Jump to content

Search the Community

Showing results for tags 'list'.

The search index is currently processing. Current results may not be complete.
  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

  1. OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited. NOTE: Facebook changes the markup of it's pages regularly, so the script might break from time to time. Please open an issue if something doesn't work and I'll take a look at it. Pull requests are welcome as well. TODO: Make script check for followers if friend list isn't public. Add more error handling. Add proxy rotation. [hide][Hidden Content]]
  2. List of Decompilers • JVM-based languages • Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully. • JD-GUI • procyon ◦ Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained. • JAD - JAD Java Decompiler (closed-source, unmaintained) • JADX - a decompiler for Android apps. Not related to JAD. • .net-based languages ◦ dotPeek - a free-of-charge .NET decompiler from JetBrains ◦ ILSpy - an open-source .NET assembly browser and decompiler ◦ dnSpy - .NET assembly editor, decompiler, and debugger Native code ◦ Hopper - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables. ◦ cutter - a decompiler based on radare2. ◦ retdec ◦ snowman ◦ Hex-Rays Python ◦ uncompyle6 - decompiler for the over 20 releases and 20 years of CPython.
  3. [Hidden Content] [Hidden Content]
  4. Unified List Manager (ULM) is a feature rich Windows utility which excels dealing with word lists. While ULM may not be 'fast', it has a very user friendly interface and gets the job done. Some examples include list; sorting, splitting, joining, analysis, generating, slicing, hashing, converting and reformatting to name a few. [hide][Hidden Content]]
  5. VPS stands for virtual private server which definitely means having the independency of managing the entire resource of the server with no partner. It is virtually administered. The management aspect means a customer has total and absolute control of the private server and is able to do whatever he or she wants to do. It differs from shared server that you have to follow what the server consists of and what recourses it contains rather than the settings that may not be convenient for some customers’ applications, or does not have the functional ability to run their programs. Here we have the VPS password list generator for you that you can use to make password list in order to brute servers through RDP. Copy to clipboard Load/Save As Files 3 Part Inputs Remove Duplicate Passwords Change Characters To Symbols Easy to use Very quick No lag [hide][Hidden Content]]
  6. Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project. [hide][Hidden Content]]
  7. Lists of .NET Deobfuscator and Unpacker (Open Source) [HIDE][Hidden Content]]
  8. Words Scraper Selenium based web scraper to generate passwords list. [HIDE][Hidden Content]]
  9. A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests Every section contains the following files, you can use the _template_vuln folder to create a new chapter: README.md - vulnerability description and how to exploit it Intruder - a set of files to give to Burp Intruder Images - pictures for the README.md Files - some files referenced in the README.md You might also like the Methodology and Resources folder : Methodology and Resources Active Directory Attack.md Cloud - AWS Pentest.md Cloud - Azure Pentest.md Cobalt Strike - Cheatsheet.md Linux - Persistence.md Linux - Privilege Escalation.md Metasploit - Cheatsheet.md Methodology and enumeration.md Network Pivoting Techniques.md Network Discovery.md Reverse Shell Cheatsheet.md Subdomains Enumeration.md Windows - Download and Execute.md Windows - Mimikatz.md Windows - Persistence.md Windows - Post Exploitation Koadic.md Windows - Privilege Escalation.md Windows - Using credentials.md CVE Exploits [HIDE][Hidden Content]]
  10. From Wikipedia, the free encyclopedia This article is a list of unsolved problems in computer science. A problem in computer science is considered unsolved when no solution is known, or when experts in the field disagree about proposed solutions. Contents 1 Computational complexity 2 Polynomial versus non-polynomial time for specific algorithmic problems 3 Other algorithmic problems 4 Natural Language Processing algorithms 5 Programming language theory 6 Other problems 7 References 8 External links Computational complexity Main article: Computational complexity theory P versus NP problem What is the relationship between BQP and NP? NC = P problem NP = co-NP problem P = BPP problem P = PSPACE problem L = NL problem PH = PSPACE problem L = P problem L = RL problem Unique games conjecture Is the exponential time hypothesis true? Is the strong exponential time hypothesis (SETH) true? Do one-way functions exist? Is public-key cryptography possible? Log-rank conjecture Polynomial versus non-polynomial time for specific algorithmic problems Main article: NP-intermediate Can integer factorization be done in polynomial time on a classical (non-quantum) computer? Can clustered planar drawings be found in polynomial time? Can the discrete logarithm be computed in polynomial time? Can the graph isomorphism problem be solved in polynomial time? Can leaf powers and k-leaf powers be recognized in polynomial time? Can parity games be solved in polynomial time? Can the rotation distance between two binary trees be computed in polynomial time? Can graphs of bounded clique-width be recognized in polynomial time?[1] Can one find a simple closed quasigeodesic on a convex polyhedron in polynomial time?[2] Can a simultaneous embedding with fixed edges for two given graphs be found in polynomial time?[3] Other algorithmic problems The dynamic optimality conjecture: do splay trees have a bounded competitive ratio? Is there a k-competitive online algorithm for the k-server problem? Can a depth-first search tree be constructed in NC? Can the fast Fourier transform be computed in o(n log n) time? What is the fastest algorithm for multiplication of two n-digit numbers? What is the lowest possible average-case time complexity of Shellsort with a deterministic, fixed gap sequence? Can 3SUM be solved in strongly sub-quadratic time, that is, in time O(n2−ϵ) for some ϵ>0? Can the edit distance between two strings of length n be computed in strongly sub-quadratic time? (This is only possible if the strong exponential time hypothesis is false.) Can X + Y sorting be done in o(n2 log n) time? What is the fastest algorithm for matrix multiplication? Can all-pairs shortest paths be computed in strongly sub-cubic time, that is, in time O(V3−ϵ) for some ϵ>0? Can the Schwartz–Zippel lemma for polynomial identity testing be derandomized? Does linear programming admit a strongly polynomial-time algorithm? (This is problem #9 in Smale's list of problems.) How many queries are required for envy-free cake-cutting? What is the algorithm for the lookup table that consistently generates playable mazes in the 1982 Atari 2600 game Entombed merely from the values of the five pixels adjacent to the next ones to be generated?
  11. SQL Injection In this section, we'll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. [HIDE][Hidden Content]]
  12. Bɪɢ ʟɪsᴛ ᴏғ Wɪғɪ ᴛᴏᴏʟs ᴡɪғɪ ᴀʀsᴇɴᴀʟ ɪs ᴀ ᴘᴀᴄᴋ ᴏғ ᴠᴀʀɪᴏᴜs ᴜsᴇғᴜʟʟ/ᴜsᴇʟᴇss ᴛᴏᴏʟs ғᴏʀ 802.11 ʜᴀᴄᴋɪɴɢ [Hidden Content]
  13. Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  14. FREEDOM: TRISQUEL Trisquel, currently in version 8.0, was initiated by students from the University of Vigo in Spain who wanted to create an educational distribution that would support the Galician language. But the project soon exceeded this initial scope and became a totally free distribution with multilingual support. Trisquel was officially presented in April 2005 by Richard Stallman himself , and is now headed by FSF board member Rubén Rodríguez . It is based on Ubuntu 16.04 but version 9.0 is in progress and in fact it is looking for a nickname, which should be of Celtic origin. Use the GNOME 3 environment. I have selected Trisquel as the best free distro because of all those that are 100% free, it is the easiest to install and use. Just great. STABILITY: DEBIAN I do not know of any distribution that exceeds Debian in terms of stability. But it is also true for servers, since its strength is based on its stability and because it is the GNU / Linux distribution with the most extensive repositories. It is also very important the written support that exists on the network, being one of the oldest distros since it is the mother of Ubuntu, and therefore, has the merit of being, in truth, the basis of perhaps 90% of the existing distributions Debian is also called as the universal operating system, since it is compatible with virtually all architectures. Debian is a free operating system, since it comes without proprietary firmware and with a free kernel. The only requirement that does not meet to be sponsored by the FSF is because it brings non-free repositories. PRIVACY: TAILS Privacy is a strange concept today, but more and more important as technology weaves into our daily lives. It boils down to what you perceive as your threat model. If you are trying to be 100% anonymous on the Internet, for example, you will have to make a great effort to do so. If you want to prevent companies from creating a data profile about you and the steps you take on the web, then things are easier with a distribution focused on privacy. A good way to be more anonymous online is to use Tails. And Tails forgets things when you restart It is also based on Debian. EASE: MINT LINUX Mint Linux is unquestionably one of the most popular GNU / Linux desktop distributions. While Ubuntu is based on Debian, Linux Mint is based on Ubuntu. The question is why use an Ubuntu derivative or a Debian derivative instead of using the source itself. We don't know that, but it is true that Mint Linux beats Ubuntu in everything, including ease of use. Linux Mint makes Ubuntu better. And respect more the philosophy of free software by not including Amazon. Mint comes with three flavors: Cinnamon, MATE and XFCE. CUSTOMIZATION: ARCH LINUX In constant development since 2002, Arch Linux is not new. It has created, among them, me, a loyal following of users who love Arch's flexible approach, where minimalism and choice are the most important. No installation of Arch Linux is the same, and that is attractive to Arch users. It is not the most user-friendly GNU / Linux distribution, but if you really want to understand what a GNU / Linux distribution can do, Arch Linux could be for you. But you must take into account that it is installed without graphic help and you are installing software according to your need, so it is so customizable. Every day more distributions are based on Arch Linux. FORENSIC: KALI GNU / Linux is a strong platform within the area of forensic diagnosis. There are many distributions to choose from in this category, but I have chosen Kali. Kali is a GNU / Linux distribution derived from Debian designed for digital forensic analysis and penetration testing. It is maintained and funded by Offensive Security Ltd. The toolkit is very complete and it would be useful to have previous knowledge. Kali is made primarily for professionals who want to run penetration testing suits or people who want to learn ethical and digital forensic hacking. But you have to be careful. With a normal GNU / Linux system, there is an account for a normal user and a separate account for root. This is not the case in Kali Linux. Kali Linux uses the default root account and does not provide you with a normal user account. This is because almost all security tools available in Kali require root privileges, and to avoid asking you for the root password every minute, they designed it that way. LIGHTNESS: PUPPY LINUX Puppy is a super light distribution that will run completely inside the RAM on a given machine. This is incredibly useful if you need to perform tasks quickly. The entire system can be run from RAM with current versions that generally occupy about 210 MB, which allows you to remove the boot media after the operating system has started. It has variations built on Slackware and Ubuntu, but both have the same tools for the most part. Puppy is part of a unique family of GNU / Linux distributions intended for home users' computers. It was originally created by Barry Kauler in 2003.
  15. Below is a list of offshore and bulletproof hosting providers 2019 [Hidden Content]
  16. A list of darknet links [Hidden Content]
  17. Remote Access Tool Trojan List - Android Github: [Hidden Content] This repo contents all RAT trojan android as I know so far (free or paid app) with permission and feature used list for my documentation. Looking for free port forwarding without buy VPN or Router setting?? Use Ngrok DroidJack [Hidden Content] Camera Storage SMS CALL Whatsapp Reader Contact Browser History App Manager GPS Location Microphone AndroRAT [Hidden Content] Get contacts (and all theirs informations) Get call logs Get all messages Location by GPS/Network Monitoring received messages in live Monitoring phone state in live (call received, call sent, call missed..) Take a picture from the camera Stream sound from microphone (or other sources..) Streaming video (for activity based client only) Do a toast Send a text message Give call Open an URL in the default browser Do vibrate the phone SpyNote Bind your server APK with any other Game or App. Explore Files with full access. Read/Write Messages. Make a call, record a call and browse call logs. Read and write contact list. Capture photos and videos. Listen live conversation through mic, record mic sound live. Check browser history. Get GPS Location. Check installed apps. Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER). Fun Panel (Show messages, shake the phone etc) AhMyth [Hidden Content] Camera Storage Microphone Location Contact Message Call Logs TheFatRAT [Hidden Content] execute command getuid process lost sysinfo record microphone camera snap, stream, list BetterAndroRAT [Hidden Content] Remote Update & Install Application Remote WebCam Remote Microphone Record Remote File Management Remote Call & SMS Remote Device Controller UnknownRAT Storage access Android Tools such, take photo, screenshot etc Record audio android_trojan / Android Trojan [Hidden Content] shell command upload file sms dump download restart location info record mic stream sync file clear and quit storage call log history contact OmniRAT Fully Remote Access Activity Information File Manager App Widgets Audio Information Battery Information Bluetooth Information Call Information Camera Information Configuration Information Connectivity Information Contacts Information, Device admin Information Display Information Installed Apps Information Location Information Memory Information APK Installer Call & SMS Surveillance and many more Android Voyage Remote Android Screen Screenshot Keylogger Traffic Monitor Make as system application Lock and unlock application Hide and unhide application Remove android password Message Access Bricks the device, Anti Antivirus Self Destructive Mode Password Grabbers NetWire camera audio keylogger storage download upload location etc rdroid [Hidden Content] Contact System App Storage Call Message Shell LokiDroid Call Contact Message Storage Location App KevDroid Installed applications Phone number Phone Unique ID Location (the application tries to switch on the GPS), this information is collected every 10 seconds, which is aggressive for this kind of spying tool Stored contacts information (name, phone numbers, emails, photos, etc.) Stored SMS Call logs Stored emails Photos Recording calls columbus-trojan [Hidden Content] (cute trojan) Image (front-facing camera) 10-second sound clip (microphone) Location (mobile triangulation) GhostCtrl Admin Voice record Message Location Pupy [Hidden Content] Text to speech for Android to say stuff out loud webcam snapshots (front cam & back cam) GPS tracker ! TeleRAT and IIRAT (Telegram BOT) Contact Clipboard App list Camera SMS Storage Control Admin Screen Microphone Vibrate Hidden Cobra Proxy Contact SMS Payload Dendroid [Hidden Content] Deleting call logs Opening web pages Dialing any number Recording calls SMS intercepting Uploading images and video Opening an application Performing denial-of-service attacks Changing the command and control server Casperspy [Hidden Content] Similar with dendroid Actually Botnet by dendroid SMS Camera Mic Storage Browser open page Joanap Mic botnet steal log SHConnect [Hidden Content] Camera Location Storage HighRise Incoming outgoing SMS LaRAT [Hidden Content] Get messages Screenshot Functionality Camera Access Add Google form for passwords Triout Framework Record phonecall, save it, send it to C&C SMS Logs Call Logs Steal Images or Video, Camera Access Hide Cerberusapp [Hidden Content] Storage Location Camera Admin notdeleteable more Pegasus Storage Mic Screenshot Calender Instant Messaging Contact & Call & SMS & Mail Browser History Device Setting Location Adobot [Hidden Content] Realtime command execution Schedule commands Hidden app icon (stealth mode) Fetch SMS in Fetch call logs Fetch contacts Send SMS command Forward received/sent SMS etc Adroid Spy App [Hidden Content] Contact Logs SMS Location Photos Etc SpyApp Client [Hidden Content] Notification Listener (Facebook, whatsapp, email, instagram etc) Call Logs Contact SMS Etc i-spy Android [Hidden Content] Camera Location Storage Etc FinSpy Storage Phone information Call Sms Mms Contact GPS Location Voip record such Skype, WeChat, Viber, LINE etc Monokle GPS location Audio record, call record Screen recording Keylogger and fingerprint-device duplicate History browser and Call log, SMS Email logs, create a Call and SMS Contact and calender Shell as root (rooted/rootable) Cerberus Banking Bots Bank and CC Logs information Mail logs SMS, Call (+Forward), Contact, GPS, Audio Monitoring all activity / logs Push to turnoff Play Protected (Disable) Download, Install, Remove Apps Lock device
  18. Because I'm using mixing-services very often and my favorite mixer isnt existing anymore, im searching for a new mixer. Previous experience: Cryptomixer.io - not recommendable, because they twice didnt payed me out and the support isnt answering Bestmixer.io - unfortunately actually down Ledgermixer.com - only tested with 220€ so far, fast service, recieved everything, but still not knowing if its trusted Do you know otherwise bitcoin mixer? I thought I have to go safe, if not I will test it again and tell if everything worked well. Because my favorite currently is Ledgermixer because of the low fee and the nice infrastructure and because they also accepting other cryptocurrency coins.
  19. [Hidden Content]
  20. MailCarrier version 2.51 POP3 LIST command remote SEH buffer overflow exploit. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.