Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'mass'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 16 results

  1. For automatically spreading your program on the filesharing sites that allow searching. For example... Ulozto, Chomikuj, Fayloobmennik, Filehostco, 4Shared and Torrents. [hide][Hidden Content]]
  2. Features : Token Utilities Avatar Changer Username Changer Hypesquad Changer Bio Changer Token Changer Invite joiner (Single/Multi modes) Guild Leaver Token Onliner Token Format Changer Token Checker Reaction Adder Server Checker Mass Messaging Mass DM Advertisement Single DM Spam DM on React Scraping Utilities Opcode 14 Scraper (Memberlist scraper) Opcode 8 Scraper (Bruteforce Scraper) Reaction Scraper Other Features Multiple Captcha APIs supported Supports token & email:pass:token formats Compatible with all major OS and Architectures Proxyless Supports HTTP(s), SOCKS5 and SOCKS4 proxies Free & Open source Emulates Discord's requests to a very high accuracy to prevent detection Highly Documented Multi-threaded using Light-weight Goroutines supporting thousands of concurrent accounts Can Receieve messages during mass DM Can ping user Can send embeds using 3rd Party APIs Supports multiple messages Discord Mass DM GO v1.9.1 Fixed proxyType not being detected Fixed not being able to specify emoji for DM on react Turned down Suspicion avoidance to 0 as people were getting confused about the speed Added option to set unlimited captcha retries on DMs Added feature to refund Hcaptcha from anti-captcha if solved incorrectly Made typing optional Ran gofmt Fixed token not being detected. [hide][Hidden Content]]
  3. massExploitConsole a collection of tools with a cli ui disclaimer Please use this tool only on authorized systems, I’m not responsible for any damage caused by users who ignore my warning I do not own the code of adapted exploits or tools exploits are adapted from other sources, please refer to their author info Please note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugs Feature an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) google page crawler with gecko and Firefox (not fully working) a simple Baidu crawler (multi-threaded) censys host scan Changelog v2.3.4 Bug Fixes get_version crashes when not in a git directory (3963dfd) MECROOT not found (e13011e) [hide][Hidden Content]]
  4. Silver is a front-end that allows complete utilization of (masscan,nmap) programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more. Features Resumable scanning Slack notifcations Multi-core utilization Supports: IPs, CIDR & hostnames Vulnerability data caching Shodan integration Dependencies nmap masscan Python libraries psutil requests [Hidden Content]
  5. Features - Add any SMTP - Mass mailer, send multiple emails per second - Add Single/List - Remove Single/List - Validate Email List - Ensure Emails Are Legit - Plain text/HTML - Add any attachment [hide][Hidden Content]] * Detected because its Obfuscated / itsMe
  6. Usage ! python3 -m pip install requests pyyhon3 cve-2021-41773.py urlist.txt pool Note ! results will be automatically saved in vuln.txt [hide][Hidden Content]]
  7. ★ Description: ● Engines: [Google apis cache] Bing Ask Yandex Sogou Exalead Shodan ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Mass Extern commands execution. ● Exploits and issues search. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress & Joomla sites. ● Wordpress theme and plugin detection. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Collect IPs ● Collect E-mails. ● Auto detect errors. ● Auto detect forms. ● Auto detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● IP Localisation ● Issues and Exploit search ● Interactive and Normal interface. ● And more... [hide][Hidden Content]]
  8. Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress and Joomla sites on the server. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Extract IPs ● Extract E-mails. ● Auto-detect errors. ● Auto-detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● And more… CHANGES: v17.0.1 – Fix bug extern process. [hide][Hidden Content]]
  9. [Hidden Content]
  10. AutoSploit As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to enter their platform-specific search query such as; Apache, IIS, etc, upon which a list of candidates will be retrieved. After this operation has been completed the ‘Exploit’ component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a ‘Hail Mary’ type of attack as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, localhost and local port for MSF facilitated back connections are configured through the dialog that comes up before the ‘Exploit’ component is started. Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. Version 4.0 released Implements the ability to use nmap from within the terminal function as a "local" system. Meaning that instead of having multiple tabs open to nmap and attack you can now nmap from within the shell and make your choice on what to target [HIDE][Hidden Content]]
  11. Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress and Joomla sites on the server. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Extract IPs ● Extract E-mails. ● Auto-detect errors. ● Auto-detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● And more… CHANGES: v17.0.0 – Engine fix. – Some scans fix. [HIDE][Hidden Content]]
  12. Am in need of good IP SMTP senders please can anyone including the administrator help me out with where i can get good IP SMTP senders? Your help will be appreciated. Thanks!
  13. As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. This release adds a number of features and bug fixes. Features New Terminal. Now also supports; Custom Commands Command History Native binary execution (/bin & /sbin) Host file backup support Options to renew or reset API tokens SRC [Hidden Content]
  14. AutoSploit As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. Changelog v3.0 Features New Terminal. Now also supports; Custom Commands Command Histor Native binary execution (/bin & /sbin) Host file backup support Options to renew or reset API tokens [HIDE][Hidden Content]]
  15. PHP Mass Mail version 1.0 suffers from a remote shell upload vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.