Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'shells' or 'hack'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast process. Built using the Python programming language and can only be run on the command line terminal. This tool has advantages which include: Fast process. Execution of more than one target. Easy to use. Using the asyncronus method, makes this tool run quite well. [hide][Hidden Content]]
  2. Slowloris Slowloris is low bandwidth Dos hacking app. The tool was programmed using Python programming language. It performs an HTTP Denial of Service attack that slows down or makes the small servers crash. You can also use this tool to perform a Dos attack on the website. The tool creates a lot of HTTP requests and sends headers periodically to keep the connection open. The tool never closes the connection unless the server does so. As the server closes the connection, Slowloris built a new connection to the server. As a result, the server goes down or doesn't reply. How to install Open your Termux and type the following commands one by one. [Hidden Content] Hence the Slowloris is installed in your Termux. Now type the below command to see how to use Slowloris. Source Code [hide][Hidden Content]]
  3. ABOUT SQL DUMPER SOFTWARE The SQLi dumper has incredible features that give the user more power and versatility. It is cracked by a famous hacker OkProg. It is a database-driven application that is very simple to use and you can easily handle it. There is no harmful work you can do. There are no bugs found and it is very simple to use. Although it is added by some users that this software is the easiest way to keep save the database files. There is no chance to lose your database information. Microsoft gave us several methods for SQL server backups but few of them are easy and they all need a lot of time. Features Safe to download Work with all versions of windows Totally Free Easy to use Primary key identity Multiple online search engine Automated analyzer Dumping data with multi-threading Analyzer and dumper supporter Come with advanced WAF bypass Admin login finder Trash system SQLi dork scanner Hash online Cracker Exploiter supporters up to 100x threats Come with an advanced custom query box Proxies list Tools Settings Analyzer My SQL union Dorks XSS Many more. How To Install Firstly Turn Off your antivirus Download and extract the zip file Now unzip it Turn off windows defender real-time protection Run and install My SQL Dumper Cracked.Exe Enjoy. [Hidden Content]
  4. How to hack any website in 9 minutes [Hidden Content]
  5. GitHub says unknown attackers have stolen encrypted code-signing certificates for its Desktop and Atom applications after gaining access to some of its development and release planning repositories. [Hidden Content]
  6. title says question... can learn hacking here?
  7. Hacklock - Hack Android Pattner From Link Hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which can hack victim pattern and. This tool works on both rooted Android device and Non-rooted Android device. [Hidden Content]
  8. Here Are 5 Of The Best Ways To Hack An Instagram Accounts [Hidden Content]
  9. HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing How the hackers do the hacking? Well, keep reading and you will find out.. [Hidden Content] [hide][Hidden Content]]
  10. A script for generating common revshells fast and easy. Especially nice when in need of PowerShell and Python revshells, which can be a PITA getting correctly formated. [hide][Hidden Content]]
  11. NOTE: This hack works only on outdated Windows 2000, XP,Vista and 7 How to hack passwords using USB Drive Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit: [Hidden Content] NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
  12. Go Beyond Root: Pop The Box and Build Real Detections Description Are you ready to feel the fun of KNOWING how to hack? In this course you will learn how to build a modern hacking lab. You'll learn how to master the latest tools and attacker tradecraft for compromise victim environments. You'll finally feel the pleasure and freedom of knowing what you're talking about. I had a BLAST creating this course for you guys and I'm so excited to share all the awesome with you. In this course you will learn: ping (for recon) nmap rustscan whatweb + Wappalyzer Burp Browser (why you should say NO to FoxyProxy!) feroxbuster kerbrute ldp ldapsearch crackmapexec smbclient How to install Impact from scratch (because you know... it always breaks) getTGT GetUserSPNs What the heck a SPN is anyway! You'll learn that - finally hashcat Silver Tickets ticketer How to manually convert passwords into NTLM hashes SQL Commands How to build a reverse shell in Powershell rlwrap netcat iconv xxd base64 PEAS-ng (winPEAS) Powershell Remoting evil-winrm Reverse Engineering .NET Binaries Wireshark Insecure Deserialization ysoserial JuicyPotatoNG Persistence Mechanisms Beyond Root: Threat Hunting the Attack Beyond Root: Mitigations Seriously! This is the best course I've ever made on hacking. It's the combination of all my experience jam packed into one tiddy little course. You'll also get: Hacking links and resources Complete commands to copy and paste directly into your terminal! So what are you waiting for? Why are you still reading? Enroll now and change your life. Let's go! Who this course is for: New SOC Analysts New Penetration Testers New Red Teamers New Blue Team Defenders Help Desk Analysts (wanting to get into cyber) Network Admins, Sys Admins and Network Engineers (wanting to get into cyber) Cybersecurity Managers (who want to know how the bad guy compromise environments) [Hidden Content] [hide][Hidden Content]]
  13. How To Hack Instagram, Facebook, Twitter And Other Web Accounts | Kali Linux | Blackeye Video: [Hidden Content] Tools: [Hidden Content]
  14. The netfilter project enables packet filtering, network address [and port] translation (NA[P]T), packet logging, userspace packet queueing and other packet mangling. Download: [Hidden Content]
  15. Packet Filter (from here on referred to as PF) is OpenBSD's system for filtering TCP/IP traffic and doing Network Address Translation. PF is also capable of normalizing and conditioning TCP/IP traffic, as well as providing bandwidth control and packet prioritization. PF has been a part of the GENERIC kernel since OpenBSD 3.0. Download: [Hidden Content] Guide: [Hidden Content]
  16. How to Hack Wireless Network Basic Security and Penetration Testing Kali Linux Your First Hack Alan T. Norman is a proud, savvy, and ethical hacker from San Francisco City. After receiving a Bachelor of Science at Stanford University. Alan now works for a mid-size Informational Technology Firm in the heart of SFC. He aspires to work for the United States government as a security hacker, but also loves teaching others about the future of technology. Alan firmly believes that the future will heavily rely on computer “geeks” for both security and the successes of companies and future jobs alike. In his spare time, he loves to analyze and scrutinize everything about the game of basketball. [hide][Hidden Content]]
  17. Decrypt passwords/cookies/history/bookmarks from the browser. HackBrowserData is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download|localStorage|extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. Disclaimer: This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility! hack-browser-data-v0.4.2 Latest Changes feat: support export extension @moonD4rk (#129) feat: enhance cmd color log output @moonD4rk (#129) docs: add logo for HackBrowserData @moonD4rk (#128) Supported Browser Windows Browser Password Cookie Bookmark History Google Chrome ✅ ✅ ✅ ✅ Google Chrome Beta ✅ ✅ ✅ ✅ Chromium ✅ ✅ ✅ ✅ Microsoft Edge ✅ ✅ ✅ ✅ 360 Speed ✅ ✅ ✅ ✅ QQ ✅ ✅ ✅ ✅ Brave ✅ ✅ ✅ ✅ Opera ✅ ✅ ✅ ✅ OperaGX ✅ ✅ ✅ ✅ Vivaldi ✅ ✅ ✅ ✅ Yandex ✅ ✅ ✅ ✅ CocCoc ✅ ✅ ✅ ✅ Firefox ✅ ✅ ✅ ✅ Firefox Beta ✅ ✅ ✅ ✅ Firefox Dev ✅ ✅ ✅ ✅ Firefox ESR ✅ ✅ ✅ ✅ Firefox Nightly ✅ ✅ ✅ ✅ Internet Explorer ❌ ❌ ❌ ❌ [hide][Hidden Content]]
  18. 3 Ways to Hack CCTV Cameras (and How to Prevent It from Happening to You) Though advances have been made in recent years, many CCTV cameras remain troublingly vulnerable to attack. Malicious actors have developed a wide range of techniques to circumvent security protocols and gain access to video surveillance systems. Some use very simple exploits (that take mere minutes), while others prefer more sophisticated intrusions (that infiltrate even hardened systems). Though their methods may vary, talented hackers can make their way into your home security or enterprise surveillance network. Once inside, they can use remote access to watch the world through your cameras—or potentially even take control of them. Raising the bar on security is the whole point of installing CCTV cameras in the first place. So, these vulnerabilities largely defeat the purpose of investing in a surveillance system. TThe entire industry received a wake-up call to this reality following the revelation in 2017 that more than half a dozen Hikvision brand wifi cameras were being accessed through a backdoor password reset flaw. The problem created embarrassing headlines (the hashtag #hakvision circulated on social channels). And ICS-Cert, an agency within the U.S. Department of Homeland Security, characterized the vulnerability as “remotely exploitable” with a “low skill level to exploit.” Despite this incident raising overall awareness, many organizations are still woefully behind when it comes to safeguarding their camera systems. To better prepare, all enterprises should understand the following three methods that are among the most commonly used by criminals to gain unauthorized access to CCTV cameras.
  19. Description Do you want to learn how to hack websites and web application in the most fun way? If yes, then this course is for you. In this course, you will start as a beginner with no previous experience and knowledge about website or web app hacking. You will learn different hacking methodologies, tools and techniques. This course gives you ideas on website hacking through theoretical knowledge and practical implementation. This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Rather than using virtual machines and Kali Linux tools, We will be using the “hackthissite” website to hone our website hacking skills. There are several websites on the internet which allow learners to hack through cool and realistic challenges. These websites are free of cost to use and help us understand how web hacking works at the core level. By completing all these challenges and missions, you will be able to start your career as web pen-tester. You can then use some tools and techniques using Kali Linux to uplift your knowledge. But, if you are a complete beginner then, this course will be perfect to start with. Most of the courses you will find at Udemy will teach you hacking through installing Linux on your machines using virtual machines. This way of learning web hacking can be troublesome for some of us because our machine may not be high end enough to support these tools smoothly. In order to make anyone start with ethical hacking and web hacking, I have brought this course to you which can be compatible with any machine (Linux, Windows, MacOS x) because we will be learning to hack through completing missions and challenges given by “hackthissite” website. In this course, we will cover basic to advanced concepts of web and application hacking in a fun and exciting way which will feel like you are playing some sort of the games where you complete the missions and you get rewarded. The “Hack This Site” website we will be using throughout this course is a popular platform among hackers to learn and play hacking games similar to Capture The Flag (CTF). You will learn following topics throughout this course: PHP code vulnerability HTML code tampering Encryption and Decryption Server Side Include commands Cookies tampering Directory listing vulnerability SQL injection attacks Reverse Engineering Cryptography Apache server related vulnerability Cross site scripting attacks (XSS) Tampering forms and cookies Application hacking using x64dbg and tools Wire-shark You do not need any virtual machines, Kali Linux or high end machines to learn websites and application hacking in this course. I will be using Windows 10 to complete the missions and learn at the same time. You can use any operating system to learn from this course. I will be using Chrome as a web browser throughout this course. Lastly, This course does not teach you only these aforementioned attacks/missions, we will be updating new content like Javascript missions, programming missions and other remaining missions. Completing these missions, I am sure you will have enough knowledge to attack any type of website you want. Hope to see you at the class! Caution: Please take permissions of the owner before defacing any websites. Who this course is for: Beginner programmer who want to learn how to hack websites and applications For anyone who want to shift their career field from programming to hacking For self learners who want to hone their ethical hacking skills For completely noob person in hacking who knows basic HTML commands Requirements No web hacking experience required Though taught in the course, basic knowledge of Html, Javascript and SQL is required Must know how to use web browser either Chrome or FireFox [Hidden Content] [hide][Hidden Content]]
  20. Shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place. [hide][Hidden Content]]
  21. Proxies: Yes Bots: 100 Email:Pass Capture: Plan / Points / sVip / isServerVIP [hide][Hidden Content]]
  22. We are at your service with one of the best software ** WiFi that few people know about it and maybe they do not know its efficiency, I will bring you the latest version of this software. Well, the difference between this software and similar programs like Damper is that Damper software takes a PIN from you. For ** WiFi, which is not sometimes responsive, but this software provides you with 3 pins for each WiFi, which increases the percentage. [Hidden Content]
  23. Anon?M ID's Hack Pack v2 Contents __________________________________________________ #Booters __________________________________________________ Atomic Booter Edited.rar Atomic Booter.rar ATTBooter Source [PRODIGY Edit].rar booter source.rar Carbon Booter v2 Final.rar Ddos em source.rar DOS Net Booter Source.rar Erotic Booter.rar JeeJeePower.rar Knofilct Booter.rar Konflict Source [Custom Coded].rar KyleFYI.rar Legion Booter [Avatar Vuln Fixed].rar lJepsi Booter.rar Orgylicious Booter.rar OsOModS Premium Source.rar Phanatac Booter.rar Phantac Booter [Custom Coded].rar Premium Web Booter [New PRODIGY].rar Premium Web Booter.rar Prodigy's Booter New by Natha.rar Prodigys Booter.rar Quick Booter.rar Rage Booter Source.rar SB Booter.rar SB Source [Custom Coded].rar ShellSRC (Old Prodigy).rar Stealth Booter V1.rar Team313 Booter.rar twBooter v1.6.0.rar Tyler777 Booter.rar Ub3r Booter.rar VertexNetv1.2.1.rar WebBasedV1.rar WicKd Booter.rar Wormf00d Booter.rar XBL booter v1.rar XioNz Booter Web Edition v1.rar __________________________________________________ #E-Book __________________________________________________ -------------------------------------------------- Computer Hacking -------------------------------------------------- Win XP Hacks by O'Reilly.chm (Ebook - Pdf) Untold Windows Tips And Secrets (Ank Black Book of Compuer Viruses.pdf Computer Knowledge Virus Tutorial.pdf Computer Viruses for Dummies.pdf -------------------------------------------------- Computer Hacking\How To Hack_Hacker_Highschool -------------------------------------------------- HHS_en01_Being_a_Hacker.pdf HHS_en02_Windows_and_Linux.pdf HHS_en03_Ports_and_Protocols.pdf HHS_en04_Services_and_Connections.pdf HHS_en05_System_Identification.pdf HHS_en06_Malware.pdf HHS_en07_Attack_Analysis.pdf HHS_en08_Forensics.pdf HHS_en09_Email_Security.pdf HHS_en10_Web_Security_and_Privacy.pdf HHS_en11_Passwords.pdf HHS_en12_Legalities_and_Ethics.pdf HHS_TOC_Glossary.pdf -------------------------------------------------- Cracking -------------------------------------------------- Fadia, Ankit - Encryption Algorithms Explained.pdf Hacking GMail.pdf Sentry Config Guide.pdf Truths!!!--What they Don't teach in Manuals!!!.pdf -------------------------------------------------- etc -------------------------------------------------- Cracking the Universal Product Code.pdf Gray Hat Hacking.pdf -------------------------------------------------- Monetizing -------------------------------------------------- $100+10Mins CPALead.pdf $100+Daily.pdf $200+Daily.pdf $2300 in 3 Days using Twitter Traffic.pdf $250+Daily.pdf $300 Easily.pdf $300+Daily.pdf $400+Daily.pdf $567.21+DAY CPA METHOD.pdf $8633.pdf 20 Ways To Make $100 Per Day Online.pdf 25k+Weekend.pdf 3_Step_Money_Guide_By_Meh..pdf 500_a_Day_facebook_fan_pages.pdf 5KDay(Part 1).pdf 5KDay(Part 2).pdf Adfly money machine - make $1000 every month - no Andrew6800HF Ebook.pdf CPALead_Blackhat_ebook_new.pdf CPA-Prophet.pdf Get free Alienware Laptops [Secret Loophole of Del Get free domains Black Hat method.pdf Make $100+ Guide - MoneyBag.pdf Make $20+ a day. Autopilot.pdf Make $50 Day in 10 minutes with EnviroFile and Lin Make $75 a Day Guide.pdf Make 100$ Per Day with Your Typing Skills - Punch Make 100$ Per Day.pdf Make 1000$ in 10 days.pdf Make Money with BlackHat Methods.pdf Share Cash Sucess!.pdf The Ultimate Money Making Guide.pdf -------------------------------------------------- Network and Web Hacking -------------------------------------------------- Web Hacking - Attacks and Defense.chm 501 Web Site Secrets Unleash the Power of Google, Attacking with HTML5 by Lavakumar Kuppan.pdf Bookmarks for Extreme Googling.pdf Dangerous Google.pdf Defacing Websites A Step By Step Process By Ankit Dos Attacked.pdf FTP Exploits By Ankit Fadia.pdf How To Hack Into A Computer On LAN.pdf SQL INJECTION TUT.pdf Tracing IP,DNS,WHOIS-nsLOOKUP.pdf Transparent_proxies_with_Squid_By_Ankit_fadia_hack __________________________________________________ #Script __________________________________________________ -------------------------------------------------- C & C++ -------------------------------------------------- arme.c rudy.c ssyn.c sudp.c udp.c udplag.c X.c passgen.cpp syn.cpp tcpip.cpp synflood.h -------------------------------------------------- Perl -------------------------------------------------- desktop.ini 17.pl b374k Shell Checker.pl CiscoDosExploits.pl cpanel_password_brute_forcer.pl ddos.pl dork.pl fb.pl Google Hacks.pl Google tool.pl ICF SQLI CRAWLER.pl LFI scan.pl md5 checksum.pl md5_cracker.pl md6_cracker.pl Paranoic Scan 0.9.pl pixel.pl port scanner.pl script_ddos_perl.pl slap.pl slowloris.pl slowris.pl SQL Injection Vulnerability Dork Scanner.pl Sqli scanner script by int3 .pl synflood.pl udpflood.pl Viper Lfi Scanner Ver. 4.0.pl web-sites-on-web-server-scanner.pl zone-h mass poster.pl joomscan_2.rar Perl Collection.rar Web-Sorrow_v1.5.0FINAL(patched_version).rar dos script.txt multiple cms hash cracker.txt -------------------------------------------------- PHP Shells -------------------------------------------------- -------------------------------------------------- DOSER -------------------------------------------------- Green Shell (UDP).php Post DOS (TCP).php Slowloris.php ddos_v2.txt mass_shell_checker_-_coded_by_kurosaki.txt new_-_udp.txt script_dos_php.txt simpliest php dos.txt SQL Injection Server ScaNNer.txt UDPFLOOD.txt -------------------------------------------------- Misc Script -------------------------------------------------- admin page finder.php Bing Subdomain Scanner CLI.php Bing Subdomain Scanner WebBased.php BinusHacker Mailer.php bomber.php Cloudflare Resolver.php com_jce.php com_user vulnerability scanner.php comuser.php connect_tools.php Convert PHP Shell to PNG or GIF.php don3.php dork scanner.php down.php facebook colour text generator.php geo.php gmail bruteforcer.php google.php index.php killer3n.php logs.php m_killer3.php m_mannu.php MadLeets Mail Bomber.php madspotshell.php Mailer.php mailm.php mannu.php Massdeface.php MySQL Web Interface.php netflix.php PasswordHash.php post.php Proxy Blocker Block Proxies EFFECTIVLY.php rootdevil.php scaner.php slowloris shell.php Slowloris.php smtp_sending.php SQLi Google Scanner & MySQLi Dumper PHP IRC BOT.ph Sym.php tez.php web vulnerability scanner.php Website vulnerable scanner Tools.php www.checksite.us.php xsschallenge3.php [PHP] FTP + Cpanel.txt CloudFlare IP Resolver by Phizo.txt cpanel brute force ~ expl0it.txt fake mailer by syahmie == www.facebook.com_moneyca infamousbytes.txt joomla and wordpress mass defacer_v2.txt k2_component_category_selection_custom_field-_joom mass_mailer.txt mobile device detection.txt multI_cpanel_username_scraper_+_brute_forcer_wIth_ name availability checker.txt new_header_checks.txt paypal valid email checker.txt php_wallbase_random_wallpaper_downloader.txt script_ascii_art.txt silent poison by team indishell.txt silent poison edited by m0bil3.txt url_find_[php_engine].txt yYJ4Urhr.txt ------------------------------------------------ AnonGhost Shell.php anonymous.php antichat.php b374k-2.8.php b374k-2.8.source.php c100.php c99.php c999.php cgi.php cmd.php CWShellDumper.php ekin0x.php erne.php fso.php itsecteam_shell.php Jackal v1.9.php kacak.php liz0zim.php login.php Moroccan Spamers Ma-EditioN By GhOsT.php NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Versi r57.php safe0ver.php simattacker.php sosyete.php stres.php SyRiAn Sh3ll V7.php Botnets.rar php-dos-attacker-1.2b.rar preDict.rar wordpress-password-cracker.rar 529.txt anonghost_bypass_shell--decoded.txt anonghost_shell_priv8.txt antichat.txt Antichat_Shell_v1.3.txt aspx.txt aspydrv.txt Ayyildiz_Tim_AYT_Shell_v 2.1_Biz.txt backupsql.txt beyaz_hacker.txt bypass.txt bypass_shell_2013_priv8.txt c100(1).txt c100.txt c99.txt c99ud.txt cgi.txt cmd.txt cpanel.txt Crystal.txt ctt_sh.txt cw.txt CWShellDumper.txt cybershell.txt dC3_Security_Crew_Shell_PRiV.txt Dive_Shell_1.0_Emperor_Hacking_Team.txt dq.txt Dx.txt ekin0x.txt erne.txt ex0shell.txt fso.txt ftpsearch.txt GFS web-shell ver 3.1.7 - PRiV8.txt gfs_sh.txt h4ntu shell [powered by tsoi].txt hxpshell.txt ironshell.txt isko.txt JspWebshell 1.2.txt ka0s_over.txt kacak.txt KAdot Universal Shell v0.1.6.txt kral.txt lamashell.txt Liz0ziM Private Safe Mode.txt liz0zim.txt load_shell.txt login.txt lolipop.txt magiccoder.txt mass.txt matamu.txt megabor.txt Moroccan Spamers Ma-EditioN By GhOsT.txt Mysql interface v1.0.txt MySQL Web Interface Version 0.8.txt mysql.txt mysql_tool.txt NCC-Shell.txt NetworkFileManagerPHP.txt NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Versi nst.txt nstview.txt PH Vayv.txt PHANTASMA.txt php-include-w-shell.txt Private-i3lue.txt pws.txt r57(1).txt r57.txt r57shell.txt r57shell1.40.txt rootshell.txt ru24_post_sh.txt s72 Shell v1.1 Coding.txt Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt safe0ver(1).txt safe0ver.txt saudi_sh3ll_v1.0.txt shellzx.txt simattacker(1).txt simattacker.txt Simple PHP backdoor by DK.txt simple_cmd.txt SimShell 1.0 - Simorgh Security MGZ.txt small.txt sosyete(1).txt sosyete.txt spygrup.txt stres.txt telnet.txt tryag.txt tryag1.txt udp_shell.txt Uploader.txt zaco.txt zacosmall.txt zehir4.txt zone.txt -------------------------------------------------- PHP Shells: DOSER -------------------------------------------------- Green Shell (UDP).php Post DOS (TCP).php Slowloris.php ddos_v2.txt mass_shell_checker_-_coded_by_kurosaki.txt new_-_udp.txt script_dos_php.txt simpliest php dos.txt SQL Injection Server ScaNNer.txt UDPFLOOD.txt -------------------------------------------------- PHP Shells: Misc Script -------------------------------------------------- admin page finder.php Bing Subdomain Scanner CLI.php Bing Subdomain Scanner WebBased.php BinusHacker Mailer.php bomber.php Cloudflare Resolver.php com_jce.php com_user vulnerability scanner.php comuser.php connect_tools.php Convert PHP Shell to PNG or GIF.php don3.php dork scanner.php down.php facebook colour text generator.php geo.php gmail bruteforcer.php google.php index.php killer3n.php logs.php m_killer3.php m_mannu.php MadLeets Mail Bomber.php madspotshell.php Mailer.php mailm.php mannu.php Massdeface.php MySQL Web Interface.php netflix.php PasswordHash.php post.php Proxy Blocker Block Proxies EFFECTIVLY.php rootdevil.php scaner.php slowloris shell.php Slowloris.php smtp_sending.php SQLi Google Scanner & MySQLi Dumper PHP IRC BOT.ph Sym.php tez.php web vulnerability scanner.php Website vulnerable scanner Tools.php www.checksite.us.php xsschallenge3.php [PHP] FTP + Cpanel.txt CloudFlare IP Resolver by Phizo.txt cpanel brute force ~ expl0it.txt fake mailer by syahmie == www.facebook.com_moneyca infamousbytes.txt joomla and wordpress mass defacer_v2.txt k2_component_category_selection_custom_field-_joom mass_mailer.txt mobile device detection.txt multI_cpanel_username_scraper_+_brute_forcer_wIth_ name availability checker.txt new_header_checks.txt paypal valid email checker.txt php_wallbase_random_wallpaper_downloader.txt script_ascii_art.txt silent poison by team indishell.txt silent poison edited by m0bil3.txt url_find_[php_engine].txt yYJ4Urhr.txt -------------------------------------------------- Python -------------------------------------------------- adm_pagefinder.py adminfinder.py Bing LFI-RFI Searcher.py com_user server scanner.py com_user.py ddos.py Dequiem2.0.py Email Spoofing.py findip.py findmyhash.py help.py hulk.py jce.py jce_scanner.py main.py pastebin_upload.py patator_v0.5.py PHPbb Bruteforcer.py portscan.py Proxy_finder.py pyagent_user_agent_generator.py pycrack_md5_hash_cracker_(python_2.7.5).py pycrack_md5_hash_cracker_(python_3.3.2).py pyflood_dos_flooder_(syn_tcp_udp).py python___secure_password_generator.py python_elmasry_mail_sender.py python_flash_card_quizzer.py python_sql,rfi,lfi.py recipe-473869-1.py scriptfinder.py shellfinder.py SQLi.py suram.py togel.py tumblr.py V3n0MScanner-smartd0rk3r.py v3n0m-v.0.1.py WebAdminLoginFinder v2.1.py wifite.py XSS SQLi LFI RFI cmd scanner .py facebook.rar password_generator_-_python.txt pastebin_python.txt pyomegle2_v2.txt xparadox's_uk_sms_bomber.txt -ARPwner-master -faraday-master -GooDork-master -ntpdos-master -PACK-0.0.3 -PyInstaller-2.1 -pylunch -pysqli-master -r-u-dead-yet -ShellDetect -tool -tor ____________________________________________________________ #Tools ____________________________________________________________ -------------------------------------------------- Admin Page - Login Page Scanner -------------------------------------------------- admin.pl Admin_Locate.pl APF.pl Admin_Locate.py -------------------------------------------------- Crypters and Binders -------------------------------------------------- 0 Crypter .rar 2012 Crypter.rar Black-Crypt.rar Byte Crypter V3.rar Chrome Crypter 4.9.rar CrypteX Advanced.rar DarkBinderV1.rar Easy Binder.rar Entropy_v5u2.rar Grieve Crypter 2012.rar High Life Crypter.rar iBinder.rar Infinity Crypter v2.rar jCrypt.rar MAXACryptPortable.rar MoonCrypter.rar nBinder V 5.5.rar no$crypter.rar OwnZ Crypter 3.5.9.rar Psomasweb_Public_Rinajel_Crypter.rar Quest Crypter.rar RedLions Binder.rar Refacts Crypter.rar Saddam Crypter.rar Shock Labs File Binder v1.0.rar Sikandar Crypter.rar SImple Crypt0r v2.rar The DarKness binDer.rar uBinder.rar UltimateLogger.rar Unknow Crypter Private.rar ZMini.rar -------------------------------------------------- Crypto -------------------------------------------------- BulkMD5PasswordCracker.rar BulkSHA1PasswordCracker.rar ChromePasswordDecryptor.rar HA CRYPTO V1.0.rar Hash Analyzer 1.0.rar MAXACryptPortable-maxa-tools.com.paf.rar md5 tools.rar MD5SaltedHashKracker.rar mdbruterzip20040221-1.rar MDcrack EasyLoader.rar mdcrack-1.2.rar mdcrackphpfe.rar NullAddFrontend.rar passwordspro.rar rainbowcrack-1.5-win32.rar SHA256SaltedHashKracker.rar SHThashCracker.rar -------------------------------------------------- Dork Scanner -------------------------------------------------- Dork Searcher Setup v1091.rar DorkToolsV.5.0.rar Google_URL_Extractor_Version_1.1.rar Mass Dork Scanner v1.0.0.1.rar -------------------------------------------------- DOS _ DDOSER _ FLOODER -------------------------------------------------- DaRKDDoSeR+5.6.rar IPKILLER 2.rar udpflood.rar War Flooder.rar -------------------------------------------------- Keyloggers -------------------------------------------------- 007 keylogger.rar Anonymous Keylogger.rar Ardamax 2.8.rar Ardamax 3.0.rar Ardamax Keylogger remover.rar Digital_Keylogger_v3.3.rar Dracula Logger.rar PoisonLogger.rar Project Neptune v1.78.rar Project Neptune v2.0.rar RapZo Logger v 1.5 ( Public Edition ).rar RinLogger.rar Silent Keylogger v1.6 Public Version By BUNNN.rar Syslogger.rar UltimateLogger.rar Unknown Logger Public V 1.5.rar -------------------------------------------------- RATs -------------------------------------------------- Blackshades Public Edition.rar Blackshades v 5.4 Private.rar Cybergate 1.8.rar Darkcomet 5.3.1 + Remover.rar Darkcomet 5.3.1.rar DarkComet Legacy.rar jRat.rar Loki Rat.rar Paradox RAT.rar Xtreme Rat v2.7.rar XtremeRat 3.5.rar -------------------------------------------------- Vulnerable Scanner -------------------------------------------------- Acunetix Web Vulnerability Scanner 7.0 [vokeon].ra Explode Web Scanner.rar Fiddler Web Debugger Setup.rar Gr3eNoX LFi Exploiter.rar Havij 1.152 Pro Edition.rar Iron Web application Advanced Security testing Pla Multi-Vuln-Checker-2014-By-P.S.rar nmap-6.40-setup.rar Vuln_Hunter_2014.rar vulnerability master 1.0.rar wapiti-2.3.0-win32-standalone.rar WebCruiser.rar WebCruiserPro.rar Websecurity Scanner 0.9.rar WebSurgery-Setup-1.1.1.rar -------------------------------------------------- Vulnerable Scanner\#SQLi Tools -------------------------------------------------- Ashiyane SQL Scanner v1.2.0.rar dorkinj.rar Injection Framework - Automatized Sql Injection To JSQL-Injection.rar SQL Exploiter Pro v2.10.rar SQL Helper.rar SQLI-Hunter_v1.1.rar SQLI-Hunter_v1.2.rar SQL-Inject-Me-master.rar sqlmap_win_v01.rar sqlmap-0.9.rar sqlninja-0.2.6-r1.rar SQLSentinel_v_0.3.rar Warbot VersaoSQL Tool v1.0 Alpha Build 6.rar XCodeExploitScannerSept2011.rar xSQL SCanner.rar -------------------------------------------------- Others -------------------------------------------------- #.rar Black File Pumper 1.0.rar Black_Batcher_v3.rar Cain & Abel Setup 4.9.50.rar Dedi Exploiter V2.rar DoX Manager.rar Doxer.rar exploit packs.rar Google Proxy Checker Final Setup.rar Icon Changer.rar InfamousTool.rar InfiniteBulkMailer.rar Ip-Tracer.rar Kon Boot.rar MayDay.rar NetDatabaseScanner.rar NetTools5.0.70.rar Proxy.Goblin.2.5.9.1.rar QHackBox.rar Shell Checker.rar Spider Mail.rar Themeforest.rar Tiger Bot Cracked by IoY.rar ToolBox v1.2.rar Ultimate Virus Builder.rar xtscrack-1.0.rar Youtube Stuff.rar Disclaimer "Download, install, running, copy, and share this Hack Pack means you agreed of all risk would be possibly harm the system. I will not responsible for any action and damage taken with this Hack Pack." Download Link [Hidden Content] Instructions After downloading all the parts, place them in same folder. Use WinRAR or similar app to extract the RAR package from part 1. then Use PowerISO or Daemon Tools to extract the ISO.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.