Search the Community

Showing results for tags 'security'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 105 results

  1. The Shellcoder's Handbook: Discovering and Exploiting Security Holes [Hidden Content] This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files Doewnload: [HIDE][Hidden Content]]
  2. WordPress Hide & Security Enhancer is a flexible, well-supported and easy-to-use plugin to hide any WordPress fingerprints and traces, making your site Content Management System (CMS) impossible to detect. Prevent over 99,99% of intrusions, which is a huge security improvement as your site will never get hacked by attackers and boots who try to exploit the huge list of WordPress security holes which get bigger every day. Demo: [Hidden Content] [HIDE][Hidden Content]]
  3. ZoneAlarm Extreme Security Manténgase seguro con una protección prémium completa. 100% Sin Virus, Garantizado. Términos Potente antivirus que previene amenazas y ataques maliciosos Nuestro firewall protege su identidad y privacidad en línea Prevención de ransomware galardonada nuevo Protección contra phishing en tiempo real para compras y banca en línea [Hidden Content] [HIDE][Hidden Content]]
  4. Nsauditor Network Security Auditor is a powerful Network Security Auditing Tools Suite designed for network auditing, network scanning, network monitoring and more. Key Features and Benefits Nsauditor Network Security Auditor is a powerful network security tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts. Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditor checks enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor network auditing software significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found. Nsauditor network monitoring provides some insight into services running locally, with options to dig down into each connection and analyze the remote system, terminate connections and view data. Nsauditor is the best network security auditing tools suite, includes more than 45 network tools and utilities for network security auditing, network scanning, network monitoring and more. Nsauditor helps network administrators to identify security holes and flaws in their networked systems Nsauditor includes firewall system, real-time network monitoring, packet filtering and analyzing software [Hidden Content] [HIDE][Hidden Content]]
  5. Advanced Firewall protection detects fake, spam and attacking users and protects your website. Indeed, it cannot be blocked by Google or other search engine detections and does not harm your website in terms of SEO. Real-time firewall protection works according to the two options; one is blocking attacks when it is detected and the other one is checking it with reCAPTHCA. You can arrange these settings with Prevention Method System. Demo: [Hidden Content] [HIDE][Hidden Content]]
  6. ITWSV is an automated penetration testing tool that performs information gathering, auditing, and reporting. TOOLS USED FOR PENTEST WHOIS DNSWALK FIERCE DNSRecon DNSenum NMAP DMitry theHarvester LBD SSLScan SSLYze WhatWeb Automater Grabber Parsero Uniscan Metagoofil A2SV WPScan Droopescan WPSeku XssPy Spaghetti sublist3r WAFW00F nslookup nslookup dirsearch OWASP Joomscan Spaghetti Globuster Grabber OTHER TOOLS Pureblood Wapiti Lscript Trity RED_HAWK [HIDE][Hidden Content]]
  7. Microsoft Windows Server 2012 suffers from a Group Policy security feature bypass vulnerability. View the full article
  8. Intelligent Security System SecurOS Enterprise version 10.2 suffers from a SecurosCtrlService unquoted service path vulnerability. View the full article
  9. 1337day-Exploits

    sudo 1.8.28 Security Bypass

    sudo version 1.8.28 suffers from a security bypass vulnerability. View the full article
  10. 7 downloads

    Pluralsight Cyber Security Course Collection ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  11. View File Pluralsight Cyber Security Course Collection - 13 GB - Pluralsight Cyber Security Course Collection ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 10/10/19 Category Libro Online Password ********  
  12. Mobile Security Framework (MobSF) Version: v2.0 beta Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing. Screenshots Static Analysis - Android APK Static Analysis - iOS IPA Dynamic Analysis - Android APK Web API Viewer Download: [HIDE][Hidden Content]]
  13. CheckPoint Endpoint Security VPN versions E80.87 Build 986009514 and below and ZoneAlarm versions 15.4.062.17802 and below suffer from a privilege escalation vulnerability. View the full article
  14. OWASP API Security Top 10 2019 [Hidden Content]
  15. Security Engineering for the IoT A Gudie to Security Solution of the IoT System [Hidden Content]
  16. Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. View the full article
  17. 5 downloads

    Top 100 Hacking & Security E-Books (Free Download) S.No E-Book (PDF Link) Total Pages 1. Advanced Penetration Testing 269 Pages 2. The Basics of Web Hacking 179 Pages 3. The Basics of Hacking and Penetration Testing 178 Pages 4. The Art of Deception by Kevin Mitnick 577 Pages 5. SQL Injection Attacks and Defense 761 Pages 6. Metasploit - The Penetration Tester's Guide 332 Pages 7. Ethical Hacking and Penetration Testing Guide 523 Pages 8. Network Attacks and Exploitation - A Framework 219 Pages 9. Python Web Penetration Testing Cookbook 224 Pages 10. Wireshark for Security Professionals 391 Pages 11. Mastering Modern Web Penetration Testing 298 Pages 12. The Shellcoder's Handbook 745 Pages 13. The Little Black Book of Computer Viruses 183 Pages 14. XSS Attacks - Cross Site Scripting Exploits and Defense 482 Pages 15. The Web Application Hacker's Handbook 771 Pages 16. Ethical Hacking and Countermeasures 239 Pages 17. Reversing - Secrets of Reverse Engineering 619 Pages 18. Network Security Bible 697 Pages 19. Hacking Web Applications - Hacking Exposed 416 Pages 20. Hacking for Dummies 387 Pages 21. Hacking Wireless Network for Dummies 387 Pages 22. Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques 314 pages 23. Professional Penetration Testing 525 Pages 24. Gray Hat Hacking - The Ethical Hacker's Handbook 577 Pages 25. Hack Attacks Testing 561 Pages 26. Basic Security Testing with Kali Linux 242 Pages 27. Mastering Kali Linux for Advanced Penetration Testing 356 Pages 28. Kali Linux CTF Blueprints 190 Pages 29. Kali Linux Cookbook 261 Pages 30. Kali Linux - Assuring Security by Penetration Testing 454 Pages 31. Information Security Management Handbook 3206 Pages 32. Computer and Information Security Handbook 877 Pages 33. CISSP - Certified Information Systems Security Professional 804 Pages 34. Computer Security and Cryptography 542 Pages 35. Python for Kids 348 Pages 36. End to End Network Security - Defense-in-Depth 469 Pages 37. A Guide to Computer Network Security 483 Pages 38. Essential Computer Security 321 Pages 39. Security in Wireless Mesh Networks 548 Pages 40. Hacking Windows XP (OLD) 379 Pages 41. Hacking Exposed - Windows Security, Secrets and Solutions 482 Pages 42. Hacking Exposed - Network Security, Secrets and Solutions 736 Pages 43. Information Security - Principles and Pratice 413 Pages 44. Nessus, Snort and Ethereal Power Tools 472 Pages 45. Active Defense - A Comprehensive Guide to Network Security 374 Pages 46. Information Security Fundamentals 262 Pages 47. Wireless Network Security 422 Pages 48. Red Hat Linux Security and Optimization 721 Pages 49. Windows Forensics Analysis 386 Pages 50. Mobile and Wireless Network Security and Privacy 232 Pages 51. Firewalls and Internet Security 456 Pages 52. An Introduction to Computer Security - The NIST Handbook 290 Pages 53. Unauthorized Access - Physical Penetration Testing for IT Security Teams 309 Pages 54. Testing Web Security 297 Pages 55. Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network 670 Pages 56. Information Resource Guide - Computer, Internet and Network Systems Security 325 Pages 57. The Hacker's Underground Handbook 116 Pages 58. Guide to SCADA and Industrial Control Systems Security 164 Pages 59. The International Handbook of Computer Security 274 Pages 60. The Code Book - How to Make It, Break It, Hack It, Crack It 273 Pages 61. Linux 101 Hacks 271 Pages 62. Introduction to Linux - A Hands on Guide 223 Pages 63. Bluetooth Security 222 Pages 64. IT Governance - A Manager's Guide to Data Security and ISO 27001/27002 385 Pages 65. Batch File Programming 155 Pages 66. Cracking the Coding Interview 310 Pages 67. Dictionary of Networking 465 Pages 68. Hacking Gmail 310 Pages 69. Linux Complete Command Reference 1528 Pages 70. Practical Hacking Techniques and Countermeasures 752 Pages 71. The Art of Intrusion by Kevin Mitnick 291 Pages 72. Hack Notes - Windows Security Portable Reference 289 Pages 73. Hacing - The Next Generation 298 Pages 74. Hacking the Cable Modem 330 Pages 75. Hackers Beware - Defending Your Network From The Wiley Hacker 817 Pages 76. Hack Proofing Your Network 826 Pages 77. Hack Attacks Revealed 837 Pages 78. Dissecting the Hack - The F0rb1dd3n Network 441 Pages 79. TCP/IP Guide 1671 Pages 80. Offensive Security - Wireless Attacks - WiFu 385 Pages 81. Google Hacking - For Penetration Testers 529 Pages 82. Computer Forensics Investigating Network Intrusions and Cyber Crime 394 Pages 83. Hakin9 Bible 207 Pages 84. Network Forensics - Tracking Hackers Through Cyberspace 574 Pages 85. Computer Forensics - Investigating Data and Image Files 227 Pages 86. Penetration Testing and Network Defense 625 Pages 87. Hacking Exposed - Malware and Rootkits 401 Pages 88. Malware Analyst's Cookbook 746 Pages 89. Mobile Malware - Attacks and Defense 386 Pages 90. Java 2 Network Security 702 Pages 91. A Bug Hunter's Diary 212 Pages 92. Viruses Revealed - Undestand and Counter Malicious Software 721 Pages 93. Figital Forensics With Open Source Tools 289 Pages 94. SSH, The Secure Shell - The Definitive Guide 438 Pages 95. Pro PHP Security 369 Pages 96. Zero Day Exploit - Countdown to Darkness 363 Pages 97. Metasploit Penetration Testing Cookbook 269 Pages 98. 24 Deadly Sins of Software Securtiy 433 Pages 99. Botnets - The Killer Web App 482 Pages 100. Hacker Highschool - Hack School for Beginners (ZIP) 12 Books ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  18. View File Top 100 Hacking & Security E-Books Top 100 Hacking & Security E-Books (Free Download) S.No E-Book (PDF Link) Total Pages 1. Advanced Penetration Testing 269 Pages 2. The Basics of Web Hacking 179 Pages 3. The Basics of Hacking and Penetration Testing 178 Pages 4. The Art of Deception by Kevin Mitnick 577 Pages 5. SQL Injection Attacks and Defense 761 Pages 6. Metasploit - The Penetration Tester's Guide 332 Pages 7. Ethical Hacking and Penetration Testing Guide 523 Pages 8. Network Attacks and Exploitation - A Framework 219 Pages 9. Python Web Penetration Testing Cookbook 224 Pages 10. Wireshark for Security Professionals 391 Pages 11. Mastering Modern Web Penetration Testing 298 Pages 12. The Shellcoder's Handbook 745 Pages 13. The Little Black Book of Computer Viruses 183 Pages 14. XSS Attacks - Cross Site Scripting Exploits and Defense 482 Pages 15. The Web Application Hacker's Handbook 771 Pages 16. Ethical Hacking and Countermeasures 239 Pages 17. Reversing - Secrets of Reverse Engineering 619 Pages 18. Network Security Bible 697 Pages 19. Hacking Web Applications - Hacking Exposed 416 Pages 20. Hacking for Dummies 387 Pages 21. Hacking Wireless Network for Dummies 387 Pages 22. Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques 314 pages 23. Professional Penetration Testing 525 Pages 24. Gray Hat Hacking - The Ethical Hacker's Handbook 577 Pages 25. Hack Attacks Testing 561 Pages 26. Basic Security Testing with Kali Linux 242 Pages 27. Mastering Kali Linux for Advanced Penetration Testing 356 Pages 28. Kali Linux CTF Blueprints 190 Pages 29. Kali Linux Cookbook 261 Pages 30. Kali Linux - Assuring Security by Penetration Testing 454 Pages 31. Information Security Management Handbook 3206 Pages 32. Computer and Information Security Handbook 877 Pages 33. CISSP - Certified Information Systems Security Professional 804 Pages 34. Computer Security and Cryptography 542 Pages 35. Python for Kids 348 Pages 36. End to End Network Security - Defense-in-Depth 469 Pages 37. A Guide to Computer Network Security 483 Pages 38. Essential Computer Security 321 Pages 39. Security in Wireless Mesh Networks 548 Pages 40. Hacking Windows XP (OLD) 379 Pages 41. Hacking Exposed - Windows Security, Secrets and Solutions 482 Pages 42. Hacking Exposed - Network Security, Secrets and Solutions 736 Pages 43. Information Security - Principles and Pratice 413 Pages 44. Nessus, Snort and Ethereal Power Tools 472 Pages 45. Active Defense - A Comprehensive Guide to Network Security 374 Pages 46. Information Security Fundamentals 262 Pages 47. Wireless Network Security 422 Pages 48. Red Hat Linux Security and Optimization 721 Pages 49. Windows Forensics Analysis 386 Pages 50. Mobile and Wireless Network Security and Privacy 232 Pages 51. Firewalls and Internet Security 456 Pages 52. An Introduction to Computer Security - The NIST Handbook 290 Pages 53. Unauthorized Access - Physical Penetration Testing for IT Security Teams 309 Pages 54. Testing Web Security 297 Pages 55. Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network 670 Pages 56. Information Resource Guide - Computer, Internet and Network Systems Security 325 Pages 57. The Hacker's Underground Handbook 116 Pages 58. Guide to SCADA and Industrial Control Systems Security 164 Pages 59. The International Handbook of Computer Security 274 Pages 60. The Code Book - How to Make It, Break It, Hack It, Crack It 273 Pages 61. Linux 101 Hacks 271 Pages 62. Introduction to Linux - A Hands on Guide 223 Pages 63. Bluetooth Security 222 Pages 64. IT Governance - A Manager's Guide to Data Security and ISO 27001/27002 385 Pages 65. Batch File Programming 155 Pages 66. Cracking the Coding Interview 310 Pages 67. Dictionary of Networking 465 Pages 68. Hacking Gmail 310 Pages 69. Linux Complete Command Reference 1528 Pages 70. Practical Hacking Techniques and Countermeasures 752 Pages 71. The Art of Intrusion by Kevin Mitnick 291 Pages 72. Hack Notes - Windows Security Portable Reference 289 Pages 73. Hacing - The Next Generation 298 Pages 74. Hacking the Cable Modem 330 Pages 75. Hackers Beware - Defending Your Network From The Wiley Hacker 817 Pages 76. Hack Proofing Your Network 826 Pages 77. Hack Attacks Revealed 837 Pages 78. Dissecting the Hack - The F0rb1dd3n Network 441 Pages 79. TCP/IP Guide 1671 Pages 80. Offensive Security - Wireless Attacks - WiFu 385 Pages 81. Google Hacking - For Penetration Testers 529 Pages 82. Computer Forensics Investigating Network Intrusions and Cyber Crime 394 Pages 83. Hakin9 Bible 207 Pages 84. Network Forensics - Tracking Hackers Through Cyberspace 574 Pages 85. Computer Forensics - Investigating Data and Image Files 227 Pages 86. Penetration Testing and Network Defense 625 Pages 87. Hacking Exposed - Malware and Rootkits 401 Pages 88. Malware Analyst's Cookbook 746 Pages 89. Mobile Malware - Attacks and Defense 386 Pages 90. Java 2 Network Security 702 Pages 91. A Bug Hunter's Diary 212 Pages 92. Viruses Revealed - Undestand and Counter Malicious Software 721 Pages 93. Figital Forensics With Open Source Tools 289 Pages 94. SSH, The Secure Shell - The Definitive Guide 438 Pages 95. Pro PHP Security 369 Pages 96. Zero Day Exploit - Countdown to Darkness 363 Pages 97. Metasploit Penetration Testing Cookbook 269 Pages 98. 24 Deadly Sins of Software Securtiy 433 Pages 99. Botnets - The Killer Web App 482 Pages 100. Hacker Highschool - Hack School for Beginners (ZIP) 12 Books ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 16/09/19 Category Libro Online Password ********  
  19. The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module. View the full article
  20. Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. View the full article
  21. Web Security Dojo Web Security Dojo is a virtual machine that provides the tools, targets, and documentation to learn and practice web application security testing. A preconfigured, stand-alone training environment ideal for classroom and conferences. No Internet required to use. Ideal for those interested in getting hands-on practice for ethical hacking, penetration testing, bug bounties, and capture the flag (CTF). A single OVA file will import into VirtualBox and VMware. There is also an Ansible script for those brave souls that want to transform their stock Ubuntu into a virtual dojo. Bow to your sensei! Features vulnerable web applications common web security testing tools popular industry web application security guidelines walk-throughs of several targets (no peeking ahead) no Internet-connect required to use username: dojo password: dojo To install Dojo you first install and run VirtualBox 5 or later, then “Import Appliance” using the Dojo’s OVF file. We have PDF or YouTube for instructions for Virtualbox. The OVA should also be able to be imported and used in various VMware tools, but we do not support this directly at this time. [HIDE][Hidden Content]]