Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 172 results

  1. WP-Hide Explained The convenient way to hide your WordPress from being visible through the code. A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code. Provide a clean method for removing any WordPress fingerprints including themes and plugins. No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved. [Hidden Content] [hide][Hidden Content]]
  2. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.5.9 Start: Code optimization Update: Change changelog.md + Readme.md [hide][Hidden Content]]
  3. Hide My WP is the number one security plugin for WordPress. It hides your WordPress from attackers, spammers and theme detectors. Over 26,000 satisfied customers use Hide My WP. It also hides your wp login URL and renames admin URL. It detects and blocks XSS, SQL Injection type of security attacks on your WordPress website. [Hidden Content] [hide][Hidden Content]]
  4. Protection against your greatest online foes Avast Premium Security protects against all online threats including spoofed websites and ransomware. Security that’s tailored to fit your needs Custom features for PC, Mac, Android, and iPhone/iPad secure your devices where it’s needed most. Single- and Multi-Device options let you choose the protection that works best for you. “Up to 10 devices” means you can share your security with every one of your devices or everyone closest to you. [Hidden Content] [hide][Hidden Content]]
  5. Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters Web Application Security Recon Automation Framework It takes user input as a domain name and maximize the attack surface area by listing the assets of the domain like - Subdomains from - Amass ,findomain, subfinder & resolvable subdomains using shuffledns Screenshots Port Scan JS files Httpx Status codes of subdomains Dirsearch file/dir paths by fuzzing [hide][Hidden Content]]
  6. Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features Man-in-the-middle (MITM) HTTP/1.1 proxy with logs Project based database storage (SQLite) Scope support Headless management API using GraphQL Embedded web interface (Next.js) [hide][Hidden Content]]
  7. Including: Cybersecurity for IT Professionals Cybersecurity with Cloud Computing Cybersecurity Foundations Ethical Hacking Denial of Service Ethical Hacking Enumeration Ethical Hacking Session Hijacking Ethical Hacking Wireless Networks Ethical Hacking Mobile Devices and Platforms Ethical Hacking Website and Web Application Testing Ethical Hacking Exploits Ethical Hacking Perimeter Defenses Learning Kali Linux Securing the IoT Designing and Testing Securing Android Apps Securing the IoT Secure Architectures Penetration Testing Essential Training Ransomware Practical Reverse Engineering [hide][Hidden Content]]
  8. McAfee Endpoint Security – is a comprehensive security solution that protects servers, endpoint systems and tablets from all known threats. These threats include malware, suspicious connections, insecure websites and downloaded files. Endpoint Security intercepts threats, monitors the overall state of the system and reports on detections and status. Features Basic threat prevention tools • Mandatory antivirus, vulnerability prevention tools, firewall, and web control tools share threat information with each other. Machine Learning • Modern methods allow you to detect malicious code based on static and behavioral attributes. Application deterrence • Blocking different types of behavior and deterring threats before they can infect systems or spread in your environment reduces the amount of potential damage from suspicious files and “zero-day” malware. Endpoint Detection and Response • Our integrated, automated and adaptable endpoint detection and response (EDR) technology is easy to use and reduces the incident response task to a single mouse click. Protection Modules: • Threat Prevention – check for viruses, spyware, unwanted programs and other threats by automatically checking the files each time a user accesses them or on demand. • Firewall – tracking data transfer between a computer, network resources and the Internet. It intercepts suspicious messages. • Internet Control – Displays security ratings and reports for websites when searching and browsing the Internet. Internet control allows the administrator to block access to websites based on their security rating or content. • Adaptive Threat Protection — analyzes content in your corporate environment and determines what actions to perform using file reputation data, rules, and reputation thresholds. [Hidden Content] [hide][Hidden Content]]
  9. Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features/to do HTTP man-in-the-middle (MITM) proxy and GraphQL server. Web interface (Next.js) with proxy log viewer. Add scope support to the proxy. Full-text search (with regex) in the proxy log viewer. Project management. Sender module for sending manual HTTP requests, either from scratch or based off requests from the proxy log. Attacker module for automated sending of HTTP requests. Leverage the concurrency features of Go and its net/http package to make it blazingly fast. Changelog v0.2.1 6931d63 Remove GitHub workflows 71e87d3 Remove modd.conf 81fbfe4 Tidy up .gitignore f6789fa Tidy up manual build process 0ffbb61 Update README c01f190 Use Go instead of C for regexp sqlite func [hide][Hidden Content]]
  10. EmbedOS EmbedOS – Embedded security testing operating system preloaded with firmware security testing tools. The virtual machine can be downloaded and imported as an OVF file into VirtualBox or VMWare. Tools (~/tools) Firmware Analysis Toolkit Firmware Analysis Comparison Toolkit (FACT) : Not fully installed. More disk space required. fwanalyzer ByteSweep Firmwalker Checksec.sh Binwalk QEMU Firmadyne Firmware Modification Kit OpenOCD Flashrom minicom ubi_reader uboot write elfutils pax-utils prelink lddtree plus more… Some of the above tools will install additional dependencies not listed here such as radare2, cwe-checker, and others. Vulnerable Firmware (~/firmware) Mirai affected firmware (DVR based) Damn Vulnerable Router Project IoTGoat Methodology (~/Desktop/Firmware-Security-Testing-Methodology.pdf) Firmware Security Testing Methodology – See the following repository for further details [Hidden Content] Changelog v2020.2 Update: 10/2020 New theme, and updated tools. [hide][Hidden Content]]
  11. You care about what you build. Protect your websites with the best WordPress security available. Wordfence includes an endpoint firewall and malware scanner that were built from the ground up to protect WordPress. Our Threat Defense Feed arms Wordfence with the newest firewall rules, malware signatures and malicious IP addresses it needs to keep your website safe. Rounded out by a suite of additional features, Wordfence is the most comprehensive security option available. [Hidden Content] [hide][Hidden Content]]
  12. itsMe

    Shield Security Pro v9.2.1

    It's Time To Stop Risking Everything You Work So Hard For. Take your WP Security seriously, before a lack of security takes you. Seriously. [Hidden Content] [hide][Hidden Content]]
  13. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.5.4 Add option “–js” for scan and analyze JS Delete “dryscrape” librarie for the moment, many errors with it, I’ll remake it later [hide][Hidden Content]]
  14. Avast Premium Security – is a well-known antivirus of a fairly high level. The developers of this antivirus have put all their knowledge about the fight against viruses into it in order to create one of the best antiviruses. This anti-virus program combines all the advanced technologies and methods to get the highest degree of computer security. This product is ideal for all Windows operating systems. Avast Premium Security protects against all online threats, including spoofed websites and ransomware. Complemented by SafeZone technology, it creates an isolated virtual desktop, invisible to any possible attacker, where you can do your online shopping and banking securely. Features • Advanced antivirus. Blocks viruses, spyware, and other malware in real-time. • Web Shield. Blocks dangerous downloads and websites. • Wi-Fi Inspector. Detects weaknesses in both your home Wi-Fi network and public networks. • Real Site. Prevents you from visiting fake sites designed to steal passwords and money. • Sandbox. Lets you open suspicious files in a safe environment to protect your PC. • Advanced Firewall. Monitors and controls what goes in and out of your computer. • Ransomware Shield. Prevents ransomware from harming any files in your protected folders. • Sensitive Data Shield. Stops spyware from accessing sensitive documents on your computer. • Webcam Shield. Blocks untrusted apps from accessing your webcam. • Data Shredder. Helps you permanently delete sensitive files so they can’t be recovered. • Automatic Software Updater. Updates the most popular apps on your PC to help plug security holes. • Passive Mode. Lets you safely use another antivirus on your PC alongside Avast Premium Security. • Do Not Disturb Mode. Silences notifications from Windows, other apps, and even our own Avast apps. • Real-time updates. Pushes security updates to you so you always have our best protection. [Hidden Content] [hide][Hidden Content]]
  15. PwnFox PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit. If you are a chrome user you can check [Hidden Content]. Single click BurpProxy Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked. Containers Profiles PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp. PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++. Security header remover Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload. Headers stripped: Content-Security-Policy X-XSS-Protection X-Frame-Options X-Content-Type-Options [hide][Hidden Content]]
  16. The Best WordPress Security Plugin to Secure & Protect WordPress Built by the WordPress security experts iThemes Security Pro takes the guesswork out of WordPress security. You shouldn’t have to be a security professional to use a security plugin, so iThemes Security Pro makes it easy to secure & protect your WordPress website. [Hidden Content] [Hidden Content]
  17. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.5.3 – add setup.sh [hide][Hidden Content]]
  18. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.2 RC3 First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools. Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include: Filtering the hunt query Pivot to PCAP Create an alert in TheHive Google search for the value Analyze the value on VirusTotal.com Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer! [hide][Hidden Content]]
  19. Stowaway is a Multi-hop proxy tool for security researchers and pentesters Users can easily proxy their network traffic to intranet nodes (multi-layer) PS: The files under demo folder are Stowaway’s beta version, it’s still functional, you can check the detail by README.md file under the demo folder This tool is limited to security research and teaching, and the user bears all legal and related responsibilities caused by the use of this tool! The author does not assume any legal and related responsibilities! Features Obvious node topology Clear information display of nodes and keep them permanently Active/passive connect mode between nodes Reverse connection between nodes through socks5 proxy Ssh tunnel mode Can be used on multiple platforms Multi-hop socks5 traffic proxy(Support UDP/TCP,IPV4/IPV6) Multi-hop ssh traffic proxy Remote interactive shell Upload/download functions Port Mapping(local to remote/remote to local) Port Reuse Open or Close all the services arbitrarily Authenicate each other between nodes Network traffic encryption with AES-256(CBC mode [hide][Hidden Content]]
  20. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.5.2 Try differents bypass for 403 code error Update dico.txt [hide][Hidden Content]]
  21. Pown Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploit, Pown.js considers frameworks to be an anti-pattern. Therefore, each module in Pown is, in fact, a standalone NPM module allowing a greater degree of reuse and flexibility. Creating new modules is a matter of publishing to NPM and tagging them with the correct tags. The rest is handled automatically. [Hidden Content]
  22. 0d1n Web security tool to make fuzzing at HTTP 0d1n is an Open Source web application bruteforcer and Fuzzer, its objective is to automate exhaustive tests to search anomalies. At another point of view, this anomaly can be a vulnerability, These tests can follow web parameters, files, directories, forms, and others Why is this tool made in C language? C has a high delay time for writing and debugging, but no pain no gain, it has fast performance, in addition, the C language is run at any architecture like Mips, ARM and others… in the future can follow mobile implementations. Other benefits of C is that it has a good and high profile to write optimizations if you want to write some lines in ASSEMBLY code with AES-NI or SiMD instructions, this is a good choice. Why you don’t use POO ? in this project I follow the”KISS” principle: [Hidden Content] It Simple C language has a lot of old school dudes like a kernel hacker. Changelog v2.7 Fix CORS Bug in load HTML (Now uses local HTTPD) Insert HTTPD with lib mongoose to load reports only for localhost Refactor the core of code Sort files by directory Create install resources in make file (tested on debian based distro) Change fork() to vfork() to gain performance Bug fix in console Read the readme.md Fix output results, to create directory for each log in /opt/0d1n/view… Remove wild pointer bugs [hide][Hidden Content]]
  23. 3 downloads

    EC Council | Certified Security Analyst Full Course Material FREE DOWNLOAD FOR USERS PRIV8

    $100.00 PRIV8

  24. View File EC Council | Certified Security Analyst EC Council | Certified Security Analyst Full Course Material FREE DOWNLOAD FOR USERS PRIV8 Submitter dEEpEst Submitted 19/08/20 Category Libro Online Password ********  
  25. Parrot Security OS is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and developed by the Frozen box network. Lorenzo Faletra announces the release of Parrot Security OS 4.10, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. Changelog v4.10 AnonSurf 3.0 AnonSurf 3.0 is ready, and it ha many important features. It is now subdivided into 3 modules: GUI, Daemon and Utilities. The GUI is written in NIM, a blazing fast programming language very easy to write and read that compiles in native C code. It uses Gintro GTK for the interface and it has several features to let the user control the anonsurf behavior. You can start, stop and reload anonsurf, you can easily configure anonsurf to automatically start at boot, and it is easy to monitor the status of tor and see the traffic, the logs and some usage statistics thanks to its integration with NYX. The new AnonSurf Daemon takes care of shutting down the service automatically at shutdown in case the user powered off the computer with anonsurf enabled, which was a known cause of later connectivity issues in previous versions, and of corurse allows the user to tell the init system to automatically start anonsurf at boot for those who need it. Anonsurf also ships with some utilities, like a CLI interface: the old famous anonsurf command, which is now an interface for the daemon instead of a standalone tool. We also delivered (and updated) dnstool, a software to easily control the behavior of DNS resolution across the system, that allows the user to choose between static and dynamic configurations and to use the servers provided by dhcp, the servers of choice of the user or the servers of the OpenNIC project. AnonSurf is overall more reliable and more stable, and it is an important step forward for the whole project since we deeply believe in privacy and the role it covers in the fight for freedom. Linux 5.7 Parrot OS now comes with Linux 5.7. Few important changes of this new kernel version: Improved scheduler. new ExFAT filesystem module. Spli Lock detection. userfaultfd() write protection support. A BPF-based Linux Security Module called bpf-lsm. Allow clone3() to spawn processes into cgroups. Improved perf cgroup profiling. Improved btrfs filesystem support. Metasploit 6.0 The development of Metasploit 6 has finally started, and it ships a lot of awesome features that were missing from the previous versions. It is important to know that this version will break retro-compatibility with previous versions, so it is important for our users to understand what has changed in this version. One of the most wanted features is finally here: end-to-end encryption in meterpreter backdoors, which of course breaks retro-compatibility with older meterpreter payloads. Other awesome news include the implementation of SMBv3 client support, imprved evasive capabilities via polimorphic paload generation routines. More… [hide][Hidden Content]]