Search the Community

Showing results for tags 'hacker'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 28 results

  1. itsMe

    Resource Hacker v5.1.8

    Overview: Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker™ is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line. Version 5.1.8 Last updated: 14 November 2020 Changes in 5.1.8: Added: Zooming/scrolling views of image resources Update: Enabled scrolling for very tall dialogs Bugfix: Very large binary resources (>>100Mb) could crash the hex editor Bugfix: Occasional bug decompiling dialogs styles (WS_TABSTOP) Bugfix: RC file missing when extracting a binary resource type from commandline [hide][Hidden Content]]
  2. [hide][Hidden Content]]
  3. Rubyfu, where Ruby goes evil! This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It’s a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in shortest and smartest way. Rubyfu is where you’ll find a plug-n-hack code, Rubyfu is a book to use not only to read, it’s where ruby goes evil. Who should read this book? Ideally, Hackers!; Those who have enough experience to hack our world and have at least basics in Ruby programming language. To get the best benefits of the book, open Rubyfu.net and pin its browser tab; Use irb/pry as interpreter to run the code or run it as a script; Enhance the code to fit your needs and yeah, tweet the code and its output to @Rubyfu to share it with our awesome community. Organization of the book Module 0x0 | Introduction Module 0x0 is just a smooth start for you, whether you’re a reader, writer, hacker or someone came to say hi. In this module, you’ll find a great start for you as a contributor, where all kinds of contributions are welcome starting from proofreading ending to topic writing. Module 0x1 | Basic Ruby Kung Fu Module 0x1 is an awesome collection of the most commonly needed String manipulation, extraction, and conversion. Dealing with real cases that you might face during your hack. Dealing with encoding and data conversion could be trivial or complex topic and here we don’t care, we’ll solve it. Module 0x2 | System Kung Fu Module 0x2 digs more in system hacking, where the system command, file manipulation, cryptography and generating the common hashes are needed. Getting bind and reverse shell with really simple ways requires a skill you need no doubt. Almost all Linux systems are shipped-up with ruby and if it doesn’t? no problem we’ll get rid of it. Module 0x3 | Network Kung Fu Module 0x3 dives deeper in the network sockets, protocols, packet manipulation, more service enumeration ways and gives us more hacky and awesome code to get the job done. Working with network protocols need a deeper knowledge of how these protocols work in order to exchange understandable data and yeah, we’ll figure it out right here. Module 0x4 | Web Kung Fu Module 0x4 web is the most common place to share information, however, it’s a more delicious place to hack. Dealing with web known with its uniqueness for dealing with many and many technologies in one page only. Here we’ll know how to deal with GET, POST requests, web services, databases, APIs and manipulating the browser to make it our soldier. Module 0x5 | Exploitation Kung Fu Module 0x5 whatsoever the vulnerability was, remote (FTP, IMAP, SMTP, etc.) or local (file format, local system) you’ll need to know how to build fuzzers and skeleton exploit for that. If you get there you’ll need a simple, clean and stable way to build your exploit. Here you’ll know how to build your fuzzer, exploit and porting your exploit to Metasploit and how to write your own Metasploit modules too. Module 0x6 | Forensic Kung Fu Module 0x6 whoever you’re, a good or bad guy you’ll need forensic skills in your hack and/or investigation. Here you’ll learn more how to deal with registry extracting browsers’ information and much more. [hide][Hidden Content]]
  4. itsMe

    WordPress Hacker

    Script Options: Get Information(AdminPage,Usernames,Programmed Language,CMS And ...) Get Installed Plugins Admin Page Brute Forcer [hide][Hidden Content]]
  5. [Hidden Content]
  6. Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 148 MB | Duration: 35 mins _https://www.udemy.com/course/ethical-hacking-wireshark-course/ What you'll learn Basics Packet Capturing Attacking Decrypting TLS Lua Scripting Requirements Computer with Network Card Description Wireshark is the most widely used network capture and protocol analyzer on the market. It is used by IT and Network administrators to troubleshoot network connectivity issues and by Network Security analysts to dissect network attacks. This free and open source application is so widely used in the industry because it works. It is cross platform, meaning that it runs on Windows, Mac, Linux, and FreeBSD. This course is an introduction to the application and goes over the basics to get you started capturing and analyzing network traffic. It will build your base by explaining the theory behind how networks work and then get you into real-world applications of the software. Who this course is for: IT Security Analysts [Hidden Content]
  7. How to Become An Professional Ethical Hacker ? Ethical Hacking Career [Hidden Content]
  8. The Hacker Playbook: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 2: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 3: Practical Guide To Penetration Testing (English Edition) [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. dEEpEst

    Biggest Hacker Attacks of 2018

    [Hidden Content]
  10. 3 downloads

    710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  11. View File CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs 710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 21/08/19 Category Libro Online Password ********  
  12. dEEpEst

    Hacker HighSchool

    Version 1.0.0

    7 downloads

    Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user

    $100.00 PRIV8

  13. dEEpEst

    on saleHacker HighSchool

    View File Hacker HighSchool Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user Submitter dEEpEst Submitted 19/07/19 Category Libro Online Password ********  
  14. Mundo Hacker Day 2019 | Sala 25 | Mesa Redonda: Democracia Hackeada
  15. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  16. Hacker High School E-Book Hacker high school pdf 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities and Ethics 13 TOC Glossary Download : [Hidden Content]
  17. New Features api.rest now exposes polled_at time field for the object session implemented (http|https).proxy.whitelist and (http|https).proxy.blacklist parameters (closes #508) caplets will now include the list of sub scripts and files in api.rest handshakes history is now loaded from the configured pcap aliases are now centralized and can be used for any type of device (closes #504) the events ignore list is now exported as the events.stream state object via api.rest exporting available network interfaces in /api/session for api.rest exporting version, os, arch, and goversion from api.rest preloading and exporting caplets from api.rest hid devices now exports the last 50 sniffed payloads via api.rest hid module now exposes the available layouts via api.rest new /api/file route for api.rest to read and write files the hid module now exposes its status via api.rest syn.scan now exposes progress via api.rest module can now export a State map with specific information exposing ble.device.disconnected events via api.rest module exposing enumerated BLE services for each device via api.rest module hid module is now supported on Windows tnx to @4p3rtur3 (closes #482) exporting module parameters current value in api.rest hid.sniff will now hexdump sniffed payloads (closes #490) new hid.clear command to clear the list of devices the wifi module can now use an optional wifi.interface parameter in order to use a secondary interface (fixes #488) exposing flags and connectable fields for BLE devices in api.rest dns.spoof.hosts supports both wildcard (optional) based domain lines and hosts based entries. if the ip is ommited in a line it defaults to the ip given in dns.spoof.address. add JS functions gzipCompress and gzipDecompress Fixes fixed a bug when AttEcodeSuccess was returned as an error by the gatt lib (fixes #498) caplet code is loaded entirely and comments are only skipped while evaluating it fixed macOS compilation clear handler caused issues on some terminals, fixed by using os specific clear command wifi clients sent and received data frame counters are now updated correctly api.rest.address now defaults to 127.0.0.1 attempt to fix #500 by structure realigning events.include and events.ignore now filter for both events.stream and api.rest fixed a bug in ble.recon which sometimes caused a crash if ble.recon off was called but no device was present do not start arp.spoof if the list of targets is empty now api.rest can execute multiple commands divided by ; fixed a bug which prevented ‘set alias MAC “”‘ to clear an alias increased hid pruning time to 20 minutes using fallback hid.device.type if the device was detected but not its type checking dongle pointer in hid.recon off gracefully handling https.server starting errors gracefully handling http.server starting errors printing path for unauthorized attempts to request api.rest routes exposing session modules as a map in api.rest for quick lookup pruning HID devices after 10 minutes of inactivity fixed packets.Queue JSON serialization for api.rest module allow wifi modules to use network aliases for clients never seen on lan setting BLE device name once services are enumerated using sync.Map to avoid race conditions on the packets.Queue added handshake information for wifi aps in api.rest made arp.spoof debug less verbose (ref #483) propagating mod.started and mod.stopped events fixed wifi.client.handshake event json serialization fixed wifi.client.probe event json serialization fixed a bug in the gatt library which prevented ble.recon/ble.enum to work multiple times (fixes #471) made arp.spoof debug logs less verbose when mac addresses can’t be resolved (ref #483) fixed libusb issue in Dockerfile (fixes #480) updated islazy to 1.10.3 (ref #481) fixed a bug that caused hid.recon to crash if started more than once handling CORS for api.rest fixed typo in net.sniff (tnx to @branzo) fixed a bug caused by multiple wifi devices attached with different supported frequencies Fixed certificate issues fix android Shell command function Misc added debug panic for #500 adding networking interfaces addresses for api.rest added race detector build to Makefile add build constraint for android [HIDE][Hidden Content]]
  18. itsMe

    Resource Hacker v5.1.7

    Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker™ is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line. Version 5.1.7 Last updated: 3 January 2019 Copyright © 1999-2019 Angus Johnson [HIDE][Hidden Content]]
  19. itsMe

    WiFi Hacker

    Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) [Hidden Content]
  20. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content]_(Updated_20-01-2019).zip Virus Scan [Hidden Content]
  21. electrify

    The best hacker link directory

    Hacker Link [Hidden Content] Link Base [Hidden Content] Scene Link List [Hidden Content]
  22. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. This is the worlds most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers. What’s new in the CEH v10? (Certified Ethical Hacker Certification) EC-Council has announced the CEH v10 – the tenth edition of the popular Certified Ethical Hacker certification. Unveiled amongst other huge updates at the Scaling the unscalable mountain of cyber capability webinar, CEH v10 marks a new chapter for the certification as it aims to maintain its status as the world’s top ethical hacking certification. The CEH dates back to 2003 and has been updated regularly to embrace evolving technologies. As a reminder, the CEH certification was last updated in 2015, with the launch of the CEH v9. This update increased the number of modules to 18 and introduced a greater focus on cloud computing. Alongside other EC-Council partners, Firebrand attended the announcement webinar to give our students their first look at these important updates. What’s new in the CEH v10? EC-Council is continuing to update CEH to meet the demands of employers across the world. Here’s what’s new in the CEH v10: A module on the Internet of Things (IoT) security Upgraded vulnerability assessment material A focus on cloud attack vectors, AI and Machine Learning Introduction of the CEH Practical In response to the escalating threat of unsecured IoT devices – like 2017’s Mirai botnet attack - CEH v10 will introduce a new module focusing on Internet of Things (IoT) security. This module will provide professionals with the knowledge they need to test, deploy and manage the security of IoT devices. The new version of CEH will also introduce upgraded vulnerability assessment content. Vulnerability assessment is a critical element of the hacking life-cycle and v10 will increase the depth of application vulnerability analysis in real-world environments. Students will cover the tools required to assess systems, the tools hackers use and how to fix vulnerabilities. Professionals can expect an increased focus on emerging attacks vectors, like cloud technologies, AI and machine learning. Students will find themselves studying AI and Machine Learning to conduct vulnerability assessments in an effort to defend against malware attacks. The CEH v10 will also introduce students to the malware analysis process – the method for determining the functionality, origin and impact of malware through reverse engineering. The new CEH exam maintains the same format as its predecessors: Number of Questions: 125 Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: ECC EXAM, VUE Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE) Lab Tools for CEH v10: CEHv10 – Lab Prerequisites CEHv10 Module – Footprinting and Reconnaissance CEHv10 Module – Scanning Networks CEHv10 Module – Enumeration CEHv10 Module – Vulnerability Analysis CEHv10 Module – System Hacking CEHv10 Module – Malware Threats CEHv10 Module – Sniffing CEHv10 Module – Social Engineering CEHv10 Module – Denial-of-Service CEHv10 Module – Session Hijacking CEHv10 Module – Evading IDS, Firewalls, and Honeypots CEHv10 Module – Hacking Web Servers CEHv10 Module – Hacking Web Applications CEHv10 Module – SQL Injection CEHv10 Module – Hacking Wireless Networks CEHv10 Module – Hacking Mobile Platforms CEHv10 Module – Cloud Computing CEHv10 Module – Cryptography ------ MAGNET LINK ----- magnet:?xt=urn:btih:E9D4B579D19A9877FC89B18B4AE9FFC1D100801B&dn=%5BFreeCoursesOnline.Me%5D%20CEH%20v10%20Certified%20Ethical%20Hacker%20Lab%20Tools%20-%20%5BFCO%5D.torrent&tr=[Hidden Content] Go To: Copy/paste Whole code to your browser’s address and press Enter, to start download via torrent client. Size: 4.79 GB (5,152,705,971 bytes)
  23. In this first release i include a virus free example build in Microsoft Visual C++ 5.0 that can be fully editable with Resource Hacker. This is a cool exe for those of you who do not know how to code and want to build a simple warning message. This exe example contains 3 elements. A image (BMP), a Text and a button. This elements can be editable with Resource Hacker and the only thing that it will do is execute any exe that is in the same folder named setup.exe. The name for the file to execute can be editable with a disassembler. To start editing, open the file "Virus Remover by Hacxx.exe" with Resource Hacker Replace Bitmap with any that you want Replace Icon with any that you want Edit Dialog to whatever you want. The Bitmap, text and button are editable here Download [Hidden Content] Virustotal Not scanned to avoid the file been reviewed by malware experts.