Search the Community

Showing results for tags 'hacker'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 26 results

  1. Rubyfu, where Ruby goes evil! This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It’s a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in shortest and smartest way. Rubyfu is where you’ll find a plug-n-hack code, Rubyfu is a book to use not only to read, it’s where ruby goes evil. Who should read this book? Ideally, Hackers!; Those who have enough experience to hack our world and have at least basics in Ruby programming language. To get the best benefits of the book, open and pin its browser tab; Use irb/pry as interpreter to run the code or run it as a script; Enhance the code to fit your needs and yeah, tweet the code and its output to @Rubyfu to share it with our awesome community. Organization of the book Module 0x0 | Introduction Module 0x0 is just a smooth start for you, whether you’re a reader, writer, hacker or someone came to say hi. In this module, you’ll find a great start for you as a contributor, where all kinds of contributions are welcome starting from proofreading ending to topic writing. Module 0x1 | Basic Ruby Kung Fu Module 0x1 is an awesome collection of the most commonly needed String manipulation, extraction, and conversion. Dealing with real cases that you might face during your hack. Dealing with encoding and data conversion could be trivial or complex topic and here we don’t care, we’ll solve it. Module 0x2 | System Kung Fu Module 0x2 digs more in system hacking, where the system command, file manipulation, cryptography and generating the common hashes are needed. Getting bind and reverse shell with really simple ways requires a skill you need no doubt. Almost all Linux systems are shipped-up with ruby and if it doesn’t? no problem we’ll get rid of it. Module 0x3 | Network Kung Fu Module 0x3 dives deeper in the network sockets, protocols, packet manipulation, more service enumeration ways and gives us more hacky and awesome code to get the job done. Working with network protocols need a deeper knowledge of how these protocols work in order to exchange understandable data and yeah, we’ll figure it out right here. Module 0x4 | Web Kung Fu Module 0x4 web is the most common place to share information, however, it’s a more delicious place to hack. Dealing with web known with its uniqueness for dealing with many and many technologies in one page only. Here we’ll know how to deal with GET, POST requests, web services, databases, APIs and manipulating the browser to make it our soldier. Module 0x5 | Exploitation Kung Fu Module 0x5 whatsoever the vulnerability was, remote (FTP, IMAP, SMTP, etc.) or local (file format, local system) you’ll need to know how to build fuzzers and skeleton exploit for that. If you get there you’ll need a simple, clean and stable way to build your exploit. Here you’ll know how to build your fuzzer, exploit and porting your exploit to Metasploit and how to write your own Metasploit modules too. Module 0x6 | Forensic Kung Fu Module 0x6 whoever you’re, a good or bad guy you’ll need forensic skills in your hack and/or investigation. Here you’ll learn more how to deal with registry extracting browsers’ information and much more. [hide][Hidden Content]]
  2. itsMe

    WordPress Hacker

    Script Options: Get Information(AdminPage,Usernames,Programmed Language,CMS And ...) Get Installed Plugins Admin Page Brute Forcer [hide][Hidden Content]]
  3. [Hidden Content]
  4. Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 148 MB | Duration: 35 mins _ What you'll learn Basics Packet Capturing Attacking Decrypting TLS Lua Scripting Requirements Computer with Network Card Description Wireshark is the most widely used network capture and protocol analyzer on the market. It is used by IT and Network administrators to troubleshoot network connectivity issues and by Network Security analysts to dissect network attacks. This free and open source application is so widely used in the industry because it works. It is cross platform, meaning that it runs on Windows, Mac, Linux, and FreeBSD. This course is an introduction to the application and goes over the basics to get you started capturing and analyzing network traffic. It will build your base by explaining the theory behind how networks work and then get you into real-world applications of the software. Who this course is for: IT Security Analysts [Hidden Content]
  5. How to Become An Professional Ethical Hacker ? Ethical Hacking Career [Hidden Content]
  6. The Hacker Playbook: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 2: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 3: Practical Guide To Penetration Testing (English Edition) [Hidden Content] Download: [HIDE][Hidden Content]] Password:
  7. dEEpEst

    Biggest Hacker Attacks of 2018

    [Hidden Content]
  8. 3 downloads

    710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  9. View File CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs 710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 21/08/19 Category Libro Online Password ********  
  10. dEEpEst

    Hacker HighSchool

    Version 1.0.0


    Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user

    $100.00 PRIV8

  11. dEEpEst

    on saleHacker HighSchool

    View File Hacker HighSchool Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user Submitter dEEpEst Submitted 19/07/19 Category Libro Online Password ********  
  12. Mundo Hacker Day 2019 | Sala 25 | Mesa Redonda: Democracia Hackeada
  13. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  14. Hacker High School E-Book Hacker high school pdf 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities and Ethics 13 TOC Glossary Download : [Hidden Content]
  15. New Features now exposes polled_at time field for the object session implemented (http|https).proxy.whitelist and (http|https).proxy.blacklist parameters (closes #508) caplets will now include the list of sub scripts and files in handshakes history is now loaded from the configured pcap aliases are now centralized and can be used for any type of device (closes #504) the events ignore list is now exported as the state object via exporting available network interfaces in /api/session for exporting version, os, arch, and goversion from preloading and exporting caplets from hid devices now exports the last 50 sniffed payloads via hid module now exposes the available layouts via new /api/file route for to read and write files the hid module now exposes its status via syn.scan now exposes progress via module can now export a State map with specific information exposing ble.device.disconnected events via module exposing enumerated BLE services for each device via module hid module is now supported on Windows tnx to @4p3rtur3 (closes #482) exporting module parameters current value in hid.sniff will now hexdump sniffed payloads (closes #490) new hid.clear command to clear the list of devices the wifi module can now use an optional wifi.interface parameter in order to use a secondary interface (fixes #488) exposing flags and connectable fields for BLE devices in dns.spoof.hosts supports both wildcard (optional) based domain lines and hosts based entries. if the ip is ommited in a line it defaults to the ip given in dns.spoof.address. add JS functions gzipCompress and gzipDecompress Fixes fixed a bug when AttEcodeSuccess was returned as an error by the gatt lib (fixes #498) caplet code is loaded entirely and comments are only skipped while evaluating it fixed macOS compilation clear handler caused issues on some terminals, fixed by using os specific clear command wifi clients sent and received data frame counters are now updated correctly now defaults to attempt to fix #500 by structure realigning events.include and events.ignore now filter for both and fixed a bug in ble.recon which sometimes caused a crash if ble.recon off was called but no device was present do not start arp.spoof if the list of targets is empty now can execute multiple commands divided by ; fixed a bug which prevented ‘set alias MAC “”‘ to clear an alias increased hid pruning time to 20 minutes using fallback hid.device.type if the device was detected but not its type checking dongle pointer in hid.recon off gracefully handling https.server starting errors gracefully handling http.server starting errors printing path for unauthorized attempts to request routes exposing session modules as a map in for quick lookup pruning HID devices after 10 minutes of inactivity fixed packets.Queue JSON serialization for module allow wifi modules to use network aliases for clients never seen on lan setting BLE device name once services are enumerated using sync.Map to avoid race conditions on the packets.Queue added handshake information for wifi aps in made arp.spoof debug less verbose (ref #483) propagating mod.started and mod.stopped events fixed wifi.client.handshake event json serialization fixed wifi.client.probe event json serialization fixed a bug in the gatt library which prevented ble.recon/ble.enum to work multiple times (fixes #471) made arp.spoof debug logs less verbose when mac addresses can’t be resolved (ref #483) fixed libusb issue in Dockerfile (fixes #480) updated islazy to 1.10.3 (ref #481) fixed a bug that caused hid.recon to crash if started more than once handling CORS for fixed typo in net.sniff (tnx to @branzo) fixed a bug caused by multiple wifi devices attached with different supported frequencies Fixed certificate issues fix android Shell command function Misc added debug panic for #500 adding networking interfaces addresses for added race detector build to Makefile add build constraint for android [HIDE][Hidden Content]]
  16. itsMe

    Resource Hacker v5.1.7

    Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker™ is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line. Version 5.1.7 Last updated: 3 January 2019 Copyright © 1999-2019 Angus Johnson [HIDE][Hidden Content]]
  17. itsMe

    WiFi Hacker

    Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) [Hidden Content]
  18. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content]_(Updated_20-01-2019).zip Virus Scan [Hidden Content]
  19. electrify

    The best hacker link directory

    Hacker Link [Hidden Content] Link Base [Hidden Content] Scene Link List [Hidden Content]
  20. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. This is the worlds most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers. What’s new in the CEH v10? (Certified Ethical Hacker Certification) EC-Council has announced the CEH v10 – the tenth edition of the popular Certified Ethical Hacker certification. Unveiled amongst other huge updates at the Scaling the unscalable mountain of cyber capability webinar, CEH v10 marks a new chapter for the certification as it aims to maintain its status as the world’s top ethical hacking certification. The CEH dates back to 2003 and has been updated regularly to embrace evolving technologies. As a reminder, the CEH certification was last updated in 2015, with the launch of the CEH v9. This update increased the number of modules to 18 and introduced a greater focus on cloud computing. Alongside other EC-Council partners, Firebrand attended the announcement webinar to give our students their first look at these important updates. What’s new in the CEH v10? EC-Council is continuing to update CEH to meet the demands of employers across the world. Here’s what’s new in the CEH v10: A module on the Internet of Things (IoT) security Upgraded vulnerability assessment material A focus on cloud attack vectors, AI and Machine Learning Introduction of the CEH Practical In response to the escalating threat of unsecured IoT devices – like 2017’s Mirai botnet attack - CEH v10 will introduce a new module focusing on Internet of Things (IoT) security. This module will provide professionals with the knowledge they need to test, deploy and manage the security of IoT devices. The new version of CEH will also introduce upgraded vulnerability assessment content. Vulnerability assessment is a critical element of the hacking life-cycle and v10 will increase the depth of application vulnerability analysis in real-world environments. Students will cover the tools required to assess systems, the tools hackers use and how to fix vulnerabilities. Professionals can expect an increased focus on emerging attacks vectors, like cloud technologies, AI and machine learning. Students will find themselves studying AI and Machine Learning to conduct vulnerability assessments in an effort to defend against malware attacks. The CEH v10 will also introduce students to the malware analysis process – the method for determining the functionality, origin and impact of malware through reverse engineering. The new CEH exam maintains the same format as its predecessors: Number of Questions: 125 Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: ECC EXAM, VUE Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE) Lab Tools for CEH v10: CEHv10 – Lab Prerequisites CEHv10 Module – Footprinting and Reconnaissance CEHv10 Module – Scanning Networks CEHv10 Module – Enumeration CEHv10 Module – Vulnerability Analysis CEHv10 Module – System Hacking CEHv10 Module – Malware Threats CEHv10 Module – Sniffing CEHv10 Module – Social Engineering CEHv10 Module – Denial-of-Service CEHv10 Module – Session Hijacking CEHv10 Module – Evading IDS, Firewalls, and Honeypots CEHv10 Module – Hacking Web Servers CEHv10 Module – Hacking Web Applications CEHv10 Module – SQL Injection CEHv10 Module – Hacking Wireless Networks CEHv10 Module – Hacking Mobile Platforms CEHv10 Module – Cloud Computing CEHv10 Module – Cryptography ------ MAGNET LINK ----- magnet:?xt=urn:btih:E9D4B579D19A9877FC89B18B4AE9FFC1D100801B&dn=%5BFreeCoursesOnline.Me%5D%20CEH%20v10%20Certified%20Ethical%20Hacker%20Lab%20Tools%20-%20%5BFCO%5D.torrent&tr=[Hidden Content] Go To: Copy/paste Whole code to your browser’s address and press Enter, to start download via torrent client. Size: 4.79 GB (5,152,705,971 bytes)
  21. In this first release i include a virus free example build in Microsoft Visual C++ 5.0 that can be fully editable with Resource Hacker. This is a cool exe for those of you who do not know how to code and want to build a simple warning message. This exe example contains 3 elements. A image (BMP), a Text and a button. This elements can be editable with Resource Hacker and the only thing that it will do is execute any exe that is in the same folder named setup.exe. The name for the file to execute can be editable with a disassembler. To start editing, open the file "Virus Remover by Hacxx.exe" with Resource Hacker Replace Bitmap with any that you want Replace Icon with any that you want Edit Dialog to whatever you want. The Bitmap, text and button are editable here Download [Hidden Content] Virustotal Not scanned to avoid the file been reviewed by malware experts.
  22. Scanned Report : Scanned time : 2018-05-29 02:03:15 Scanner results: 7%的杀软(3/40)报告发现病毒 File Name : STUB.exe File Size : 1929216 byte File Type : application/x-dosexec MD5 : dfba92e1714a27bea4706981a4d0bffe SHA1 : 428317f39ae8b64c7195a833078d9a897e5cb176 Online report : [Hidden Content] File information File Name : STUB.exe (File not down) File Size :1929216 byte File Type :application/x-dosexec MD5:dfba92e1714a27bea4706981a4d0bffe SHA1:428317f39ae8b64c7195a833078d9a897e5cb176 Scanner results Scanner results:7%Scanner(s) (3/40)found malware! Time: 2018-05-29 02:03:15 (CST) Scanner Engine Ver Sig Ver Sig Date Scan result Time ahnlab 9.9.9 9.9.9 2013-05-28 Found nothing 6 antivir Found nothing 56 antiy AVL SDK 2.0 1970-01-01 Found nothing 7 arcavir 1.0 2011 2014-05-30 Found nothing 8 asquared 2015-03-08 Found nothing 1 avast 170303-1 4.7.4 2017-03-03 Found nothing 44 avg 2109/15180 10.0.1405 2018-05-23 Found nothing 1 baidu Trojan.Crypt.Heur.gen 2 baidusd 1.0 1.0 2017-03-22 Found nothing 2 bitdefender 7.58879 7.90123 2015-01-16 Found nothing 1 clamav 24608 0.97.5 2018-05-27 Found nothing 2 comodo 15023 5.1 2018-05-27 Found nothing 7 ctch 4.6.5 5.3.14 2018-05-28 Found nothing 3 drweb 2018-03-29 Found nothing 45 fortinet 1.000, 58.563, 58.446, 58.470 5.4.247 2018-05-28 Found nothing 1 fprot 2016-02-05 W32/Felix:P:Lastsect_unkn!Eldorado 2 fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 23 gdata 25.17213 25.17213 2018-05-29 Found nothing 18 hauri 2.73 2.73 2015-01-30 Found nothing 1 ikarus 4.00.08 V1.32.31.0 2018-05-28 Found nothing 11 jiangmin 16.0.100 2017-12-22 Found nothing 2 k7 10.45.26928 2018-05-29 Found nothing 1 kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 25 kingsoft 2.1 2.1 2018-05-28 Win32.Heur.KVMH004.a 4 mcafee 8620 5400.1158 2017-08-12 Found nothing 17 nod32 7240 3.0.21 2018-04-18 Found nothing 1 panda 9.05.01 9.05.01 2018-05-28 Found nothing 11 pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 2 qh360 1.0.1 1.0.1 1.0.1 Found nothing 55 qqphone 2015-12-30 Found nothing 1 quickheal 14.00 14.00 2017-11-18 Found nothing 5 rising 3619 3619 2017-12-26 Found nothing 5 sophos 5.32 3.65.2 2016-10-10 Found nothing 12 sunbelt 3.9.2671.2 3.9.2671.2 2018-05-28 Found nothing 5 symantec 20151230.005 2015-12-30 Found nothing 1 tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4 thehacker 2018-05-24 Found nothing 1 tws 17.47.17308 2018-05-28 Found nothing 4 vba beta beta 2018-04-10 Found nothing 1 virusbuster 15.0.985.0 2014-12-05 Found nothing 16 ■Heuristic/Suspicious ■Exact NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself. Password: RAR5 > siggggggggggy RIPMED128 LVL23 > Igpay Atinlay LVL23 > LOKI97 LVL23 > SAFER LVL23 > HAVAL256 LVL23 592fddfea22b8c85d554881424375ff95a56c963c7e8e7f7e6d95871d33c3c89 Download: [hide][Hidden Content]]