run requirements except a 64-bit OS Injection (Silent/Hidden) - Hide miner behind another process like conhost.exe, svchost.exe and others Idle Mining - Can be configured to mine at different CPU and GPU usages or not at all while computer is or isn't in use Stealth - Pauses the miner and clears the GPU memory while any of the programs in the "Stealth Targets" option are open Watchdog - Monitors the miner file and replaces the file if removed and starts it if the injected miner is closed down Multiple Miners - Can create multiple miners to run at the same time, for example one XMR (CPU) miner and one ETH (GPU) miner CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) Windows Defender Exclusions - Can add exclusions into Windows Defender after being started to avoid being detected Process Killer - Constantly checks for any programs in the "Kill Targets" list and kills them if found Remote Configuration - Can get the miner settings remotely from a specified URL every 100 minutes Web Panel Support - Has support for monitoring and configuring all the miners efficiently in a free self-hosted online web panel SilentCryptoMiner v3.1.0 Latest Changed process creation from undocumented API calls to direct system calls Added process parent spoofing with token impersonation when creating processes Created custom process parameter creation to avoid API calls Added system call process enumeration for parent spoofing Updated SysWhispers2 with custom process creation definitions and more Modified SysWhispers2 assembler instructions to bypass new detection Changed all indirect API calls to direct system calls Changed compiler binaries to reduce some compiler caused detections Fixed known XMR "GPU Mining" compilation error with new compiler Fixed XMR GPU library location checking on some systems Changed GPU memory checking from CUDA API to NVML for much better accuracy Updated ethminer CUDA and OpenCL mining implementations Updated ethash, etchash and ubqhash algorithm implementation Added improved CUDA and OpenCL automatic restart on error or crash Improved GPU limit sleep time accuracy for powerful GPU cards Removed ETH from the preset list due to the ETH merge from PoW to PoS Added EthereumPoW (ETHW) fork of ETH to the preset list Rewrote website blocking to avoid using string to reduce dependencies Updated rootkit and fixed some rootkit bugs Fixed many miscellaneous bugs Updated xmrig [Hidden Content]
  15. Description Linux is for everyone! Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux. This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you’ll have access to the most comprehensive overview of Linux around. Explore the inner workings of Linux machines, so you’ll know Linux front to back. This all-inclusive handbook also walks you through solving Linux problems—complete with hands-on examples—so you’ll be a Linux whiz before you know it. Get familiar with Linux as you install and customize the operating system Learn how to navigate the file system, use the Linux shell, and get online Become a Linux guru with server hosting, scripting, and security how-tos Study for your Linux certification by using this complete guide a... [Hidden Content],+7th+Edition-p-9781119901921 [hide][Hidden Content]]
  16. [hide][Hidden Content]]
  17. Master Reverseshell attacks Course Duration: 5 sections • 28 lectures • 4h 4m total length What you'll learn: Master Reverse Shell Attacks Pracice Windows Reverse Shell Attacks Build your own cybersecurity lab Pracrice linux reverse shell attacks Master variety of reverse shell attacks tools Requirements: No requirement or Prerequistes this course for Absolute Beginners Description: Reverse shell attacks are one of the most famous and dangerous attacks because they can bypass security controls and they can take full control of the target device. The reverse shell attack's main goal is to make the connection come back from the victim's device and then take full control of the victim's device. In this course, we assume that you never did any kind of reverse shell attacks before, so we will start from scratch. We will start talking about reverse shell attacks in general and then we will build the necessary ethical hacking lab to practice reverse shell attacks in safe and legal environments. Then, we will learn together some essential system commands. However, you can skip this section if already know Linux commands. After that, we will start practicing the following:1-Build your cyber security lab - Download and Install VirtualBox -Download and Install Vmware - Download and Install Kali Linux - Take a look on Kali Linux - Download and Install Metasploitabl - Download and Install Windows 10 VM.2- learn some networks basics -what is IP Address? - what is Mac Address? -what is port number? - what is DNS? -what is DHCP? - What is NAT?3-Essential System Commnads4-Practice Reverse shell attacks - Bind shell attacks - Reverse TCP attacks -Reverse HTTPS attacks - Linux and Android payload for reverse attacks - Windows Reverse shell attacks using MSFPC - MSFPC for Android payload - MSFPC for Linux payload - USING Netcat fro reverse shell attacks.Also, you will learn a lots about reverse shell attacks in practical way.The best way to study for this course is to watch the lesson first and then go ahead and practice it. If you face any difficulty please contact me and I will be more than happy to help. Who this course is for: Anyone wants to learn and master reverse shell attacks by doing them [Hidden Content] [hide][Hidden Content]]
  18. Utilize Microsoft Power Pages, a platform that uses little code, to start building entertaining, powerful, and secure websites. What you’ll learn Detailed tutorials on using Microsoft Power Pages to build successful company websites. Power Pages’ several workspaces include various elements such as text, images, videos, iFrames, etc. Tables, views, forms, lists, and other dataverse objects’ creation and management Requirements You will learn everything about Microsoft Power Pages from the beginning; no prior knowledge is required. Description Power Apps portals have long provided customers with a complete experience that allows them to rapidly and safely establish external portals and personalize them with pages, layouts, and content. Microsoft Power Pages is a brand-new, stand-alone program that makes it easy for anyone, no matter how technical they are, to make websites that are data-driven, modern, and safe. In addition to being low-code, Power Pages can accomplish much more than portals could before. The main justifications for learning Microsoft Power Pages are as follows: Soon, Microsoft Power Pages will have the most advanced security features and the best low-code website building portal in the cloud. There is a growing need for website developers. This position is currently one of the most in-demand in the data science industry. For somebody with this expertise, there are several options available all across the world. A trial version of this tool is now accessible to the general public. It is accessible to everyone and is free. To learn this tool, you do not need a computer with a high configuration. Any machine with an internet connection will do. The main justifications for enrolling in this course are as follows: We start with the fundamentals and progress to more complex subjects in this course since it was created with students from diverse educational levels in mind. You can finish this course over the weekend. Real-world examples and case studies covering all themes All questions will be resolved. Most importantly, you’ll get assistance with things other than the tool itself. You will not only learn how to use the program, but you will also learn important rules for designing websites. Who this course is for: Working with CMS systems like WordPress, Joomla, and others as web developers. Professionals want to design stunning commercial websites. Students aspiring to work in the web development and website creation industries should Experienced professionals that are proficient with Microsoft tools like Teams, Power BI, Dataverse, and others. [Hidden Content] [hide][Hidden Content]]
  19. MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. Features: Email validation Check social accounts with Socialscan and Holehe Check data breaches and password leaks Find related emails and domains Scan Pastebin and Throwbin Dumps Google Search DNS Lookup IP Lookup Output to text file [hide][Hidden Content]]
  20. Based on the test results, a fully equipped password hash machine with eight RTX 4090s would have the computing power to perform 200 billion iterations of an eight-character password in 48 minutes. The sub-hour result is 2.5 times faster than the previous RTX 3090 record. Both tests were conducted using only off-the-shelf GPU hardware and corresponding software. Hashcat software offers various types of attacks designed to facilitate password recovery or, depending on the user, unauthorized access to third-party accounts. These attacks include dictionary attacks, combinator attacks, mask attacks, rule-based attacks, and brute force attacks.
  21. All in One Hacking tool Kit For Hackers Update Available V2.0 Added New Tools Ngrok - Your web services running in any cloud or private network, or your machine Portmap - Make your home PC available from Internet without real IP address Pagekite - Make your sites public, but keep your home IP hidden Localtonet - Public URLs for Http, Tcp, Udp tun PhoneInfoga - Advanced information gathering & OSINT framework for phone numbers Thanos - Browser in browser phishing tool Hiddeneye Fixed - Modern Phishing tool AutoPhisher - Newly Cloned Website's Phishing tool QRLJacking - WhatsApp qrl captured tool AdvPhishing - This is Advance Phishing Tool ! OTP PHISHING BlackEye - The ultimate phishing tool with 38 websites available! Miskphish - Hide phishing URL under a normal looking URL (google.com or facebook.com) Biginner Friendly - Anyone can understand easily Hackingtool Menu Anonymously Hiding Tools Information gathering tools Wordlist Generator Wireless attack tools SQL Injection Tools Phishing attack tools Web Attack tools Post exploitation tools Forensic tools Payload creation tools Exploit framework Reverse engineering tools DDOS Attack Tools Remote Administrator Tools (RAT) XSS Attack Tools Steganograhy tools Other tools Anonymously Hiding Tools Anonmously Surf Multitor Localtonet Pagekite Portmap Ngrok Information gathering tools Network Map (nmap) PhoneInfoga Dracnmap Port scanning Host to IP Xerosploit RED HAWK (All In One Scanning) ReconSpider(For All Scaning) IsItDown (Check Website Down/Up) Infoga - Email OSINT ReconDog Striker SecretFinder (like API & etc) Find Info Using Shodan Port Scanner - rang3r (Python 2.7) Port Scanner - Ranger Reloaded (Python 3+) Breacher Wordlist Generator Cupp WordlistCreator Goblin WordGenerator Password list (1.4 Billion Clear Text Password) Wireless attack tools WiFi-Pumpkin pixiewps Bluetooth Honeypot GUI Framework Fluxion Wifiphisher Wifite EvilTwin Fastssh Howmanypeople SQL Injection Tools Sqlmap tool NoSqlMap Damn Small SQLi Scanner Explo Blisqy - Exploit Time-based blind-SQL injection Leviathan - Wide Range Mass Audit Toolkit SQLScan Phishing attack tools AutoPhisher AdvPhishing Setoolkit SocialFish HiddenEye Evilginx2 I-See_You(Get Location using phishing attack) SayCheese (Grab target's Webcam Shots) QR Code Jacking WifiPhisher BlackEye ShellPhish Thanos QRLJacking BlackPhish MashPhish Web Attack tools Web2Attack Skipfish SubDomain Finder CheckURL Blazy(Also Find ClickJacking) Sub-Domain TakeOver Dirb Post exploitation tools Vegile - Ghost In The Shell Chrome Keylogger Forensic tools Autopsy Wireshark Bulk extractor Disk Clone and ISO Image Aquire Toolsley Payload creation tools The FatRat Brutal Stitch MSFvenom Payload Creator Venom Shellcode Generator Spycam Mob-Droid Enigma Exploit framework RouterSploit WebSploit Commix Web2Attack Reverse engineering tools Androguard Apk2Gold JadX DDOS Attack Tools SlowLoris Asyncrone | Multifunction SYN Flood DDoS Weapon UFOnet GoldenEye Remote Administrator Tools (RAT) Stitch Pyshell XSS Attack Tools DalFox(Finder of XSS) XSS Payload Generator Extended XSS Searcher and Finder XSS-Freak XSpear XSSCon XanXSS Advanced XSS Detection Suite RVuln Steganograhy tools SteganoHide StegnoCracker StegoCracker Whitespace Other tools SocialMedia Bruteforce Android Hacking tools IDN Homograph Attack Email Verify tools Hash cracking tools Wifi Deauthenticate SocialMedia Finder Payload Injector Web crawling Installation For Linux This Tool Must Run As ROOT !!! [Hidden Content]
  22. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM. Features Featureful hex view Byte patching Patch management Copy bytes as feature Bytes Hex string C, C++, C#, Rust, Python, Java & JavaScript array ASCII-Art hex view HTML self-contained div String and hex search Colorful highlighting Goto from start, end, and current cursor position Custom C++-like pattern language for parsing highlighting a file’s content Automatic loading based on MIME-type arrays, pointers, structs, unions, enums, bitfields, using declarations, litte and big-endian support Useful error messages, syntax highlighting, and error marking Data importing Base64 files IPS and IPS32 patches Data exporting IPS and IPS32 patches Data Exporting Data inspector allowing interpretation of data as many different types (little and big-endian) Huge file support with fast and efficient loading Strings search Copying of strings Copying of detangled strings File hashing support CRC16 and CRC32 with custom initial values and polynomials MD4, MD5 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 Disassembler supporting many different architectures ARM32 (ARM, Thumb, Cortex-M, aarch32) ARM64 MIPS (MIPS32, MIPS64, MIPS32R6, Micro) x86 (16 bit, 32 bit, 64 bit) PowerPC (32 bit, 64 bit) Sparc SystemZ XCore M68K TMS320C64X M680X Ethereum Bookmarks Region highlighting Comments Data Analyzer File magic-based file parser and MIME type database Byte distribution graph Entropy graph Highest and avarage entropy Encrypted / Compressed file detection Helpful tools Itanium and MSVC demangler ASCII table Regex replacer Mathematical expression evaluator (Calculator) Hexadecimal Color picker Built-in cheat sheet for pattern language and Math evaluator Doesn’t burn out your retinas when used in late-night sessions [hide][Hidden Content]]
  23. OSINT Tool: Generate username lists from companies on LinkedIn. This is a pure web-scraper, no API key required. You use your valid LinkedIn username and password to log in, it will create several lists of possible username formats for all employees of a company you point it at. Use an account with a lot of connections, otherwise, you’ll get crappy results. Adding a couple of connections at the target company should help – this tool will work up to third-degree connections. Note that LinkedIn will cap search results to 1000 employees max. You can use the features ‘–geoblast’ or ‘–keywords’ to bypass this limit. Look at the help below for more details. Here’s what you get: first.last.txt: Usernames like Joe.Schmoe flast.txt: Usernames like JSchmoe firstl.txt: Usernames like JoeS first.txt Usernames like Joe rawnames.txt: Full name like Joe Schmoe Optionally, the tool will append @domain.xxx to the usernames. Changelog v0.22 This version, ironically, removes version checks. It’s the wild west! [hide][Hidden Content]]
  24. Aleph is a tool for indexing large amounts of both documents (PDF, Word, HTML) and structured (CSV, XLS, SQL) data for easy browsing and search. It is built with investigative reporting as a primary use case. Aleph allows cross-referencing mentions of well-known entities (such as people and companies) against watchlists, e.g. from prior research or public datasets. Here are some key features: Web-based search across large document and data sets. Imports many file formats, including popular office formats, spreadsheets, email and zipped archives. Processing includes optical character recognition, language and encoding detection and named entity extraction. Load structured entity graph data from databases and CSV files. This allows navigation of complex datasets like companies registries, sanctions lists or procurement data. Import tools for OpenSanctions. are included. Receive notifications for new search matches with a personal watchlist. OAuth authorization and access control on a per-source and per-watchlist basis. Changelog v3.12.7 RC1 Bump urllib3 from 1.26.10 to 1.26.11 by @dependabot in #2417 Bump followthemoney from 3.0.2 to 3.0.3 by @dependabot in #2418 removed code smell of function args with mutable defaults by @brassy-endomorph in #2436 Bump normality from 2.3.3 to 2.4.0 by @dependabot in #2430 Switch to rabbitmq based task queue by @sunu in #2199 Remove the public access disabled message by @sunu in #2408 Fix timelines editor by @tillprochaska in #2457 Bump sqlalchemy from 1.4.39 to 1.4.40 by @dependabot in #2455 Make the hide filter button persistent by @Rosencrantz in #2459 Bump jsonschema from 4.7.2 to 4.9.1 by @dependabot in #2443 Quickfix: Set the max_analyzed_offset setting to prevent ES errors by @sunu in #2474 Display highlights in document plaintext view mode by @tillprochaska in #2388 Bump react-dropzone from 11.7.1 to 14.2.2 in /ui by @dependabot in #2375 Bump axios from 0.25.0 to 0.27.2 in /ui by @dependabot in #2250 Bump yaml from 1.10.2 to 2.1.1 in /ui by @dependabot in #2291 Bump urllib3 from 1.26.11 to 1.26.12 by @dependabot in #2479 Fix activation screen by @tillprochaska in #2506 Fix date helper by @tillprochaska in #2490 Till/2400 message banner by @tillprochaska in #2421 Bump uuid from 8.3.2 to 9.0.0 in /ui by @dependabot in #2510 Bump authlib from 0.15.5 to 1.1.0 by @dependabot in #2518 Bump jsonschema from 4.9.1 to 4.16.0 by @dependabot in #2508 Bump sqlalchemy from 1.4.40 to 1.4.41 by @dependabot in #2503 Bump black from 22.6.0 to 22.8.0 by @dependabot in #2493 Update pyjwt requirement from <2.5.0,>=2.0.1 to >=2.0.1,<2.6.0 by @dependabot in #2522 Rollback RabitMQ based task queue changes by @sunu in #2536 change contact to new form by @jlstro in #2541 Bump servicelayer[amazon,google] from 1.20.0 to 1.20.4 by @dependabot in #2537 Bump ftm and ftm-compare by @Rosencrantz in #2544 added ability to set custom settings via env vars by @brassy-endomorph in #2538 Bump servicelayer[amazon,google] from 1.20.4 to 1.20.5 by @dependabot in #2545 [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.