Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'help'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 21 results

  1. The Sysinternals web site was created in 1996 by Mark Russinovich to host his advanced system utilities and technical information. Whether you’re an IT Pro or a developer, you’ll find Sysinternals utilities to help you manage, troubleshoot and diagnose your Windows and Linux systems and applications. [Hidden Content]
  2. Need help on how to solve captcha with php. Please help me
  3. This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports Windows through the ThreatHound.exe, making it even more accessible. The latest release of ThreatHound has several new features that make it even more useful. For example, you can now save results in JSON format or print them on the screen by using the "print" argument. If you want to save results in JSON format, you can set the argument to "no." If you prefer to print the results on the screen, you can set the argument to "yes." You can give ThreatHound a single EVTX file, a Windows event logs folder, or multiple EVTX files separated by commas using the "-p" argument. You can also give Sigma rules path using the "-s" argument. ThreatHound also has multithreading capabilities, which significantly improves its running speed. It is an agent-based tool, which means you can push it to multiple servers and run it easily. ThreatHound has many useful features, including automation for Threat hunting, Compromise Assessment, and Incident Response for the Windows Event Logs. It downloads and updates Sigma rules daily from the source and has more than 50 detection rules included. With support for more than 1500 detection rules for Sigma, it can detect a wide range of threats. One of the best things about ThreatHound is that you can easily add your own detection rules to it. It also allows you to add new event log source types to mapping.py easily, making it even more flexible. Overall, ThreatHound is a powerful and useful tool for anyone working in the IR, Threat Hunting, or CA fields. Its ability to detect a wide range of threats, combined with its flexibility and ease of use, make it an invaluable addition to any security toolkit. Here is github link: [Hidden Content] Hope it helps, Happy Hunting!
  4. Hello everyone, I need some help, so here I have a software that is protected by Enigma Protector, but I don't have the generator for this protection,i wanted to know if there is a way to circumvent the protection if there is how could someone tell me how
  5. hello friends, first I want to thank you for being part of the forum,I have here a serial generator made and protected by Enigma 6.xx,and I can't break this protection, I've tried to create a loader with the hwid enigma but I haven't been successful,could someone help me to do this please
  6. With the help of this automated script, you will never lose track of newly released CVEs. What does this powershell script do is exactly running the Microsoft Edge at system startup, navigate to 2 URLs ,and then put the browser in to full screen mode. As ethical hackers, it's vital that we keep track of the recently released CVEs in order to be fully aware of new threats or vulnerabilities out there in the Internet. Actually, it's a routine task in our day to day lives. So why don't we just automate the whole procedure of opening a browser and navigate to our sources for cheking the new CVEs? The purpose of this tool is to basically, automate the mentioned procedure with the help of powershell scripting. Among all the online sources that are available which publish new CVEs, I've chosen the following 2 URLs and leveraged them in the script. [hide][Hidden Content]]
  7. Best Support System is a self-hosted support ticket application.It handle support ticket, manage email ticket, collect any payment by paypal. It has easy installer so you don’t need any programming skill. We will keep update reqularly and it has auto update feature. [Hidden Content] [hide][Hidden Content]]
  8. It generates the XML payloads, and automatically starts a server to serve the needed DTD’s or to do data exfiltration. Some notes: If you choose to use OOB or CDATA mode, XXExploiter will generate the necessary dtd to be included and will start a server to host them. Have in mind that if you use these options you should set the server address If you include content in the body of the XML have in mind that XML restricted characters like ‘<‘ may break the parsing so be sure to use CDATA or PHP’s base64encode Most of the languages limit the number of entity expansion, or the total length of the content expanded, so make sure you test XEE on your machine first, with the same conditions as the target. [hide][Hidden Content]]
  9. Hey guys, I am trying to make a OB config to reset password of Mycanal Account is it possible to find an API to make it? cz always I got "Access Denied" when I am trying from Web Interface Thanks in advance
  10. [HIDE][Hidden Content]]
  11. [Hidden Content]
  12. Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks. View the full article
  13. I'm looking true the web but can't resolve this error .......Bash: $ command not found Can someone give me help ? 👽
  14. Is there a RAT removal tool that I can use to remove a RAT in my system??
  15. Hi I need some help . I try to download Kali from Torrent and i can't it is just show with the PDF icon and do notthing . If i try with the HTTP it work's good. Where i have to go in my comp to fix that pls .
  16. I found a template that i really keen on, but now I have a trouble with the search label page. For example, this is my url label search: [Hidden Content] It shows 20 posts at page 1 but then if you click on page 2, it still shows 20 page as your previous click in page 1. Who can help me find the solution in source code to make it show the older posts in a search label page, please This is original demo: [Hidden Content] This is download link of the template: [Hidden Content] I hope staff members can accept my post 😞 Thanks you so much
  17. MailCarrier version 2.51 HELP remote buffer overflow exploit. View the full article
  18. hello, i got a little knowledge of android rat. are there any exploits or any ways to hack by just sending them a link with including exploit in it? or can i buy them, if anyone sells them? it should work like rat and also if i use android rat apk. after installation it shows permanantly on notifcation. anyway can i disable it to not to show up in notification bar, after installation?please reply below,if you got something. Thank you.
  19. Hello evryone can someone help me to find good botnet+hvnc plagin for working today? cuz testing parasite the bild dont work i need some botnet+hvnc which work today or someone man who selling good hvnc+panel with good % (70-90) of installed or some public hvnc builder + panel which work today tnx for helping
  20. Please who can help me with Remcos crack version 1.7?
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.