Jump to content

Search the Community

Showing results for tags 'services'.

The search index is currently processing. Current results may not be complete.
  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 15 results

  1. awsEnum is a python script that enumerates AWS services through the provided credential. It is coded and published to be used in particular circumstances: Engaging in penetration testing activity. Carry on a Bug hunting activity. AWS cloud security Audit. Any other legal activity that is already approved by the owner of the asset. awsEnum is created to work under a hoodie, which means there’s no intention to support all modes. Features Connect to aws service through boto3, in other words! signing request. awsEnum allows users to set the number of requests [By default: 1000]. awsEnum store result into json file. Keep AWS credential within awscli configuration and just pass profile_name to awsEnum. Supported service: ec2, iam, s3. [hide][Hidden Content]]
  2. What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. tornado can do create hidden service with tor network generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things hidden service becomes available outside tor network and ready to reverse shell connection be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim's point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users. Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  3. Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have experienced different remote administration tools, probably you know you need a forward port with VPN or NGROK but in this sense, the Tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. Currently, this project has that features. Create a hidden service Generate msfvenom payload with fully undetectable Hidden service becomes available outside tor network Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  4. Silver is a front-end that allows complete utilization of (masscan,nmap) programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more. Features Resumable scanning Slack notifcations Multi-core utilization Supports: IPs, CIDR & hostnames Vulnerability data caching Shodan integration Dependencies nmap masscan Python libraries psutil requests [Hidden Content]
  5. smartbrute The smart password spraying and bruteforcing tool for Active Directory Domain Services. [hide][Hidden Content]]
  6. BruteX is a shell script and automates the process of analyzing one or many targets. BruteX include Nmap,Hydra & DNS enum. Nmap scan opens ports and defines running on the target server service. Thereafter, start Bruteforce FTP, SSH, and other services using the Hydra, and so on. Automatically brute force all services running on a target: Open Ports Usernames Passwords Changelog v2.3 Updated default credentials for Rasberry Pi/Kali [hide][Hidden Content]]
  7. Our upload services lets you upload files such as .exe .dll .scr .bat .doc .pdf and much more anonymously. Just drag and drop a file to the upload box, or you can click the box and select a file to upload. After upload u will get direct link to your file so u are able to share it instantly. [Hidden Content]
  8. QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking. Features: Port Forwarding using Ngrok [HIDE][Hidden Content]]
  9. msctf in the Text Services Framework suffers from multiple design flaws that can lead to things like UIPI bypass and interfering with processes. View the full article
  10. Terminal Services Manager version 3.2.1 denial of service proof of concept exploit. View the full article
  11. This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services by sending a crafted request to the /node REST endpoint. As per SA-CORE-2019-003, the initial remediation was to disable POST, PATCH, and PUT, but Ambionics discovered that GET was also vulnerable (albeit cached). Cached nodes can be exploited only once. View the full article
  12. Download: [hide][Hidden Content]] Virus Scan: Not needed it, it's a text file.
  13. This Metasploit module exploits Hashicorp Consul's services API to gain remote command execution on Consul nodes. View the full article
  14. Terminal Services Manager version 3.1 SEH local buffer overflow exploit. View the full article
  15. Microsoft Active Directory Federated Services (ADFS) suffers from a time-based user enumeration vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.