Search the Community

Showing results for tags 'list'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 41 results

  1. Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  2. FREEDOM: TRISQUEL Trisquel, currently in version 8.0, was initiated by students from the University of Vigo in Spain who wanted to create an educational distribution that would support the Galician language. But the project soon exceeded this initial scope and became a totally free distribution with multilingual support. Trisquel was officially presented in April 2005 by Richard Stallman himself , and is now headed by FSF board member Rubén Rodríguez . It is based on Ubuntu 16.04 but version 9.0 is in progress and in fact it is looking for a nickname, which should be of Celtic origin. Use the GNOME 3 environment. I have selected Trisquel as the best free distro because of all those that are 100% free, it is the easiest to install and use. Just great. STABILITY: DEBIAN I do not know of any distribution that exceeds Debian in terms of stability. But it is also true for servers, since its strength is based on its stability and because it is the GNU / Linux distribution with the most extensive repositories. It is also very important the written support that exists on the network, being one of the oldest distros since it is the mother of Ubuntu, and therefore, has the merit of being, in truth, the basis of perhaps 90% of the existing distributions Debian is also called as the universal operating system, since it is compatible with virtually all architectures. Debian is a free operating system, since it comes without proprietary firmware and with a free kernel. The only requirement that does not meet to be sponsored by the FSF is because it brings non-free repositories. PRIVACY: TAILS Privacy is a strange concept today, but more and more important as technology weaves into our daily lives. It boils down to what you perceive as your threat model. If you are trying to be 100% anonymous on the Internet, for example, you will have to make a great effort to do so. If you want to prevent companies from creating a data profile about you and the steps you take on the web, then things are easier with a distribution focused on privacy. A good way to be more anonymous online is to use Tails. And Tails forgets things when you restart It is also based on Debian. EASE: MINT LINUX Mint Linux is unquestionably one of the most popular GNU / Linux desktop distributions. While Ubuntu is based on Debian, Linux Mint is based on Ubuntu. The question is why use an Ubuntu derivative or a Debian derivative instead of using the source itself. We don't know that, but it is true that Mint Linux beats Ubuntu in everything, including ease of use. Linux Mint makes Ubuntu better. And respect more the philosophy of free software by not including Amazon. Mint comes with three flavors: Cinnamon, MATE and XFCE. CUSTOMIZATION: ARCH LINUX In constant development since 2002, Arch Linux is not new. It has created, among them, me, a loyal following of users who love Arch's flexible approach, where minimalism and choice are the most important. No installation of Arch Linux is the same, and that is attractive to Arch users. It is not the most user-friendly GNU / Linux distribution, but if you really want to understand what a GNU / Linux distribution can do, Arch Linux could be for you. But you must take into account that it is installed without graphic help and you are installing software according to your need, so it is so customizable. Every day more distributions are based on Arch Linux. FORENSIC: KALI GNU / Linux is a strong platform within the area of forensic diagnosis. There are many distributions to choose from in this category, but I have chosen Kali. Kali is a GNU / Linux distribution derived from Debian designed for digital forensic analysis and penetration testing. It is maintained and funded by Offensive Security Ltd. The toolkit is very complete and it would be useful to have previous knowledge. Kali is made primarily for professionals who want to run penetration testing suits or people who want to learn ethical and digital forensic hacking. But you have to be careful. With a normal GNU / Linux system, there is an account for a normal user and a separate account for root. This is not the case in Kali Linux. Kali Linux uses the default root account and does not provide you with a normal user account. This is because almost all security tools available in Kali require root privileges, and to avoid asking you for the root password every minute, they designed it that way. LIGHTNESS: PUPPY LINUX Puppy is a super light distribution that will run completely inside the RAM on a given machine. This is incredibly useful if you need to perform tasks quickly. The entire system can be run from RAM with current versions that generally occupy about 210 MB, which allows you to remove the boot media after the operating system has started. It has variations built on Slackware and Ubuntu, but both have the same tools for the most part. Puppy is part of a unique family of GNU / Linux distributions intended for home users' computers. It was originally created by Barry Kauler in 2003.
  3. [Hidden Content]
  4. Below is a list of offshore and bulletproof hosting providers 2019 [Hidden Content]
  5. [HIDE][Hidden Content]]
  6. [Hidden Content]
  7. dEEpEst

    A list of darknet links

    A list of darknet links [Hidden Content]
  8. Remote Access Tool Trojan List - Android Github: [Hidden Content] This repo contents all RAT trojan android as I know so far (free or paid app) with permission and feature used list for my documentation. Looking for free port forwarding without buy VPN or Router setting?? Use Ngrok DroidJack [Hidden Content] Camera Storage SMS CALL Whatsapp Reader Contact Browser History App Manager GPS Location Microphone AndroRAT [Hidden Content] Get contacts (and all theirs informations) Get call logs Get all messages Location by GPS/Network Monitoring received messages in live Monitoring phone state in live (call received, call sent, call missed..) Take a picture from the camera Stream sound from microphone (or other sources..) Streaming video (for activity based client only) Do a toast Send a text message Give call Open an URL in the default browser Do vibrate the phone SpyNote Bind your server APK with any other Game or App. Explore Files with full access. Read/Write Messages. Make a call, record a call and browse call logs. Read and write contact list. Capture photos and videos. Listen live conversation through mic, record mic sound live. Check browser history. Get GPS Location. Check installed apps. Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER). Fun Panel (Show messages, shake the phone etc) AhMyth [Hidden Content] Camera Storage Microphone Location Contact Message Call Logs TheFatRAT [Hidden Content] execute command getuid process lost sysinfo record microphone camera snap, stream, list BetterAndroRAT [Hidden Content] Remote Update & Install Application Remote WebCam Remote Microphone Record Remote File Management Remote Call & SMS Remote Device Controller UnknownRAT Storage access Android Tools such, take photo, screenshot etc Record audio android_trojan / Android Trojan [Hidden Content] shell command upload file sms dump download restart location info record mic stream sync file clear and quit storage call log history contact OmniRAT Fully Remote Access Activity Information File Manager App Widgets Audio Information Battery Information Bluetooth Information Call Information Camera Information Configuration Information Connectivity Information Contacts Information, Device admin Information Display Information Installed Apps Information Location Information Memory Information APK Installer Call & SMS Surveillance and many more Android Voyage Remote Android Screen Screenshot Keylogger Traffic Monitor Make as system application Lock and unlock application Hide and unhide application Remove android password Message Access Bricks the device, Anti Antivirus Self Destructive Mode Password Grabbers NetWire camera audio keylogger storage download upload location etc rdroid [Hidden Content] Contact System App Storage Call Message Shell LokiDroid Call Contact Message Storage Location App KevDroid Installed applications Phone number Phone Unique ID Location (the application tries to switch on the GPS), this information is collected every 10 seconds, which is aggressive for this kind of spying tool Stored contacts information (name, phone numbers, emails, photos, etc.) Stored SMS Call logs Stored emails Photos Recording calls columbus-trojan [Hidden Content] (cute trojan) Image (front-facing camera) 10-second sound clip (microphone) Location (mobile triangulation) GhostCtrl Admin Voice record Message Location Pupy [Hidden Content] Text to speech for Android to say stuff out loud webcam snapshots (front cam & back cam) GPS tracker ! TeleRAT and IIRAT (Telegram BOT) Contact Clipboard App list Camera SMS Storage Control Admin Screen Microphone Vibrate Hidden Cobra Proxy Contact SMS Payload Dendroid [Hidden Content] Deleting call logs Opening web pages Dialing any number Recording calls SMS intercepting Uploading images and video Opening an application Performing denial-of-service attacks Changing the command and control server Casperspy [Hidden Content] Similar with dendroid Actually Botnet by dendroid SMS Camera Mic Storage Browser open page Joanap Mic botnet steal log SHConnect [Hidden Content] Camera Location Storage HighRise Incoming outgoing SMS LaRAT [Hidden Content] Get messages Screenshot Functionality Camera Access Add Google form for passwords Triout Framework Record phonecall, save it, send it to C&C SMS Logs Call Logs Steal Images or Video, Camera Access Hide Cerberusapp [Hidden Content] Storage Location Camera Admin notdeleteable more Pegasus Storage Mic Screenshot Calender Instant Messaging Contact & Call & SMS & Mail Browser History Device Setting Location Adobot [Hidden Content] Realtime command execution Schedule commands Hidden app icon (stealth mode) Fetch SMS in Fetch call logs Fetch contacts Send SMS command Forward received/sent SMS etc Adroid Spy App [Hidden Content] Contact Logs SMS Location Photos Etc SpyApp Client [Hidden Content] Notification Listener (Facebook, whatsapp, email, instagram etc) Call Logs Contact SMS Etc i-spy Android [Hidden Content] Camera Location Storage Etc FinSpy Storage Phone information Call Sms Mms Contact GPS Location Voip record such Skype, WeChat, Viber, LINE etc Monokle GPS location Audio record, call record Screen recording Keylogger and fingerprint-device duplicate History browser and Call log, SMS Email logs, create a Call and SMS Contact and calender Shell as root (rooted/rootable) Cerberus Banking Bots Bank and CC Logs information Mail logs SMS, Call (+Forward), Contact, GPS, Audio Monitoring all activity / logs Push to turnoff Play Protected (Disable) Download, Install, Remove Apps Lock device
  9. [Hidden Content]
  10. IPTV Adult 18+ M3u List XXX 27/07/2019 [hide][Hidden Content]]
  11. itsMe

    p.maker - PassWord List Maker

    This Application Make Password list using information from TARGET Example: First Name -> jan Last Name -> olson Age -> 22 Birthday -> 1999 Mom Name -> kara Dad Name -> mike Phone Number -> 09176314576 Friend -> mike City -> newyork Country -> usa Name Girl Freind -> luci Favorite Thing -> flower Favorite Sport -> soccer [Hidden Content]
  12. [Hidden Content]
  13. Sunberger

    [Mixing] Cryptocurrency List 2019

    Because I'm using mixing-services very often and my favorite mixer isnt existing anymore, im searching for a new mixer. Previous experience: Cryptomixer.io - not recommendable, because they twice didnt payed me out and the support isnt answering Bestmixer.io - unfortunately actually down Ledgermixer.com - only tested with 220€ so far, fast service, recieved everything, but still not knowing if its trusted Do you know otherwise bitcoin mixer? I thought I have to go safe, if not I will test it again and tell if everything worked well. Because my favorite currently is Ledgermixer because of the low fee and the nice infrastructure and because they also accepting other cryptocurrency coins.
  14. [Hidden Content]
  15. [Hidden Content]
  16. [Hidden Content]
  17. dEEpEst

    ONION LINK LIST

    [Hidden Content]
  18. [Hidden Content]
  19. Level23HackTool

    100K Combo List Email-Pass

    [Hidden Content]
  20. Level23HackTool

    210K Combo List Email-Pass

    [Hidden Content]
  21. [Hidden Content]
  22. [Hidden Content]
  23. MailCarrier version 2.51 POP3 LIST command remote SEH buffer overflow exploit. View the full article