Search the Community

Showing results for tags 'source'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 129 results

  1. 𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, more assets, WAF/CDN bypassed IPs, Internal/External Infra, Publicly exposed leaks and many more about their target. Shodan Premium API key is required to use this automation. Output from the 𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is displayed to the screen and saved to files/directories. Features Powerful and flexible results via Shodan Dorks SSL SHA1 checksum/fingerprint Search Only hit In-Scope IPs Verify each IP with SSL/TLS certificate issuer match RegEx Provide Out-Of-Scope IPs Find out all ports including well known/uncommon/dynamic Grab all targets vulnerabilities related to CVEs Banner grab for each IP, Product, OS, Services & Org etc. Grab favicon Icons Generate Favicon Hash using python3 mmh3 Module Favicon Technology Detection using nuclei custom template ASN Scan BGP Neighbour IPv4 & IPv6 Profixes for ASN Interesting Leaks like Indexing, NDMP, SMB, Login, SignUp, OAuth, SSO, Status 401/403/500, VPN, Citrix, Jfrog, Dashboards, OpenFire, Control Panels, Wordpress, Laravel, Jetty, S3 Buckets, Cloudfront, Jenkins, Kubernetes, Node Exports, Grafana, RabbitMQ, Containers, GitLab, MongoDB, Elastic, FTP anonymous, Memcached, DNS Recursion, Kibana, Prometheus, Default Passwords, Protected Objects, Moodle, Spring Boot, Django, Jira, Ruby, Secret Key and many more... [hide][Hidden Content]]
  2. rpcfirewall: Open Source Ransomware Kill Switch Tool Why should I care? RPC is the underlying mechanism which is used for numerous lateral movement techniques, reconnaissance, relay attacks, or simply to exploit vulnerable RPC services. DCSync attack? over RPC. Remote DCOM? over RPC. WMIC? over RPC. SharpHound? over RPC. PetitPotam? over RPC. PsExec? over RPC. ZeroLogon? over RPC… well, you get the idea What is it used for? Research Install the RPC Firewall and configure it to audit all remote RPC calls. Once executing any remote attack tools, you will see which RPC UUIDs and Opnums were called remotely. Remote RPC Attacks Detection When the RPC Firewall is configured to audit, it writes events to the Windows Event Log. Forward this log to your SIEM, and use it to create baselines of remote RPC traffic for your servers. Once an abnormal RPC call is audited, use it to trigger an alert for your SOC team. Remote RPC Attacks Protection The RPC Firewall can be configured to block & audit only potentially malicious RPC calls. All other RPC calls are not audited to reduce noise and improve performance. Once a potentially malicious RPC call is detected, it is blocked and audited. This could be used to alert your SOC team, while keeping your servers protected. What are the RPC Firewall Components? It is made up of 3 components: RpcFwManager.exe – In charge of managing the RPC Firewall. RpcFirewall.dll – Injected DLL which performs the audit & filtering of RPC calls. RpcMessages.dll – A common library for sharing functions, and logic that writes data into Windows Event Viewer. [hide][Hidden Content]]
  3. Nikoxx99

    Twitch source code leaks

    Someone have the torrent for the Twitch Source code leaked in recent days?
  4. Karta - source code assisted fast binary matching plugin for IDA. [hide][Hidden Content]]
  5. Leaked source code of the babuk ransomware by VXUG Use For Educational Purposes Only [Hidden Content]
  6. An open-source ransomware tool written in .NET. Disclaimer The tool is intended for research and threat emulation purposes only. I'm not reponsible for any malicious uses of this tool. [Hidden Content]
  7. ONLY FOR EDUCATIONAL PURPOSES [Hidden Content]
  8. itsMe

    Dc - Binder Source

    A simple binder. [hide][Hidden Content]]
  9. Source Code of Jigsaw Ransomware Created in Vb.Net. Warning: This project is Education purpose only, I'm not Responsible for any damage or harm [hide][Hidden Content]]
  10. Crypto Ransomware Warning: This project is Education purpose only, I'm not Responsible for any damage or harm Function 1.) Encrypt your data 2.) Show fake windows update screen during enrypting your data 3.) Kill TaskMnager and Explorer.exe 4.) Lock Your Computer 5.) Delete it self after complete all task [hide][Hidden Content]]
  11. Disclaimer I, the creator, am not responsible for any actions, and or damages, caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use. By using this software, you automatically agree to the above. Data extraction: [→] AntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run) [→] Knock off IPLogger. [→] USB worm. [→] Clipper Crypto Wallet (BTC, Etherium, LiteCoin, Monero) [→] Clipper Card Bank (Visa, Mastercard, QIWI) [→] Clipper Wallet WebMoney (WMR, WMZ, WMU, WMX) [→] Clipper Wallet QIWI (Nick, Money Box, Number) [→] Clipper Wallet YandexMoney. [→] Clipper Wallet Payeer. [→] Clipper LINK (STEAM, MEGA DISK, Yandex Dis, DONAT ALERT) [→] Clipper LINK (STEAM, MEGA DISK, Yandex Dis, DONAT ALERT) [hide][Hidden Content]]
  12. ReconSpider ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard and facilitate alerting and monitoring on the data. Recon Spider also combines the capabilities of Wave, Photon and Recon Dog to do a comprehensive enumeration of attack surface. [hide][Hidden Content]]
  13. HyperDbg is now available for tests! Please test it and provide us with your valueable feedback and possible bugs. HyperDbg Debugger is an open-source, community-driven, hypervisor-assisted, user-mode and kernel-mode Windows debugger with a focus on using modern hardware technologies. It is a debugger designed for analyzing, fuzzing and reversing. Follow HyperDbg on Twitter to get notified about new releases ! Description HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows by virtualizing an already running system using Intel VT-x and Intel PT. This debugger aims not to use any APIs and software debugging mechanisms, but instead, it uses Second Layer Page Table (a.k.a. Extended Page Table or EPT) extensively to monitor both kernel and user executions. Unique Features First Release (v0.1.0.0) Classic EPT Hook (Hidden Breakpoint) [link][link] Inline EPT Hook (Inline Hook) [link][link] Monitor Memory For R/W (Emulating Hardware Debug Registers Without Limitation) [link][link] SYSCALL Hook (Disable EFER & Handle #UD) [link][link] SYSRET Hook (Disable EFER & Handle #UD) [link][link] CPUID Hook & Monitor [link] RDMSR Hook & Monitor [link] WRMSR Hook & Monitor [link] RDTSC/RDTSCP Hook & Monitor [link] RDPMC Hook & Monitor [link] VMCALL Hook & Monitor [link] Debug Registers Hook & Monitor [link] I/O Port (In Instruction) Hook & Monitor [link] I/O Port (Out Instruction) Hook & Monitor [link] MMIO Monitor Exception (IDT < 32) Monitor [link][link] External-Interrupt (IDT > 32) Monitor [link][link] Running Automated Scripts [link] Transparent-mode (Anti-debugging and Anti-hypervisor Resistance) [link][link] Running Custom Assembly In Both VMX-root, VMX non-root (Kernel & User) [link] Checking For Custom Conditions [link][link] VMX-root Compatible Message Tracing [link] Powerful Kernel Side Scripting Engine [link][link] Support To Symbols (Parsing PDB Files) [link][link] Event Forwarding (#DFIR) [link][link] Transparent Breakpoint Handler Various Custom Scripts [link] [hide][Hidden Content]]
  14. itsMe

    VirusMaker Source Code

    [hide][Hidden Content]]
  15. Features : - Little weight - Beautiful ui design - Easy to use Protections : - Anti ILdasm - Hide Namespaces - Junk - Renamer - Strings Encryption - Fix Res [Hidden Content]
  16. Satoshi box ~ Sell your digital content for bitcoins [Hidden Content]
  17. [hide][Hidden Content]]
  18. Full Orcus 1.9.1 Source Code [hide][Hidden Content]]
  19. itsMe

    SleazyCrypt Source

    [hide][Hidden Content]]
  20. REDasm – The Open Source Disassembler REDasm is a cross-platform disassembler with a modern codebase useful from the hobbyist to the professional reverse engineer. All features are provided by LibREDasm which loads plugins developed in C, C++, and Python3 (you can also support new languages if you want!) and a user-friendly Qt frontend. LibREDasm also provides a plain C API for maximum ABI compatibility along with a C++17 core. Changelog v3.0 beta5 REDasm Fixed Dialog plugins implementation (QtDialogUI) Improved QHexView integration (still WIP) Code cleanup Minor Fixes LibREDasm Redesigned internal address space representation (for performance) Redesigned and simplified Document API Improved surface rendering performance Improved analysis accuracy and speed Fixed Control Flow Graph generation Separate comments from autocomments Expanded Type System and its APIs Drastically reduced memory usage Improved string detection performance Analyzers can now be hidden from plugins Code cleanup Minor Fixes Plugins Implemented DEX Loader Implemented Dalvik Assembler ELF: Fixed segmentation fault [hide][Hidden Content]]
  21. Description Network protection is vital to organizations big and small, but it doesn’t have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network. [Hidden Content] [hide][Hidden Content]]
  22. The source code of the new banking Trojan DEFENSOR ID. [Hidden Content] [hide][Hidden Content]]
  23. RAT-el is an open-source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software. Features RATelServer: Multiple Connections Broadcast commands to all clients Stores client information in the database Encryption of data on the network via XOR Token management system to identify clients Client: Encryption of data sent over the network Startup persistence Remote command execution via CMD Remote command execution via Powershell Encryption of data on the network via XOR Automatic persistence when running the client Automatic reconnection RATelGenerator: Automatic client compilation [hide][Hidden Content]]
  24. Original Source Code [hide][Hidden Content]]
  25. [hide][Hidden Content]]