Search the Community

Showing results for tags 'for'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 641 results

  1. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes. Installing HashDB Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests) Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes! [hide][Hidden Content]]
  2. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
  3. wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web traffic WiFi networks scanning DNS monitoring service Credentials harvesting Transparent Proxies LLMNR, NBT-NS, and MDNS poisoner (Responder3) and more! Changelog v1.0.9R2 Added added route for get information of plugins and proxies on restAPI added new attribute on plugins and proxies mode class added logger resource API added new command dhcpmode added option for settings dhcp mode pydhcpserver or dhcpd_server added new support to run isc_dhcp_server for dns/ dhcp added support kali linux iptables nf_tables set iptables_legacy as default #140 added format 28 files reformatted black library Changed Deprecated Removed removed support to Rest API controller temporally Fixed fixed cli error when resquest restAPI plugins and proxies fixed restApi error when get exceptions http request fixed wirelesscontroller not started into restAPI mode fixed locale error in docker container fixed logical error dhcpd server implementation #158 fixed logical error when try to get iptables path with nf_tables thanks @cjb900 [hide][Hidden Content]]
  4. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.9.5 Fixed: A pass on the source code, more speedy [hide][Hidden Content]]
  5. A tool for generating fake code signing certificates or signing real ones. A tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid MSS and sock scruitney. LimeLighter can also use valid code signing certificates to sign files. Limelighter can use a fully qualified domain name such as acme.com. [hide][Hidden Content]]
  6. CrackerJack is a Web GUI for Hashcat developed in Python. Architecture This project aims to keep the GUI and Hashcat independent. In a nutshell, here’s how it works: User uploads hashes select wordlist/rules/mask etc, and clicks “start”. Web server spawns a new screen. Generates the hashcat command based on the settings. Runs the command on the screen. Monitors the screen’s output, parses it and displays it in the GUI. This allows CrackerJack to be future-proof as it ties to the input/output of Hashcat. Also, if the GUI is not working for whatever reason, hashcat will keep running. Features Minimal dependencies Uses sqlite3, screen, and hashcat. Complete hashcat session management. Start/stop/pause/restore running sessions. Terminate cracking jobs after a specific date/time. Web interface for mask generation (?a?l?u). Web Push notifications when a password is cracked. Swagger 2.0 API. Create wordlists from already cracked passwords and feedback into the cracking session. Session history to track which attacks you have already performed. Multi-user support (local and/or LDAP). Wordlist/Mask/Rule support. Multiple theme support (Bootswatch). Straight-forward setup. The entire configuration is via the GUI. No need for manually editing config files. Run locally on Linux and Windows (WSL). Install on a server using ansible scripts (Ubuntu 14/16/18 and CentOS 7/8). Easy backups – all user data are in the ./data directory. Troubleshoot sessions via SSH. Limitations Not a solution for queueing jobs – it’s only for on-demand password cracking. Not meant to be a replacement for command-line usage. It’s complimentary and only supports basic and most common cracking tasks. Will not install any GPU drivers. The main assumption is that you have a cracking rig already set up and are looking for a Web GUI. Wordlists and rules should already be present in the system. Changelog v1.1.2 [New] Added “Test Connection” feature to LDAP settings. [hide][Hidden Content]]
  7. Goblin for Phishing Exercise Tools Goblin is a phishing rehearsal tool for red-blue confrontation. By using a reverse proxy, it is possible to obtain information about a user without affecting the user’s operation perceptibly or to induce the user’s operation. The purpose of hiding the server-side can also be achieved by using a proxy. Built-in plug-in, through a simple configuration, quickly adjusts the content of the web page to achieve a better exercise effect. Features Support for caching static files to speed up access. Supports dumping all requests, dumping requests that match the rules. Support quick configuration through plug-ins to adjust inappropriate jumps or content. Support for implanting specific javascript code. Support for modifying the content of responses or goblin requests. Support hiding real IP by proxy. [hide][Hidden Content]]
  8. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes. Installing HashDB Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests) Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes! [hide][Hidden Content]]
  9. GEF – GDB Enhanced Features GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support). Feature One single GDB script. Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable in 2 seconds (unlike PwnDBG). Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible (unlike PwnDBG). Provides more than 50 commands to drastically change your experience in GDB. Easily extendable to create other commands by providing more comprehensible layout to GDB Python API. Works consistently on both Python2 and Python3. Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc. (unlike PEDA) Suited for real-life apps debugging, exploit development, just as much as CTF (unlike PEDA or PwnDBG) Changelog GEF – v2021.10 Highlights of Impractical Information 93 commits, 5 Issues & 25 PRs closed Massive background re-work by @theguy147 , which includes (but not limited): Better and more CI tests More… [hide][Hidden Content]]
  10. crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole web page with DOM rendering stage, automatically fills and submits forms, with intelligent JS event triggering, and collects as many entries exposed by the website as possible. The built-in URL de-duplication module filters out a large number of pseudo-static URLs, still maintains a fast parsing and crawling speed for large websites, and finally gets a high-quality collection of request results. crawlergo currently supports the following features: chrome browser environment rendering Intelligent form filling, automated submission Full DOM event collection with automated triggering Smart URL de-duplication to remove most duplicate requests Intelligent analysis of web pages and collection of URLs, including javascript file content, page comments, robots.txt files and automatic Fuzz of common paths Support Host binding, automatically fix and add Referer Support browser request proxy Support pushing the results to passive web vulnerability scanners [hide][Hidden Content]]
  11. Learn Computer Basics as a Complete Beginners to Start Using a Computer Correctly. What you'll learn Computer Basics of Both Desktop & Laptop Computers! The Brief History of Computers! Find Out What the Buttons Do on a Computer and How to Use Them! Get Set Up on a Computer! How to Access/Use the Internet! Protecting Your Computer (Offline and Online)! Where to Search Your Questions Online! How to Use Email Online! Learn about Social Media and How to Use It! Requirements There are no specific requirements needed to take this course. Description Confused and frustrated over trying to figure out computers? The GOOD NEWS is YOU don't have to be! In this course, I (Brennan, your instructor) will take you step by step through all of the most important information you need to know as a beginner. That includes desktop and laptop computers! If you're not sure what the difference is between the two, no worries! This course is designed for complete beginners that are looking to learn how to use a computer correctly. No confusing advanced lessons here - instead step by step instructional videos that guide you each step of the way. Now the only thing left to do in order to improve your computer skills is to enroll in this course today! Computers are here to stay, and being able to stay connected to friends and family is just one of the many fantastic abilities that computers give us. If you're interested in learning the basics, along with the ability to stay connected to friends and family online through computers, enroll in this course today! ============================ INSTRUCTOR BACKGROUND I've been an entrepreneur for 10+ years, and have taught over 50,000 students how to improve their own skills. I've become an eBay Powerseller and Amazon Best Selling Author and actively consult with multiple 6, 7, and 8 figure businesses. From what I've learned from these experiences, I'd love to share the knowledge with you. My goal is to help as many people as possible by teaching each student everything I know about each topic. I teach to ensure each student leaves each of my courses feeling like they've learned something new. ============================ GET ONE-ON-ONE HELP You can get my help and advice at any time - simply message me through Udemy! Regardless if you're just starting your course or have been done for months, I'm happy to help you. ============================ AMAZING VALUE: LEARN FROM 10+ YEARS OF EXPERIENCE ALL IN JUST A COUPLE HOURS! The information that you'll learn in this course can be either learned from many years of experience, or you can learn valuable skills all best summarized within a couple of hours of time. Is it really worth taking hundreds or even thousands of hours of your time to learn this information by yourself? The choice is yours to make. ============================ PROVEN STRATEGIES TO GROW YOUR BUSINESS All strategies that I share are either from my personal experience or are well-proven strategies based on industry experts. ============================ WHY TAKE THIS COURSE? Simply put, save time, save money, and learn valuable skills that you can implement into your life (for the rest of your life). Learn from others that have done it before you, and learn what has proven to work best for them. Don't do it all by yourself! ============================ CERTIFICATE OF COMPLETION WHEN YOU FINISH THE COURSE When you complete 100% of the videos in this course, you'll be emailed a certificate of completion by Udemy! ============================ MONEY BACK GUARANTEE The course comes with a Udemy-backed, 30-day money-back guarantee so you can try this course absolutely risk-free. This is not just a guarantee, it's my personal promise to you that you will improve your skills after completing this course. Invest in your future. Enroll now. Who this course is for: Anyone who is looking to learn the very beginner basics of how to use a computer & the internet. (Beginner level). [Hidden Content] [hide][Hidden Content]]
  12. HTTPUploadExfil HTTPUploadExfil is a (very) simple HTTP server written in Go that’s useful for getting files (and other information) off a machine using HTTP. While there are many use-cases, it’s meant to be used in low-stakes offensive scenarios (e.g., CTFs). Think of this as python3 -m http.server but for getting data off a machine instead of on the machine. Obviously, this is a very loud and somewhat restricted way of exfiltrating data. Nevertheless, it’s quite handy and somewhat easier than, for example, using SMB or FTP. If you are looking for something more elegant, have a look at, for example, dnsteal or PyExfil. [hide][Hidden Content]]
  13. A deobfuscator for Eziriz .NET Reactor Currently Supported .NET Reactor Versions: 6.0.0.0 6.2.0.0 6.3.0.0 6.5.0.0 6.7.0.0 Features: Deobfuscate Control Flow Restore Hidden Calls Remove Proxy Calls Decrypt Strings Remove Anti Tamper Remove Anti Debugger Decrypt Resource Dump Embedded Assemblies Decrypt Methods (NecroBit) Unpack Native... [hide][Hidden Content]]
  14. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.9.3 beta Updated: New banner Fixed: Multiple websites with a file which contains url [hide][Hidden Content]]
  15. PowerShell for Pentesters is a basic introduction to using PowerShell on internal penetration tests. This course is essentially the PowerShell module from my popular Movement, Pivoting, and Persistence course on TCM Academy and Udemy. In the course we will cover: User, group, and workstation enumeration Domain enumeration Downloading with PowerShell Group Policy Enumeration ACL Enumeration PowerShell Remoting PowerView and other popular offensive PowerShell scripts Mimikatz exploitation Scripts are provided for easy installation of Active Directory functionality, however, no instruction will be given on installing virtual machines in the video. A lab guide provided in this repo will outline the basics for installing your network on Virtualbox. The process is similar on VMWare Workstation and Workstation Pro. You will need Hashcat for the course, which is accessible at [Hidden Content]. You can also access Hashcat through Kali Linux if you have it installed. A course wordlist is included in the repo which contains user passwords when necessary, and will not require a GPU to crack. [Hidden Content]
  16. Hunting Bugs Effectively. What you'll learn How to find out hidden bugs to get big bounty Right approach to pentest the web application Practical ethical hacking and penetration testing skills Understand the security threats affecting networks and applications Perform bug hunting Audit OWASP Top 10 Perform web security audits Be a White Hat Hacker Requirements Basics of web application security OWASP Top 10 Attacks BurpSuite Description Welcome to this course on Pentesters Practical Approach for Bug Hunting and Bug Bounty. To enjoy this course, you need a positive attitude and a desire to learn. In this course, you will learn the practical side of penetration testers and bug hunters. We have seen that how some of the pen-testers are earning millions in a year through bug bounty platforms. Too many courses teach students tools and concepts that are never used in the real world. In this course, we will focus only on tools, topics and practical live demonstration that will make you successful as a security researcher and bug hunter. The course is incredibly hands on and will cover all essential topics. This is a short-term beginner-friendly practical course that covers different types of offensive techniques and strategical approach to pentest the web application. Takeaways: After this course you will be able to find various types of vulnerabilities which you often miss during your assessment. Modules Introduced in this Course: Defining the target Scope Understanding Application Business Logic Threat Mapping Performing scope based recon Performing Manual Pentesting Performing Application Specific Attacks Introduction to Juice Shop Hitting hard Juice shop Application navigation to each feature SSL/TLS Enumeration Attacks Banner Exploits Version Enumeration Sensitive data fetching using FTP Exploration Leaked Information lookup in Page Source Authentication Authorization Flaws XSS Exploits Injection Attacks Client Side Validation Bypass Attacks Parameter Pollution Attack Force Data Pushing Attack Session Based Flaws Hunt For Injection and IDOR Privilege Escalation Hunt Exploit File Upload Feature Role Level Checks Bypass Business Logic Bypass Exploit Broken Access Control Payment Gateway Bypass attacks Missing Server Side Validation Exploit Note: This course has been created for educational purposes only. All attacks shown were done so with given permission. Please do not attack a host unless you have permission to do so. Who this course is for: Students who all are looking to join the journey of Corporates as a Pentester Security Researchers who wanted to earn more in Bug Bounty [Hidden Content] [hide][Hidden Content]]
  17. APK Lab The ultimate Android RE experience right inside your VS Code. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac Changelog v1.5 Added apktool updated to v2.6.0 apk-mitm updated to v1.1.0 feat: auto update check for tools on startup (dev) use yarn instead of npm (ci) auto publish release on tag (ci) use yarn cache for faster builds (ci) migrate to nodejs v14 Fixed fixed some bug/warning (dev) updated other dependencies [hide][Hidden Content]]
  18. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.3.80 FEATURE: Ability to disable Zeek, Suricata #4429 FEATURE: Add docs link to Setup #5459 FEATURE: Add evtx support in Import Node #2206 FEATURE: Consolidate whiptail screens when selecting optional components #5456 FEATURE: Distinguish between Zeek generated syslog and normal syslog in hunt for event fields #5403 FEATURE: Enable index sorting to increase search speed #5287 FEATURE: Expose options for elasticsearch.yml via Salt pillar #1257 FEATURE: Role-based access control (RBAC) #5614 FEATURE: soup -y for automation #5043 FIX: Add new default filebeat module indices to the global pillar. #5526 FIX: all.rules file can become empty on non-airgap deployments if manager does not have access to the internet. #3619 FIX: Curator cron should run less often #5189 FIX: Improve unit test maintainability by refactoring to use Golang assertion library #5604 FIX: Invalid password message should also mention dollar signs are not allowed #5381 FIX: Max files for steno should use a pillar value for easy tuning. #5393 FIX: Remove raid check for official cloud appliances #5449 FIX: Remove watermark settings from global pillar. #5520 FIX: SOC Username case sensitivity #5154 FIX: so-user tool should validate password before adding user to SOC #5606 FIX: Switch to new Curator auth params #5273 UPGRADE: Curator to 5.8.4 #5272 UPGRADE: CyberChef to 9.32.2 #5158 UPGRADE: SOC UI 3rd Party dependencies to latest versions #5603 UPGRADE: Zeek to 4.0.4 #5630 [hide][Hidden Content]]
  19. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM. Features Featureful hex view Byte patching Patch management Copy bytes as feature Bytes Hex string C, C++, C#, Rust, Python, Java & JavaScript array ASCII-Art hex view HTML self-contained div String and hex search Colorful highlighting Goto from start, end, and current cursor position Custom C++-like pattern language for parsing highlighting a file’s content Automatic loading based on MIME-type arrays, pointers, structs, unions, enums, bitfields, using declarations, litte and big-endian support Useful error messages, syntax highlighting, and error marking Data importing Base64 files IPS and IPS32 patches Data exporting IPS and IPS32 patches Data Exporting Data inspector allowing interpretation of data as many different types (little and big-endian) Huge file support with fast and efficient loading Strings search Copying of strings Copying of detangled strings File hashing support CRC16 and CRC32 with custom initial values and polynomials MD4, MD5 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 Disassembler supporting many different architectures ARM32 (ARM, Thumb, Cortex-M, aarch32) ARM64 MIPS (MIPS32, MIPS64, MIPS32R6, Micro) x86 (16 bit, 32 bit, 64 bit) PowerPC (32 bit, 64 bit) Sparc SystemZ XCore M68K TMS320C64X M680X Ethereum Bookmarks Region highlighting Comments Data Analyzer File magic-based file parser and MIME type database Byte distribution graph Entropy graph Highest and avarage entropy Encrypted / Compressed file detection Helpful tools Itanium and MSVC demangler ASCII table Regex replacer Mathematical expression evaluator (Calculator) Hexadecimal Color picker Built-in cheat sheet for pattern language and Math evaluator Doesn’t burn out your retinas when used in late-night sessions [hide][Hidden Content]]
  20. itsMe

    How To Make HQ Proxy For Free

    How To Make HQ Proxy For Free Which Works On (NETFLIX / PAYPAL / ONLYFANS / SPOTIFY / More...) [Hidden Content]
  21. Hello, I'm looking for an hacker or a dumper that got fresh and private dB for selling me mailist (leads) or the full database. I'm only looking for fresh dumped dB and never dumper. If you have French private database, please contact me on telegram : @labavette or PM
  22. cutter Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. Disclaimer Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2. Changelog v2.0.3 Additions and Changes Debug: Heap viewer widget for glibc Rizin, rz-ghidra and jsdec updated to 0.3.0 with changes for compatibility. Various improvements for native macOS UI (#2776) Many internal changes switching from error-prone rizin commands to C API CI and Linux builds: use Ubuntu 18.04 as oldest supported build system (#2736) Bugfixes Fix Decompiler Copy Shortcut (Fix #2773, #2778) Fix Restoring “Show Disassembly as” in Preferences (Fix #2726, #2748) Complete Color Theme Lists (Fix #2672) (#2752) macOS: Fix Versions in Info.plist (Fix #2679) (#2740) Debug: Fix continue until main not being enabled in certain cases (#2727) Debug: Fix attaching to a process with no file opened (#2727) Fix a crash when printing disassembly arrows (#2688) Removals Type Link features removed due to unreliability, in light of global variables coming soon (#2775) [hide][Hidden Content]]
  23. Turns any junk text into a usable wordlist for brute-forcing. [hide][Hidden Content]]
  24. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM. Features Featureful hex view Byte patching Patch management Copy bytes as feature Bytes Hex string C, C++, C#, Rust, Python, Java & JavaScript array ASCII-Art hex view HTML self-contained div String and hex search Colorful highlighting Goto from start, end, and current cursor position Custom C++-like pattern language for parsing highlighting a file’s content Automatic loading based on MIME-type arrays, pointers, structs, unions, enums, bitfields, using declarations, litte and big-endian support Useful error messages, syntax highlighting, and error marking Data importing Base64 files IPS and IPS32 patches Data exporting IPS and IPS32 patches Data Exporting Data inspector allowing interpretation of data as many different types (little and big-endian) Huge file support with fast and efficient loading Strings search Copying of strings Copying of detangled strings File hashing support CRC16 and CRC32 with custom initial values and polynomials MD4, MD5 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 Disassembler supporting many different architectures ARM32 (ARM, Thumb, Cortex-M, aarch32) ARM64 MIPS (MIPS32, MIPS64, MIPS32R6, Micro) x86 (16 bit, 32 bit, 64 bit) PowerPC (32 bit, 64 bit) Sparc SystemZ XCore M68K TMS320C64X M680X Ethereum Bookmarks Region highlighting Comments Data Analyzer File magic-based file parser and MIME type database Byte distribution graph Entropy graph Highest and avarage entropy Encrypted / Compressed file detection Helpful tools Itanium and MSVC demangler ASCII table Regex replacer Mathematical expression evaluator (Calculator) Hexadecimal Color picker Built-in cheat sheet for pattern language and Math evaluator Doesn’t burn out your retinas when used in late-night sessions [hide][Hidden Content]]
  25. INDEX 1. - WHAT IS RDP ? 2. - SOME METHODS TO GET RDP FREE [hide][Hidden Content]]