Search the Community

Showing results for tags 'from'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 70 results

  1. OnlyFans DataScraper (Python 3.9.X) #path_formatting: {site_name} = The site you're scraping. {post_id} = The posts' ID. {media_id} = The media's ID. {username} = The account's username. {api_type} = Posts, Messages, etc. {media_type} = Images, Videos, etc. {filename} = The media's filename. {value} = Value of the content. Paid or Free. {text} = The media's text. {date} = The post's creation date. {ext} = The media's file extension. Don't use the text variable. If you do, enjoy emojis in your filepaths and errors lmao. [hide][Hidden Content]]
  2. What you'll learn Programming in C Computer Programming Write code Data Structure in C File i/o Modular Programming Pointers in C/C++ Course content 12 sections • 68 lectures • 13h 13m total length Requirements A cup of coffee Description This C course will help you achieve your programming goals. In this course, you will be introduced to concepts through hands-on coding. There will be no long drawn out lectures and boring slides. You will be guided in a step-by-step fashion from novice level to where you will be able to build your own applications. This course goes beyond C; it's a foundation course for programming. In other words, whatever your learn here will apply to other languages such as C++, Python, Java and many others. All you have to do from that point forward is adjust to the new syntax of whatever language you choose to deal with. This course will go over how to build an application in C using functions, pointers, structures, arrays and it will even cover Data Structure concepts such as Lists. This is a comprehensive course with many hands-on examples that will help get your competency to professional developer levels. Thank you and enjoy your journey to success. Who this course is for: Beginners computer programmers Intermediate computer programmers in need of review Software developers College students High school students Programming enthusiasts [Hidden Content] [hide][Hidden Content]]
  3. Course content 7 sections • 32 lectures • 3h 10m total length What you'll learn How to purchase products from the Dark Web. How to use and navigate Tails. How to message using PGP. Be able to setup and configure Tor with a VPN or Tor Bridges. Purchase Bitcoin anonymously and tumble it. Requirements You should have taken the Deep Web 101 course or have a basic understanding of the Deep Web. You should be able to use and navigate a PC on an above basic level. You should understand the basics of Bitcoin and Tails. You should be able to purchase Bitcoin. Description A Deep Web Crash Course (Without the Crashing) The Ultimate Deep Web Guide was designed to help you become an active, daily, deep web user. Learn to purchase products from dark web markets. Learn to anonymously search the Deep Web. Learn how to use Cryptocurrency without detection. Across five main sections, you’ll learn everything you need to... Begin using the Tails Operating System. Be able to setup and configure Tor with a VPN or Tor Bridges. Send communication through Tails using OpenPGP encryption. Purchase Bitcoin anonymously. Use and purchase items anonymously off of Deep Web markets. You will learn about important topics like... Tor- The anonymous browser used to access the Dark Web. Tails- An operating system that keeps your network and hardware privacy secure. Bitcoin- A concurrency used to purchase things online without a trace. Markets- The hub of the entire Dark Web. Black markets account for 80% of all traffic on the Tor Network. PGP- A form of encryption used to send messages across the internet. Not even the FBI could read what you were saying Who this course is for: Anyone who wants to be a power user on the Deep Web. Anyone who wants to be able to anonymously purchase items on the Dark Net Markets. Anyone who wants to learn about Tails, PGP, Bitcoin, Tor and more. [Hidden Content] [hide][Hidden Content]]
  4. What you'll learn On completing the course you will have firm grip on C++ language. You will understand the object oriented programming OOPs concept in depth. You will understand the basic programming structures like branching and looping. You will understand details about pointers and dynamic memory allocation along with memory management techniques. You will understand all about functions, parameter passing by value and by reference. All about user defined types using struct and class. Constructor function, method overloading and dynamic polymorphism. You will learn operator overloading, friend functions. In depth understanding of Inheritance and dynamic polymorphism, how runtime polymorphism helps to write more flexible and dynamic code. Course content 30 sections • 190 lectures • 27h 29m total length Requirements You do not need to have any prior knowledge of programming. This is for absolute beginners. You only need to know how to create a folder and how to save files in folder in any operating system like Mac or Windows. You can start writing C++ program using any text editor like Notepad or Notepad++ or Sublime text or Atom You can also use advance IDEs like Visual Studio or Xcode or Code::Blocks - I will demonstrate how to download and install each of them - No Worries. You will also need C++ compiler - I will demonstrate how to install C++ compiler on your system at the beginning. You can also use online C++ compiler to compile and execute your program. Description This course will teach you C++ from scratch upto advance level step-by-step with Object oriented programming (OOP ) using C++11/14. The object oriented programming concepts are clearly explained, you will learn classes, objects, inheritance, runtime polymorphism, Operator overloading apart from basic programming concepts like variables, branching and looping, functions, reference parameters, arrays, string and vectors in C++. File I/O has been discussed in details and in the Mini project File I/O is used extensively. You will learn STL or standard template library in detail along with concept of functors and lambda. The approach is 100% practical, hands on experience of learning will help you to get more confidence with C++ programming. You can follow me along side doing the programs in C++ and that will be best way to do the course. [Hidden Content] [hide][Hidden Content]]
  5. [hide][Hidden Content]]
  6. itsMe

    Smtp Cracker From Sites V1

    Version 1 Current version is 1 What's New • speed up • Bug fixes [hide][Hidden Content]]
  7. How To Remove Background From Images Online | In Single Click Go to site : [Hidden Content] Upload Image & voila its done. U can sign up on site to get HQ images.
  8. About this video Welcome to this comprehensive course on website and web application hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install the required software to practice penetration testing on your own machine. Then you will learn about websites, how they work, what they rely on, what is meant by a web server, a database, and how all of these components work together to give us functioning websites. Once you understand how websites work we will start talking about how can we exploit these components and this method of communication to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level. By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. All the attacks in this course are practical attacks that work against any real websites. For each vulnerability you will learn the basic exploitation, then you will learn advanced methods that will give you more privileges or allow you to bypass security measurements. [Hidden Content] [hide][Hidden Content]]
  9. Extended Bitcoin Clipper from Nyan Cat I took his "BTC Grabber" & Edited some stuff. Im relativly new to C#, before i only coded in VB shaking my head What i edited: REMOVED ETH & XMR CLIPPER [Is re-addable] EDITED SOME CODE [SORRY FOR SPAGHETTI CODE :( ] ADDED AUTO STARTUP [PATH FOR EXE + REGISTRY ENTRY] ONLY VISIBLE IN "DETAILS" UNDER TASKMANAGER 100% Credits to NYAN-x-CAT 100% FOR EDUCATIONAL PURPOSES ONLY [hide][Hidden Content]]
  10. Get content from almost any site to your WordPress blog, automatically! FOR WHAT IT CAN BE USED Create a personal site which collects news, posts, etc. from your favorite sites to see them in one place Use it with WooCommerce to collect products from shopping sites Collect products from affiliate programs to make money Collect posts to create a test environment for your plugin/theme... [Hidden Content] [hide][Hidden Content]]
  11. What you'll learn Android Malware Reverse Engineering How to Create a Ransomware Decryption Tool Mobile Security Static Analysis Dynamic Analysis Android App development fundamentals Requirements Basic IT knowledge Description This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security. In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals. This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general. The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs. Course outline: -Course Requirements -Intro to Android -Course/Lab Setup -Developing a Basic Android App -Analyzing Android Apps -Case Study: Analyzing an actual ransomware and developing a decryption tool Who this course is for: Students interested in Cyber Security and Android Reverse Engineering [Hidden Content] [hide][Hidden Content]]
  12. ABOUT TOOL : Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. AVAILABLE ON : Termux TESTED ON : Termux REQUIREMENTS : internet external storage permission storage 400 MB 1gb ram FEATURES : [+] Dangerous virus tool ! [+] Updated maintainence ! [+] Easy for beginners ! [+] Working virus tool for termux ! [hide][Hidden Content]]
  13. Description Ultimate Photoshop Training From Beginner to Pro is the name of the famous Photoshop software tutorial. Photoshop software, one of Adobe’s most popular products, is extremely popular in the world. In this tutorial, you will start learning from basic and basic levels and as you continue your training and sessions you will become an expert in using Photoshop software. The Ultimate Photoshop Training From Beginner to Pro is designed so that students can use it without prior knowledge and acquire the necessary training and skills. This tutorial also covers a variety of issues including designing and creating icons, graphic images, and characters, enhancing images, creating creative texts, and more. What you'll learn Design icons, business cards, illustrations, and characters Clean up face imperfections, improve and repair photos Use creative effects to design stunning text styles Remove people or objects from photos Cut away a person from their background Master selections, layers, and working with the layers panel Requirements No previous knowledge of Photoshop required. If you have Photoshop installed, that's great. If not, I'll teach you how to get it on your computer. This course includes 14 hours on-demand video 2 articles 183 downloadable resources Full lifetime access Access on mobile and TV Assignments Certificate of completion Who this course is for This course is perfect for beginner-level Photoshop users. If you’re an intermediate or advanced user, please check out my curriculum especially the practice activities and assignments to see if this course is a good fit for you. This course is not for students who want to learn about one particular topic in depth, for example, painting with brushes in Photoshop. Instead, this is a comprehensive course that gives you a solid foundation on all the major topics in Photoshop. [Hidden Content] [hide][Hidden Content]]
  14. GitDorker GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various sources to provide an overview of sensitive information stored on github given a search query. The Primary purpose of GitDorker is to provide the user with a clean and tailored attack surface to begin harvesting sensitive information on GitHub. GitDorker can be used with additional tools such as GitRob or Trufflehog on interesting repos or users discovered from GitDorker to produce the best results. Rate Limits GitDorker utilizes the GitHub Search API and is limited to 30 requests per minute. In order to prevent rate limits, a sleep function is built into GitDorker after every 30 requests to prevent search failures. Therefore, if one were to run use the alldorks.txt file with GitDorker, the process will take roughly 5 minutes to complete. [hide][Hidden Content]]
  15. Description Complete Python Bootcamp is a 0 to 100 Python programming language course. In this tutorial you will be thoroughly trained from the basics to the advanced stages and you will learn how to create programs and games in this language. In the world, Python has gone out of training and entertainment in many commercial, specialized and scientific products such as Blender and BitTorrent and some of the largest web and social networking services such as YouTube, Dropbox, Instagram, Spotify, BitBook, many products Google and so on are used by this language, so Python programmers have been catching up in the last few years. In Iran, though Python has not been as welcomed as the C / S and Java languages , it has made significant progress in recent years. This course is recommended for you if you have no programming knowledge, little knowledge of or even a professional development in Python. Both Python 2 and 3 are taught in this tutorial. This 13-hour course has over 100 lessons and includes everything you need to know about Python. Education is not just theory, you test your knowledge with a variety of tests, exercises and quizzes. In addition, three complete programs will be implemented during the course of the program, which will play a role in better learning. The Python Network Programming Course is another Yudemian suite that has specialized in network discussion in this language. What you'll learn Learn to use Python professionally, learning both Python 2 and Python 3! Create games with Python, like Tic Tac Toe and Blackjack! Learn advanced Python features, like the collections module and how to work with timestamps! Learn to use Object Oriented Programming with classes! Understand complex topics, like decorators. Understand how to use both the Jupyter Notebook and create .py files Get an understanding of how to create GUIs in the Jupyter Notebook system! Build a complete understanding of Python from the ground up! This course includes 21.5 hours on-demand video 14 articles 19 coding exercises Full lifetime access Access on mobile and TV Certificate of completion Requirements Access to a computer with an internet connection. Who this course is for Beginners who have never programmed before. Programmers switching languages to Python. Intermediate Python programmers who want to level up their skills! [hide][Hidden Content]]
  16. HackBrowserData hack-browser-data is an open-source tool that could help you decrypt data[passwords|bookmarks|cookies|history] from the browser. It supports the most popular browsers on the market and runs on Windows, macOS, and Linux. Supported Browser Windows Browser Password Cookie Bookmark History Google Chrome (Full Version) Firefox Microsoft Edge 360 Speed Browser QQ Browser Internet Explorer [hide][Hidden Content]]
  17. Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage to recover a significant portion of a repository even where directory listings are disabled. For educational/penetration testing use only. [hide][Hidden Content]]
  18. ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point. Notes: ADCollector is not an alternative to the powerful PowerView, it just automates enumeration to quickly identify juicy information without thinking too much at the early Recon stage. Functions implemented in ADCollector are ideal for enumeration in a large Enterprise environment with lots of users/computers, without generating lots of traffic and taking a large amount of time. It only focuses on extracting useful attributes/properties/ACLs from the most valuable targets instead of enumerating all available attributes from all the user/computer objects in the domain. You will definitely need PowerView to do more detailed enumeration later. The aim of developing this tool is to help me learn more about Active Directory security in a different perspective as well as to figure out what’s behind the scenes of those PowerView functions. I just started learning .NET with C#, the code could be really terrible~ It uses S.DS namespace to retrieve domain/forest information from the domain controller(LDAP server). It also utilizes S.DS.P namespace for LDAP searching. Enumeration Current Domain/Forest information Domains in the current forest (with domain SIDs) Domain Controllers in the current domain [GC/RODC] (with ~~IP, OS Site and ~~Roles) Domain/Forest trusts as well as trusted domain objects[SID filtering status] Privileged users (currently in DA and EA group) Unconstrained delegation accounts (Excluding DCs) Constrained Delegation (S4U2Self, S4U2Proxy, Resources-based constrained delegation) MSSQL/Exchange/RDP/PS Remoting SPN accounts User accounts with SPN set & password does not expire account Confidential attributes () ASREQROAST (DontRequirePreAuth accounts) AdminSDHolder protected accounts Domain attributes (MAQ, minPwdLength, maxPwdAge lockoutThreshold, gpLink[group policies that linked to the current domain object]) LDAP basic info(supportedLDAPVersion, supportedSASLMechanisms, domain/forest/DC Functionality) Kerberos Policy Interesting ACLs on the domain object, resolving GUIDs (User-defined object in the future) Unusual DCSync Accounts Interesting ACLs on GPOs Interesting descriptions on user objects Sensitive & Not delegate account Group Policy Preference cpassword in SYSVOL/Cache Effective GPOs on the current user/computer Restricted groups Nested Group Membership Changelog v2.0 1. Complete Rewrite (more extensible) 2. Add Interactive Menu with command line choice 3. Use direct API call to enumerate Trust relationship 4. Update Applied GPO Enumeration with Security Filtering and WMI Filtering (WMIFilter needs to be checked manually) 5. Add LDAP DNS Record Enumeration 6. RunAs: Run ADCollector under another user context 7. Flexible SPN Scan, DNS Records, Nested Group Membership, ACL Enumeration 8. Add NetSessionEnum, NetLocalGroupGetMembers and NetWkstaUserEnum [hide][Hidden Content]]
  19. English | 2020 | ISBN: 1484259757 | 701 Pages | True PDF, EPUB | 13 MB Learn how to program using C, beginning from first principles and progressing through step-by-step examples to become a competent, C-language programmer. All you need are this book and any of the widely available C compilers, and you’ll soon be writing real C programs. You’ll discover that C is a foundation language that every programmer ought to know. Beginning C is written by renowned author Ivor Horton and expert programmer German Gonzalez-Morris. This book increases your programming expertise by guiding you through the development of fully working C applications that use what you’ve learned in a practical context. You’ll also be able to strike out on your own by trying the exercises included at the end of each chapter. At the end of the book you’ll be confident in your skills with all facets of the widely-used and powerful C language. What You Will Learn - Discover the C programming language - Program using C starting with first steps, then making decisions - Use loops, arrays, strings, text, pointers, functions, I/O, and more - Code applications with strings and text - Structure your programs efficiently - Work with data, files, facilities, and more [Hidden Content] [hide][Hidden Content]]
  20. Create WordPress Websites and Blogs: Especially for Beginners, Freelancers, and Graphic Designers Who Don’t Want to Code What you’ll learn You will learn how to “spin up” new WordPress sites in under one minute You will learn exactly how I build websites for my clients. You will learn how to create websites, portfolios, and blogs with WordPress You will learn how to download, install and configure WordPress plugins You will learn to use Photoshop and more to create beautiful website graphics You will create a responsive website that looks good on any browser Requirements You should have a basic understanding of computers and software A modern browser like Chrome, Safari, or Firefox Internet access You do not need any coding experience or programming knowledge You can follow along with free themes, but I also show you how to use several premium themes – the typical cost is $60 per theme, if you choose to go that route We will work locally (no cost), but if you want to launch your site you will need to purchase a domain name and hosting Description A Beginner’s Guide to WordPress! The main goal of this course is to teach anyone, even a complete beginner, how to setup a complete WordPress website quickly and easily. While other courses teach you all of the in-depth, complicated things about building websites in WordPress, this course focuses on only those things needed to get your website up and running as efficiently as possible. You do not need to wade through hours and hours of lectures to create a stunning website. WordPress is wonderful because once you have your site up, you can refine it over time as you are able. If you’re like most designers or freelancers or entrepreneurs, chances are good you don’t want to spend weeks perfecting your website – you want something up ASAP! To help you reach that goal as quickly as possible, I move quickly through the content to help get you up and running fast – so come ready to rapidly dive into the meat of this course! [Hidden Content] [Hidden Content]
  21. Key Features : Finds parameters from web archives of the entered domain. Finds parameters from subdomains as well. Gives support to exclude urls with specific extensions. Saves the output result in a nice and clean manner. It mines the parameters from web archives (without interacting with the target host) [hide][Hidden Content]]
  22. Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass SmartScreen/Defender) Legal disclaimer: Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [hide][Hidden Content]]
  23. Advanced Perl Programming: From Advanced to Expert by William Bo Rothwell English | 2020 | ISBN: 1484258620 | 305 Pages | True PDF, EPUB | 10 MB William “Bo” Rothwell’s Advanced Perl Programming continues where his previous book left off, more or less, as it guides you through advanced techniques of the Perl programming language starting with command-line options, references, and arrays and hashes from advanced data types. Next, you’ll learn about typeglobs for symbolic entries. Additionally, you’ll see advanced subroutine handling, then packages and namespaces. Furthermore, you’ll build advanced modules and install CPAN modules. Unlike Java and C++, modules have been around in Perl for a long time now. Along the way, you’ll learn and use POD mark up language for Perl documentation. Moreover, you’ll get a survey of the many advanced features and data structures of the current Perl programming language. You’ll also get a survey of the new features of the latest Perl 5.x release. After reading and using this book, you’ll have the tools, techniques, and source code to be an expert Perl programmer. What You Will Learn - Carry out command-line parsing and extract scripts - Create references; return values from a reference; work with the ref Function and strict refs - Work with advanced Perl data types using arrays, hashes, and hash of hashes - Use Typeglobs for symbol table entries - Build modules and install CPAN modules - Write documentation for Perl using POD - Work with the newest features in Perl, including the smartmatch operator, yada yada, automated regex modifiers, the CORE namespace and more [HIDE][Hidden Content]]
  24. Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, ...) [HIDE][Hidden Content]]