Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'need'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 22 results

  1. OpenAI recently launched an investigation of the potential of its new version GPT-4. In the study you can see its potential for malicious purposes. OpenAI worked to restrict all those responses. For example: As you can see GPT-4 becomes macabre without the restrictions of OpenAI. You can download all the research at this link, it is not wasted.
  2. Need help on how to solve captcha with php. Please help me
  3. Everything You Need To Know About ChatGPT Who developed it? It is a variant of the GPT-3 language model, which OpenAI developed. GPT-3 is a large, powerful language model that was trained on a vast amount of text data, and ChatGPT is a variant of this model that is optimized for generating text in a conversational style. What does GPT in ChatGPT means? GPT stands for “Generative Pretrained Transformer.” It is a language model that uses deep learning techniques to generate human-like text. GPT models are trained on large amounts of text data and are able to generate text that is similar to the input they were trained on. What does it do? As a language model, ChatGPT is capable of generating text in a conversational style. This means that it can generate responses to user input in a way that sounds natural and human-like. What can I do with ChatGPT? As a variant of the GPT-3 language model, ChatGPT is particularly well-suited for generating text in a conversational style. This means that it can be used in chatbot applications, where it can respond to user queries or engage in conversations with users. Is ChatGPT free to use? Yes, all you need to do is sign up for an account with openai.com, sign in and then go to [Hidden Content] Limitation of ChatGPT As with any tool or technology, there are limitations to what ChatGPT can do. Because it is a language model, ChatGPT can only generate text based on a given input. It does not have the ability to browse the web, access external databases, or perform other tasks that require access to information outside of its trained data.
  4. hello friends, first I want to thank you for being part of the forum,I have here a serial generator made and protected by Enigma 6.xx,and I can't break this protection, I've tried to create a loader with the hwid enigma but I haven't been successful,could someone help me to do this please
  5. Ethical Hacking with KALI LINUX What you’ll learn Penetration Testing with KALI and More: All You Need to Know Course Learn simplified ethical hacking techniques from scratch Linux basics Learn more than 9 ways to perform LAN attacks Master 2 smart techniques to crack into wireless networks Perform an actual Mobile attack Learn 10+ web application attacks Learn more than 5 proven methods of Social Engineering attacks Obtain 20+ skills any penetration tester needs to succeed Make better decisions on how to protect your applications and network Upgrade your information security skills for a new job or career change Learn how to write a professional penetration testing report Requirements Intermediate computer knowledge Fair knowledge of Windows systems Networking basics Programming basics Web applications basics Mobile applications basics General idea about information security Description Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniques employed in a modern ubiquitous computing world and will take you from a beginner to a more advanced level. We will discuss various topics ranging from traditional to many modern ones, such as Networking security, Linux security, Web Applications structure and security, Mobile Applications architecture and security, Hardware security, and the hot topic of IoT security. At the end of the course, I will show you some real attacks. The layout of the course is easy to walk-through, and the videos are made short and engaging. My purpose is to present you with case exposition and show you live demos while utilizing a large set of KALI tools (Enumeration, Scanning, Exploitation, Persistence Access, Reporting, and Social Engineering tools) in order to get you started quickly. The necessary resources and tools are posted for each section of the course. Before jumping into penetration testing, you will first learn how to set up your own lab and install the needed software to practice Penetration Testing along with me. All the attacks explained in this course are launched against real devices, and nothing is theoretical. The course will demonstrate how to fully control victims’ devices such as servers, workstations, and mobile phones. The course can also be interesting to those looking for quick hacks such as controlling victim’s camera, screen, mobile contacts, emails, and SMS messages. At the end of the course, you will be equipped with the necessary tools and skills to: 1) Assess security risks by adopting a standard Threat Modeling technique 2) Adopt a structured approach to perform Penetration Tests 3) Protect yourself and the organization you work at 4) Compile security findings and present them professionally to your clients 5) Make the world a safer place You can as well enjoy the JUICY BONUS section at the end of the course, which shows you how to set up useful portable Pentest Hardware Tools that you can employ in your attacks. I will be happy to answer all your inquiries and connect with you. Join TODAY and enjoy life-time access. PS: The course is available in Arabic as well as Russian versions. Hack Ethically! Who this course is for: Anyone who wants to learn how to secure their systems from hacker Who wants to learn how hackers can attack their computer systems Anyone looking to become a penetration tester (From zero to hero) Computer Science, Computer Security, and Computer Engineering Students Content From: [Hidden Content] Ethical password hacking and protecting Course [Hidden Content] [hide][Hidden Content]]
  6. Hello Everyone. Now we have SPREE (Retail and Staff Management, Firebase Database Mobile POS) It's android application. I try to remove hosts but i get errors also in java code, So you can download code & Anyone need to share knowledge please leave comment. Download [Hidden Content]
  7. New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools. RottenPotatoDLL This project generates a DLL and EXE file. The DLL contains all the code necessary to perform the RottenPotato attack and get a handle to a privileged token. The MSFRottenPotatoTestHarness project simply shows example usage for the DLL. For more examples, see https://github.com/hatRiot/token-priv/tree/master/poptoke/poptoke, specifically the SeAssignPrimaryTokenPrivilege.cpp and SeImpersonatePrivilege.cpp files. RottenPotatoEXE This project is identical to the above, except the code is all wrapped into a single project/binary. This may be more useful for some penetration testing scenarios. Modify the "main" method in MSFRottenPotato.cpp to change what command will be run. By default it just runs cmd.exe to pop a command shell. [hide]https://github.com/breenmachine/RottenPotatoNG[/hide]
  8. php webshell Since I derped, and forgot to talk about usage. Here goes. For this shell to work, you need 2 things, a victim that allows php file upload(yourself, in an educational environment) and a way to send http requests to this webshell. [hide]https://github.com/oldkingcone/slopShell[/hide]
  9. Hello, I'm looking for an hacker or a dumper that got fresh and private dB for selling me mailist (leads). If you have French private database, please contact me on telegram : @labavette or PM
  10. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler html CSS Javascripts Internal Links External Links Images robots sitemaps Links inside Javascripts Links from Wayback Machine from Last 1 Year DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver crt.sh ThreatCrowd AnubisDB ThreatMiner Facebook Certificate Transparency API Auth Token is Required for this source, read Configuration below Traceroute Protocols UDP TCP ICMP Directory Searching Support for File Extensions Directories from Wayback Machine from Last 1 Year Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv [HIDE] https://github.com/thewhiteh4t/finalrecon DEMO: https://www.youtube.com/watch?v=10q_CKnM3x4 [/HIDE]
  11. Burp Extension features When you generate your plugin project, the generator will ask you what features should be included in your plugin. If you are familiarized with burp extension developing, the names of the features will be descritive enough, but, if you are new in burp extensions, here is a short description of what can be done with each feature. Extension Tab GUI Custom tab that will be added to Burp's UI. Normally is used to add some functionality (like logger++ extension) or just for enabling the user to config the extension. Context menu GUI Custom context menu will be added to Burp's UI nearly anywhere, by pressing right click. Burp allows to show context menus in any of this situations: Intruder attack results. Intruder payload positions editor. Request editor. Response editor. Non-editable request viewer. Non-editable response viewer. Proxy history. Scanner results. Search results window. Target site map table. Target site map tree. [HIDE]https://github.com/rsrdesarrollo/generator-burp-extension[/HIDE]
  12. Help remove the deobfuscation, most likely NetReactor 6, please. This is a free bot for Bitmex , but I would like to take a look at the strategy and learn for myself, I will be grateful. Download: https://yadi.sk/d/0Kc49w9JVEOHRQ
  13. Maby is a stupid question but i can't find the anwser . Do i need a network adapter to use backdoor on kali linux + vbox ????
  14. Just have a problem finding a way to post. Help pls
  15. [HIDE] [Wordlist] UserIndex=1 PassIndex=2 EmailIndex=0 EE925DE0E6D77F81C460D3DBB4B2D7D2=0 [Settings] SiteURL=https://api.goldenfrog.com/settings?BY=@Cr4cking Timeout=20 WaitBot=0 ResolveHost=0 ComboFilter=0 UsernameStart=6 UsernameEnd=8 PasswordStart=6 PasswordEnd=8 ComboMode=0 Letters=0 Digits=0 Alpha=0 Email=0 LowerUpper=0 LetterDigit=0 SpeciaChar=0 PasswordLetters=0 PasswordDigits=0 PasswordAlpha=0 PasswordEmail=0 PasswordLowerUpper=0 PasswordLetterDigit=0 PasswordSpeciaChar=0 EmailFilter=0 EmailMode=0 ProxyActivate=10 ProxyRatio=4 ProxyCombo=0 WaitTime=5 BanWindowWidth=1 BanWindowProxies=10 BanWindowRatio=10 blnNoProxies=1 RequestMethod=2 Referer=0 HTTPHeader=<ACTION> <FORM ACTION> <HTTP VERSION>|Accept: */*|User-Agent: VyprVPN Windows 2.9.6.7227 (DBBB5306)|Host: <HOST>|Pragma: no-cache|Connection: keep-alive|X-GF-PLATFORM: Windows|X-GF-PRODUCT: VyprVPN|X-GF-PLATFORM-VERSION: Windows v10.0 build(10586) X86|X-GF-PRODUCT-VERSION: 2.9.6.7227|locale: en| [Fake] AfterFP=0 FollowRedirect=0 EnableConHits=0 Success=3 ConHits=0 EnableConLength=0 SourceTags=1 ConLength=-1 blnSuccess=0 SuccessRetries=3 blnForbToOK=0 ForbToOkLength=1000 blnBadOcrCode=0 BadOcrCodeRetries=3 blnCompleteNot=1 HTTPFollow=1 blnProcessErrors=1 blnInvalidPath=1 UserField=0 [Form] IAParse=0 blnBasic=0 Action=https://api.goldenfrog.com/settings Username= Password= Email= CustomData= NoIndex= AddData= Cookie= IAction=-1 IUser=-1 IPass=-1 IEmail=-2 ICaptcha=-1 ReqReferer= ReqCookie= AjaxURL= AjaxPOSTData= AjaxData= AjaxParsingCode= RefData= ParsingCode= FormRedirectUrl= RedPostData= LoginPostData= RedKeys= DataDesc=Account_Level CaptureParsingCode=vel": "|"|#00|#00|0|{ | }|0 RefreshSession=0 RefreshCookie=0 IAMethod=2 POSTMethod=1 RedMethod=1 LoginMethod=1 AjaxHeader=0 FormHeader=0 RedHeader=0 LoginHeader=0 ImageAfterAjax=0 FollowRedirectsOnIA=0 FollowRedirectsOnRed=1 [Ajax] Variables=Contenttype||Login Page||None||Costant||Content-Type: application/json||None||None||Username||||-1||-1||0||0||0||0&&username||Login Page||None||Costant||\nusername: ||&||None||Username||||-1||-1||0||0||0||0&&password||Login Page||None||Costant||\npassword: ||&||None||Password||||-1||-1||0||0||0||0&&1||Login Page||None||Contenttype||||&||None||username||||0||1||0||0||0||0&&2||Login Page||None||1||||&||None||password||||3||2||0||0||0||0 PostElements2=None&&None&&None&&None&&None&&None&&None&&None&&None&&None&&2&&None&&None&&None&&None RedURL= [OCR] OCRMode=0 URLMode=0 ImageURLID=|| Captcha= OCRKey= RefreshCaptcha=0 blnContrast=0 blnBrightness=0 blnSaturation=0 blnThreshold=0 blnInvert=0 blnNoise=0 blnIsolate=0 blnResize=0 blnBorder=0 blnCharExtract=0 blnRemoveColors=0 blnStringFilter=0 blnLetter=1 blnDigits=1 blnBlur=0 blnReconstruct=0 blnLower=0 blnUpper=0 blnRemoveLines=0 blnMultiChar=0 blnPalette=0 blnCharResize=0 blnCharSubExtraction=0 blnGif=0 blnCompute=0 blnBorderPre=0 Contrast=0 Brightness=0 Saturation=0 Threshold=0 Noise=1 Isolate=1 Resize=2 BorderLeft=0 BorderTop=0 BorderRight=0 BorderBottom=0 CharExtractMinBlack=0 CharExtractMaxBlack=1 CharExtractMinWidth=1 CharRotateMax=0 CharRotateSteps=5 MinLength=1 MaxLength=10 BlurRadius=1 CharExtractMaxWidth=33 CharWidthMinBlack=2 CharSpace=1 Range=0 InvertDensity=0 InvertLength=20 LineCurvatureMax=4 LineWidthMax=13 CharResize=1 CharHeight=13 GifStart=2 GifOffset=2 BorderLeftPre=0 BorderTopPre=0 BorderRightPre=0 BorderBottomPre=0 CharBorderH=5 CharBorderV=5 CharRotateBorder=5 CharExtractMinHeight=1 VerticalRejoin=30 CharExclude= SpecialChars= Colors= Colors2= Lines=Min Length: 2, Max Width: 5, Horizzontal Language=eng [Keywords] HeaderFail= HeaderSuccess= HeaderBan= HeaderRetry= SourceFail=invalid username or password;<SCombo>||{"confirmed": true&&locked;<SCombo>||{"confirmed": true&&{"account_level": "Free";<GUser>||{"confirmed": false SourceSuccess={"account_level": "Basic&&<NOT>||locked;{"account_level": "Pro&&<NOT>||locked;{"account_level": "Premier&&<NOT>||locked;{"account_level": "Business"&&<NOT>||locked SourceBan= SourceRetry= EnableHeaderFail=0 EnableHeaderSuccess=0 EnableHeaderBan=0 EnableHeaderRetry=0 EnableSourceFail=1 EnableSourceSuccess=1 EnableSourceBan=0 EnableSourceRetry=0 EnableGlobalSourceRetry=1 [/HIDE]
  16. Is there a RAT removal tool that I can use to remove a RAT in my system??
  17. I found a template that i really keen on, but now I have a trouble with the search label page. For example, this is my url label search: https://gffall.blogspot.com/search/label/Games It shows 20 posts at page 1 but then if you click on page 2, it still shows 20 page as your previous click in page 1. Who can help me find the solution in source code to make it show the older posts in a search label page, please This is original demo: http://genesistemplate.blogspot.com This is download link of the template: https://drive.google.com/file/d/1Uhue_9OmKSHrbQYuZC5DzBr84jRfyySa/view?usp=sharing I hope staff members can accept my post 😞 Thanks you so much
  18. Hello everybody, I want to install a Possum Bot on a Discord Server, but it doesnt work. I used this tutorial. After i got the Link at Step 9, i cant select a Server. Does anybody have experience with a Possum Bot and can help me out A bot that will allow you to "hack" ANY discord server. # Features * `Get full control of the server.` * `Ban everyone in a matter of seconds.` * `More features coming soon!` # Commands * !myakish - to get admin perms. * !arturdebil - to ban everyone on the server. # Dependencies. * Node v10.13.0 or higher , you can get it [here](https://nodejs.org/en/download/) # Installation To install this bot follow these simple steps. 1. Download and un-zip the repo. 2. Install node.js you can get it [here.](https://nodejs.org/en/download/) 3. Open cmd or terminal if your using mac. 4. Type in `cd` and drag and drop the possumbot folder into the console. Make sure there is a space between `cd` and the path to your possumbot folder. 5. Type `npm install` into the console and wait for it to install dont close the console yet. If it doesnt work make sure you have node.js installed you can install it [here.](https://nodejs.org/en/download/) If it still doesnt work restart your console. 6. Open your browser and go to [discord.com/developers](https://discordapp.com/developers/applications/) And create a new application and customize it to your likings. You should see something like thcis. ![You should see something like this.](https://media.discordapp.net/attachments/508571077958434839/511258005937979392/2018-11-11_21.14.15.png) Navigate to the bot settings And copy the token. After you copied the token proceed to the next step. ![](https://cdn.discordapp.com/attachments/508571077958434839/511259113712517130/2018-11-11_21.21.00.png) 7. Open the possumbot folder and navigate to `botsettings.json` open it using a text editor like notepad for windows or textedit for mac. It should look like this ![](https://media.discordapp.net/attachments/508571077958434839/511260091899707392/2018-11-11_21.11.08.png) 8. Paste your token into the token field. Dont remove the "". 9. Open your console (You should already be in your possumbot folder). Type `node bot.js` into the console. The bot should now be activated. 10. A link will be generated in the console use it to invite the bot.
  19. Hello, im in need of an android bot like loki or exo but dont know where to get a good working clean one. If anyone can help me I would appreciate that
  20. Hi Guys, I have no experience in cracking at all but i have attempted to try this one with no luck, I believe it has a very secure registration system to crack . Are there any guys here kind enough to help and crack this for me ? In return i can offer my services as a penetration tester or coding in php html vb sql etc . Many Thanks Need SMSGadgetInstaller.msi
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.