Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'own'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 15 results

  1. [hide][Hidden Content]]
  2. [hide][Hidden Content]]
  3. Course Duration: 21 sections • 95 lectures • 9h 13m total length What you'll learn: Remove your dependence on Cloud providers by managing your data at your own home, using Synology DSM7 Back up your data offsite to a second, or friend or family members, Synology NAS Store your data securely, keep your own encryption keys to yourself Learn how to connect Windows 10 & 11, OSX/Mac, and Ubuntu clients to your own private cloud Learn how to back up your photos to your own private cloud, using your Android or Apple device (demos are of Android) Learn how to create a free VPN connection between Synology NASes, using ZeroTier (port forwarding also briefly covered, but VPN recommended) Learn how to backup your Windows 10 & 11, OSX/Mac and Ubuntu workstations, including how to perform offsite backups Learn how to synchronise a live file share with your friends NAS so you can share data in a secure way over the interent Learn the basics of Synology Surviellance Station (CCTV software) Requirements: An intermediate level of computer literacy is needed. Familiarity with your own home network, including the ability to make changes on your own network infrastructure. A basic knowledge on firewalls and routers, and how they work. A basic understanding of security and its importance. Description: Learn how to remove your dependence on Cloud providers such as Google, Apple, Microsoft and Amazon, and store your data yourself securely using Synology DSM7 technology.This course will take you through how to configure your own secure private cloud using Synology NASes - from a basic introduction to why we should care where our data is stored, to what to look for when purchasing your Synology NAS(es), to how to build and connect to your own private cloud, to how to backup your data offsite automatically each night.The course covers the basics of the Synology NAS, though the course is not aimed at explaining everything about Synology, rather, the Synology NAS hardware is being used to achieve the outcome of own secure private cloud, accessible while outside of your network through your laptop, tablet or phone, in a secure way.It will cover how to share files with others - both members of your family, or friends that do not have a connection into your private network. The course will also cover how you can create a location on your NAS where people from outside of your network can upload files to, without having direct access into your network.Security is at the forefront of everything that is discussed in this course. The order of preference to access the NAS from outside of your private network is through a VPN, then using Synology's QuickConnect technology, to lastly port forwarding and dynamic DNS. The pros and cons of these access methods are discussed so that you can make an informed decision on the level of security that will be appropriate and acceptable to you.Support for this course is through Udemy's messaging system, and the aim is always to respond to any queries within 24hrs. Who this course is for: This course is for intermediately IT skilled people that want to remove their reliance on Cloud providers like Google, Apple, Microsoft and Amazon, by managing their data themselves in a secure and private way. [hide][Hidden Content]]
  4. Open Bullet Tutorials Overview #1 Open Bullet Tutorials #2 | Creating a Simple Config Open Bullet Tutorials #3 | Creating a complex Config (Tokens) Open Bullet Tutorials #4 | Creating a config with a Recaptcha Solver [hide][Hidden Content]]
  5. Within 15 minutes, you can make your own cryptocurrency (English and Hindi). What you’ll learn Create Your Own Cryptocurrency In 5 Simple Steps The learners will learn how to make a new Cryptocurrency from scratch, and they will do it together. A Metamask wallet is something the students will learn more about during this class. In class, they will learn about the Ethereum Faucet. The students will learn how to use the Etherscan to find out more about Smart contracts. Requirements There is no need for programming experience. Everything you need to know will be learned. Description Create your own Cryptocurrencies like Ethereum, Bitcoin, and other cryptocurrencies. Creating your own cryptocurrency in 5 simple steps by Abhishek Salaria. Using the ERC20 tokens. Deploy your own cryptocurrency and make transactions. With this course, even a non-technical person can create a cryptocurrency. Well, we have not followed any shortcuts and explained to you every step in every detail so that you can easily create your cryptocurrency. In this course, I have used the Ropsten test network in order to create the deploy the cryptocurrency as I can then use a faucet in order to generate ethers for free for the gas charges. However, you can use the Ethereum Network in order to deploy your cryptocurrency but you would require some ETH in your wallet to pay for the gas charges. I have also used Remix which is an online compiler enabling us to deploy our following Smart Contract directly onto the Ethereum-Blockchain. ERC-20 has emerged as the technical standard and is used for all contracts on the Ethereum blockchain for token implementation. In this video, we will be using ERC20 for creating our own cryptocurrency. This course on Create Your Own Cryptocurrency In 5 Simple Steps gives details of each and every step. And also the detailed instruction required to create your own cryptocurrency. Who this course is for: Anyone who wants to know how cryptocurrency is made and anyone who wants to make their own cryptocurrency. [Hidden Content] [hide][Hidden Content]]
  6. Books + eBooks Crash Course: How to Start Your Own eBook Business This class will help you start your own coaching program. You’ll learn: Recommended tools to create your ebooks Recommended platforms to sell your ebooks How to outsource ebook creation How to design a book cover that stands out How to use Print On Demand for hardback books How to use Amazon KDP to publish your ebooks How to price your ebooks Everything in this course is based on my real world experience with case studies showing you what has working for me. These are ebook strategies that you can repeat to create your own successful online business Start your online business today! There’s absolutely no reason to hesitate. If you’ve ever wanted to start an online business… THIS is the course for you. [Hidden Content] [hide][Hidden Content]]
  7. Create Your Own Penetration & Hacking Lab – NOOB to PRO Build A Cybersecurity & Ethical Hacking Home Lab || Go One More Step In The World Of Hacking || Red Team & Blue Team VM What you’ll learn About Hacking Lab Practice Hacking With Own Computer Build 100% Hacking Lab Totaly Free On Your Device Noob to Expart using Virtual Hacking Labs || VM Use any Operating System Create A Operating System Hacking Lab Create A Web-App Penetration Testing Hacking Lab Requirements A Good Quality Compute & Nothing Without Indomitable will-power Description Hacking-Lab is a Lab that is Basically used for offline & online-based Ethical-Hacking, Computer Networks, Web-App Penetration Testing & bug-bounty practices. The goal of the hacking lab is to create an environment where you can become a cybersecurity expert by practicing live securely as anonymous. Why Do We Need To Have A Hacking Lab? Suppose, you think you don’t need any hacking lab. You will start hacking without a hacking lab. However, you cannot start hacking with any computer. All of this requires special tools, software, and a variety of operating systems. If you think that you can continue working with your computer without hacking lab, then you need to disable antivirus and firewall to use most of the tools and software you need to use. As a result, your PC can be a victim of viruses, malware, spyware, ransom at any time and The data in your collection will be at risk. So we need to use hacking labs. Hacking labs can be of two types. 1. Physical Lab 2. Virtual Lab. Building a physical lab requires a lot of money. The reason – you have to use a lot of devices here as well as the network and build a structure. Which will be very time-consuming and cost huge money. On the other hand, you don’t have to spend money to create a virtual hacking lab And it saves time. So we will use virtual hacking labs. Now you can say, “Oh, I understand. But here we can use a dual-mode operating system instead of hacking lab.” yes, you can. But you will not get the same benefits as the hacking lab. You will not have the opportunity to use multiple operating systems at once. The computer needs to be restarted every time there is an operating change. If there is a mistake in the setup, all data on your C drive will be deleted. Which is extremely dangerous and annoying. so, we will use virtual hacking labs. What Is Needed To Create A Virtual Hacking Lab? A Good Quality Computer, A Virtualization Software & Operating System. A Good Quality Computer: To create a virtual hacking lab, at least 100 GB of disks must be left empty. It depends on how many operating systems you want to use. If you want to use more operating systems then you have to empty more disk space, 64-bit Processor, And your computer must have a minimum of 8 GB RAM to work well. A Virtualization Software: Then you need virtualization software. It allows you to run two or more operating systems using just one PC. Virtualization software, also called a hypervisor, is what allows one computer or server to host multiple operating systems. Operating System: Then, you need to download the operating system you want to use. We will add a Linux distribution operating system here. I will also show you how to add Windows and mobile operating systems into virtualization software. **~ As a result, you will do easily add any operating system without the help of anyone ~** Who this course is for: Who want to learn VM Hacking Lab If you want to Start Hacking Journey IF You Want to Learn Hacking Lab If you want to use more operating systems at the same time From inexperienced to Expert user, VM Who Want to Practice Hacking Own Computer [Hidden Content] [hide][Hidden Content]]
  8. Requirements An Internet connected computer A few dollars budget to set up your own brand/product All you need to do is following the step-by-step outline and literally copy-paste our powerful cash getting-system Description FULL STEP-BY-STEP BLUEPRINT TO ABSOLUTELY CRUSH IT ON AMAZON BY SELLING YOUR OWN PRODUCTS! - WORKS NO MATTER WHERE YOU LIVE IN THE WORLD! "You can start selling YOUR products and making money in just 48 hours from now!" You'll discover how you can EASILY get companies to create products for YOU! So these are gonna be YOUR products with YOUR name on it! I'll show you how to get them to do it for PENNIES on the dollar! I'll show you how to turn around and sell YOUR OWN PRODUCTS on Amazon for HUGE profits! You will learn how to use Amazon FBA! They are going to handle shipping, customer support, and everything else... So you don't have to! - All you have to do is just sit back and collect the checks! Who this course is for: Anyone who wants to easily make money online, following a step-by-step training People from any country, any age or with any ability The course is suited for everybody from newbies to experts! What you'll learn By the end of this course, you will be able pick smoking hot products, get your own products listed on at the top of Amazon, and drive lots of traffic to it from Youtube & Google to stuff your bank account with cash! Learn how to destroy the competition on Amazon and a sneaky trick to get hundreds of rave reviews for your products in no time! Learn how to get your very own products created for PENNIES! You will learn ALL my closely guarded secrets to completely DOMINATE the billion dollar supplement industry Get started and start earning massive profits no matter where you live in the world! Start to profit like a boss NOW! [Hidden Content] [hide][Hidden Content]]
  9. What you'll learn AWS Basics Cloud Computing Basics Internet Security Basics VPN Basics Build a VPN Launch A EC2 Server Requirements Basic Computer Knowledge Description VPNs are all the rage these days. But what if I told you that you can build your very own VPN server for free? In this course I'm going to teach you how to do just that. We're also going to tip our toes into cloud computing. AWS is leading the cloud computing market, and in this course we're going to be working with AWS to build our VPN server. Who this course is for: Beginners To Cloud Computing Beginners to AWS Anyone looking for a VPN solution [Hidden Content] [hide][Hidden Content]]
  10. Descripción de la revista: Save money by building your own PC! Whether you have never seen the inside of a computer or you have some basic knowledge, this guide is the perfect way to increase your understanding and bolster your confidence in PC building. Helpfully broken up into three sections: Planning, Building and Software, this book is all you need to build a brilliant first PC. [Hidden Content] [hide][Hidden Content]]
  11. [HIDE] Requirements: Format Of Storm Config [Hidden Content] HTTP Analyser V7 - in the forum Storm 2.6.0.2 - in the forum [Hidden Content]]
  12. PayPro is a digital download payment gateway. Start a business simply by creating your own download payment gateway and offer Stripe, Paypal, Bitcoin, Litecoin and Dogecoin as an option. Receive a percentage of each product sold using your very own PayPro gateway by charging a gateway fee in the admin panel. Demo: [Hidden Content] [HIDE][Hidden Content]]
  13. BYOB (Build Your Own Botnet) Disclaimer: This project should be used for authorized testing or educational purposes only. BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT (Remote Administration Tool) or a C2 (Command & Control server) from scratch. The RAT's key feature is that arbitrary code/files can be remotely loaded into memory from the C2 and executed on the target machine without writing anything to the disk. Supports Python 2 & 3. Client Generate fully-undetectable clients with staged payloads, remote imports, and unlimited post-exploitation modules Remote Imports: remotely import third-party packages from the server without writing them to the disk or downloading/installing them Nothing Written To The Disk: clients never write anything to the disk - not even temporary files (zero IO system calls are made) because remote imports allow arbitrary code to be dynamically loaded into memory and directly imported into the currently running process Zero Dependencies (Not Even Python Itself): client runs with just the python standard library, remotely imports any non-standard packages/modules from the server, and can be compiled with a standalone python interpreter into a portable binary executable formatted for any platform/architecture, allowing it to run on anything, even when Python itself is missing on the target host Add New Features With Just 1 Click: any python script, module, or package you copy to the ./byob/modules/ directory automatically becomes remotely importable & directly usable by every client while your command & control server is running Write Your Own Modules: a basic module template is provided in ./byob/modules/ directory to make writing your own modules a straight-forward, hassle-free process Run Unlimited Modules Without Bloating File Size: use remote imports to add unlimited features without adding a single byte to the client's file size Fully Updatable: each client will periodically check the server for new content available for remote import, and will dynamically update its in-memory resources if anything has been added/removed Platform Independent: everything is written in Python (a platform-agnostic language) and the clients generated can optionally be compiled into a portable executable (Windows) or bundled into a standalone application (macOS) Bypass Firewalls: clients connect to the command & control server via reverse TCP connections, which will bypass most firewalls because the default filter configurations primarily block incoming connections Counter-Measure Against Antivirus: avoids being analyzed by antivirus by blocking processes with names of known antivirus products from spawning Encrypt Payloads To Prevent Analysis: the main client payload is encrypted with a random 256-bit key which exists solely in the payload stager which is generated along with it Prevent Reverse-Engineering: by default, clients will abort execution if a virtual machine or sandbox is detected Modules Post-exploitation modules that are remotely importable by clients Keylogger (byob.modules.keylogger😞 logs the user’s keystrokes & the window name entered Screenshot (byob.modules.screenshot😞 take a screenshot of current user’s desktop Webcam (byob.modules.webcam😞 view a live stream or capture image/video from the webcam Ransom (byob.modules.ransom😞 encrypt files & generate random BTC wallet for ransom payment Outlook (byob.modules.outlook😞 read/search/upload emails from the local Outlook client Packet Sniffer (byob.modules.packetsniffer😞 run a packet sniffer on the host network & upload .pcap file Persistence (byob.modules.persistence😞 establish persistence on the host machine using 5 different methods Phone (byob.modules.phone😞 read/search/upload text messages from the client smartphone Escalate Privileges (byob.modules.escalate😞 attempt UAC bypass to gain unauthorized administrator privileges Port Scanner (byob.modules.portscanner😞 scan the local network for other online devices & open ports Process Control (byob.modules.process😞 list/search/kill/monitor currently running processes on the host iCloud (byob.modules.icloud😞 check for logged in iCloud account on macOS Spreader (byob.modules.spreader😞 spread client to other hosts via emails disguised as a plugin update Miner (byob.modules.miner😞 run a cryptocurrency miner in the background (supports Bitcoin & Litecoin) Server Command & control server with persistent database and console Console-Based User-Interface: streamlined console interface for controlling client host machines remotely via reverse TCP shells which provide direct terminal access to the client host machines Persistent SQLite Database: lightweight database that stores identifying information about client host machines, allowing reverse TCP shell sessions to persist through disconnections of arbitrary duration and enabling long-term reconnaissance Client-Server Architecture: all python packages/modules installed locally are automatically made available for clients to remotely import without writing them to the disk of the target machines, allowing clients to use modules which require packages not installed on the target machines Core Core framework modules used by the generator and the server Utilities (byob.core.util😞 miscellaneous utility functions that are used by many modules Security (byob.core.security😞 Diffie-Hellman IKE & 3 encryption modes (AES-256-OCB, AES-256-CBC, XOR-128) Loaders (byob.core.loaders😞 remotely import any package/module/scripts from the server Payloads (byob.core.payloads😞 reverse TCP shell designed to remotely import dependencies, packages & modules Stagers (byob.core.stagers😞 generate unique payload stagers to prevent analysis & detection Generators (byob.core.generators😞 functions which all dynamically generate code for the client generator Database (byob.core.database😞 handles interaction between command & control server and the SQLite database Handler (byob.core.handler😞 HTTP POST request handler for remote file uploads to the server To Do Contributors welcome! Feel free to issue pull-requests with any new features or improvements you have come up with! Remote Import Encryption - encryption for data streams of packages/modules being remotely imported (to maintain confidentiality/authenticity/integrity and prevent any remote code execution vulnerabilities arising from deserialization) Transport Types - add support for more transport types (HTTP/S, DNS, etc.) Bug Fixes - fix any bugs/issues Download: [HIDE][Hidden Content]]
  14. Disclaimer: This project should be used for authorized testing or educational purposes only. [HIDE][Hidden Content]] BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT (Remote Administration Tool) or a C2 (Command & Control server) from scratch. The RAT's key feature is that arbitrary code/files can be remotely loaded into memory from the C2 and executed on the target machine without writing anything to the disk. Supports Python 2 & 3. Client Generate fully-undetectable clients with staged payloads, remote imports, and unlimited post-exploitation modules Remote Imports: remotely import third-party packages from the server without writing them to the disk or downloading/installing them Nothing Written To The Disk: clients never write anything to the disk - not even temporary files (zero IO system calls are made) because remote imports allow arbitrary code to be dynamically loaded into memory and directly imported into the currently running process Zero Dependencies (Not Even Python Itself): client runs with just the python standard library, remotely imports any non-standard packages/modules from the server, and can be compiled with a standalone python interpreter into a portable binary executable formatted for any platform/architecture, allowing it to run on anything, even when Python itself is missing on the target host Add New Features With Just 1 Click: any python script, module, or package you copy to the ./byob/modules/ directory automatically becomes remotely importable & directly usable by every client while your command & control server is running Write Your Own Modules: a basic module template is provided in ./byob/modules/ directory to make writing your own modules a straight-forward, hassle-free process Run Unlimited Modules Without Bloating File Size: use remote imports to add unlimited features without adding a single byte to the client's file size Fully Updatable: each client will periodically check the server for new content available for remote import, and will dynamically update its in-memory resources if anything has been added/removed Platform Independent: everything is written in Python (a platform-agnostic language) and the clients generated can optionally be compiled into a portable executable (Windows) or bundled into a standalone application (macOS) Bypass Firewalls: clients connect to the command & control server via reverse TCP connections, which will bypass most firewalls because the default filter configurations primarily block incoming connections Counter-Measure Against Antivirus: avoids being analyzed by antivirus by blocking processes with names of known antivirus products from spawning Encrypt Payloads To Prevent Analysis: the main client payload is encrypted with a random 256-bit key which exists solely in the payload stager which is generated along with it Prevent Reverse-Engineering: by default, clients will abort execution if a virtual machine or sandbox is detected Modules Post-exploitation modules that are remotely importable by clients Keylogger (byob.modules.keylogger): logs the user’s keystrokes & the window name entered Screenshot (byob.modules.screenshot): take a screenshot of current user’s desktop Webcam (byob.modules.webcam): view a live stream or capture image/video from the webcam Ransom (byob.modules.ransom): encrypt files & generate random BTC wallet for ransom payment Outlook (byob.modules.outlook): read/search/upload emails from the local Outlook client Packet Sniffer (byob.modules.packetsniffer): run a packet sniffer on the host network & upload .pcap file Persistence (byob.modules.persistence): establish persistence on the host machine using 5 different methods Phone (byob.modules.phone): read/search/upload text messages from the client smartphone Escalate Privileges (byob.modules.escalate): attempt UAC bypass to gain unauthorized administrator privileges Port Scanner (byob.modules.portscanner): scan the local network for other online devices & open ports Process Control (byob.modules.process): list/search/kill/monitor currently running processes on the host iCloud (byob.modules.icloud): check for logged in iCloud account on macOS Spreader (byob.modules.spreader): spread client to other hosts via emails disguised as a plugin update Miner (byob.modules.miner): run a cryptocurrency miner in the background (supports Bitcoin & Litecoin)
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.