Search the Community

Showing results for tags 'image'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 19 results

  1. Pixie is a photo editing & manipulation application. It is perfect for integration into other projects or personal and other use. Unlike other similar products it is built with html5 and jаvascript and not outdated technologies like flash. This makes Pixie future-proof, allows for much better performance and cross-device compatibility. [Hidden Content] [hide][Hidden Content]]
  2. BugBountyScanner A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information output. It’s recommended to run BugBountyScanner from a server (VPS or home server), and not from your terminal. It is programmed to be low on resources, with potentially multiple days of scanning in mind for bigger scopes. The script functions on a stand-alone basis. You can run the script either as a docker image or from your preferred Debian/Ubuntu system (see below). All that is required is kicking off the script and forgetting all about it! Running the script takes anywhere in between several minutes (for very small scopes < 10 subdomains) and several days (for very large scopes > 20000 subdomains). A ‘quick mode’ flag is present, which drops some time-consuming tasks such as vulnerability identification, port scanning, and web endpoint crawling. Features Resource-efficient, suitable for running in the background for a prolonged period of time on a low-resource VPS, home server, or Raspberry Pi Telegram status notifications with per-command results Extensive CVE and misconfiguration detection with Nuclei (optionally with detection of blind vulnerabilities via Burp Collaborator) Subdomain enumeration and live web server detection Web screenshotting and crawling, HTML screenshot report generation Retrieving (hopefully sensitive) endpoints from the Wayback Machine Identification of interesting parameterized URLs with Gf Enumeration of common “temporary” and forgotten files with GoBuster Automatic detection of LFI, SSTI, and Open Redirects in URL parameters Subdomain takeover detection Port scanning (Top 1000 TCP + SNMP) ‘Quick Mode’ for opsec-safe (ish) infrastructure reconnaissance Tools amass dnsutils Go gau Gf (with Gf-Patterns) GoBuster gospider httpx nmap Nuclei (with Nuclei-Templates) qsreplace subjack webscreenshot [hide][Hidden Content]]
  3. Introduction Pixload is an advanced set of tools that allows you to hide payloads within image files by either creating or injecting the intended payload into the desired image. Pixload: Image Payload Creating & Injecting Tools This set of tools has the ability to give you an access to some sophisticated hacking functions. Through it, you can create Polyglot files that can be used to sidestep the standard CSP security procedures by injecting the necessary attack scripts into a given image file. Polyglot files can be very effective when exploiting browsers such as Firefox, IE11, Edge, and Safari. One of the advantages of this type of exploit is that it can allow you to deploy attack files in the form of JavaScript or image files. The payloads which have been deployed can also be easily extracted without applying any external script during an attack. With Pixload you can also be able to exploit server-side misconfigurations by scripting malicious codes into the available system files.Through GD file manipulation PHP shells can be restructured in the form of PNG and IDAT chunks. Features: Bypassing CSP using polyglot JPEGs Encoding Web Shells in PNG IDAT chunks Hidden malvertising attacks (with Polyglot images) XSS payload revisiting (in PNG and IDAT chunks) XSS Facebook upload (Wonky and PNG content) [hide][Hidden Content]]
  4. Imager – Minimal Image Hosting Script is a PHP Script for creating an Image Hosting website. Let your users easily upload images to your server or Amazon S3 using a Drag and Drop interface. Users can create their profiles to keep track of their uploads using E-Mail or Social Login. Create custom pages, change website settings, ads, meta tags, scripts and manage all of the uploads using our powerful Administrator Panel. Earn money by Advertisements. The script also includes Modular Theme Support like WordPress which lets you create / edit themes very easily. The interface is completely responsive and modern, built with technologies like Bootstrap 4 & jQuery. [Hidden Content] [hide][Hidden Content]]
  5. Robin imagе optimizer Make your WordPress site blazingly fast and rank higher in search engines. [Hidden Content] [hide][Hidden Content]]
  6. PixelPhoto v1.4.1 - The Ultimate Image Sharing & Photo Social Network Platform PixelPhoto is a photo sharing script, PixelPhoto is the best way to start your own photo sharing website! PixelPhoto is fast, secured, and it will be regularly updated. [Hidden Content] [hide][Hidden Content]]
  7. Image Optimizer Automatically optimize any image uploaded to your forum. Compress your photos to save storage space and bandwidth and improve your website's load time. Image Optimizer supports,, jpegoptim, and pngquant. You will need to have an active subscription on to use with Image Optimizer. To use Pngquant and Jpegoptim with Image Optimizer you must install them on your server. General Features Optimize any image on your forum Optimize all images uploaded or optimize images via cron Support for,, Jpegoptim, Gifsicle, and Pngquant Support for user avatars, attachments (including the XenForo Media Gallery and other add-ons that use the attachment system) and proxied images View which images have been optimized, how much storage space was saved, and which provider was used in the status queue Pngquant Features with Image Optimizer Supports png image type Define minimum quality Define maximum quality Choose speed Gifsicle Features with Image Optimizer Supports gif image type Define lossiness factor Choose optimization mode Jpegoptim Features with Image Optimizer Supports jpeg image type Define maximum quality Choose whether or not to strip EXIF data Choose whether or not to strip IPTC data Features with Image Optimizer Supports gif, jpeg, and png image types Choose between lossless and lossy optimization types Preserve metadata for the image Features with Image Optimizer Supports gif, jpeg, png, and bmp image types Choose whether or not to preserve EXIF metadata [Hidden Content] [Hidden Content]
  8. Scripteen Image Upload script suffers from a shell upload vulnerability. View the full article
  9. [Hidden Content]
  10. Huawei eSpace version Meeting conference whiteboard functionality is vulnerable to a buffer overflow issue when inserting known image file formats. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. View the full article
  11. Joomla ARI Image Slider component version 2.2.0 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  12. A simple html program to take screenshots of websites or use it as a screenshot proxy for malicious URLs. Download: (Updated 03/03/2019) [Hidden Content] Virus Scan: [hide][Hidden Content]] Source code: <html> <title>Simple URL Image Proxy</title> <body bgcolor="black"> <center> <br> <h1><font color="white">Simple URL Image Proxy</font></h1> <br> <form action="[Hidden Content]?" target="frame"> <input type="hidden" name="key" value="4ba62b"> <input type="hidden" name="dimension" value="640x480"> <input type="hidden" name="device" value="desktop"> <input type="hidden" name="format" value="jpg"> <input type="hidden" name="cacheLimit" value="1"> <input type="hidden" name="delay" value="0"> <input type="text" name="url" value="" placeholder="ex: [Hidden Content]; <input type="submit" name="submit" value="Visit!"> </form> <iframe name="frame" frameborder="0" height="480" width="640"></iframe> </center> </body> </html>
  13. iffu03


    This only works if their Facebook Profile is public What does this do? In simple words you have at least one Image of the Person you are looking for and a clue about its name. You feed this program with it and it tries to find Instagram, Youtube, Facebook, Twitter Profiles of this Person. [HIDE][Hidden Content]]
  14. dEEpEst

    Hide Full Zip Within an Image 

    Hide Full Zip Within an Image No Software Needed [Hidden Content]
  15. CF Image Hosting Script version 1.6.5 suffers from a privilege escalation vulnerability. View the full article
  16. Joomla DJ Image Slider component version 3.2.3 suffers from a database disclosure vulnerability. View the full article
  17. kttyeman - CSS3 Image Hover Effects kttyeman is a big collection of CSS3 Image Hover Effects which are suitable for any kind of Website. kttyeman has framework style combinations and only contains CSS3 and HTML5. kttyeman are created with the more style advanced features. With kttyeman you can include any image hover effect into your page very easy.. Browser Compatibility kttyeman – CSS3 Image Hover Effects has been tested to work best with IE10+, latest versions of Mozilla Firefox, Google Chrome, Safari, Android and iOS mobile browsers. Support Demo : [Hidden Content] More Info : [Hidden Content] Download : [Hidden Content]
  18. GIU Gallery Image Upload version 0.3.1 suffers from a remote SQL injection vulnerability. View the full article
  19. jiNa OCR Image to Text version 1.0 denial of service proof of concept exploit. View the full article