Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'server'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. contents this is the server side code written in nodejs for screenshotting Tor websites. The code itself is just a puppeteer that connects to tor websites through a TOR proxy (which I setup on a different server. See the image below for instructions on how to setup a tor proxy) Its written as a docker img that fetches a list of tor sites from Amazon DynamoDB (you can replace this with SQL), then crawls each one and takes screenshot of them all. Stores it on S3 then exists. This project was run once a day on Azure Container Instances. the lambdasubmitsite.js is redundant actually and can be ignore. Its a rest endpoint (aws lambda) to receive user submitted Tor sites. setup tor proxy in the code you can see the following line const config_tor_proxies = ["18.130.24.239:56826", "18.130.24.239:56824"] I setup two instances of Tor and port 56826 and 56824. One is also sufficient. [Hidden Content]
  2. Cerberus FTP Server Enterprise Edition is a Managed File Transfer server that solves secure file transfer for larger organizations through file retention policies, transfer automations, advanced reporting, ad hoc file sharing and our popular HTTP/S web client. [Hidden Content] [hide][Hidden Content]]
  3. Wing FTP Server is an easy-to-use, powerful, and free FTP server software for Windows, Linux, and Mac OS. It supports multiple file transfer protocols, including FTP, FTPS, HTTP, HTTPS, and SFTP, giving your clients flexibility in how they connect to the server. And it provides admins with a web-based interface to administrate the server from anywhere. You can also monitor server performance and online sessions and even receive email notifications about various events taking place on the server. [Hidden Content] [hide][Hidden Content]]
  4. Global DNS allows you to instantly check the DNS records across multiple servers. It provides an insight to end users on which server website is pointing to. It is also helpful to check the current DNS entries incase the DNS records are changed. [Hidden Content] [hide][Hidden Content]]
  5. SMSLab, is a simple and professional Android App based SMS-sending system that comes with Android Apps and PHP Laravel. Its most the cheaper solution for SMS Business, SMS Marketing and avoiding dnd. It’s developed for those people who are interested to create their own SMS Services or who need a personal SMS system to promote their business. 5 billion people globally send and receive SMS messages. That’s about 65% of the world’s population. 23 billion SMS messages are sent every day worldwide. Expectedly, the number of messages sent daily worldwide is much higher. [Hidden Content] [hide][Hidden Content]]
  6. God Genesis is a C2 server purely coded in Python3 created to help Red Teamers and Penetration Testers. Currently, It only supports TCP reverse shell but waits a min, it’s a FUD and can give an admin shell from any targeted WINDOWS Machine. The List Of Commands It Supports:- =================================================================================================== BASIC COMMANDS: =================================================================================================== help –> Show This Options terminate –> Exit The Shell Completely exit –> Shell Works In Background And Prompted To C2 Server clear –> Clear The Previous Outputs =================================================================================================== SYSTEM COMMANDS: =================================================================================================== cd –> Change Directory pwd –> Prints Current Working Directory mkdir *dir_name* –> Creates A Directory Mentioned rm *dir_name* –> Deletes A Directoty Mentioned powershell [command] –> Run Powershell Command start *exe_name* –> Start Any Executable By Giving The Executable Name =================================================================================================== INFORMATION GATHERING COMMANDS: =================================================================================================== env –> Checks Enviornment Variables sc –> Lists All Services Running user –> Current User info –> Gives Us All Information About Compromised System av –> Lists All antivirus In Compromised System =================================================================================================== DATA EXFILTRATION COMMANDS: =================================================================================================== download *file_name* –> Download Files From Compromised System upload *file_name* –> Uploads Files To Victim Pc =================================================================================================== EXPLOITATION COMMANDS: =================================================================================================== persistence1 –> Persistance Via Method 1 persistence2 –> Persistance Via Method 2 get –> Download Files From Any URL chrome_pass_dump –> Dump All Stored Passwords From Chrome Bowser wifi_password –> Dump Passwords Of All Saved Wifi Networks keylogger –> Starts Key Logging Via Keylogger dump_keylogger –> Dump All Logs Done By Keylogger python_install –> Installs Python In Victim Pc Without UI Feature 1. The Payload.py is a FULLY UNDETECTABLE(FUD) use your own techniques for making an exe file. (Best Result When Backdoored With Some Other Legitimate Applications) 2. Able to perform privilege escalation on any Windows system. 3. Fud keylogger 4. 2 ways of achieving persistence 5. Recon automation to save your time. [hide][Hidden Content]]
  7. Minecraft servers list (CMS) is TOP quality, features rich Minecraft servers listing control management system. Which allows you to own and maintain premium quality minecraft servers project in minutes with no programming knowledge at all. [Hidden Content] [hide][Hidden Content]]
  8. PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware in any system on any system with PowerShell installed on it. Thanks to the integrated C2 server, you can exfiltrate files and receive client information via HTTP. All communication between the two elements is encrypted or encoded so as to be undetected by traffic inspection mechanisms, although at no time is HTTPS used at any time. Requirements PowerShell 4.0 or greater This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it. [hide][Hidden Content]]
  9. HTTPUploadExfil HTTPUploadExfil is a (very) simple HTTP server written in Go that’s useful for getting files (and other information) off a machine using HTTP. While there are many use-cases, it’s meant to be used in low-stakes offensive scenarios (e.g., CTFs). Think of this as python3 -m http.server but for getting data off a machine instead of on the machine. Obviously, this is a very loud and somewhat restricted way of exfiltrating data. Nevertheless, it’s quite handy and somewhat easier than, for example, using SMB or FTP. If you are looking for something more elegant, have a look at, for example, dnsteal or PyExfil. [hide][Hidden Content]]
  10. HTTPUploadExfil HTTPUploadExfil is a (very) simple HTTP server written in Go that’s useful for getting files (and other information) off a machine using HTTP. While there are many use-cases, it’s meant to be used in low-stakes offensive scenarios (e.g., CTFs). Think of this as python3 -m http.server but for getting data off a machine instead of on the machine. Obviously, this is a very loud and somewhat restricted way of exfiltrating data. Nevertheless, it’s quite handy and somewhat easier than, for example, using SMB or FTP. If you are looking for something more elegant, have a look at, for example, dnsteal or PyExfil. [hide][Hidden Content]]
  11. Self managed VPS | Host WordPress site and flutter web app | Opensource WordOps and Virtualmin control panel | Firewall. What you'll learn Self managed virtual Private Server setup WordOps - WordPress management tool for VPS Virtualmin and webmin alternate to cPanel Host wordPress websites Host Flutter web app Secure Virtual Private Server Set Firewall Requirements Computer with decent internet connection Willing to purchase a basic VPS plan (4 $- 10$) Description Self-managed VPS | Host WordPress site and flutter web app | Opensource WordOps and Virtualmin control panel | Firewall The course is designed to manage Virtual Private Server for a beginner. Mainly the course is focused on easy and understandable platforms to manage your Virtual Private Server. Unmanaged Virtual Private Server gives you the limitless possibility of customization. But you should know how to manage the Linux VPS purchased. Managed VPS is easy to use, but it is costly. So unmanaged VPS is the best option. For those who are using shared hosting and need more control over your website, this course will be helpful to explore the speed and customization possibilities in VPS hosting. VPS has a great advantage, that it can completely be managed by you. So that you will have an unlimitted possibility of customization. In this course, you will learn to deploy WordPress websites and Flutter web app to the virtual private server. Topics covered Section1 Select a hosting plan Section2 Purchase domain name Purchase a VPS Pointing VPS IP address to domain Change hostname Section3 Operating system installation -Ubuntu OS Connect to VPS using SSH Section4 WordOps installation Create WordPress website and update SSL certificate Basic firewall settings WordOps- update and maintenance Login and update WordPress website Remove WordPress website WordOps Experiment Section5 Reinstall OS Virtualmin installation Configure virtualmin Create virtual server Load SSL certificate Package update Add new website Install WordPress Delete a virtual server Section6 Deploy Flutter web app into the virtual server Who this course is for: Beginners Those who are looking to improve website speed on self managed server Hosting WordPress website VPS Hosting Flutter web app on VPS [Hidden Content] [hide][Hidden Content]]
  12. RDP Servers? Before Going to RDP servers we will learn that what is RDP and what's use it. After that, we will learn what are the RDP servers and will discuss some RDP/ VPS service providers. What is RDP? RDP stands for Remote desktop protocol. Remote Desktop Protocol owns by Microsoft, you may also notice a software called Remote Desktop Connection on your Windows computer. RDP allows user to remotely control or connect to an RDP Server enabled Computer through the internet or Local networks. Remote Desktop Protocol allows remote users to control the other windows pc which is situated in other location and its so cool to have an RDP server for your self I will talk about it later. Remote Desktop Protocol is Only For Windows, by RDP you can only connect to a Windows RDP server, and also not all windows version supports RDP sever establish, only some of windows server version supports it. So Basically, RDP is for transmitting the remote server's monitor/screen to the Client User and the Client User's keyboard and mouse to the remote server, by this client user have full control of the RDP server. What is an RDP Server? For the shake of simplicity, The RDP Server is a windows machine that has installed the necessary components to share the control of that machine to an RDP remote user or an RDP client User. let's understand with a basic example, suppose you have a Windows PC in which you installed necessary components (RDS etc.) to share its control with another user, in this case, your pc is an RDP server. What is a client? The client are you. Yes! a client is who controls the remote servers using and RDP client software. You can connect to an RDP server from windows, macOS, IOs, android cause Microsoft officially provides RDP client apps for all of the above platforms. You can also connect to an RDP server using Linux or other platform but using third party solutions or applications. Requirements to connect to an RDP Server There are no special requirements to establish a connection between the RDP server and your Device, you just need an RDP server IP address with a port and an RDP client on your device. For android, you can find the Official RD client app of Microsoft in google play store and for windows, you can use preinstalled software the Remote Desktop Connection. How To Get an RDP Server For Yourself Cause of the Extreme Popularity of RDP/VPS at present, there are lots of RDP/VPS providers on the internet. Some are costly and some are very cheap. If you want to take a trial you can use Amazon AWS or Microsoft Azure for testing and experience the RDP server. AWS 1 year - aws.amazon.com/free Azure 100$ Credit - azure.microsoft.com/en-us/free/students/ What The Use OF RDP? I think after reading the above lines you should know why to use RDP/VPS, but if you don't know then let me explain to you the advantage of it. First read the above paragraphs about RDP, RDP servers, RDP Client carefully. I hope Now you understood what RDP and how it works, now you know that we can establish a connection to a Windows RDP server using RDP client software which is available for android, ios and macOS, so it's clear here that you can control a windows machine which has a good amount of ram, high processing power by just your smartphone, isn't it cool? it's super cool to control a high-end computer using your Low-end device. You can use it if you haven't a Computer, you can use it for anonymous reasons, and for privacy reasons of for doing some anonymous activity which you don't want to do on your PC and your local network. And One More Thing I use RDPs for High-Speed & Unlimited internet(up to 5gp/ps) and as a hosting.
  13. KMS Server Service – KMS helpers and emulators. Part of the KMS Tools by Ratiborus. Command Line Parameters -Port – KMS Port. Range from 1 to 65535 -PWin – Windows PID -PO14 – Office 2010 PID -PO15 – Office 2013 PID -PO16 – Office 2016 PID -AI – Activation Interval. Range from 15 to 43200 minutes -RI – Renewall Interval. Range from 15 to 43200 minutes -Debug – Detailed info. -Log – Log file Enabled. -Hwid – Machine Hardware Hash. What’s New * ADD SKU for office 21 [hide][Hidden Content]]
  14. Set up your own IPsec VPN server in just a few minutes, with IPsec/L2TP, Cisco IPsec and IKEv2 on Ubuntu, Debian and CentOS. All you need to do is provide your own VPN credentials, and let the scripts handle the rest. An IPsec VPN encrypts your network traffic, so that nobody between you and the VPN server can eavesdrop on your data as it travels via the Internet. This is especially useful when using unsecured networks, e.g. at coffee shops, airports or hotel rooms. Features New: The faster IPsec/XAuth ("Cisco IPsec") and IKEv2 modes are supported New: A pre-built Docker image of the VPN server is now available Fully automated IPsec VPN server setup, no user input needed Encapsulates all VPN traffic in UDP - does not need ESP protocol Can be directly used as "user-data" for a new Amazon EC2 instance Includes sysctl.conf optimizations for improved performance Tested with Ubuntu, Debian, CentOS/RHEL and Amazon Linux 2 ⚠️ DO NOT run these scripts on your PC or Mac! They should only be used on a server! [hide][Hidden Content]]
  15. A fake MySQL Server used for penetration, which is implemented by native python3 with out any other dependency package. [hide][Hidden Content]]
  16. Kubesploit Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of the Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization’s cyber event management, which doesn’t happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made. We wanted to create an offensive tool that will meet these requirements. What’s New As the C&C and the agent infrastructure were done already by Merlin, we integrated the Go interpreter (“Yaegi”) to be able to run Golang code from the server to the agent. It allowed us to write our modules in Golang, provide more flexibility on the modules, and dynamically load new modules. It is an ongoing project, and we are planning to add more modules related to Docker and Kubernetes in the future. The currently available modules are: Container breakout using mounting Container breakout using docker.sock Container breakout using CVE-2019-5736 exploit Scan for Kubernetes cluster known CVEs Port scanning with focus on Kubernetes services Kubernetes service scan from within the container Light kubeletctl containing the following options: Scan for containers with RCE Scan for Pods and containers Scan for tokens from all available containers Run command with multiple options [hide][Hidden Content]]
  17. SnitchDNS SnitchDNS is a database-driven DNS Server with a Web UI, written in Python and Twisted, that makes DNS administration easier with all configuration changed applied instantly without restarting any system services. One of its main features is the logging of all DNS queries allowing the discovery of network traffic endpoints, and it can also be used to implement canary tokens as it supports notifications via e-mail, web push, Slack, and Teams. Red teamers can also use SnitchDNS to monitor phishing domains for sandboxes, integrate with SIEM solutions, restrict responses to specific IP ranges, egress data via a DNS tunnel and catch-all domains, and more. Basic Features Database Driven. Changes are reflected immediately on each DNS request. Supported DBMS: SQLite MySQL / MariaDB Postgres DNS Server Support for common DNS Records. A, AAAA, AFSDB, CNAME, DNAME, HINFO, MX, NAPTR, NS, PTR, RP, SOA, SPF, SRV, SSHFP, TSIG, TXT. Catch-All Domains. Ability to match any subdomain (no matter the depth) to a specific parent domain, for instance, *.hello.example.com. Unmatched Record Forwarding. Functionality to intercept specific queries (ie only A and CNAME) and forward all other records to a third-party DNS server (ie Google). Tags and Aliases. IP Rules Configure Allow/Block rules per domain. Notifications. Receive a notification when a domain is resolved, via: E-mail Web Push Slack Microsoft Teams User Management Multi-User support Each user is given their own subdomain to use. LDAP Support Two Factor Authentication Password Complexity Management Logging All DNS queries are logged, whether they have been matched or not. CSV Logging for SIEM integration. Swagger 2.0 API Deployment Ansible scripts for Ubuntu 18.04 / 20.04 Docker CLI support for the zone, record, user, and settings management. CSV Export/Import [hide][Hidden Content]]
  18. Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server [hide][Hidden Content]]
  19. What you'll learn Setup your own vpn server in just 5 minutes Setup and configure Wireguard vpn server Setup and configure OpenVpn server Requirements Basic knowledge of Linux commands Description WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry. OpenVPN provides flexible VPN solutions to secure your data communications, whether it's for Internet privacy, remote access for employees, securing IoT, or for networking Cloud data centers. Our VPN Server software solution can be deployed on-premises using standard servers or virtual appliances, or on the cloud. Well in this course I'm going to show you how it is to set up your own Wireguard or OpenVPN server with less than three dollars per month in just five minutes. This way we're going to configure, you can easily connect to your VPN server as a client with graphical application in macOS, windows, Linux, android and iOS with no extra fee. You will not find the contents of this course anywhere else and this is going to be a unique course. You can use this way to decrease your costs that you pay to VPN providers and also have a great safe connection where ever you connect to Internet or you can even start your VPN providing business and earn money have a good revenue from it. I'll see you in the course :) Who this course is for: The ones who want to decrease their VPN cost The ones who want to have a safe and secure Internet connection The ones who are looking for a way to easily set up WireGuard VPN server The ones who are looking for a way to easily set up OpenVPN server [Hidden Content] [hide][Hidden Content]]
  20. PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement. PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Other notable features of PoshC2 include: Highly configurable payloads, including default beacon times, jitter, kill dates, user agents and more. A large number of payloads generated out-of-the-box which are frequently updated and maintained to bypass common Anti-Virus products. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. A modular format allowing users to create or edit C#, PowerShell or Python3 modules which can be run in-memory by the Implants. Notifications on receiving a successful Implant, such as via text message or Pushover. A comprehensive and maintained contextual help and an intelligent prompt with contextual auto-completion, history and suggestions. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic even when communicating over HTTP. Client/Server format allowing multiple team members to utilise a single C2 server. Extensive logging. Every action and response is timestamped and stored in a database with all relevant information such as user, host, implant number etc. In addition to this the C2 server output is directly logged to a separate file. Changelog v7.2 New Report template & style Updates to support Slack Notifications Add ability to chain SharpPBind implants to an arbitrary depth Fix Sharpsocks on Docker Misc minor fixes [hide][Hidden Content]]
  21. SQLi-Hunter SQLi-Hunter is a simple HTTP proxy server and a sqlmap api wrapper that makes dig SQLi easily. [hide][Hidden Content]]
  22. Global DNS allows you to instantly check the DNS records across multiple servers. It provides an insight to end users on which server website is pointing to. It is also helpful to check the current DNS entries incase the DNS records are changed. Demo: [Hidden Content] [HIDE][Hidden Content]]
  23. About Carina Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so that we don't need to store webshell, VPS or cPanel data in "strange places". [HIDE][Hidden Content]]
  24. SQLi-Hunter SQLi-Hunter is a simple HTTP proxy server and a sqlmap api wrapper that makes dig SQLi easily. [HIDE][Hidden Content]]
  25. Global DNS allows you to instantly check the DNS records across multiple servers. It provides an insight to end users on which server website is pointing to. It is also helpful to check the current DNS entries incase the DNS records are changed. Demo: [Hidden Content] [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.