Jump to content

Search the Community

Showing results for tags 'new'.

The search index is currently processing. Current results may not be complete.
  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

  1. KaOS 2021.08 Download .iso, Updated with a New Look, The August edition of the KDE-focused rolling release distribution KaOS has a different look. The Midna theme has been revised, it now offers a uniform look for SDDM and lockscreen with a darker transparent sidebar, a cleaner splash screen and a darker logout look. Furthermore, the main menu has been changed from the cascading menu used previously to the Application Launcher, which was new with Plasma 5.22. KaOS 2021.08 Current plasma desktop The current version of KDE Plasma is the only desktop offered by KaOS. For KaOS 2021.08, this means Plasma 5.22.4, KDE Gear 21.08 and Frameworks 5.85.0. The packages are built from scratch at KaOS, since KaOS is not based on any other distribution. Arch Linux only takes over the package manager. The packages for KaOS 2021.08 were built with Qt 5.15.2+, although Qt 5.15 no longer receives updates from the manufacturer Qt-Company. The fact that KaOS can still use newer versions is thanks to the initiative of KDE, who, together with Qt Company, created a patch set to enable KDE to transition smoothly to Qt 6. [Hidden Content] KaOS-2021.08-x86_64.iso (2,573MB) [hide][Hidden Content]]
  2. Cybersecurity researchers from Bitdefender discovered a new malware, “MosaicLoader,” which is targeting users looking online for pirated software. Adversaries often target users with various phishing tactics. But sometimes, unwitting users fall into a hacker’s trap, revealing their private data to attackers. Cybersecurity researchers from Bitdefender recently identified a new malware variant that targets users who are looking online for pirated software. Tracked as MosaicLoader, the malware is distributed via paid advertisements in search results, specially crafted to trick users into clicking the malicious ads link and infect their devices. Once deployed on the system, MosaicLoader creates a complex chain of processes and automatically downloads additional payloads like cookie stealers, crypto-currency miners, and backdoors like Glupteba. Glupteba is a malware Trojan with advanced features that could turn the infected system into a remotely controlled bot and steal personal information. MosaicLoader’s Infection Flow Initially, the MosaicLoader malware adds local exclusions in Windows Defender for legitimate-looking filenames to evade security detections. The malware then deploys additional malware payloads to gain persistent access to the targeted device. The execution flow of MosaicLoader include: Creating a fake software file > Code obfuscation with execution order > Auto-downloading with several malware strains. Impact In addition to MosaicLoader, Bitdefender researchers also identified a malware sprayer distributing Facebook cookie stealers to access users’ login cookies from browsers. This allows threat actors to take over victims’ Facebook accounts, deploy malware, and steal identities. They even leveraged a variety of RATs like AsyncRAT and Powershell Dropper for their cyberespionage campaigns to obtain users’ log keystrokes, audio from the microphone, and images from the infected system. “Due to MosaicLoader’s capabilities, user privacy may be severely affected. The malware sprayer can deliver Facebook cookie stealers on the system that might exfiltrate login data, resulting in complete account takeovers, posts that can harm the reputation of businesses or persons, or posts that spread malware. Another significantly dangerous malware delivered through MosaicLoader is the Remote Access Trojans. They can log keypresses on the system, record audio from the microphone and images from the webcam, capture screenshots, etc. With this private information, attackers can take over accounts, steal digital identities and attempt to blackmail victims,” Bitdefender said. Indicators of Compromise URLs t1.cloudshielding.xyz c1.checkblanco.xyz s1.chunkserving.com m1.uptime66.com 5a014483-ff8f-467e-a260-28565368d9be.certbooster.com 0129e158-aa17-4900-99a6-30f4a49bd0a4.nordlt.com Integral.hacking101.net IP Address 195.181.169.92 Mitigation While the MosaicLoader campaign has not targeted any specific countries or sectors, the attackers are mostly targeting personal computers. To prevent MosaicLoader infections: Organizations should apply the indicators of compromises (IOCs) to endpoint detection and response (EDR) systems Ensure employees avoid downloading pirated software or applications Always download from authentic sources Keep devices updated
  3. We are at your service with one of the best software ** WiFi that few people know about it and maybe they do not know its efficiency, I will bring you the latest version of this software. Well, the difference between this software and similar programs like Damper is that Damper software takes a PIN from you. For ** WiFi, which is not sometimes responsive, but this software provides you with 3 pins for each WiFi, which increases the percentage. [Hidden Content]
  4. Video: [Hidden Content] [hide][Hidden Content]]
  5. Unpack archive. Launch Warzone Cracked.exe Unpack archive. Launch Warzone Cracked.exe Port forwarding instructions: Step 1) Control Panel > Firewall and Network > Allow an App through Firewall > Select “WARZONE RAT 2.70.exe” Step 2) Control Panel > Windows Defender Firewall > Advanced Settings Step 3) a) Inbound Rules > New Rule > Port > TCP > Specific Port you want b) Inbound Rules > New Rule > Port > UDP > Specific Port you want c) Outbound Rules > New Rule > Port > TCP > Specific Port you want d) Outbound Rules > New Rule > Port > UDP > Specific Port you want Step 4) Build your server with your port and your VPS IP address or DNS. Download: [Hidden Content]
  6. 50% EXCLUSIVE DISCOUNT COUPON LUNAR NEW YEAR [PRIV8] DISCOUNT ON PRIV8 SUBSCRIPTIONS FOR A VERY LIMITED TIME. UNLIMITED DOWNLOADS FOR A LIFETIME, NO RENOVATIONS. COUPON: %50LUNARNEWYEARLVL23 (OFFER AVAILABLE UNTIL AT FEBRUARY 15º) [Hidden Content]
  7. These are 28 tuts on how to crack the DotNET applications. Content: [hide][Hidden Content]]
  8. IMOS Worm 1.0.0.7 Change log: Smaller Stub Removed Autoit Script Removed Run CMD Command Removed Blue Screen Added Get Passowrd Added Get ScreenShot Screen Added Key Logger Added Download And Execute From Disk Changed New GUI [hide][Hidden Content]] Scan Server [Hidden Content]
  9. IMOS Worm 1.0.0.5 Change log: Main code moded Main window Changed Add DDos attack tool Add blue screen mode Add msgBox Add open WebPage Changed download and execute Fixed country's problem Ping slaves to see if connetions drop Add Run Scripts Add logs window add Simple tool box Builder Changed !!! IMPORTANT !!! To use the builder of the worm you need to install Autoit3 in your c:/program files (X86) if you will not install it you the builder will not open! You can download Autoit3 from the main website: [Hidden Content] [hide][Hidden Content]] Scan Server [Hidden Content]
  10. GitHub just announced that its new code scanning feature, GitHub code scanning, is now generally available. The new feature of the developer platform that Microsoft bought in 2018 for 7.5 billion dollars can scan any public repository for vulnerabilities. The idea is to offer a native function within GitHub that can find vulnerabilities in the code of a repository before they reach production. If you have a public repo on GitHub, you can activate it from now on following the official documentation. Automated security as part of your workflow With the function active, the code will be revised as it is created, and areas that could be exploited in the future will be highlighted. At GitHub they hope that with this feature active they can catch bugs early to significantly reduce security incidents in the future. GitHub code scanning integrates with GitHub Actions or your existing CI / CD environment to maximize team flexibility. Scans code as it is created and displays actionable security reviews within pull requests and other GitHub experiences, all to automate security as part of your workflow. Before its launch, code scanning went through several months of testing. So far it has scanned 12,000 repositories 1.4 million times, and in total it has detected 20,000 security problems, from bugs that allowed remote code execution, through cross-site scripting, to SQL injection. During the tests the developers and those in charge of maintaining the repositories resolved 72% of the security flaws identified in their pull requests before merging after the first 30 days. This is important data since industry data shows that less than 30% of vulnerabilities are fixed within a month after being discovered. [Hidden Content]
  11. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. BlackArch Linux is an open-source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up to be used by security professionals for penetration testing tasks. ChangeLog 2020.06.01: added more than 150 new tools disabled iptables/ip6tables service remove unneeded virtualbox services (drag’n’drop, vmsvga-x11) replace wicd with wifi-radar (gui) and wifi-menu (curses -> netctl) updated blackarch-installer to v1.1.45 included linux kernel 5.6.14 QA’ed and fixed a lot of packages (runtime exec, missing dependencies) updated all vim plugins and improved vim config options updated all blackarch tools and packages including config files updated all system packages updated all window manager menus (awesome, fluxbox, openbox) [HIDE][Hidden Content]]
  12. Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations. reaver-wps-fork-t6x version 1.6b is a community forked version, which has included various bug fixes and additional attack method (the offline Pixie Dust attack). Depending on the target’s Access Point (AP), to recover the plaintext WPA/WPA2 passphrase the average amount of time for the transitional online brute force method is between 4-10 hours. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. When using the offline attack, if the AP is vulnerable, it may take only a matter of seconds to minutes. Changelog v1.6.6 several improvements have been made: improved bruteforce mode using .wpc save files. automatic pixiewps pin retrieval and live injection in current session if pin is cracked before the timeout happens, experimental uptime command line switch -u lots of bugfixes and improvements [HIDE][Hidden Content]]
  13. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  14. Video: [Hidden Content] Tools: [Hidden Content]
  15. This archive contains all of the 170 exploits added to Packet Storm in October, 2019. View the full article
  16. [Hidden Content]
  17. This archive contains all of the 160 exploits added to Packet Storm in September, 2019. View the full article
  18. This archive contains all of the 159 exploits added to Packet Storm in August, 2019. View the full article
  19. Hey Guys, I'm new here and I'm looking for Neutrino 5.4/5.5 or latest . Also, SolarBot latest. Can anyone help:) Thanks in advance.
  20. This archive contains all of the 146 exploits added to Packet Storm in July, 2019. View the full article
  21. This archive contains all of the 110 exploits added to Packet Storm in June, 2019. View the full article
  22. What will be on the course: Understanding the secure configuration of the wireless router Arsenal necessary "Ethical WiFi hacker" Collecting a password from open sources Router security audit Hacking WEP encryption Hacking WPA encryption DoS attacks on access point Creating your own dictionaries for brutfors Online decryption services Evil Twin attacks on TD Much more! [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.