Search the Community

Showing results for tags 'network'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 49 results

  1. itsMe

    x3 FOX Network

    [Hidden Content]
  2. Version

    0 downloads

    EC-Council - CND Certified Network Defender Total size: 10.96 GB

    $100.00 PRIV8

  3. View File EC-Council - CND Certified Network Defender [10.96 GB] EC-Council - CND Certified Network Defender Total size: 10.96 GB Submitter dEEpEst Submitted 15/10/19 Category Libro Online Password ********  
  4. Proxies: Yes Bots: 100/150 Email:Pass Capture: ACTIVE / Auto-renewal / payment-type Expired accounts = Custom [Hidden Content]
  5. WeDefend - Check Proccess and Network Activity to against Remote Access Trojan WeDefend is application based on java programming language with several features as check proccess activity, network activity, file encryption, disk hider and folder lock to against and also protect user data from Remote Access Trojan malware in Windows operating system. Video: [Hidden Content] Download: [Hidden Content]
  6. [lolix] Proxies: Yes Capture: Plan Type / Next Billing Bots: 100/150 Email:Pass [HIDE][Hidden Content]]
  7. Proxies: Yes Capture: Plan Type / Next Billing / Days Left / Auto-Renew Bots: 100/150 Email:Pass [HIDE][Hidden Content]]
  8. dEEpEst

    BIN WWE NETWORK

    [Hidden Content]
  9. Jok3r v3 Network & Web Pentest Automation Framework About Overview Jok3r is a framework that aids penetration testers for network infrastructure and web security assessments. Its goal is to automate as much stuff as possible in order to quickly identify and exploit "low-hanging fruits" and "quick win" vulnerabilities on most common TCP/UDP services and most common web technologies (servers, CMS, languages...). Combine Pentest Tools Do not re-invent the wheel. Combine the most useful hacking tools/scripts available out there from various sources, in an automatic way. Automate Attacks Automatically run security checks adapted to the targeted services. Reconnaissance, CVE lookup, vulnerability scanning, exploitation, bruteforce... Centralize Mission Data Store data related to targets in a local database. Keep track of all the results from security checks and continuously update the database. Features Key Features Pentest Toolbox Management Selection of Tools Compilation of 50+ open-source tools & scripts, from various sources. Docker-based Application packaged in a Docker image running Kali OS, available on Docker Hub. Ready-to-use All tools and dependencies installed, just pull the Docker image and run a fresh container. Updates made easy Easily keep the whole toolbox up-to-date by running only one command. Easy Customization Easily add/remove tools from a simple configuration file. Network Infrastructure Security Assessment Many supported Services Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.). Combine Power of Tools Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks. Context Awareness Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.). Reconnaissance Automatic fingerprinting (product detection) of targeted services is performed. CVE Lookup When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details). Vulnerability Scanning Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn). Brute-force Attack Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services. Post-authentication Testing Automatically perform some post-exploitation checks when valid credentials have been found. Web Security Assessment Large Focus on HTTP More than 60 different security checks targeting HTTP supported for now. Web Technologies Detection Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server. Server Exploitation Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.). CMS Vulnerability Scanning Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.). Local Database & Reporting Local Database Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings. Metasploit-like Interactive Shell Access the database through an interactive shell with several built-in commands. Import Targets from Nmap Add targets to a mission either manually or by loading Nmap results. Access all Results All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily. Reporting Generate full HTML reports with targets summary, web screenshots and all results from security testing. Architecture Framework Architecture General Architecture graph Flowchart Demo Demonstration Videos Download Get Jok3r Jok3r is open-source. Contributions, ideas and bug reports are welcome ! [Hide] [Hidden Content]]
  10. DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). View the full article
  11. Maby is a stupid question but i can't find the anwser . Do i need a network adapter to use backdoor on kali linux + vbox ????
  12. Link is a social network used to improve the collaboration, and communication between a groups of people. It allows them to interact, socialize, share and consume information, thoughts and ideas. In addition, it combines individuals into specific groups like a neighborhood subdivision. Link provides an opportunity for the community such as high school, universities, institutions, governments, non-government institution and others to engage. It also contains many features used to facilitate user interaction and collaboration. Some of these features include: posting, comment on the post, real-time chat session, voting, user profile, and focusing groups. Demo: [Hidden Content] [HIDE][Hidden Content]]
  13. Overview Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests. The goal is to save as much time as possible during network/web pentests by automating as many security tests as possible in order to quickly identify low-hanging fruits vulnerabilities, and then spend more time on more interesting and tricky stuff ! It is based upon the observation that there are many hacking open-source tools/scripts (from various sources) targeting common network services available out there, that allow to perform various tasks from fingerprinting to exploitation. Therefore, the idea of Jok3r is to combine those open-source tools in a smart way to get the more relevant results. Features Pentest Toolbox management Selection of Tools: Compilation of 50+ open-source tools & scripts, from various sources. Docker-based: Application packaged in a Docker image running Kali OS, available on Docker Hub. Ready-to-use: All tools and dependencies installed, just pull the Docker image and run a fresh container. Updates made easy: Easily keep the whole toolbox up-to-date by running only one command. Easy Customization: Easily add/remove tools from a simple configuration file. Network Infrastructure Security Assessment Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.). Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks. Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.). Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed. CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details). Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn). Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services. Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found. Web Security Assessment Large Focus on HTTP: More than 60 different security checks targeting HTTP supported for now. Web Technologies Detection: Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server. Server Exploitation: Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.). CMS Vulnerability Scanning: Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.). Local Database & Reporting Local Database: Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings. Metasploit-like Interactive Shell: Access the database through an interactive shell with several built-in commands. Import Targets from Nmap: Add targets to a mission either manually or by loading Nmap results. Access all Results: All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily. Reporting: Generate full HTML reports with targets summary, web screenshots and all results from security testing. [HIDE][Hidden Content]]
  14. Cisco Data Center Network Manager (DCNM) versions 11.1(1) and below suffer from authentication bypass, arbitrary file upload, arbitrary file download, and information disclosure vulnerabilities. View the full article
  15. PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. PivotSuite as a Server : If the compromised host is directly accessable (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on compromised machine and access the different subnet hosts from our pentest machine, Which was only accessable from compromised machine. PivotSuite as a Client : If the compromised host is behind a Firewall / NAT and isn't directly accessable from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessable from compromised machine. Key Features: Supported Forward & Reverse TCP Tunneling Supported Forward & Reverse socks5 Proxy Server UDP over TCP and TCP over TCP Protocol Supported Corporate Proxy Authentication (NTLM) Supported Inbuilt Network Enumeration Functionality, Eg. Host Discovery, Port Scanning, OS Command Execution PivotSuite allows to get access to different Compromised host and their network, simultaneously (Act as C&C Server) Single Pivoting, Double Pivoting and Multi-level pivoting can perform with help of PivotSuite. PivotSuite also works as SSH Dynamic Port Forwarding but in the Reverse Direction. Advantage Over Other tools: Doesn't required admin/root access on Compromised host PivotSuite also works when Compromised host is behind a Firewall / NAT, When Only Reverse Connection is allowed. No dependency other than python standard libraries. No Installation Required UDP Port is accessable over TCP [HIDE][Hidden Content]]
  16. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the Crimeflare.com database. Bruteforce scan over 2500 subdomains. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [HIDE][Hidden Content]]
  17. Email/User: Email/User Proxies: Yes/Proxyless works too Capture: Hit = Premium Recommended Bots: 200 [HIDE][Hidden Content]]
  18. Brocade Network Advisor version 14.4.1 unauthenticated remote code execution exploit. View the full article
  19. Emerson Network Power Liebert Challenger version 5.1E0.5 suffers from a cross site scripting vulnerability. View the full article
  20. [Hidden Content]
  21. Config: WWE Network Bots: 400-500 (if your pc can handle it.) P.S. USE VPN FOR PROXYLESS TO WORK (ExpressVPN works good, Zenmate = God level) Captures: Subscription, Next Billing Date Hit: WWE Network enabled, Trial if no capture data Custom: Free accs. (Completely reworked for HIGH CPM) CPM: on 200 bots: 1400~ [HIDE][Hidden Content]]
  22. Combo type: email:pass Proxies: yes Suggested bots: 50 Capture: Premium as hits, free as free (you may need my environment.ini, see below), captures next billing date. [HIDE][Hidden Content]]
  23. Introduction Airgeddon is a multi-use bash script for WiFi network security auditing on Linux systems. This multi-purpose WiFi hacking tool has very rich features which supports multiple methods for WiFi hacking including multiple WPS hacking modes, all-in-one WEP attack, handshake file capturing, Evil Twin attacks, Pixie Dust attacks, and so much more (see features below). Features: Monitor-managed: interface mode switcher. Multiple configurable options, multilang support, auto update, HTTP proxy auto detection for updates, and so much more. WPA/WPA2 personal networks Handshake file capturing. Cleaning and optimizing Handshake captured files Evil Twin attacks [Rogue AP]: Integrated sniffing, sslstrip2, BeEF with Hostapd + DHCP + DoS + Ettercap + Sslstrip + BeEF; WiFi password capturing through captive portal with DNS blackhole; optional MAC spoofing. WPS cracking: WPS scanning, Pixie Dust attacks, Brute-force PIN attacks [Bully, Reaver], WPS PINs attacks. WEP All-in-One attack: combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc. DoS over wireless networks using different methods [DOS Pursuit Mode]. Comptaibility: Many Linux distros, iptables/nftables. [HIDE][Hidden Content]]