Search the Community

Showing results for tags 'new'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 58 results

  1. GitHub just announced that its new code scanning feature, GitHub code scanning, is now generally available. The new feature of the developer platform that Microsoft bought in 2018 for 7.5 billion dollars can scan any public repository for vulnerabilities. The idea is to offer a native function within GitHub that can find vulnerabilities in the code of a repository before they reach production. If you have a public repo on GitHub, you can activate it from now on following the official documentation. Automated security as part of your workflow With the function active, the code will be revised as it is created, and areas that could be exploited in the future will be highlighted. At GitHub they hope that with this feature active they can catch bugs early to significantly reduce security incidents in the future. GitHub code scanning integrates with GitHub Actions or your existing CI / CD environment to maximize team flexibility. Scans code as it is created and displays actionable security reviews within pull requests and other GitHub experiences, all to automate security as part of your workflow. Before its launch, code scanning went through several months of testing. So far it has scanned 12,000 repositories 1.4 million times, and in total it has detected 20,000 security problems, from bugs that allowed remote code execution, through cross-site scripting, to SQL injection. During the tests the developers and those in charge of maintaining the repositories resolved 72% of the security flaws identified in their pull requests before merging after the first 30 days. This is important data since industry data shows that less than 30% of vulnerabilities are fixed within a month after being discovered. [Hidden Content]
  2. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. BlackArch Linux is an open-source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up to be used by security professionals for penetration testing tasks. ChangeLog 2020.06.01: added more than 150 new tools disabled iptables/ip6tables service remove unneeded virtualbox services (drag’n’drop, vmsvga-x11) replace wicd with wifi-radar (gui) and wifi-menu (curses -> netctl) updated blackarch-installer to v1.1.45 included linux kernel 5.6.14 QA’ed and fixed a lot of packages (runtime exec, missing dependencies) updated all vim plugins and improved vim config options updated all blackarch tools and packages including config files updated all system packages updated all window manager menus (awesome, fluxbox, openbox) [HIDE][Hidden Content]]
  3. [Hidden Content]
  4. [Hidden Content]
  5. Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations. reaver-wps-fork-t6x version 1.6b is a community forked version, which has included various bug fixes and additional attack method (the offline Pixie Dust attack). Depending on the target’s Access Point (AP), to recover the plaintext WPA/WPA2 passphrase the average amount of time for the transitional online brute force method is between 4-10 hours. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. When using the offline attack, if the AP is vulnerable, it may take only a matter of seconds to minutes. Changelog v1.6.6 several improvements have been made: improved bruteforce mode using .wpc save files. automatic pixiewps pin retrieval and live injection in current session if pin is cracked before the timeout happens, experimental uptime command line switch -u lots of bugfixes and improvements [HIDE][Hidden Content]]
  6. [Hidden Content]
  7. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  8. itsMe

    EpicChecker New API

    Updated EpicChecker with the new API and XSRF shit. [HIDE][Hidden Content]]
  9. dEEpEst

    Cool New Features in Python 3.8

    [Hidden Content]
  10. Video: [Hidden Content] Tools: [Hidden Content]
  11. This archive contains all of the 170 exploits added to Packet Storm in October, 2019. View the full article
  12. dEEpEst

    New SMS Receiver Sites

    [Hidden Content]
  13. This archive contains all of the 160 exploits added to Packet Storm in September, 2019. View the full article
  14. Online Spotify Checker | Web Based | Full Capture | HQ & Fast [ NEW ] [hide][Hidden Content]]
  15. This archive contains all of the 159 exploits added to Packet Storm in August, 2019. View the full article
  16. [Hidden Content]
  17. Spotify Checker By Xsphere | Faster & Proxyless | VT : [Hidden Content] Download : [Hidden Content] Youtube : [Hidden Content]
  18. Hey Guys, I'm new here and I'm looking for Neutrino 5.4/5.5 or latest . Also, SolarBot latest. Can anyone help:) Thanks in advance.
  19. This archive contains all of the 146 exploits added to Packet Storm in July, 2019. View the full article
  20. This archive contains all of the 110 exploits added to Packet Storm in June, 2019. View the full article
  21. What will be on the course: Understanding the secure configuration of the wireless router Arsenal necessary "Ethical WiFi hacker" Collecting a password from open sources Router security audit Hacking WEP encryption Hacking WPA encryption DoS attacks on access point Creating your own dictionaries for brutfors Online decryption services Evil Twin attacks on TD Much more! [HIDE][Hidden Content]]
  22. Just have a problem finding a way to post. Help pls
  23. [HIDE][Hidden Content]]
  24. F B I

    VPS X8 new

    [Hidden Content]