Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'secret'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 12 results

  1. jsleak is a tool to find secret , paths or links in the source code during the recon. It is easy-to-use command-line tool designed to uncover secrets and links in JavaScript files or source code. Features: Discover secrets in JS files such as API keys, tokens, and passwords. Identify links in the source code. Complete Url Function Concurrent processing for scanning of multiple Urls Check status code if the url is alive or not [Hidden Content]
  2. Additional Secret Disk Creating a secure place for sensitive files has never been easier than with our software Secret Disk. Within a few clicks, you can create a password-protected additional hard disk to store, hide, and lock files. The software also enables you to set several automation scenarios to make usage very convenient for you. If you need more than one secret disk, that can easily be handled by our software. Easy And Fast Creation With our software, you won't need to format your hard disk or change anything to the boot sector. It can make a new disk automatically and quickly while providing you with plenty of set-up options. You can choose to make the disk invisible, including the contents in it, and keep it password-protected. The Secret Disk works similarly to a standard hard disk and provides compatibility with any other software. To top it all off, you can choose your disk letter. Clever in Any Situation In the case of a power outage or fatal error of your Windows OS, your secret disk will automatically lock and become invisible as the information related to the disk instance is stored in the virtual memory. The Secret Disk does not encrypt your files, but it does limit access to them by allowing you to keep them password protected. The software ties together your files with the virtual disk to provide ample security to keep your files secure. [Hidden Content] [Hidden Content]
  3. Breakout Strategies, Scalping/Day Trading Strategies, and Investment Strategies What you’ll learn An Overview of Trading Strategies Which trading techniques are most suited to your time constraints? Trading techniques for types 5 scalping/day trading strategies 5 swing trading strategies. Five investment methods Several breakthrough techniques are Diversification of your portfolio by kind Management of Risk Before the crash and the pump, exit and enter. Predict the peak and bottom of Bitcoin. Price movement, trends, and charts are used to trade. Swing trading and day trading using the Price Action chart. Description Introduction: The majority of cryptocurrency-related courses available on various online platforms do not cover all trading tactics. They mostly concentrate on basic technical analysis, cryptocurrencies, and blockchain fundamentals on the internet. They don’t go into detail on how to make investing choices; where to enter and exit trades; how to day and swing trade; and how to set stop losses and maximize gains. Welcome to the crash school on hidden trading tactics. I will just cover trading tactics in this course. I will not go into the fundamentals of cryptocurrency. This course will be divided into four sections: In this first chapter, we’ll go through all of the dollar-cost averaging tactics for the cryptocurrency market. How to securely join and leave altcoins and bitcoins, as well as how to predict the bottom and top of the bitcoin cycle and its relationship with altcoins. We’ll also talk about how to use bitcoin’s seasonal pattern to make the most money by selling at the right time. After that, in the second chapter, we’ll look at swing trading methods, including how to enter trades and where to take profits using risk management settings. In the third section of the course, we will concentrate on scalping and day trading tactics. I’ll go through how to use several financial market principles to capture the market’s brief swing. We’ll talk through breakout tactics and how they function in the last module or chapter. We’ll get into breakout trading in depth. Look at how to properly integrate price action with candlesticks and trends, as well as how to trade this combination. What you will discover: Trading techniques for types Which trading configuration should you employ based on your time constraints? 5 scalping/day trading strategies 5 swing trading strategies. Five investment methods Several breakaway techniques Price movement, trends, and charts are used to trade. Management of Risk What is the best way to place a stop loss and take profit? Predict the peak and bottom of Bitcoin. Before the crash and the pump, exit and enter. Diversification of your portfolio by kind There are plenty of others… Disclaimer In most nations, cryptocurrency is not a regulated digital asset. All investments are vulnerable to significant price volatility. Please remember that any action you take based on the information in this course is completely at your own risk, and I won’t be responsible for any losses or damages you experience because of it. Who this course is for: Anyone interested in learning scalping or day trading may do so. Is anyone interested in swing trading tactics? Anyone interested in learning about investing methods can Anyone who wants to learn more about risk management can find Is anyone interested in trading yet unfamiliar with its concepts? Anyone interested in learning how to employ trading methods may find it useful. Is anyone interested in learning about escape and entrance techniques? Anyone looking to increase their income through cryptocurrency trading will discover Anyone interested in learning how to anticipate the bottom and peak of the bitcoin market may do so. Who wants to know when they should invest in the bitcoin industry can find out. How much longer? [Hidden Content] [hide][Hidden Content]]
  4. GitGuardian Shield: protect your secrets with GitGuardian GitGuardian shield (ggshield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets, as well as other potential security vulnerabilities or policy breaks. GitGuardian shield uses our public API through py-gitguardian to scan and detect potential secrets on files and other text content. Only metadata such as call time, request size, and scan mode is stored from scans using GitGuardian shield, therefore secrets and policy breaks incidents will not be displayed on your dashboard and your files and secrets won’t be stored. You’ll need an API Key from GitGuardian to use ggshield. Currently supported integrations Azure Pipelines Bitbucket Pipelines Circle CI Orbs Docker Drone GitHub Actions GitLab Jenkins Pre-commit hooks Pre-push hooks Pre-receive hooks Travis CI Changelog v1.4.2 Add dead link checker action by @RemakingEden in #303 Adjust link-check run & fix last broken link by @commjoen in #304 Challenge 18: New challenge – MD5 hashing by @RemakingEden in #298 Bump peter-evans/create-issue-from-file from 3 to 4 by @dependabot in #306 Challenge 18-pre-alpha fixes by @commjoen in #305 [hide][Hidden Content]]
  5. Jbin website secret scraper Jbin will gather all the URLs from the website and then it will try to expose the secret data from them. It collects both URLs and JS links to scrape secrets out of it. Also if you are looking for a specific string on a page or want to run custom regex then you can do that too now with the new release, It also provides you with an informative excel report. Currently, we can scrape these secrets! Google Maps API Artifactory API Artifactory Pass Auth Tokens AWS Access Keys AWS MWS Auth Token Base 64 Basic Auth Credentials Cloudanary Basic Auth Tokens Facebook Access Tokens Facebook Oauth Tokens Github Secrets Google Cloud API Google Oauth Tokens Youtube Oauth Tokens Heroku API Keys IPV4 IPV6 URL Without http URL With http Generic API RSA Private Keys PGP Private Keys Mailchamp API key Mailgun API key Picatic API Slack Token Slack Webhook Stripe API Keys Square Access Token Square Oauth Secret Twilio API key Twitter Client ID Twitter Oauth Twitter Secret Keys Vault Token Firebase Secrets Paypal Braintree Tokens New Features? Directory bruteforce to get more URLs Custom wordlist Added realtime task monitoring Added the option to reduce power [hide][Hidden Content]]
  6. Tool to scan for secret files on HTTP servers. snallygaster is a tool that looks for files accessible on web servers that shouldn’t be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. Changelog v0.0.9 Fix problems with dnspython 2.x, see #54. Add .orig extension to backupfiles test. Add new tests for wordpress debug.log files and url-encoded HTTP header. Minor bugfixes. [hide][Hidden Content]]
  7. snallygaster Tool to scan for secret files on HTTP servers. snallygaster is a tool that looks for files accessible on web servers that shouldn’t be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. [hide][Hidden Content]]
  8. snallygaster Tool to scan for secret files on HTTP servers what? snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: Attacking with HTTP Requests See the TESTS.md file for an overview of all tests and links to further information about the issues. [HIDE][Hidden Content]]
  9. A Burp Suite extension to help pentesters to discover a apikeys,accesstokens and more sensitive data using a regular expressions. SecretFinder process any HTTP response (support javascript file) and support Passive and Active scan. Add RegEx Download SecretFinder and open it with any editor Now add your regex and save the file Example Install download SecretFinder Requirements jython burpsuite [HIDE][Hidden Content]]
  10. snallygaster Tool to scan for secret files on HTTP servers what? snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: Attacking with HTTP Requests See the TESTS.md file for an overview of all tests and links to further information about the issues. [HIDE][Hidden Content]]
  11. [Hidden Content]
  12. Lupusec XT2 Plus Main Panel with firmware 0l0.2.19E suffers from shared private keys for SSL certificates, root passwords derived from the MAC address, information disclosure, and cross site request forgery vulnerabilities. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.