Search the Community

Showing results for tags 'media'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 15 results

  1. Dongyoung Media DM-AP240T/W wireless access point remote configuration disclosure exploit. View the full article
  2. Contains : Ninjagram, Massplanner, Jarvee, GMT2 and a simple automation tool on github LINK:-[Hidden Content]
  3. Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...) Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest. This script uses some webpages generated by SocialFish Tool ([Hidden Content]) Instagram webpage generated by An0nUD4Y (@its_udy) ([Hidden Content]) Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Pinterest +1 customizable Features: Port Forwarding using Ngrok or Serveo Legal disclaimer: Usage of Shellphish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  4. TitanicPoster, it’s a complete social sharing solution for Facebook, Twitter, Tumblr, Linkedin, Pinterest, Youtube, Reddit, Medium , Blogger and wordpress. It is a web-based app and fairly easy to use and easy to operate. You can manage all those social media from one place. Managing all social media for business purpose is a huge pain. So we made this to make your life easy. Demo: [Hidden Content] [HIDE][Hidden Content]]
  5. Join 200,000+ students in the bestselling digital marketing course on Udemy! With over 20 hours of training, quizzes and practical steps you can follow - this is one of the most comprehensive digital marketing courses available. We'll cover SEO, YouTube Marketing, Facebook Marketing, Google Adwords, Google Analytics and more! Learn By Doing The course is hugely interactive with projects, checklists & actionable lectures built into every section. Learn step by step how to market a business online from scratch across all the major marketing channels. Follow the steps on screen to get results at work, for own business or for your digital marketing clients. 12 Courses in 1 Covering 12 major online marketing topics and comprising of 20+ hours of clear cut lectures & practice activities - this course is "incredible value for money!" as one student said. We'll cover: Market Research. Ask 3 simple questions to validate your business idea. WordPress. Build a world-class website in 1 hour without any coding. Email Marketing. Build a mailing list of 1000 people in 30 days from scratch. Copywriting. Write sales pages that make the cash register ring! SEO (Search Engine Optimisation). Get free traffic to your website with SEO. YouTube Marketing. Drive traffic & sales with simple "how to" videos. Social Media Marketing (Instagram, Facebook, Twitter, Pinterest & Quora). Linkedin Marketing. Go viral on Linkedin and 400x your connections. App Marketing. Discover 43 Ways To Promote Your App. Google Adwords. Avoid common mistakes and set up profitable campaigns first time. Facebook Ads. Make money with Facebook Ads without spending a fortune. Google Analytics. Improve your marketing with Google Analytics data. By the end of this course, you will be confidently implementing marketing strategies across the major online marketing channels. All the strategies, tips and tools recommended are either free or very cost effective. You'll Also Get: ✔ Lifetime Access to course updates ✔ Fast & Friendly Support in the Q&A section ✔ Udemy Certificate of Completion Ready for Download Don't Delay! Every second you wait is costing you valuable leads and sales. Go ahead and hit the "take this course" button to start growing a business online today! Who is this course for? Pre launch business owners who don't know where to get started Website owners who are struggling to get traffic and sales Anyone looking to start a pick up highly paid freelancing skills [Hidden Content]
  6. Social Mapper A Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin (Greenwolf). Social Mapper is an Open Source Intelligence Tool that uses facial recognition to correlate social media profiles across different sites on a large scale. It takes an automated approach to search popular social media sites for targets' names and pictures to accurately detect and group a person’s presence, outputting the results into report that a human operator can quickly review. Social Mapper has a variety of uses in the security industry, for example the automated gathering of large amounts of social media profiles for use on targeted phishing campaigns. Facial recognition aids this process by removing false positives in the search results, so that reviewing this data is quicker for a human operator. Social Mapper supports the following social media platforms: LinkedIn Facebook Twitter Google Plus Instagram VKontakte Weibo Douban Social Mapper takes a variety of input types such as: An organisation's name, searching via LinkedIn A folder full of named images A CSV file with names and URL’s to images online Usecases (Why you want to run this) Social Mapper is primarily aimed at Penetration Testers and Red Teamers, who will use it to expand their target lists and find their social media profiles. From here what you do is only limited by your imagination, but here are a few ideas to get started: (Note: Social Mapper does not perform these attacks, it gathers you the data you need to perform them on a mass scale.) Create fake social media profiles to 'friend' the targets and send them links or malware. Recent statistics show social media users are more than twice as likely to click on links and open documents compared to those delivered via email. Trick users into disclosing their emails and phone numbers with vouchers and offers to make the pivot into phishing, vishing or smishing. Create custom phishing campaigns for each social media site, knowing that the target has an account. Make these more realistic by including their profile picture in the email. Capture the passwords for password reuse. View target photos looking for employee access card badges and familiarise yourself with building interiors. Getting Started These instructions will show you the requirements for and how to use Social Mapper. Prerequisites As this is a Python based tool, it should theoretically run on Linux, ChromeOS (Developer Mode) and macOS. The main requirements are Firefox, Selenium and Geckodriver. To install the tool and set it up follow these 4 steps: Install the latest version of Mozilla Firefox for macOS here: [Hidden Content] Or for Debian/Kali (but not required for Ubuntu) get the non-ESR version of Firefox with: sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade Make sure the new version of Firefox is in the path. If not manually add it. Install the Geckodriver for your operating system and make sure it's in your path, on Mac you can place it in /usr/local/bin, on ChromeOS you can place it in /usr/local/bin, and on Linux you can place it in /usr/bin. Download the latest version of Geckodriver here: [Hidden Content] Install the required libraries: On Linux install the following prerequisites: sudo apt-get install build-essential cmake sudo apt-get install libgtk-3-dev sudo apt-get install libboost-all-dev On Linux & macOS finish the install with: git clone [Hidden Content] cd social_mapper/setup python -m pip install --no-cache-dir -r requirements.txt On Mac look through the setup/setup-mac.txt file to view some additional xcode, brew and xquartz installation instructions. Provide Social Mapper with credentials to log into social media services: Open social_mapper.py and enter social media credentials into global variables at the top of the file For Facebook, make sure the language of the account which you have provided credentials for is set to 'English (US)' for the duration of the run. Using Social Mapper Social Mapper is run from the command-line using a mix of required and optional parameters. You can specify options such as input type and which sites to check alongside a number of other parameters which affect speed and accuracy. Required Parameters To start up the tool 4 parameters must be provided, an input format, the input file or folder and the basic running mode: -f, --format : Specify if the -i, --input is a 'name', 'csv', 'imagefolder' or 'socialmapper' resume file -i, --input : The company name, a CSV file, imagefolder or Social Mapper HTML file to feed into Social Mapper -m, --mode : 'fast' or 'accurate' allows you to choose to skip potential targets after a first likely match is found, in some cases potentially speeding up the program x20 Additionally at least one social media site to check must be selected by including one or more of the following: -a, --all : Selects all of the options below and checks every site that Social Mapper has credentials for -fb, --facebook : Check Facebook -tw, --twitter : Check Twitter -ig, --instagram : Check Instagram -li, --linkedin : Check LinkedIn -gp, --googleplus : Check Google Plus -vk, --vkontakte : Check VKontakte -wb, --weibo : Check Weibo -db, --douban : Check Douban Optional Parameters Additional optional parameters can also be set to add additional customisation to the way Social Mapper runs: -t, --threshold : Customises the facial recognition threshold for matches, this can be seen as the match accuracy. Default is 'standard', but can be set to 'loose', 'standard', 'strict' or 'superstrict'. For example 'loose' will find more matches, but some may be incorrect. While 'strict' may find less matches but also contain less false positives in the final report. -cid, --companyid : Additional parameter to add in a LinkedIn Company ID for if name searches are not picking the correct company. -s, --showbrowser : Makes the Firefox browser visible so you can see the searches performed. Useful for debugging. -v, --version : Display current version. -e, --email : Provide a fuzzy email format like "<f><last>@domain.com" to generate additional CSV files for each site with firstname, lastname, fullname, email, profileURL, photoURL. These can be fed into phishing frameworks such as Gophish or Lucy. Example Runs Here are a couple of example runs to get started for differing use cases: A quick run for Facebook and Twitter on some targets you have in an imagefolder, that you plan to manually review and don't mind some false positives: python social_mapper.py -f imagefolder -i ./mytargets -m fast -fb -tw An exhaustive run on a large company where false positives must be kept to a minimum: python social_mapper.py -f company -i "SpiderLabs" -m accurate -a -t strict A large run that needs to be split over multiple sessions due to time, the first run doing LinkedIn and Facebook, with the second resuming and filling in Twitter, Google Plus and Instagram: python social_mapper.py -f company -i "SpiderLabs" -m accurate -li -fb python social_mapper.py -f socialmapper -i ./SpiderLabs-social-mapper-linkedin-facebook.html -m accurate -tw -gp -ig A quick run (~5min) without facial recognition to generate a CSV full of names, email addresses, profiles and photo links from up to 1000 people pulled out of a LinkedIn company, where the email format is known to be "firstname.lastname": python social_mapper.py -f company -i "SpiderLabs" -m accurate -li -e "<first>.<last>@spiderlabs.com" Troubleshooting Social Media sites often change their page formats and class names, if Social Mapper isn't working for you on a specific site, check out the docssection for troubleshooting advice on how to fix it. Please feel free to submit a pull request with your fixes. Maltego For a guide to loading your Social Mapper results into Maltego, check out the docs section. Video: [Hidden Content] [Hidden Content]
  7. # FASTEST YOULIKEHITS CHECKER + 25K CPM + HTTP Proxies + Easy Setup + STABLE + Captures Points [Hidden Content]
  8. WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  9. [Hidden Content]
  10. Zortam MP3 Media Studio version 24.15 SEH local buffer overflow exploit. View the full article
  11. WordPress Media File Manager plugin version 1.4.2 suffers from a directory traversal vulnerability. View the full article
  12. Virgin Media Hub version 3.0 suffers from a denial of service vulnerability. View the full article
  13. Grapixel New Media version 2 suffers from a remote SQL injection vulnerability. View the full article
  14. This Metasploit module exploits a use-after-free vulnerability in VideoLAN VLC versions 2.2.8 and below. The vulnerability exists in the parsing of MKV files and affects both 32 bits and 64 bits. In order to exploit this, this module will generate two files: The first .mkv file contains the main vulnerability and heap spray, the second .mkv file is required in order to take the vulnerable code path and should be placed under the same directory as the .mkv file. This Metasploit module has been tested against VLC v2.2.8. Tested with payloads windows/exec, windows/x64/exec, windows/shell/reverse_tcp, windows/x64/shell/reverse_tcp. Meterpreter payloads if used can cause the application to crash instead. View the full article
  15. Zortam MP3 Media Studio version 23.95 suffers from a denial of service vulnerability. View the full article