Search the Community

Showing results for tags 'project'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 30 results

  1. Project SECURITY is a powerful website security app that will protect your website from hackers, attacks and other threats. It will protect your website from SQLi Attacks (SQL Injections), XSS Vulnerabilities, Proxy Visitors, VPN Visitors, TOR Visitors, Spam and many other types of threats. Demo: [Hidden Content] [HIDE][Hidden Content]]
  2. Project SECURITY is a powerful website security app that will protect your website from hackers, attacks and other threats. It will protect your website from SQLi Attacks (SQL Injections), XSS Vulnerabilities, Proxy Visitors, VPN Visitors, TOR Visitors, Spam and many other types of threats. Demo: [Hidden Content] [HIDE][Hidden Content]]
  3. Project SECURITY is a powerful website security app that will protect your website from hackers, attacks and other threats. It will protect your website from SQLi Attacks (SQL Injections), XSS Vulnerabilities, Proxy Visitors, VPN Visitors, TOR Visitors, Spam and many other types of threats. Demo: [Hidden Content] [HIDE][Hidden Content]]
  4. Leaked Email Project 000Webhost | 5 Million Gmail | Nulled.to [HIDE][Hidden Content]]
  5. The probably most powerful SQLi Dumping Panel named SIB! This panel is faster than SQLi Dumper and many other sqli tools. [HIDE][Hidden Content]] [Tutorial] How to install SIB 6.0 / 7.5 panel. SQLi Injection panel [Hidden Content]
  6. CAINE 11 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari - Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims to guarantee are the following: an interoperable environment that supports the digital investigator during the four phases of the digital investigation a user-friendly graphical interface user-friendly tools CAINE represents fully the spirit of the Open Source philosophy because the project is completely open, everyone could take on the legacy of the previous developer or project manager. The distro is open source, the Windows side is freeware and, the last but not least, the distro is installable, thus giving the opportunity to rebuild it in a new brand version, so giving a long life to this project... The important news is CAINE 11.0 blocks all the block devices (e.g. /dev/sda), in Read-Only mode. You can use a tool with a GUI named BlockON/OFF present on CAINE's Desktop. This new write-blocking method assures all disks are really preserved from accidentally writing operations, because they are locked in Read-Only mode. If you need to write a disk, you can unlock it with BlockOn/Off or using "Mounter" changing the policy in writable mode. CAINE is always more fast during the boot. CAINE 11.0 can boot to RAM (toram). IMPORTANT CHANGES: All devices are blocked in Read-Only mode, by default. New tools, new OSINT, Autopsy 4.13 onboard, APFS ready,BTRFS forensic tool, NVME SSD drivers ready! SSH server disabled by default (see Manual page for enabling it). SCRCPY - screen your android device Autopsy 4.13 + additional plugins by McKinnon. X11VNC Server - to control CAINE remotely. hashcat NEW SCRIPTS (Forensics Tools - Analysis menu) AutoMacTc - a forensics tool for Mac. Bitlocker - volatility plugin Autotimeliner - Automagically extract forensic timeline from volatile memory dumps. Firmwalker - firmware analyzer. CDQR - Cold Disk Quick Response tool many others fixing and software updating. [HIDE][Hidden Content]]
  7. Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  8. dEEpEst

    Iky project tool

    Description Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Project - Previous version We want to warn you that we have changed the Frontend from AngularJS to Angular 7. For this reason we left the project with AngularJS as Frontend in the iKy-v1 branch. The reason of changing the Frontend was to update the technology and get an easier way of installation. Video Demo: [Hidden Content] Download: [Hidden Content]
  9. The probably most powerful SQLi Dumping Panel named SIB! This panel is faster than SQLi Dumper and many other sqli tools. [HIDE][Hidden Content]]
  10. AV|Ator is a backdoor generator utility, which uses cryptographic and injection techniques in order to bypass AV detection. More specifically: It uses AES encryption in order to encrypt a given shellcode Generates an executable file which contains the encrypted payload The shellcode is decrypted and injected to the target system using various injection techniques [HIDE][Hidden Content]] Current Detection Rate: 3/71
  11. TheHive Project Cortex versions 2.1.3 and below suffer from a server-side request forgery vulnerability. View the full article
  12. Symphony Project sfDoctrinesfPropel version 1.x suffers from a database password disclosure. View the full article
  13. Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also they can be used for privilege escalation by pentesters/red teamers. Vulmap can be used to, scan vulnerabilities on localhost, see related exploits and download them. Scripts basically, scan localhost to gather installed software information and ask vulmon.com api if there are any vulnerabilies and exploits related with installed software. If vulnerabilities exist, vulmap give CVE ID, risk score, vulnerability's detail link, exploit id and exploit title. Exploits can be downloaded with vulmap also. [HIDE][Hidden Content]]
  14. OrangeScrum Project Management Software version 1.6.1 suffers from a database disclosure vulnerability. View the full article
  15. Mash Project Integrated version 4.2.7.1 suffers from a database disclosure vulnerability. View the full article
  16. Rukovoditel Project Management CRM version 2.4.1 suffers from a cross site scripting vulnerability. View the full article
  17. Rukovoditel Project Management CRM version 2.4.1 suffers from a remote SQL injection vulnerability. View the full article
  18. Teameyo Project Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  19. [HIDE][Hidden Content]] Introduction JoomScan, OWASP Vulnerability Scanner, is an open source project developed in perl which detects Joomla CMS vulnerabilities and analyses them. This tool enables seamless and effortless scanning of Joomla installations, and has a modular and lightweight architecture, so it doesn’t leave to much footprints. JoomScan: If you want to perform penetration testing on a Joomla CMS, then you should try out OWASP JoomScan, since it’s faster then ever with regular updates on Joomla vulnerabilities. Beside ability to detect known offensive vulnerabilities, JoomScan can also detect many misconfigurations and admin-level shortcomings which can lead to the system compromise. Furthermore, OWASP JoomScan provides a friendly UI and compiles the final reports in both text and HTML formats. Features: Version enumerator Vulnerability enumerator (based on version) Components enumerator (1209 most popular by default) Components vulnerability enumerator (based on version)(+1030 exploit) Firewall detector Reporting to Text & HTML output Finding common log files Finding common backup files
  20. R2Games In late 2015, the gaming website R2Games was hacked and more than 2.1M personal records disclosed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 11M accounts were added in March 2016 and another 9M in July 2016 bringing the total to over 22M. Breach date: 1 November 2015 Compromised accounts: 22,281,337 Requirements: - CPU QuadCore Processor with 3GHZ or more - 8 GB of RAM or more - Why? - Maximum execution time of 30 seconds. Download: [Hidden Content].rar Virus Scan: The file is to large...
  21. Releasing an archive with a searchable engine for 000Webhost, 5 Million Gmail and nulled accounts. To use just extract to a webhosting site with support for PHP or run it locally. All the combos are in one file and all the combos available have been around the web for a while so it's public domain now. 000Webhost combo is from 2014... The reason why i'm releasing this three databases into one file is because the data is correct. My email credentials were available and the passwords were a match. Download [Hidden Content] Virus Check File is too large. Compressed 391 MB. Uncompressed 1.2 GB
  22. MyT Project Management version 1.5.1 suffers from a remote SQL injection vulnerability. View the full article