Search the Community

Showing results for tags 'point'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 8 results

  1. Hey people Am have 2 great config with work site groupon. Am tried, and this conf work perfect ! 1 config - US/MIX base need 2 config - need UK base only Proxies: Yep! Publ or private Capture: Balance and rewards $ Bots: 40-150 Need base Email:Pass Proof work with public proxy 15 min work with public socks and public base, and am have this result [Hidden Content] Work and good luck with earning $$$$ Regards people
  2. Dongyoung Media DM-AP240T/W wireless access point remote configuration disclosure exploit. View the full article
  3. Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point * Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom. * An attacker who is very close with the victim’s WiFi or already hijacked computers with the USB access could propagate them to infect the cameras with deadly malware and ransomware.
  4. Tool to Create a Fake Access Point and Sniff Data mitmAP - Combining the power of various tools, such as SSLstrip2, Driftnet, tshark, wireshark, mitmproxy and more, you can create a fake AP and sniff the data of whoever connects to it. _ _ ___ ______ (_) | / _ \ | ___ \ _ __ ___ _| |_ _ __ ___ / /_\ \| |_/ / | '_ ` _ \| | __| '_ ` _ \| _ || __/ | | | | | | | |_| | | | | | | | || | |_| |_| |_|_|\__|_| |_| |_\_| |_/\_| 2.2 A python program to create a fake AP and sniff data. new in 2.0: SSLstrip2 for HSTS bypass Image capture with Driftnet TShark for command line .pcap capture features: SSLstrip2 Driftnet Tshark Full featured access point, with configurable speed limit mitmproxy Wireshark DNS Spoofing Saving results to file requirements: Kali Linux / Raspbian with root privileges A wireless card and an ethernet adapter / 2 wireless card Python3 (mitmAP will install the dependenices, you don't have to do it) downloading: [Hide]"git clone [Hidden Content]] starting: Kali Linux -> "sudo python3 mitmAP.py" Raspberry PI -> "sudo python3 mitmAP_rpi.py" Important: At the first run, choose 'y' on installing dependencies and on creating the config files! disclaimer: I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.
  5. Site: 7/11 Proxies: Yes Combos: Mail:Pass Platform: OpenBullet Features: 6,000 cpm with 200 bots! Captures Punches and Points. [HIDE][Hidden Content]]
  6. Check Point ZoneAlarm version 8.8.1.110 suffers from a local privilege escalation vulnerability. View the full article
  7. Point of Sales (POS) in VB.Net MySQL Database version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  8. Seqrite End Point Security version 7.4 suffers from a weak file permission privilege escalation vulnerability. View the full article