Search the Community

Showing results for tags 'python'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 32 results

  1. Intensio-Obfuscator v1.0.6 What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with an always differents values Requirements Python >= 3.5 requirements.txt Steps usage Put your source code in directory dedicated at your project (directory source will scanned and obfuscated recursively) Create empty directory for output code obfuscated Read all the practices of coding that be ought respect absolutely required code format Modify your source code if it's necessary after have reading required code format Read malfunctions to be informed Obfuscate your code ! commands explained in README [HIDE][Hidden Content]]
  2. In this course you will learn all of python you need for being a good python developer. you will begin with learning that how you can have your best editor to work with. After that in first section you will learn all the basics of python like data-types, loops, conditionals, operators, file-handling, time-date, libraries and a lot. In addition you will also apply all you have learn in section-1 on practical working programs and games. Second section is about data-visualisation in which you will learn what is data science and how things work in that, and you will learn libraries like Matplotlib, seaborn, pandas, poorly and cufflinks for data visualisation and pandas, numpy for data analysis. you will also learn geo-plotting for visualising globe data. In addition you will built a large number of beautyfull plots and even 3-D plots to practice your skills. Then we will move to the project part of section-2 in which you will learn to create automatic plotter, base maps and big-data analysis project that actually analyse more than 60 million+ data. Third section is all about graphical and user interface. In which you will learn that how the desktop applications are made, you will learn about tkinter to built windows applications, then you will learn about database that how you can store your program data and where to store. After that we will move to a very interesting concept turtle graphics where you will learn how to make moving graphical things.Then this section is full of projects with actually working games and database applications. also project that will make you learn how to use keys to move your objects in games and in applications. This is not the end of the course time to time new data will be added to it. [Hidden Content]
  3. Wing Python IDE was designed from the ground up for Python, to bring you a more productive development experience. Get More Done Type less and let Wing worry about the details. Get immediate feedback by writing your Python code interactively in the live runtime. Easily navigate code and documentation. Write Better Code Avoid common errors and find problems early with assistance from Wing's deep Python code analysis. Keep code clean with smart refactoring and code quality inspection. Find Bugs Faster Debug any Python code. Inspect debug data and try out bug fixes interactively without restarting your app. Work locally or on a remote host, VM, or container. Wingware's 20 years of Python IDE experience bring you a more Pythonic development environment. Wing was designed from the ground up for Python, written in Python, and is extensible with Python. So you can be more productive. [Hidden Content] [Hidden Content]
  4. Hello everyone, I'm looking for someone who is able to write a Python script for checking account on a website without captcha It will be possible to select a combolist (mail : pass), a proxy list and the number of threads I pay by BTC with contract and escrow Contact by PM
  5. This is what this script can do: Make dorks Make dorks but better (See below in "Serious explanation") Clean dorks Extract dorks Replace words Add words to start of lines Add words to ends of lines Randomize lines Dedupe and sort lines Convert SQL-i dumpers XML files to txt url lists [Hidden Content]
  6. This Metasploit module generates an ODT file with a dom loaded event that, when triggered, will execute arbitrary python code and the metasploit payload. View the full article
  7. Version

    3 downloads

    Python All Courses Collection # Beginner Python # Python Design Patterns # Mastering Python # Python Web Penetration Testing # Python Machine Learning # Deep Learning with Python __________________________________ You can download them for free if you are a PRIV8 user

    $100.00 PRIV8

  8. View File Python All Courses Collection Python All Courses Collection # Beginner Python # Python Design Patterns # Mastering Python # Python Web Penetration Testing # Python Machine Learning # Deep Learning with Python __________________________________ You can download them for free if you are a PRIV8 user Submitter dEEpEst Submitted 16/08/19 Category Libro Online Password ********  
  9. Learn Ethical Hacking with ease as it is fully Practical Course. Get ready to Fight against Hackers and Protect yourself. Learn the Tools used by Hackers. Start Improving your Coding Skills by writing and executing C, C++, Python Programs on Android Device. More importantly if you learn ethical hacking, you can take part in Bug Bounty Programs. [Hidden Content]
  10. Python MySql From Scratch A-Z guide to Do All MySql Operations From Python Code And Make An Excel Report For Your DataBase Data MySql Is One Of The Most Used Database Type , In This Course We Will Know Whats Is MySql In Details And Learn How We Can Install And Configure It On Window & Linux Then We Will Learn How To Connect MySql With Python And Create Our DataBase From Python Code & Do All DataBase Operations From Python Code Like (Inserting Data And Images , Retrieving Data , Column Header , Prepared Statment , Reading Images , Update Data , Delete Data And stored procedures , Then I Will Show You How To Make Excel Reports For Database Data & Show You How To Style Your Report [Hidden Content]
  11. Ghostfuscator Obfuscate python scripts making them password-protected using AES Encryption Usage Just execute the script, and follow the menu. Info Once an script is obfuscated, when running it a password asking prompt will appear, after submiting the correct password, the script will execute decrypting it's decrypted content in the memory [HIDE][Hidden Content]]
  12. Takes a python source code and transform it into an obfuscated python code, replace name of variables - classes - functions to random chars and defined length, removes comments, line breaks and add to each line a random script with an always differents values. Requirement Python >= 3.5 Files supported Files written in python 2.x and 3.x [HIDE][Hidden Content]]
  13. DISCLAIMER Stitch is for education/research purposes only. The author takes NO responsibility and/or liability for how you choose to use any of the tools/source code/any files provided. The author and anyone affiliated with will not be liable for any losses and/or damages in connection with use of ANY files provided with Stitch. By using Stitch or any files included, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again Stitch and ALL files included are for EDUCATION and/or RESEARCH purposes ONLY. Stitch is ONLY intended to be used on your own pentesting labs, or with explicit consent from the owner of the property being tested. About Stitch A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. Features Cross Platform Support Command and file auto-completion Antivirus detection Able to turn off/on display monitors Hide/unhide files and directories View/edit the hosts file View all the systems environment variables Keylogger with options to view status, start, stop and dump the logs onto your host system View the location and other information of the target machine Execute custom python scripts which return whatever you print to screen Screenshots Virtual machine detection Download/Upload files to and from the target system Attempt to dump the systems password hashes Payloads' properties are "disguised" as other known programs Windows Specific Display a user/password dialog box to obtain user password Dump passwords saved via Chrome Clear the System, Security, and Application logs Enable/Disable services such as RDP,UAC, and Windows Defender Edit the accessed, created, and modified properties of files Create a custom popup box View connected webcam and take snapshots View past connected wifi connections along with their passwords View information about drives connected View summary of registry values such as DEP Mac OSX Specific Display a user/password dialog box to obtain user password Change the login text at the user's login screen Webcam snapshots Mac OSX/Linux Specific SSH from the target machine into another host Run sudo commands Attempt to bruteforce the user's password using the passwords list found in Tools/ Webcam snapshots? (untested on Linux) Implemented Transports All communication between the host and target is AES encrypted. Every Stitch program generates an AES key which is then put into all payloads. To access a payload the AES keys must match. To connect from a different system running Stitch you must add the key by using the showkey command from the original system and the addkey command on the new system. Implemented Payload Installers The "stitchgen" command gives the user the option to create NSIS installers on Windows and Makeself installers on posix machines. For Windows, the installer packages the payload and an elevation exe ,which prevents the firewall prompt and adds persistence, and places the payload on the system. For Mac OSX and Linux, the installer places the payload and attempts to add persistence. To create NSIS installers you must download and install NSIS. Wiki Crash Course of Stitch Requirements Python 2.7 For easy installation run the following command that corresponds to your OS: # for Windows pip install -r win_requirements.txt # for Mac OSX pip install -r osx_requirements.txt # for Linux pip install -r lnx_requirements.txt Pycrypto Requests Colorama PIL Windows Specific Py2exe pywin32 Mac OSX Specific PyObjC Mac OSX/Linux Specific PyInstaller pexpect To Run python main.py or ./main.py Motivation My motivation behind this was to advance my knowledge of python, hacking, and just to see what I could accomplish. Was somewhat discouraged and almost abandoned this project when I found the amazing work done by n1nj4sec, but still decided to put this up since I had already come so far. Other open-source Python RATs for Reference vesche/basicRAT n1nj4sec/pupy Screenshots Download: [HIDE][Hidden Content]]
  14. Level23HackTool

    Rat Python Telegram

    [Hidden Content]
  15. Level23HackTool

    Python Reverse Shell

    [Hidden Content]
  16. 10minutemail.net is a free, disposable e-mail service. Your temporary e-mail address will expire after 10 minutes, after which you cannot access it. You can extend the time by 10 minutes. The website you are registering with could be selling your personal information; you never know where your e-mail will be published. An email address with a 10-minute lifespan is the best solution to prevent this. [HIDE][Hidden Content]]
  17. Learn about everything there is to know about Python Applications and How To Program Them. A step by step process is used to show explain every facet of these topics. Gain a good understanding of the following concepts with this course: What Python is? How to program in the Python language Features of the Python programming language Coding semantics Website programming Design practises of applications Application programming GUI programming CGI programming Network programming Email programming XML programming Python is fast becoming a worldwide Tour De Force that is requested by all companies such as Google, Facebook and Microsoft. This course will ensure you are not left as more and more companies request this awesome language. This course will teach your everything about programming Python applications and websites. You will receive all the knowledge to use and leverage the powerful technology behind these amazing and wonderful platforms. Over 205,000 students have enrolled on my courses and all of them are extremely satisfied. You will also be satisfied with this course. If you do not like the course, remember that within 30 days you can request a full refund. I guarantee you satisfaction. If you have any questions regarding the topics covered in this course, please feel free to ask. I'm always happy to help those who want to learn. To summarise this is what you get: • Lifetime access to HD quality videos. No monthly subscription. Learn at your own pace, whenever you want. • All videos are downloadable. Learn wherever you want, even without an internet connection! • Downloadable starter code and final code for each section. • Free helpful support in the course Q&A when you have questions or get stuck. • Multiple coding challenges to practice your new skills (solutions included). Sounds great? Then start this adventure today by clicking the “Take this course" button, and join me in the only course that you will need! Who is this course for? Anyone looking to learn about Python People looking to learn about programming Those seeking to understand how Python works People seeking guidance on how to create Python based programs Beginners and experts in this field People seeking more knowledge on the various features of the Python programming language [Hidden Content]
  18. [HIDE][Hidden Content]]
  19. Sales page: [Hidden Content] Download: [HIDE][Hidden Content]]
  20. python facebom.py -t [email protected] -w wlist.txt -p 35.236.37.121 [Hidden Content]
  21. Learn Ethical Hacking with ease as it is fully Practical Course. Get ready to Fight against Hackers and Protect yourself. Learn the Tools used by Hackers. Start Improving your Coding Skills by writing and executing C, C++, Python Programs on Android Device. More importantly if you learn ethical hacking, you can take part in Bug Bounty Programs. ¿Para quién es este curso? if you want to learn Android Hacking, this is the First Course you must take [Hidden Content]
  22. [Hidden Content]
  23. Udemy - Python Programming Full Course (Basics,OOP,Modules,PyQt) [1.04 GB] [Hidden Content]