Search the Community

Showing results for tags 'hat'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 9 results

  1. Dark Fantasy v2.0.1 – Black Hat Hacking Tool Tools Included: ●Port Scanner: To know the open ports of a site. ●DDOS: To take down small websites with HTTP FLOOD. ●Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities) ●FTP Password Cracker: To hack file transferring of servers. ●Web Spider: To get all hidden urls for web application hacking. ●Email Scraper: To get all emails related to a webpage. ●IMDB Rating: Easy way to access the movie database. Use In VM Or RDP, Not Responsible For Anything Happens! Download Link: [Hidden Content]
  2. Black Hat Approach to Hacking Learn how a hacker hacks into the system and learn how to secure them from getting hacked. The Black Hat Approach to Hacking is a Computer skilled professional course where you learn all the basics of ethical hacking and countermeasures respectively. Learn the fundamentals of Ethical Hacking by enrolling in the Black Hat Approach to Hacking course. It helps you fully comprehend the technique by touching upon each and every concept in a detailed manner through the comprehensive modules designed by industry experts. By mastering the materials provided, you will gain the confidence to pursue the field on your own. Enroll in this course and get your Ethical Hacking certificate to gain the profound capabilities and skills needed to make your mark in the real-world. This course is for you if: You are a beginner wanting to learn about Ethical Hacking. You are an IT professional aspiring to understand Cyber Crimes. You are a web application penetration tester. You are an entrepreneur who wants to master information security. Source: [Hidden Content] Discount 100% here: [Hidden Content]
  3. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  4. Version 1.0.0

    5 downloads

    White Hat Hacking v10 This white hat hacking course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. With a hands-on focus, Keith Barker will teach you how to lawfully identify weaknesses and vulnerabilities of a system. Recommended Experience Knowledge of networking and security at the CompTIA Network+ and Security+ levels is recommended Familiarity with multiple versions of Windows Familiarity with Linux is recommended, but not required Recommended Equipment None Related Job Functions Network/System Administrators/Engineers Security officers Auditors Security professionals Site administrators Those concerned about the security of the network infrastructure This exam also meets the requirements for DOD 8750 and/or DOD 8140 baseline certifications for CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, and CSSP Auditor. Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith has received several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more.

    $100.00 PRIV8

  5. dEEpEst

    Hat Encrypt-Decrypt Files

    Hat.sh hat.sh is a javascript app that provides secure file encryption using the AES-256-GCM algorithm from WebCryptoAPI provided by your browser. it was coded following the WebCrypto Documentations . It's fast, secure and Serverless, the app never uploads the files to the server. in a small amount of code the app can encrypt any type of files at any size within seconds. To use the app all you have to do is Browse a file, Type a Decryption Key or Generate one through our secure key generator. and your encrypted file is ready to download. How to use just simply browse a file, type a decryption key or use our secure key generator, and encrypt or decrypt. Offline Use the app is cross-platform and is available to download on macOS , Windows and linux Requirements NodeJS and NPM Browserify which lets you require('modules') in the browser by bundling up all of your dependencies. Installation Download or clone the repository [Hidden Content] go to the app directory cd [app directory] open terminal and install the node modules that are in the package.json file sudo npm install after the packages are installed bundle main app.js and modules together in one file using Browserify browserify src/js/app.js -o bundle.js then start the app by running index.html Browser Compatibility We officially support the last two versions of every major browser. Specifically, we test on the following Chrome on Windows, macOS, and Linux , IOS, Android Firefox on Windows, macOS, and Linux Safari on iOS and macOS Edge on Windows IE 11 on Windows for more info see WebCryptoAPIhome page Crypto Examples AES-GCM - generateKey window.crypto.subtle.generateKey( { name: "AES-GCM", length: 256, }, true, ["encrypt", "decrypt"] ) .then(function(key){ console.log(key); }) .catch(function(err){ console.error(err); }); AES-GCM - importKey function importSecretKey(rawKey) { return window.crypto.subtle.importKey( "raw", rawKey, "AES-GCM", true, ["encrypt", "decrypt"] ); } .then(function(key){ console.log(key); }) .catch(function(err){ console.error(err); }); AES-GCM - exportKey async function exportCryptoKey(key) { const exported = await window.crypto.subtle.exportKey( "raw", key ) .then(function(keydata){ console.log(keydata); }) .catch(function(err){ console.error(err); }); AES-GCM - encrypt async function encryptMessage(key) { let encoded = getMessageEncoding(); // The iv must never be reused with a given key. iv = window.crypto.getRandomValues(new Uint8Array(12)); ciphertext = await window.crypto.subtle.encrypt( { name: "AES-GCM", iv: iv }, key, encoded ) .then(function (encrypted) { console.log(new Uint8Array(encrypted)); }) .catch(function (err) { console.error(err); }); } AES-GCM - decrypt async function decryptMessage(key) { let encoded = getMessageEncoding(); let decrypted = await window.crypto.subtle.decrypt({ name: "AES-GCM", iv: iv }, key, ciphertext ) .then(function (decrypted) { console.log(new Uint8Array(encrypted)); }) .catch(function (err) { console.error(err); }); } Source: [Hidden Content] Tool Online: [Hidden Content]
  6. View File CBT Nuggets - White Hat Hacking v10 (CEH V10) White Hat Hacking v10 This white hat hacking course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. With a hands-on focus, Keith Barker will teach you how to lawfully identify weaknesses and vulnerabilities of a system. Recommended Experience Knowledge of networking and security at the CompTIA Network+ and Security+ levels is recommended Familiarity with multiple versions of Windows Familiarity with Linux is recommended, but not required Recommended Equipment None Related Job Functions Network/System Administrators/Engineers Security officers Auditors Security professionals Site administrators Those concerned about the security of the network infrastructure This exam also meets the requirements for DOD 8750 and/or DOD 8140 baseline certifications for CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, and CSSP Auditor. Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith has received several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more. Submitter dEEpEst Submitted 25/02/19 Category Libro Online Password ********  
  7. F B I

    Inject shellcode Gray Hat

    [Hidden Content]
  8. yoyohoneysinger

    Black Hat Hacking Course

    Download here [Hidden Content]
  9. Red Hat Security Advisory 2018-2772-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include bypass and use-after-free vulnerabilities. View the full article