Search the Community

Showing results for tags 'hacker'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 34 results

  1. DLL Injector Hacker PRO – is a tool for injection of files dll to processes or (programs) this tool was specially designed for the injection of hacks, for games such as (Halo – Counter Strike – Swat – Nova – Mount Blade – Star War – ETC …) is easy to use and very efficient. [hide][Hidden Content]]
  2. Only days after the T-Mobile data breach, the same threat actor is selling 70 million AT&T users’ records. The mobile service provider denied the data leak claim, saying the data didn’t come from any of their systems. ShinyHunters, the same group of threat actors that posted T-Mobile users’ data for sale just days ago, is now selling 70 million records that allegedly belong to another mobile service provider – AT&T. The sample of data for sale includes AT&T users’ full names, social security numbers, email addresses, and dates of birth. ShinyHunters is selling the database for a starting price of $200,000. AT&T denied the claim that the data was leaked, suggesting that it is either inauthentic or gathered from other sources. “Based on our investigation today, information that appeared in an internet chat room does not appear to have come from our systems,” MarketWatch quoted the cellphone carrier. AT&T has suffered a data breach before. In 2015, the company agreed to pay a $25 million fine for an insider breach. As a matter of fact, in May, a threat actor was looking to hire a T-Mobile and/or AT&T employee, presumably to help them stage an insider attack on their employer. The claim of yet another enormous user database comes only days after another mobile service provider T-Mobile has confirmed a data breach. According to their latest statement, an attacker illegally accessed a database containing information on more than 40 million past, current, and prospective users of T-Mobile US. Late last week, T-Mobile was tipped about claims in an online forum that a threat actor has compromised T-Mobile systems. The company announced it had located and immediately closed the access point that might have been used to illegally gain access to the organization’s servers. “Our preliminary analysis is that approximately 7.8 million current T-Mobile postpaid customer accounts’ information appears to be contained in the stolen files, as well as just over 40 million records of former or prospective customers who had previously applied for credit with T-Mobile. Importantly, no phone numbers, account numbers, PINs, passwords, or financial information were compromised in any of these files of customers or prospective customers,” the company said in a press release. The experts we spoke to insisted that this data could be used for social engineering and identity theft. ShinyHunters is a notorious threat actor group and is responsible for multiple major data breaches. According to HackRead, they have targeted companies like Mashable, 123RF, Minted, Couchsurfing, Animal Jam, and others. Source
  3. 1) RDP Cracking 1) RDP into and how to get valid CC Free 2) how to get free RDP 3) How Developer get Free RDP 4) How to crack RDP using Tools 5) Crack RDP using angry IP scanner 100% 6) Get free 6GB RDP, free hosting, free domain 7) clear small dout of RDP 8) Why RDP is important for cracking 2) How to make own combos using SQL dumper, tps dork generator, EZ dork searcher 1) how to get free proxy and keywords 2) how to generate dork and search dork 3) How to import links on SQL Dumper 4) How to Find Exploitable site and How to Find injectable site using SQL Dumper 5) How to get own Combos and email list 6) How to export combos and email list on Desktop 3) How to make combos using slayer leecher How to Make HQ combos using slayer leecher 4) How to make own HQ Proxy 1) How to check proxy 2) How to make own proxy and check 5) Premium account cracking 1) Minicraft cracking 2) Nord VPN cracking 3) Netflix account cracking 6) How to use open bullet 7) SMTP cracking 8) Facebook account cracking 9) MD5 Decrypter [hide][Hidden Content]]
  4. itsMe

    Remote Hacker Probe Pro V.2

    The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use. The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc. Remote Hacker Probe Core is open source and constantly improved. and is no longer being updated or worked on. Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows. The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here. Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program. Server Features : Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes. Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up. The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE). Event Logging. High Speed File Upload / Download. Main Features : Probe Client : The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer. Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL) Download, Upload, Delete and browse the entire file System. Reverse Shell, Full Access to the command line. Scan Remote Network for hosts. Port scan hosts in the Target Network. Scan Remote Network for hosts vulerable to Eternal Blue Get Process Information by Process name. Geolocate Client using IP Address. Shutdown / Restart the Remote PC. Grab screenshot of the Remote PC. Record Microphone input. Add to Startup Persistence on command. Display Message box. Open URLS in the default browser. USB Infection. Active Window logging. UAC Status shown in main table. Client Path shown in main table. Keylogger. Password Recovery. Pidgin. FileZilla. Vault & IE. WinSCP. WiFi. Credential Manager. Task Manager. Remote Hacker Probe Pro V.2 This is the final release of Remote Hacker Probe. I am no longer going to update this. The professional (paid) version is now open source and is merged into this repository. [Hidden Content]
  5. itsMe

    Remote Hacker Probe V.1.1

    The Remote Hacker Probe is a Remote Access and Post Exploitation Framework coded in C++/Java. Server Features : Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes. Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up. The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE). Event Logging. High Speed File Upload / Download. Main Features : Execute DLL’s in memory using Reflective DLL Injection over Socket. Download, Upload, Delete and browse the entire file System. Reverse Shell, Full Access to the command line. Scan Remote Network for hosts. Port scan hosts in the Target Network. Scan Remote Network for hosts vulerable to Eternal Blue. Get Process Information by Process name. Geolocate Client using IP Address on an interactive Map. Shutdown / Restart the Remote PC. Grab screenshot of the Remote PC. Record Microphone input. Add to Startup Persistence on command. Display Message box. Open URLS in the default browser. USB Infection. Active Window logging. Client Path. Keylogger. Password Recovery. Pidgin. FileZilla. Vault & IE. WinSCP. WiFi. Credential Manager. Task Manager. Remote Hacker Probe V.1.1 RCE Vulnerability fixed. File Manager bugs improved. Unauthorized File Upload / Download fixed. It is checked if you triggered the file download or not. [hide][Hidden Content]]
  6. A cloud based remote android managment suite, powered by NodeJS Features GPS Logging Microphone Recording View Contacts SMS Logs Send SMS Call Logs View Installed Apps View Stub Permissions Live Clipboard Logging Live Notification Logging View WiFi Networks (logs previously seen) File Explorer & Downloader Command Queuing Built In APK Builder Auto Allow Permission Admin Permission Accessibility Feature Persistent [hide][Hidden Content]]
  7. itsMe

    Resource Hacker v5.1.8

    Overview: Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker™ is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line. Version 5.1.8 Last updated: 14 November 2020 Changes in 5.1.8: Added: Zooming/scrolling views of image resources Update: Enabled scrolling for very tall dialogs Bugfix: Very large binary resources (>>100Mb) could crash the hex editor Bugfix: Occasional bug decompiling dialogs styles (WS_TABSTOP) Bugfix: RC file missing when extracting a binary resource type from commandline [hide][Hidden Content]]
  8. [hide][Hidden Content]]
  9. Rubyfu, where Ruby goes evil! This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It’s a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in shortest and smartest way. Rubyfu is where you’ll find a plug-n-hack code, Rubyfu is a book to use not only to read, it’s where ruby goes evil. Who should read this book? Ideally, Hackers!; Those who have enough experience to hack our world and have at least basics in Ruby programming language. To get the best benefits of the book, open Rubyfu.net and pin its browser tab; Use irb/pry as interpreter to run the code or run it as a script; Enhance the code to fit your needs and yeah, tweet the code and its output to @Rubyfu to share it with our awesome community. Organization of the book Module 0x0 | Introduction Module 0x0 is just a smooth start for you, whether you’re a reader, writer, hacker or someone came to say hi. In this module, you’ll find a great start for you as a contributor, where all kinds of contributions are welcome starting from proofreading ending to topic writing. Module 0x1 | Basic Ruby Kung Fu Module 0x1 is an awesome collection of the most commonly needed String manipulation, extraction, and conversion. Dealing with real cases that you might face during your hack. Dealing with encoding and data conversion could be trivial or complex topic and here we don’t care, we’ll solve it. Module 0x2 | System Kung Fu Module 0x2 digs more in system hacking, where the system command, file manipulation, cryptography and generating the common hashes are needed. Getting bind and reverse shell with really simple ways requires a skill you need no doubt. Almost all Linux systems are shipped-up with ruby and if it doesn’t? no problem we’ll get rid of it. Module 0x3 | Network Kung Fu Module 0x3 dives deeper in the network sockets, protocols, packet manipulation, more service enumeration ways and gives us more hacky and awesome code to get the job done. Working with network protocols need a deeper knowledge of how these protocols work in order to exchange understandable data and yeah, we’ll figure it out right here. Module 0x4 | Web Kung Fu Module 0x4 web is the most common place to share information, however, it’s a more delicious place to hack. Dealing with web known with its uniqueness for dealing with many and many technologies in one page only. Here we’ll know how to deal with GET, POST requests, web services, databases, APIs and manipulating the browser to make it our soldier. Module 0x5 | Exploitation Kung Fu Module 0x5 whatsoever the vulnerability was, remote (FTP, IMAP, SMTP, etc.) or local (file format, local system) you’ll need to know how to build fuzzers and skeleton exploit for that. If you get there you’ll need a simple, clean and stable way to build your exploit. Here you’ll know how to build your fuzzer, exploit and porting your exploit to Metasploit and how to write your own Metasploit modules too. Module 0x6 | Forensic Kung Fu Module 0x6 whoever you’re, a good or bad guy you’ll need forensic skills in your hack and/or investigation. Here you’ll learn more how to deal with registry extracting browsers’ information and much more. [hide][Hidden Content]]
  10. itsMe

    WordPress Hacker

    Script Options: Get Information(AdminPage,Usernames,Programmed Language,CMS And ...) Get Installed Plugins Admin Page Brute Forcer [hide][Hidden Content]]
  11. Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 148 MB | Duration: 35 mins _https://www.udemy.com/course/ethical-hacking-wireshark-course/ What you'll learn Basics Packet Capturing Attacking Decrypting TLS Lua Scripting Requirements Computer with Network Card Description Wireshark is the most widely used network capture and protocol analyzer on the market. It is used by IT and Network administrators to troubleshoot network connectivity issues and by Network Security analysts to dissect network attacks. This free and open source application is so widely used in the industry because it works. It is cross platform, meaning that it runs on Windows, Mac, Linux, and FreeBSD. This course is an introduction to the application and goes over the basics to get you started capturing and analyzing network traffic. It will build your base by explaining the theory behind how networks work and then get you into real-world applications of the software. Who this course is for: IT Security Analysts [Hidden Content]
  12. How to Become An Professional Ethical Hacker ? Ethical Hacking Career [Hidden Content]
  13. The Hacker Playbook: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 2: Practical Guide To Penetration Testing (English Edition) [Hidden Content] The Hacker Playbook 3: Practical Guide To Penetration Testing (English Edition) [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. dEEpEst

    Biggest Hacker Attacks of 2018

    [Hidden Content]
  15. 4 downloads

    710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  16. View File CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs 710 pages ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 21/08/19 Category Libro Online Password ********  
  17. dEEpEst

    Hacker HighSchool

    Version 1.0.0

    7 downloads

    Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user

    $100.00 PRIV8

  18. dEEpEst

    on saleHacker HighSchool

    View File Hacker HighSchool Hacker high 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user Submitter dEEpEst Submitted 19/07/19 Category Libro Online Password ********  
  19. Mundo Hacker Day 2019 | Sala 25 | Mesa Redonda: Democracia Hackeada
  20. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  21. Hacker High School E-Book Hacker high school pdf 01 Being a Hacker 02 Windows and Linux 03 Ports and Protocols 04 Services and Connections 05 System Identification 06 Malware 07 Attack Analysis 08 Forensics 09 Email Security 10 Web Security and Privacy 11 Passwords 12 Legalities and Ethics 13 TOC Glossary Download : [Hidden Content]
  22. New Features api.rest now exposes polled_at time field for the object session implemented (http|https).proxy.whitelist and (http|https).proxy.blacklist parameters (closes #508) caplets will now include the list of sub scripts and files in api.rest handshakes history is now loaded from the configured pcap aliases are now centralized and can be used for any type of device (closes #504) the events ignore list is now exported as the events.stream state object via api.rest exporting available network interfaces in /api/session for api.rest exporting version, os, arch, and goversion from api.rest preloading and exporting caplets from api.rest hid devices now exports the last 50 sniffed payloads via api.rest hid module now exposes the available layouts via api.rest new /api/file route for api.rest to read and write files the hid module now exposes its status via api.rest syn.scan now exposes progress via api.rest module can now export a State map with specific information exposing ble.device.disconnected events via api.rest module exposing enumerated BLE services for each device via api.rest module hid module is now supported on Windows tnx to @4p3rtur3 (closes #482) exporting module parameters current value in api.rest hid.sniff will now hexdump sniffed payloads (closes #490) new hid.clear command to clear the list of devices the wifi module can now use an optional wifi.interface parameter in order to use a secondary interface (fixes #488) exposing flags and connectable fields for BLE devices in api.rest dns.spoof.hosts supports both wildcard (optional) based domain lines and hosts based entries. if the ip is ommited in a line it defaults to the ip given in dns.spoof.address. add JS functions gzipCompress and gzipDecompress Fixes fixed a bug when AttEcodeSuccess was returned as an error by the gatt lib (fixes #498) caplet code is loaded entirely and comments are only skipped while evaluating it fixed macOS compilation clear handler caused issues on some terminals, fixed by using os specific clear command wifi clients sent and received data frame counters are now updated correctly api.rest.address now defaults to 127.0.0.1 attempt to fix #500 by structure realigning events.include and events.ignore now filter for both events.stream and api.rest fixed a bug in ble.recon which sometimes caused a crash if ble.recon off was called but no device was present do not start arp.spoof if the list of targets is empty now api.rest can execute multiple commands divided by ; fixed a bug which prevented ‘set alias MAC “”‘ to clear an alias increased hid pruning time to 20 minutes using fallback hid.device.type if the device was detected but not its type checking dongle pointer in hid.recon off gracefully handling https.server starting errors gracefully handling http.server starting errors printing path for unauthorized attempts to request api.rest routes exposing session modules as a map in api.rest for quick lookup pruning HID devices after 10 minutes of inactivity fixed packets.Queue JSON serialization for api.rest module allow wifi modules to use network aliases for clients never seen on lan setting BLE device name once services are enumerated using sync.Map to avoid race conditions on the packets.Queue added handshake information for wifi aps in api.rest made arp.spoof debug less verbose (ref #483) propagating mod.started and mod.stopped events fixed wifi.client.handshake event json serialization fixed wifi.client.probe event json serialization fixed a bug in the gatt library which prevented ble.recon/ble.enum to work multiple times (fixes #471) made arp.spoof debug logs less verbose when mac addresses can’t be resolved (ref #483) fixed libusb issue in Dockerfile (fixes #480) updated islazy to 1.10.3 (ref #481) fixed a bug that caused hid.recon to crash if started more than once handling CORS for api.rest fixed typo in net.sniff (tnx to @branzo) fixed a bug caused by multiple wifi devices attached with different supported frequencies Fixed certificate issues fix android Shell command function Misc added debug panic for #500 adding networking interfaces addresses for api.rest added race detector build to Makefile add build constraint for android [HIDE][Hidden Content]]