Search the Community

Showing results for tags 'hidden'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 13 results

  1. SubDomainizer SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascript present in the given URL. This tool also finds S3 buckets, cloudfront URL’s and more from those JS files which could be interesting like S3 bucket is open to read/write, or subdomain takeover and a similar case for cloudfront. It also scans inside the given folder which contains your files. Cloud Storage Services Supported: SubDomainizer can find URL for following cloud storage services: 1. Amazon AWS services (cloudfront and S3 buckets) 2. Digitalocean spaces 3. Microsoft Azure 4. Google Cloud Services 5. Dreamhost 6. RackCDN. Changelog v2.0 SANs Feature: Added a feature to find Subject Alternative Names for already found subdomains from different sources. Two options can be used with -san argument i.e. all or same. same will find only subdomains for TLD of the URL. all will find all (sub)domains having the same SAN for a given subdomain. Secret Location Feature: Added a feature to display the location of secrets. Inline in case if secret(s) found within the page (used in -u argument) URL of file in case if secret(s) found on External JS file or Github URL or File path (in case of the folder). [hide][Hidden Content]]
  2. lorsrf Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods. [hide][Hidden Content]]
  3. A simple script to generate a hidden url for social engineering. Legal disclaimer: Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  4. 50 downloads

    BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8

    $100.00 PRIV8

  5. View File BlackHatProTools Hidden Content Leak BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8 Submitter dEEpEst Submitted 17/05/20 Category Files Password ********  
  6. [Hidden Content]
  7. Introduction Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc. Hidden Eye Logo Disclaimer: Use this tool for educational purposes only. Hidden Eye: Advanced Phishing Tool [Android-Support-Available] As a modern phishing tool, Hidden Eye is very good at what it does. The perfect combination of all its functional components gives it an upper hand when attacking accounts. By using brute force attacks it can effectively access the user’s personal information. Hidden Eye can easily crack user passwords and can also collect other personal data belonging to the victim. Depending on the attack vector selected you can easily hack user accounts such as Facebook, Twitter, Instagram, Snapchat and many others. It can be used to carry out phishing on 30+ pages. The tool can also run on android devices through the UserLand app or Termux app. Features: Can perform live attacks (IP, geolocation, country, etc.) Captures victim’s keystrokes (using keylogger function) Serveo URL type selection (selects between RANDOM URL and CUSTOM URL) Numerous phishing pages (Facebook, Twitter, Instagram, Dropbox, Reddit, WordPress, Yahoo, and many more) Android support (Termux/UserLand) Supported Platforms: Linux (Tested on: Kali Linux, Parrot OS, Ubuntu, Arch Linux, Black Arch, OS X High Sierra, etc.) Android (Termux/UserLand) Prerequisites: This tool can’t be run effectively is some components are not in place, so make sure that you’ve installed the following: Python 3 sudo Wget from Python PHP [HIDE][Hidden Content]]
  8. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using Scan the database. Bruteforce scan over 2500 subdomains. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [HIDE][Hidden Content]]
  9. dEEpEst

    Hidden miner builder

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart, re-installation, if already working. [+] After infection, the assembly starts within a minute. [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it. [+] Autoload. [+] "Gluing". [+] Icon selection [+] Heavy mining can be selected: 50% 75% 100% [+] For nicehash and dwarfpool, always put a random name for the worker. [+] Fake error. (can be turned on) [+] Protection against draining on VirusTotal. [+] Random name of the worker. (can be turned on) [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits. [+] Support SSL/TLS [+] Auto update miner via Tor. (actual for hard forks) *dev donate 10% Download: [HIDE][Hidden Content]]
  10. Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Passwoord:
  11. dEEpEst

    HiDDen PerSOn Crypter

    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Password:
  12. dEEpEst

    Hidden TeamViewer

    It can do everything that he can complete teamviewer , only secretly. Based on version 4. Digital signatures are in place. Prescribed in autostart. ID comes in the mail. Mail and change the password to connect to TeamViewer.ini (email / tvpass) Download: [HIDE][Hidden Content]] Password: