Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'ripper'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 6 results

  1. Features • adds itself to windows defender exclusion (admin permission) • mutex ( only one process at a time ) • delayed startup • creating your own certificate • hiding techniques [hide][Hidden Content]]
  2. usbrip (derived from "USB Ripper", not "USB R.I.P." ) is an open source forensics tool with CLI interface that lets you keep track of USB device artifacts (aka USB event history, "Connected" and "Disconnected" events) on Linux machines. Table of Contents: Description Quick Start Screenshots Git Clone Dependencies System Log Structure DEB Packages PIP Packages Portable Installation pip or setup.py install.sh Paths cron uninstall.sh Usage Synopsis Help Examples Credits & References Post Scriptum Description usbrip is a small piece of software written in pure Python 3 (using some external modules though, see Dependencies/PIP) which parses Linux log files (/var/log/syslog*or /var/log/messages* depending on the distro) for constructing USB event history tables. Such tables may contain the following columns: "Connected" (date & time), "User", "VID" (vendor ID), "PID" (product ID), "Product", "Manufacturer", "Serial Number", "Port" and "Disconnected" (date & time). Besides, it also can: export gathered information as a JSON dump (and open such dumps, of course); generate a list of authorized (trusted) USB devices as a JSON (call it auth.json); search for "violation events" based on the auth.json: show (or generate another JSON with) USB devices that do appear in history and do NOT appear in the auth.json; *when installed with -s flag*create crypted storages (7zip archives) to automatically backup and accumulate USB events with the help of crontab scheduler; search additional details about a specific USB device based on its VID and/or PID. Quick Start usbrip is available for download and installation at PyPI: ~$ pip3 install usbrip Screenshots [Hidden Content]
  3. Lavavo CD Ripper version 4.20 license activation name SEH buffer overflow exploit. View the full article
  4. Free MP3 CD Ripper version 2.8 .wma buffer overflow SEH exploit with DEP bypass. View the full article
  5. Free MP3 CD Ripper version 2.6 suffers from a buffer overflow vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.