Search the Community

Showing results for tags 'source'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 118 results

  1. Features : - Little weight - Beautiful ui design - Easy to use Protections : - Anti ILdasm - Hide Namespaces - Junk - Renamer - Strings Encryption - Fix Res [Hidden Content]
  2. Satoshi box ~ Sell your digital content for bitcoins [Hidden Content]
  3. [hide][Hidden Content]]
  4. Full Orcus 1.9.1 Source Code [hide][Hidden Content]]
  5. itsMe

    SleazyCrypt Source

    [hide][Hidden Content]]
  6. REDasm – The Open Source Disassembler REDasm is a cross-platform disassembler with a modern codebase useful from the hobbyist to the professional reverse engineer. All features are provided by LibREDasm which loads plugins developed in C, C++, and Python3 (you can also support new languages if you want!) and a user-friendly Qt frontend. LibREDasm also provides a plain C API for maximum ABI compatibility along with a C++17 core. Changelog v3.0 beta5 REDasm Fixed Dialog plugins implementation (QtDialogUI) Improved QHexView integration (still WIP) Code cleanup Minor Fixes LibREDasm Redesigned internal address space representation (for performance) Redesigned and simplified Document API Improved surface rendering performance Improved analysis accuracy and speed Fixed Control Flow Graph generation Separate comments from autocomments Expanded Type System and its APIs Drastically reduced memory usage Improved string detection performance Analyzers can now be hidden from plugins Code cleanup Minor Fixes Plugins Implemented DEX Loader Implemented Dalvik Assembler ELF: Fixed segmentation fault [hide][Hidden Content]]
  7. Description Network protection is vital to organizations big and small, but it doesn’t have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network. [Hidden Content] [hide][Hidden Content]]
  8. The source code of the new banking Trojan DEFENSOR ID. [Hidden Content] [hide][Hidden Content]]
  9. RAT-el is an open-source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software. Features RATelServer: Multiple Connections Broadcast commands to all clients Stores client information in the database Encryption of data on the network via XOR Token management system to identify clients Client: Encryption of data sent over the network Startup persistence Remote command execution via CMD Remote command execution via Powershell Encryption of data on the network via XOR Automatic persistence when running the client Automatic reconnection RATelGenerator: Automatic client compilation [hide][Hidden Content]]
  10. Original Source Code [hide][Hidden Content]]
  11. [hide][Hidden Content]]
  12. itsMe

    EternalAIO v1.6 Source

    Info: [Hidden Content] [hide][Hidden Content]]
  13. REDasm – The Open Source Disassembler REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets. You can hack and improve REDasm without any issues and limitations. REDasm is under heavy development but it provides several interesting features: IDA-Like interactive listing. Multithreaded analysis. Graphing support. Project management. Signature engine. Cross-platform. Easy to use. Changelog v3.0 beta2 Reimplemented cross references analysis Implemented Tensilica Xtensa and ESP32 support Added support for Xtensa ELF executables Implemented COFF plugin Improved build system Restored RDCommandPlugin (WIP) Fixed UI related APIs Minor fixes [hide][Hidden Content]]
  14. REDasm – The Open Source Disassembler REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets. You can hack and improve REDasm without any issues and limitations. REDasm is under heavy development but it provides several interesting features: IDA-Like interactive listing. Multithreaded analysis. Graphing support. Project management. Signature engine. Cross-platform. Easy to use. Changelog v3.0 beta1 New User Interface Brand new Disassembler Engine Plugin interface Plain C API C++17 Core Support for x86 and x86_64, ARM64 and MIPS architectures Support for PE, ELF, PSX and XBOX1 executables 32 Bit MSVC RTTI support [hide][Hidden Content]]
  15. [Hidden Content]
  16. Description HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows by virtualizing an already running system using Intel VT-x and Intel PT. This debugger aims not to use any APIs and software debugging mechanisms, but instead, it uses Second Layer Page Table (a.k.a. Extended Page Table or EPT) extensively to monitor both kernel and user executions. HyperDbg comes with features like hidden hooks, which is as fast as old inline hooks, but also stealth. It mimics hardware debug registers for (read & write) to a specific location, but this time entirely invisible for both Windows kernel and the programs, and of course without any limitation in size or count! Using TLB-splitting, and having features such as measuring code coverage and monitoring all mov(s) to/from memory by a function, makes HyperDbg a unique debugger. Although it has novel features, HyperDbg tries to be as stealth as possible. It doesn’t use any debugging APIs to debug Windows or any application, so classic anti-debugging methods won’t detect it. Also, it resists the exploitation of time delta methods (e.g., RDTSC/RDTSCP) to detect the presence of hypervisors, therefore making it much harder for applications, packers, protectors, malware, anti-cheat engines, etc. to discover the debugger. Unique Features First Release (v0.1.0.0) Classic EPT Hook (Hidden Breakpoint) [link][link] Inline EPT Hook (Inline Hook) [link][link] Monitor Memory For R/W (Emulating Hardware Debug Registers Without Limitation) [link][link] SYSCALL Hook (Disable EFER & Handle #UD) [link][link] SYSRET Hook (Disable EFER & Handle #UD) [link][link] CPUID Hook & Monitor [link] RDMSR Hook & Monitor [link] WRMSR Hook & Monitor [link] RDTSC/RDTSCP Hook & Monitor [link] RDPMC Hook & Monitor [link] VMCALL Hook & Monitor [link] Debug Registers Hook & Monitor [link] I/O Port (In Instruction) Hook & Monitor [link] I/O Port (Out Instruction) Hook & Monitor [link] MMIO Monitor Exception (IDT < 32) Monitor [link][link] External-Interrupt (IDT > 32) Monitor [link][link] Running Automated Scripts [link] Transparent-mode (Anti-debugging and Anti-hypervisor Resistance) [link] Running Custom Assembly In Both VMX-root, VMX non-root (Kernel & User) [link] Checking For Custom Conditions [link][link] Script Engine [link][link][link] VMX-root Compatible Message Tracing [link] Powerful Kernel Side Scripting Engine [link][link] Event Forwarding (#DFIR) [link][link] Transparent Breakpoint Handler Various Custom Scripts [link] [hide][Hidden Content]]
  17. itsMe

    PornHub Checker Source

    [hide][Hidden Content]]
  18. Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should be used on webservers and available on Docker. Watcher capabilities Detect emerging vulnerability, malware using social network & other RSS sources (www.cert.ssi.gouv.fr, www.cert.europa.eu, www.us-cert.gov, www.cyber.gov.au...). Detect Keywords in pastebin & in other IT content exchange websites (stackoverflow, github, gitlab, bitbucket, apkmirror, npm...). Monitor malicious domain names (IPs, mail/MX records, web pages using TLSH). Detect suspicious domain names targeting your organisation, using dnstwist. Useful as a bundle regrouping threat hunting/intelligence automated features. Additional features Create cases on TheHive and events on MISP. Integrated IOCs export to TheHive and MISP. LDAP & Local Authentication. Email notifications. Ticketing system feeding. Admin interface. Advance users permissions & groups. [hide][Hidden Content]]
  19. itsMe

    FuseAntiPublic Source

    [hide][Hidden Content]]
  20. itsMe

    OnyxCrypter Source

    [hide][Hidden Content]]
  21. itsMe

    NordVPN Checker Source

    [hide][Hidden Content]]
  22. [hide][Hidden Content]]
  23. This is the new SIB Netsky Project Sib Panel Full Setup Ebook [Hidden Content] [hide][Hidden Content]]
  24. Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set, distinguishable in most cases only by signature. For example, if a class contains only methods that accept different parameters, they can all be renamed ‘A’. If another method is added to the class that accepts the same parameters as an existing method, it could be named ‘a’. It makes the decompiled code very difficult to follow. Basically, Obfuscar scrambles the metadata in a set of assemblies. It renames everything to the minimal set of names that can be used to identify them, given signatures and type information. Since these new names are shorter than the old ones, it also dramatically shrinks the executable size. Feature Simple Configuration Hide everything private, while keeping everything public. You can achieve such simply via default settings. Name Obfuscation Hide class/method/property/event names that you don’t want to expose. This is irreversible. String Compression String contents can be compressed so that end-users won’t easily learn them. However, this is reversible by certain tools. Changelog v2.2.29 Bumped dependencies Fixed #82 Merged #300 Fixed a minor issue on SuppressIldasmAttribute. [hide][Hidden Content]]
  25. Need to Understand Code? Source Insight is a powerful project-oriented programming editor, code browser, and analyzer that helps you understand code, while you work and plan. Source Insight has built-in dynamic analysis for C/C++, C#, Java, Objective-C, and more. Understand Code Learn an existing code base quickly, and get up to speed on new projects. Evaluate the costs of potential changes by seeing where functions and objects are used. See class inheritance and function call trees. Quickly Navigate Source Insight parses your whole project and let's you navigate and edit code like a breeze, while showing you information automatically. Jump easily to callers of functions or references to variables. Discover See where functions and variables are used. Source Insight automatically shows references to functions, variables, classes, and more - almost instantly. Search across your project using advanced search features. Code Analysis Source Insight has built-in dynamic analysis for C/C++, C#, Java, Objective-C, and more. Powerful Editing Use powerful editing features, including code snippets, symbolic auto-completion, and smart-rename. Syntax Formatting See live references to variables and other declarations with Syntax Formatting. Identifiers are formatted based on their declaration, scope, and usage. [Hidden Content] [hide][Hidden Content]]