Search the Community

Showing results for tags 'hidden'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 21 results

  1. itsMe

    Hidden Miner Builder v1.4.2

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; *dev donate 10% A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. v1.4.2 A critical error with TOR has been fixed. On some PCs, an error about the missing tor.exe file could get out. Added improvements to the TOR itself. [Hidden Content]
  2. itsMe

    Hidden Miner Builder v1.4.1

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; *dev donate 10% A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. v1.4.1 Tips for beginners have been added to the builder. [Hidden Content]
  3. Cyrobo Hidden Disk Pro – There are many ways to store your data securely on your PC, and numerous applications designed to aid you in this endeavor. However, complex tools tend not to be very user-friendly, and using them on a daily basis may reduce your productivity.Hidden Disk, on the other hand, provides you with a straightforward method of securing your files. It creates a new drive that can be hidden at any time, together with the contained data, as well as protected with a user-provided password. Simple utility designed to help you hide your private files Using Hidden Disk could hardly be easier, as you can create a brand new disk drive with a single mouse click. It can then be used like any other drive, so anyone familiar with the File Explorer should be able to get the hang of this program in no time at all. Moreover, you can assign a particular letter to the created drive to make it easier to locate. However, it shares its disk space with the system drive, which may limit the amount of data you can store. Secure method of storing data Of course, you also have the option of encrypting the drive with a password. If you go for this additional security feature, you are required to provide this key every time the application is launched. Furthermore, you can take advantage of the application’s e-mail recovery feature to ensure you do not lose access to your files should you forget your password. Follow the provided instructions to avoid losing your data It is worth noting that you should always move your files from the hidden drive whenever you wish to reinstall the operating system or format the partition. Even though the data is normally inaccessible, it is stored on the system drive, so it can still be deleted when you perform these operations. All in all, Hidden Disk is a lightweight, easy-to-use program that enables you to store data on a hidden drive. It can be set up in seconds even by complete novices, and also allows you to encrypt the newly created drive for extra security. [Hidden Content] [hide][Hidden Content]]
  4. itsMe

    Hidden Miner Builder v1.4.0

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.4.0 Now information about RAM is displayed in loggers. Now you can use a random worker name at choice, through a period after the wallet, or in the password. Depending on the pool support. [Hidden Content]
  5. HOW TO DETECT A HIDDEN CAMERA IN A ROOM. When you stay in a hotel, how do you know there is no room secret pinhole camera? When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be secretly recorded. In this age of smart recording devices and pinhole sized drones, always remember when staying in a hotel, that you can use this method to check your room : 1.When you have entered into your room, turn off the lights, and close the curtains,open your phone camera, do not turn the flash light on. 2.Turn around the room with your cell phone. When a red dot is found on your screen, that means that a hidden web camera is installed. # If no red dots, then the room is okay. Please forward this message to your friends who travel a lot. And those that make a lot of business trips. My dear friends and sisters kindly note and be aware. Don't be a victim of a nude picture.
  6. itsMe

    Hidden Miner Builder v1.3.9

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.3.9 ADD: Support mining on AMD: RX 6800, 6900 [Hidden Content]
  7. itsMe

    Hidden Miner Builder v1.3.8

    [+] Run from under the user without admin rights. [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart, re-installation, if already working. [+] After infection, the assembly starts within a minute. [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute. [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute. [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it. [+] Autoload. [+] "Gluing". [+] Icon selection. [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker. [+] Fake error. (can be turned on). [+] Protection against draining on VirusTotal. [+] Random name of the worker. (can be turned on). [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits. [+] Support SSL/TLS. [+] Auto update miner via Tor. (actual for hard forks). [+] Removes other hidden miners. [+] Self-destruct installation file. v1.3.8 ADD: Support mining on NVIDIA: RTX 3060, 3070, 3080, 3090 AMD: RX 5600 A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. [Hidden Content] Scan Start.exe (Server) *Checks available today: 180 Summary result: 12/20 (from 1 object) Start: 2020-12-07 21:04 Duration: 23 sec. Link to scan result: [Hidden Content]
  8. itsMe

    Hidden Malware Builder V1.0

    Requirements: Net Framework 4 Features: 1- Hide server from Process 2- Hide server from startup 3- Hide server from scheduled tasks 4- Hide the server from the hard drive 5- Run as administrator permanently 6- Anti Virtual Machine 7- Kill Botnet Before Run 8- Change Assembly 9- Change Icon 10- Merging with another file with the AES algorithm [hide][Hidden Content]] Scan (Payload.exe) [Hidden Content]
  9. SubDomainizer SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascript present in the given URL. This tool also finds S3 buckets, cloudfront URL’s and more from those JS files which could be interesting like S3 bucket is open to read/write, or subdomain takeover and a similar case for cloudfront. It also scans inside the given folder which contains your files. Cloud Storage Services Supported: SubDomainizer can find URL for following cloud storage services: 1. Amazon AWS services (cloudfront and S3 buckets) 2. Digitalocean spaces 3. Microsoft Azure 4. Google Cloud Services 5. Dreamhost 6. RackCDN. Changelog v2.0 SANs Feature: Added a feature to find Subject Alternative Names for already found subdomains from different sources. Two options can be used with -san argument i.e. all or same. same will find only subdomains for TLD of the URL. all will find all (sub)domains having the same SAN for a given subdomain. Secret Location Feature: Added a feature to display the location of secrets. Inline in case if secret(s) found within the page (used in -u argument) URL of file in case if secret(s) found on External JS file or Github URL or File path (in case of the folder). [hide][Hidden Content]]
  10. lorsrf Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods. [hide][Hidden Content]]
  11. A simple script to generate a hidden url for social engineering. Legal disclaimer: Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  12. 61 downloads

    BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8

    $100.00 PRIV8

  13. View File BlackHatProTools Hidden Content Leak BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8 Submitter dEEpEst Submitted 17/05/20 Category Files Password ********  
  14. [Hidden Content]
  15. Introduction Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc. Hidden Eye Logo Disclaimer: Use this tool for educational purposes only. Hidden Eye: Advanced Phishing Tool [Android-Support-Available] As a modern phishing tool, Hidden Eye is very good at what it does. The perfect combination of all its functional components gives it an upper hand when attacking accounts. By using brute force attacks it can effectively access the user’s personal information. Hidden Eye can easily crack user passwords and can also collect other personal data belonging to the victim. Depending on the attack vector selected you can easily hack user accounts such as Facebook, Twitter, Instagram, Snapchat and many others. It can be used to carry out phishing on 30+ pages. The tool can also run on android devices through the UserLand app or Termux app. Features: Can perform live attacks (IP, geolocation, country, etc.) Captures victim’s keystrokes (using keylogger function) Serveo URL type selection (selects between RANDOM URL and CUSTOM URL) Numerous phishing pages (Facebook, Twitter, Instagram, Dropbox, Reddit, WordPress, Yahoo, and many more) Android support (Termux/UserLand) Supported Platforms: Linux (Tested on: Kali Linux, Parrot OS, Ubuntu, Arch Linux, Black Arch, OS X High Sierra, etc.) Android (Termux/UserLand) Prerequisites: This tool can’t be run effectively is some components are not in place, so make sure that you’ve installed the following: Python 3 sudo Wget from Python PHP [HIDE][Hidden Content]]
  16. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the Crimeflare.com database. Bruteforce scan over 2500 subdomains. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [HIDE][Hidden Content]]
  17. dEEpEst

    Hidden miner builder

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart, re-installation, if already working. [+] After infection, the assembly starts within a minute. [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it. [+] Autoload. [+] "Gluing". [+] Icon selection [+] Heavy mining can be selected: 50% 75% 100% [+] For nicehash and dwarfpool, always put a random name for the worker. [+] Fake error. (can be turned on) [+] Protection against draining on VirusTotal. [+] Random name of the worker. (can be turned on) [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits. [+] Support SSL/TLS [+] Auto update miner via Tor. (actual for hard forks) *dev donate 10% Download: [HIDE][Hidden Content]]
  18. Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  19. dEEpEst

    HiDDen PerSOn Crypter

    Scan: [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. dEEpEst

    Hidden TeamViewer

    It can do everything that he can complete teamviewer , only secretly. Based on version 4. Digital signatures are in place. Prescribed in autostart. ID comes in the mail. Mail and change the password to connect to TeamViewer.ini (email / tvpass) Download: [HIDE][Hidden Content]] Password: level23hacktools.com