Search the Community

Showing results for tags 'machine'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 8 results

  1. BAMF (Backdoor Access Machine Farmer) DISCLAIMER: This project should be used for authorized testing and educational purposes only. BAMF is an open-source tool designed to leverage Shodan (a search engine for the Internet of Things) to discover vulnerable routers, then utilize detected backdoors/vulnerabilities to remotely access the router administration panel and modify the DNS server settings. Changing the primary DNS server of a router hijacks the domain name resolution process, enabling an attacker to target every device on the network simultaneously to spread malware with drive-by downloads and harvest credentials via malicious redirects to fraudulent phishing sites. Currently the only vulnerability detected and exploited is CVE-2013-6026, commonly known as Joel's Backdoor, a severe vulnerability allowing unauthenticated access to the administration panel of many routers made by D-Link, one of the world's largest manufacturers of routers for home and business. This project is still under development and will soon have a more modular design, making it easier for other developers to add detection & exploitation features for other vulnerabilities. Installation Download or clone the repository (git clone [Hidden Content]) Install the required Python packages (pip install -r bamf/requirements.txt) Create a free Shodan account at [Hidden Content] Configure BAMF to use your Shodan API key (python bamf.py [--shodan API]) Usage Use the search command to search the internet for potential Use the scan command to scan the target routers for backdoors Use the map command to map the networks of devices connected to vulnerable routers Use the pharm command to change the DNS settings of vulnerable routers Use the targets command to view potential targets discovered this session Use the backdoors command to view routers with a confirmed backdoor Use the devices command to view all devices connected to vulnerable routers To Do Contributors welcome!Feel free to issue pull-requests with any new features or improvements you have come up with! Look into using an online vulnerability database API to enable cross-referencing responses from the Shodan IoT search engine with signatures of backdoors/vulnerabilities Change to modular design to make it easier for other developers to add detection & exploitation features for other vulnerabilities Integrate BAMF into the BYOB framework as a distribution mechanism to maximize spreading potential Downoad: [Hidden Content]
  2. Digishock 2.0: Machine Learning for Beginners (No Coding) The ultimate machine learning course of 2019 This mind-blowing course takes the huge leap from Digishock 1.0 and is for anyone who want to get introduced with Machine Learning and Deep Learning without learning code. This practical hands-on course involves hands-on exercises with numerous tricks and techniques of analytics, advanced predictive concepts to work on to ensure that all are familiarized with the discipline of machine-learning, deep-learning, big data, analytics etc. The USP of the course is that there is no kind of technical knowledge required whatsoever for students who will participate in this course. Enroll now in this mind-blowing machine learning course and be amazed by the technology taught. Who is this course for? Beginners or newbies who are curious about Data Science and machine learning Anyone who has an interest or wants to explore new technologies in machine learning without code Digital Marketers who want to enter into a new field in Machine Learning [Hidden Content]
  3. Machine Learning – A-Z™ Full Course Interested in the field of Machine Learning? Then this course is for you! As, AI and machine learning have the potential to create an additional $2.6T in value by 2020 in Marketing and Sales, and up to $2T in manufacturing and supply chain planning. Gartner predicts the business value created by AI will reach $3.9T in 2022. IDC predicts worldwide spending on cognitive and Artificial Intelligence systems will reach $77.6B in 2022. 23% of North American enterprises have machine learning embedded in at least one company function as of last year.19% of enterprises in developing markets including China and 21% in Europe also have successfully integrated machine learning into functions. The graph below shows the results of a McKinsey & Company survey of 2,135 enterprise senior executive respondents. The graph displays the percent of respondents whose organizations have embedded AI capabilities in at least one function or business unit. Respondents can select multiple AI capabilities Scopes of Machine Learning The machine learning technology is used in most banking and finance industry because the proper implication of technology can give the outstanding result and significant improvement can be seen in terms of replacing legacy system and developed enterprise. The machine learning technology helped the banking & Finance sector in taking company’s decision making, improving customer experience, increasing the backend and frontend staff efficiency. Improved customer services Improved customer services Investment Predictions Fraud Preventions Personalized Digital Assistant Marketing Network Security Projects In this course You will get projects with source code , so it will be more understandable and rich for learning. Like speech and face recognition, Bluex and many more. What materials you will get int this course? You will Get MIT press Notes on Machine learning and yes some of E- Books So Hurry ! Get this course and Get in the Field of Machine Learning. Quiz and Interview question will updated soon. ¿Para quién es este curso? Anyone interested in Machine Learning. Any people who are not that comfortable with coding but who are interested in Machine Learning and want to apply it easily on datasets. Software developers or programmers who want to transition into the lucrative data science and machine learning career path will learn a lot from this course. Including business leaders, managers, app developers, consumers - you! Udemy Link - [Hidden Content] Download - [Hidden Content]
  4. 5 Books Of Machine Learning Mastery! Topics You Learn: • Deep learning with python • Machine learning mastery with python • Machine learning mastery with r • Machine learning mastery with weka • Master machine learning algorithms • Basics for Linear Algebra for Machine Learning 2018 • Introduction to time series forecasting with Python • Deep learning for nlp • XGboost_with_python • Deep learning with python [Hidden Content]
  5. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content] Virus Scan [Hidden Content]
  6. The Hacker Machine 2 is a search engines for hackers and crackers to search for software, references or common hacker/cracker questions. Download [Hidden Content]_(Updated_20-01-2019).zip Virus Scan [Hidden Content]
  7. Twilio WEB To Fax Machine System Application version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  8. InTouch Machine Edition version 8.1 SP1 Nombre del Tag SEH buffer overflow exploit. View the full article