Jump to content

Search the Community

Showing results for tags 'system'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Avira System Speedup - The top Optimizer for Windows Discover a PC cleaner that speeds you up and wipes your online traces Startup optimizer: Boot faster Junk file cleaner: Remove all the clutter 1-click optimization: Simple and easy to use [Hidden Content] [hide][Hidden Content]]
  2. Avira System Speedup - The top Optimizer for Windows The most comprehensive PC cleaner available Maximizes performance with a faster PC Automatically cleans junk & clutter Includes 40 premium optimization tools [Hidden Content] [Hidden Content]
  3. Advanced System Optimizer The Windows Optimization Suite To Speedup Your PC Advanced System Optimizer is the ultimate cleanup utility to make your PC faster. The PC Optimizer updates not only outdated drivers but offer a solution for all your Windows optimization needs. System Cleaner & OptimizerSystem Cleaner & Optimizer Secure Deletion & Encryption Secure Deletion & Encryption System Files Backup & Restore System Files Backup & Restore [Hidden Content] [Hidden Content]
  4. iOS System Recovery Recover your iOS/tvOS to normal at home with no data lossHOT Fix common iOS system issues like Apple logo, boot loop, and black screen Downgrade iOS 16 to 15.6.1 version without jailbreakNEW Enter and exit recovery mode on iPhone/iPad/iPod touchFREE Be compatible with latest iOS 16 version and iOS devices [Hidden Content] [Hidden Content]
  5. HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing How the hackers do the hacking? Well, keep reading and you will find out.. [Hidden Content] [hide][Hidden Content]]
  6. Advanced System Optimizer The Windows Optimization Suite To Speedup Your PC Advanced System Optimizer is the ultimate cleanup utility to make your PC faster. The PC Optimizer updates not only outdated drivers but offer a solution for all your Windows optimization needs. [Hidden Content] [Hidden Content]
  7. Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? 🤔 Name-that-hash will name that hash type! 🔥 Features 📺 Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode 📈 ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice ⚡ 🌈 Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly 😎 🤖 JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! 💾 👵 Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project 🦧 ♿ Accessible – We are 100% committed to making this an accessible hacking tool 🙏 🎫 Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! 🎱 Changelog v1.11 update descrypt regex (#142) @roycewilliams Add various regexes from community contribution stream (#141) @goproslowyo Add regex and test for yescrypt (#139) @goproslowyo Bump rich from 12.0.0 to 12.0.1 (#136) @dependabot Add BitLocker and RACF hash types (#127) @ellygaytor Update CI and dependencies (#135) @amadejpapez Bump rich from 10.7.0 to 10.11.0 (#125) @dependabot Bump pytest from 6.2.4 to 6.2.5 (#123) @dependabot Bump rich from 10.4.0 to 10.7.0 (#121) @dependabot Bump rich from 10.3.0 to 10.4.0 (#118) @dependabot Added john mode to argon2i and argon2d (#117) @amadejpapez More hashcat tests, Argon2 hash support and some cleaning (#115) @amadejpapez Add new github action runners (#114) @bee-san Added a test for each hashcat mode, updated the database (#113) @amadejpapez [hide][Hidden Content]]
  8. Avira System Speedup - The top Optimizer for Windows The most comprehensive PC cleaner available Maximizes performance with a faster PC Automatically cleans junk & clutter Includes 40 premium optimization tools [Hidden Content] [hide][Hidden Content]]
  9. For Developers - Build Linux Programmable Libraries, Makefiles, Memory Management, Compilation & Linking, C Programming Description There are already innumerable courses/tutorials on the internet/Udemy which teach almost every aspect of C programming language. All those courses sound the same, talk the same and deliver more or less the same knowledge. How is this course different from others? The intention of this course is to make you ready for System programming Technical interviews, interview level - from Beginner to Intermediate. This course is for (future) Developers, not for testers or System Administrators. I choose to create this course to fill the gap between novice/beginner and intermediate/Advanced Programmers. This course assumes that you are at least above average in programming (in any programming language, but preferable in C/C++) - know memory allocations, all kinds of loops, function calls, pointers etc. In this course, I won't teach C/C++ (there are already many courses on it online) but would teach programming techniques and low-level details regarding how C program works behind the scenes - All topics are very important from an interview point of view. My Target is to grow this course into Linux/C Bible. Yet, I always feel, you need to outsmart your fellow colleagues in this era of stiff competition, and therefore, I tried this attempt to present you the wisdom and knowledge which is of utmost importance for a programmer. I have seen though students could write good C/C++ programs, yet they lack the clarity on how one should write better organized, Manageable, extensible, and programmable codes in the form of libraries. For example, Students are too good at competitive programming, yet do not know how to write a simple Makefile, the reason being, Academics do not teach and students do not care to learn. In this course, I will cover the topics related to creating Linux System Libraries (release 1) with Advanced language-agnostic Programming Concepts (release 2) which can be well applied if you happen to become a programmer in other languages tomorrow. The Concepts like MultiThreading, Thread-Synchronization, Socket Programming, IPCs, etc demand a separate course on each topic altogether. Currently, I have a course on IPC, pls check it out. These topics are out of scope for this course. The Course shall be delivered into two Releases : Release 1 Building and Managing a Library: This covers the basics regarding how one should create and organize his code as a Library. Release 2 Memory Management Concepts: This covers Advance concepts on Linux Memory Management specifically. Please check the Table of Contents for more info. Why you should *NOT* do this course? 1. Please Excuse this course if you are the ultimate beginner in C programming !! 2. There is no point of doing this course if you don't like hitting the keyboard, and are lazy enough to watch lecture VDOs only 3. If you want everything cooked and served on your plate. Course Pre-requisite : Above Beginners Level in C/C++ programming Good to have basic OS knowledge Zeal to excel and Code No Third-Party libraries Whatever logic you implement, you need to implement it from scratch. Like all my other courses, this course does not suggest taking the help of any third-party library to get the jobs done. The use of external libraries completely defeats the purpose of the course. Warning: This course has auto system-generated subtitles which may not be perfect. Please disable subtitles at your convenience. [Hidden Content] [hide][Hidden Content]]
  10. Parrot is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. The team announces the release of Parrot 5.1, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords, and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. Changelog v5.1 New kernel 5.18. Updated docker containers Updated backports. System updates Firefox profile overhault Tools updates Parrot IoT improvements Architect Edition improvements [hide][Hidden Content]]
  11. iOS System Recovery Recover your iOS/tvOS to normal at home with no data lossHOT Fix common iOS system issues like Apple logo, boot loop, and black screen Downgrade iOS 16 to 15.6.1 version without jailbreakNEW Enter and exit recovery mode on iPhone/iPad/iPod touchFREE Be compatible with latest iOS 16 version and iOS devices Repair 150+ iOS Problems on iPhone/iPad/iPod touch/Apple TV With TunesKit iOS System Recovery, you are able to quickly fix any common iOS/tvOS issue by yourself without seeking for help from Apple technical specialist. No matter whether your iOS device stuck in recovery mode/DFU mode/white Apple logo, or becomes black/blue/frozen/disabled screen, this smart iOS repair tool will get you out of the trouble and recover your device back to normal quickly. [Hidden Content] [hide][Hidden Content]]
  12. Avira System Speedup - The top Optimizer for Windows Discover a PC cleaner that speeds you up and wipes your online traces Startup optimizer: Boot faster Junk file cleaner: Remove all the clutter 1-click optimization: Simple and easy to use Because life’s too short To sit around waiting for your PC to start Too many programs trying to run automatically can really slow you down. System Speedup displays a list of applications that run on start, and lets you postpone or stop the ones you don’t need. It will even alert you to ones that slow down your system starts. [Hidden Content] [hide][Hidden Content]]
  13. Description Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we’ve done our research, we’ve found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. [Hidden Content] [hide][Hidden Content]]
  14. Advanced System Optimizer The Only Windows Optimization Suite You'll Ever Need Advanced System Optimizer is the most powerful RAM and Junk Cleaner for PC. It delivers an affordable, easy-to-use solution for all your Windows optimization needs. System Cleaner & Optimizer Secure Deletion & Encryption System Files Backup & Restore [Hidden Content] [hide][Hidden Content]]
  15. Description Apple macOS and iOS System Administration 2022 will teach you how to use Apple’s first party software in conjunction with the popular Mosyle MDM (Mobile Device Management) platform to manage iOS and macOS devices easily and efficiently. If you have familiarity with Apple's operating systems from an end-user perspective but need to manage an organization of macOS or iOS endpoints, this course is for you. This course assumes no experience with system administration on Apple platforms so no prior experience is required. If you are new to system administration or just new to administrating Apple operating systems, this course will introduce you to the basic concepts of managing a handful of devices and scales to how to provide effective support to thousands of devices. The course begins by introducing the basics of Apple hardware and local system management. Tools like Apple Remote Desktop, Screen Time and Apple Configurator are used to demonstrate how to manage a small number of devices. As the course continues, you will be building a cloud-based Mobile Device Management environment using the Mosyle MDM platform. You will learn to configure over-the-air activation and device management for iPhone and iPad endpoints including device restrictions, managed AppleIDs, managed iOS Apps, and more. You will move on to macOS administration and learn to automate software installations, updates, and customize the user experience using configuration profiles. Once you have completed this computer based training course, you will be fully capable of using macOS, Apple Device Enrollment, and Mosyle MDM to administer hundreds or thousands of endpoints across businesses big and small including the enterprise. *Photo by Dmitry Chernyshov on Unsplash Who this course is for: IT Professionals who have to manage some number of Macs or iOS devices. Windows System Administrators who have to support Apple platforms in their environment. Home users who have a number of Apple devices to manage and support with-in their household. [Hidden Content] [hide][Hidden Content]]
  16. Windows System Control Center (WSCC) con soporte de 64 bits es un programa gratuito y portable que te permite instalar, actualizar, ejecutar y organizar utilidades desde varios conjuntos de utilidades del sistema Windows. WSCC puede instalar y actualizar las utilidades compatibles automáticamente y alternativamente, WSCC puede usar el protocolo http para descargar y ejecutar dichos programas. WSCC es portable no se requiere instalación, simplemente extrae el contenido del archivo zip descargado en cualquier directorio de tu computadora y ejecutalo. Esta edición de WSCC es compatible con los siguientes conjuntos de utilidades: Windows Sysinternals Suite (incluido el soporte para el servicio Sysinternals Live) y NirSoft Utilities. Todos los paquetes de configuración se descargan del sitio web del autor y al igual que Windows Sysinternals recopila herramientas de software gratuito, el Centro de control de sistemas de Windows recopila numerosas utilidades de Windows, incluidas las de NirSoft. [Hidden Content]
  17. Avira System Speedup - The top Optimizer for Windows Discover a PC cleaner that speeds you up and wipes your online traces Startup optimizer: Boot faster Junk file cleaner: Remove all the clutter 1-click optimization: Simple and easy to use Thumbnails view, custom columns Compare editor, cursor in lister, separate trees, logging, enhanced overwrite dialog etc. Unicode names almost everywhere, long names (>259 characters), password manager for ftp and plugins, synchronize empty dirs, 64 bit context menu, quick file filter (Ctrl+S) USB port connection via special direct transfer cable, partial branch view (Ctrl+Shift+B), and many improvements to ftp, synchronizing and other functions And many more! [Hidden Content] [hide][Hidden Content]]
  18. System Mechanic Pro® Speed Up and Protect Your PC Automatically Safeguards your PC with real-time antivirus protection Speeds up and declutters with all the tools in System Mechanic® Detects the newest malware threats with advanced artificial intelligence Safely recycles old PCs with military-grade drive wiping technology Recovers irreplaceable photos, videos and more across many device types Removes system-hogging bloatware that slows you down [Hidden Content] [hide][Hidden Content]]
  19. El limpiador de equipos más completo Maximiza el rendimiento con un equipo más rápido Elimina automáticamente el desorden y los archivos basura Incluye 30 herramientas de optimización prémium [Hidden Content] [hide][Hidden Content]]
  20. WSCC allows you to install, update, execute and organize the utilities from various system utility suites. WSCC can install and update the supported utilities automatically. Alternatively, WSCC can use the http protocol to download and run the programs. The portable edition doesn't require installation and can be run directly from a USB drive. WSCC supports the following major utility suites: Sysinternals Suite NirSoft Utilities and more... System requirements Windows 11/10/8/7 32/64bit (all editions) Windows Server 2022/2019/2016/2012R2/2012/2008R2 (all editions) Internet access (optional for app installs and updates) [Hidden Content] [hide][Hidden Content]]
  21. SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. Why on earth didn't I create a PR to SysWhispers2? The reason for SysWhispers3 to be a standalone version are many, but the most important are: SysWhispers3 is the de-facto "fork" used by Inceptor, and implements some utils class which are not relevant to the original version of the tool. SysWhispers2 is moving towards supporting NASM compilation (for gcc/mingw), while this version is specifically designed and tested to support MSVC (because Inceptor will stay a Windows-only framework for the near future). SysWhispers3 contains partially implemented features (such as egg-hunting) which would not be sensible to include in the original version of the tool. [hide][Hidden Content]]
  22. Parrot is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and developed by the Frozen box network. The team announces the release of Parrot 5.0, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. Changelog v5.0 LTS and Backports Parrot 5.0 introduces a new Long Term Support release model. All the packages composing the core system are now tracking the latest Debian Stable instead of Debian Testing, and will guarantee no significant changes for at least 2 years. This approach makes Parrot more reliable, and system updates will no longer break the system as it happens with other Rolling Release systems. Our approach to the LTS release model differs from the one adopted by Debian. We recognize that no major feature updates and feature deprecations should occur during the lifecycle of the system, but there are some programs that don’t follow our same release cycle: many programs, especially desktop ones, don’t have a release every 2 years, like Debian does, and when new versions are out, older ones are deprecated and left with no support and security updates. Other times a new software gets a major release just after a new Debian version, and users are forced to stay on the previous version for the next 2 years. For this reason we have decided to maintain a special backport channel where not only the debian backports are replicated, but where we work to expand the offering of backported software as much as possible. Users using Parrot will have immediate access to the latest version of most of the programs they use daily. Along with that, users will be able to choose whether to install the backported version or stay with the older and more stable one. The team has also decided to keep a Rolling Release model for all the security tools, which will continue to receive rolling updates as soon as they are out. Last, but not least, the new LTS approach brings extremely fast security updates. This makes Parrot 5.0 and future versions, the perfect system for critical environments, like servers, where security is important. Linux 5.16 and enhanced hardware support Parrot 5.0 features the latest Linux 5.16 kernel version, which offers the best performance and hardware compatibility. In addition to that, it also offers an extensive collection of pre-installed drivers to make the system compatible with most of the hardware, including most of the wifi dongles, making Parrot the most hardware friently GNU/Linux distro available. Tools We have added a plethora of new tools to reveal the full potential of our users and guarantee an immersive experience. You can find them below: Pocsuite3 pocsuite3 is an open-source remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team. It comes with a powerful proof-of-concept engine, many nice features for the ultimate penetration testers and security researchers. Ivy-optiv Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code in memory. Ivy’s loader does this by abusing programmatical access in the VBA object environment to load, decrypt, and execute shellcode. Jwtxploiter A tool to test security of JSON Web Tokens. Jwtxploiter gives the ability to test a JWT against all known CVEs. Python3-pcodedmp Pcodedmp is a very powerful VBA P-Code disassembler that can be used to inspect and work with VBA documents. Mimipenguin Mimipenguin is a free and open source, simple yet powerful Shell/Python script used to dump the login credentials (usernames and passwords) from the current desktop user. Ffuf ffuf is a fest web fuzzer written in Go that allows typical directory discovery, virtual host discovery (without DNS records) and GET and POST parameter fuzzing. Oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the olefile parser. [hide][Hidden Content]]
  23. Advanced System Protector An Ultimate Security Suite To Safeguard Your PC Advanced System Protector is a spyware removal tool for Windows that protects your PC against Trojans, spyware, adware and other threats, thus protecting your data. Secure Your PC From Threats Advanced System Protector comes with a powerful engine that systematically scans and removes all infections and malicious files to keep your data secure. All-in-one Tool Advanced System Protector is loaded with features for complete protection. Highest Cleaning Ratio Clean 100% of detected threats for seamless browsing and computing experience. One-Click Scan Just click Start Scan Now to detect & remove infections from your PC. Different Scan Types Ensure thorough cleaning with Quick, Deep & Custom Scan modes. [Hidden Content] [hide][Hidden Content]]
  24. DRAKVUF Sandbox is an automated black-box malware analysis system with a DRAKVUF engine under the hood. This project provides you with a friendly web interface that allows you to upload suspicious files to be analyzed. Once the sandboxing job is finished, you can explore the analysis result through the mentioned interface and get insight on whether the file is truly malicious or not. Because it is usually pretty hard to set up a malware sandbox, this project also provides you with an installer app that would guide you through the necessary steps and configure your system using settings that are recommended for beginners. At the same time, experienced users can tweak some settings or even replace some infrastructure parts to better suit their needs. Supported hardware&software In order to run DRAKVUF Sandbox, your setup must fullfill all of the listed requirements: Processor: Intel processor with VT-x and EPT features Host system: Debian 10 Buster/Ubuntu 18.04 Bionic/Ubuntu 20.04 Focal with at least 2 core CPU and 5 GB RAM Guest system: Windows 7 (x64), Windows 10 (x64; experimental support) Nested virtualization: KVM does work, however it is considered experimental. If you experience any bugs, please report them to us for further investigation. Due to lack of exposed CPU features, hosting drakvuf-sandbox in cloud is not supported (although it might change in the future) Hyper-V does not work Xen does work out of the box VMware Workstation Player does work, but you need to check Virtualize EPT option for a VM; Intel processor with EPT still required [hide][Hidden Content]]
  25. Kraken: A multi-platform distributed brute-force password cracking system. What is Kraken Kraken is an online distributed brute force password cracking tool. It allows you to parallelize dictionaries and crunch word generator-based cracking across multiple machines both as a web app in a web browser and as a standalone electron-based client. Kraken aims to be easy to use, fault-tolerant and scalable. I wrote Kraken because I wanted to learn more about offensive security and to write an easy solution to overcome the limitation of using a single device when attempting to distribute brute force workloads. [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.