Search the Community

Showing results for tags 'platform'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 27 results

  1. The world’s most used penetration testing framework Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game. [HIDE][Hidden Content]]
  2. Cross-platform backdoor using dns txt records. What is ddor? ddor is a cross platform light weight backdoor that uses txt records to execute commands on infected machines. Features Allows a single txt record to have seperate commands for both linux and windows machines List of around 10 public DNS servers that it randomly chooses from Unpredictable call back times Encrypts txt record using xor with custom password Linux Features: Anti-Debugging, if ptrace is detected as being attached to the process it will exit. Process Name/Thread names are cloaked, a fake name overwrites all of the system arguments and file name to make it seem like a legitimate program. Automatically Daemonizes Tries to set GUID/UID to 0 (root) Windows Features: Hides Console Window Stub Size of around 20kb [HIDE][Hidden Content]]
  3. An Easy tool to Generate Backdoor for bypass AV and Easy Tool For Post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection . [Hidden Content]
  4. Soundkit is a Social Music Sharing Platform similar with Mixcloud, SoundCloud, allowing users to upload their music online and share with the world Demo: [Hidden Content] [HIDE][Hidden Content]]
  5. Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. v5.0.57 Add *nix Gather Grub Password module Make suggested changes to grub_password module More… [HIDE][Hidden Content]]
  6. Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [HIDE][Hidden Content]]
  7. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. v5.0.53 Adding post module for dumping credentials out of NagiosXI Add docuentation for auxiliary/scanner/http/wordpress_scanner Add documentation for wp_dukapress_file_read scanner Land #12443 Fix Python reverse_http/s More… [Hidden Content]
  8. IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution. View the full article
  9. V-SOL GPON/EPON OLT Platform version 2.03 suffers from a remote privilege escalation vulnerability. View the full article
  10. V-SOL GPON/EPON OLT Platform version 2.03 suffers from multiple cross site scripting vulnerabilities. View the full article
  11. V-SOL GPON/EPON OLT Platform version 2.03 suffers from a cross site request forgery vulnerability. View the full article
  12. V-SOL GPON/EPON OLT Platform version 2.03 suffers from a link manipulation vulnerability. View the full article
  13. V-SOL GPON/EPON OLT Platform version 2.03 suffers from an unauthenticated configuration download vulnerability. View the full article
  14. AVCON6 Systems Management Platform suffers from a remote root command execution vulnerability. View the full article
  15. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. [Hidden Content]
  16. CTFs or Pentest Labs platform links please verify and comment ============================={ Enlaces de plataformas de CTFs o Pentest Labs porfavor verificar y comentar [Hidden Content]
  17. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. [HIDE][Hidden Content]]
  18. Barco/AWIND OEM presentation platform suffers from an unauthenticated command injection vulnerability. Products affected include Crestron AM-100 1.6.0.2, Crestron AM-101 2.7.0.1, Barco wePresent WiPG-1000P 2.3.0.10, Barco wePresent WiPG-1600W before 2.4.1.19, Extron ShareLink 200/250 2.0.3.4, Teq AV IT WIPS710 1.1.0.7, InFocus LiteShow3 1.0.16, InFocus LiteShow4 2.0.0.7, Optoma WPS-Pro 1.0.0.5, Blackbox HD WPS 1.0.0.5, and SHARP PN-L703WA 1.4.2.3. View the full article
  19. Gibbonedu The Flexible School Platform version 17.0.00 suffers from a database disclosure vulnerability. View the full article
  20. Cardmate is a Online Virtual PrePaid Card selling platform developed with PHP Laravel. CardMate Comes with a lots of unique features normaly needs to run a card selling business. Cardmate is full responsive and cross browser optimized Script. Secure, Unique Looks, Updated Features, Bugs Free, Error Free, Responsive, Support 16+ Automated Payment Method & More…. Demo: [Hidden Content] [Hidden Content]
  21. OpenMRS Platform versions prior to 2.24.0 suffers from an insecure object deserialization vulnerability. View the full article
  22. A project by Offensive Security The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs. [HIDE][Hidden Content]]
  23. Do you interested in reading kindle books on PC and no idea about it; then the Kindle app allows you to read the books on PC. It is a user friendly application that provide the same environment as you experienced on Kindle. Therefore, the reader have a more screen for reading and navigation.
  24. Collaboration Compliance and Quality Management Platform versions 9.1.1.5482 and below suffer from an improper access control vulnerability. View the full article
  25. Collaboration Compliance and Quality Management Platform versions 9.1.1.5482 and below suffer from a password disclosure vulnerability. View the full article