Search the Community

Showing results for tags 'system'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 151 results

  1. Learn the art of System and Mobile Hacking. Learn to secure your devices like a Security Professional. What you'll learn How to hack a Computer System You will learn How different tools and techniques work in real world How to test the security of your system How to protect your Mobile from various external threats You will learn about System Security Hands-on Experience Requirements You will able to use PC You must have internet connection Description Learn by doing. You will learn most of the important tools and techniques used to test the security of your Computer System and Mobile Devices. You will learn how to hack your device and how to protect them from various external Threats. System Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of system hacking can be: using a password cracking tool to gain access to a computer system. You may also perform System Hacking without using any kind of tool. Learning computer hacking and security is an important aspect in today world. Let's have a look on the topics you will learn in this course. Topics Covered in this Course are: 1. Footprinting 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Clearing Tracks 6. Generating Reports 7. Quick Hacking Tips 8. Hands-on Training 9. Hacking Mobile Device 10. Securing your Computer and Mobile. Anyone who is interested to learn about Cyber Security may join this course. This course doesn't make you an expert in the field of cyber security. But, this course will teach you practical things which are must to learn for an individual if you want to know about latest attacks and their defence. Let's get started.... Who this course is for: Anyone who want to learn System and Mobile Security Anyone who is interested in Cyber Security [Hidden Content] [hide][Hidden Content]]
  2. Windows System Control Center (WSCC) – is a program that allows you to install, update, execute and organize the utilities from various system utility suites. WSCC is only an interface, you need to download and install the utilities separately. Alternatively, WSCC can use the http protocol to download and run the programs. The included Update Manager can check for newer versions of the utilities already installed and can download and install the missing items. The setup packages are downloaded from the author’s website! WSCC uses the included WSCC Console to execute command line applications. WSCC is portable, installation is not required. Extract the content of the downloaded zip archive to any directory on your computer. WSCC Portable Edition is designed for use on the PortableApps.com Platform. WSCC U3 Edition is designed for use on the U3 smart drives and integrates itself into the U3 launchpad. Features • Simple and intuitive user interface • The included Update Manager can check for newer versions of the utilities already installed and can download and install the missing items. • The Console is used to execute command line applications. • WSCC is portable, installation is not required. Extract the content of the downloaded zip archive to any directory on your computer. [Hidden Content] [hide][Hidden Content]]
  3. Kraker Kraker is a distributed password brute-force system that allows you to run and manage the hashcat on different servers and workstations, focused on easy of use. There were two main goals during the design and development: to create the most simple tool for distributed hash cracking and make it fault-tolerant. Kraker consists of two main components – a server and an agent, which communicate through a REST API. You can read about their installation and configuration below. Kraker continues to be in development, so the new functionality, documentation, and updates will be released as they become available. Changelog v1.2 Fixed: Mur-mur-hash instead of MD5. [hide][Hidden Content]]
  4. Advanced System Optimizer – s a system tweaking suite that includes more than 30 tools to improve and tweak your PC`s performance, to keep your system running smoothly, speedily, and error free. It offers an attractive and easy to use interface that organizes all tasks into categories and provides graphical statistics whenever possible. The tools include junk file cleaner, memory optimizer, system information, system files backup, file encryption, safe uninstaller, duplicate file finder, windows transparency manager and much more. Advanced System Optimizer also includes a small SMTP server for direct mail sending, an Internet tracks eraser with cookie manager and secure deletion, and even a desktop sticky notes application. Overall, a great bundle that offers a wide range of system tools, as well as some extras that are not commonly found. Advanced System Optimizer has a collection of new utilities to give you better gaming environment, keep your drivers up-to-date, protect your computer from spyware, and tweak settings to improve performance. The exquisite interface and the single click solution can make your working simpler. Whether you simply want to optimize your system or get rid of junk collected on your system with as little effort as possible or want the backup of your system files with a single click recovery option, or protect your privacy, Advanced System Optimizer is the tool of choice. No other program is as feature-rich, yet as easy to set up and use as Advanced System Optimizer Features • Smart PC Care. One-Click Solution • Game Optimizer. Play games in a disturbance free environment • Driver Updater. Update out dated and required drivers • System Protector. Protection against malware, spyware, trojans • Disk Tools. Check disks at startup • Backup Manager. Backup your important files and documents • PC Fixer. Fix the common problems instantly • Disk Optimizer. Defrag hard disk and for optimized performance • Undelete. Recover accidently deleted data • Secure Encryptor. Password protect your personal files • Registry Cleaner. Clean Registry Errors • Registry Optimizer. Defrag registry for better performance • System Cleaner. Clean junk data and free up disk space • Disk Explorer. Displays disk usage by files and folder • Uninstall Manager. Remove the unneeded programs • Memory Optimizer. Free unused allocated memory for better utilization • Privacy Protector. Clean hidden privacy exposing traces • Secure Delete. Permanently delete private data • System & Security Advisor. Fine tune system settings • Duplicate Files Remover. Remove duplicate files • Startup Manager. Remove unneeded programs from startup • System File Backup and Restore [Hidden Content] [hide][Hidden Content]]
  5. Kraker is a distributed password brute-force system that allows you to run and manage the hashcat on different servers and workstations, focused on easy of use. There were two main goals during the design and development: to create the most simple tool for distributed hash cracking and make it fault-tolerant. Kraker consists of two main components – a server and an agent, which communicate through a REST API. You can read about their installation and configuration below. Kraker continues to be in development, so the new functionality, documentation, and updates will be released as they become available. [hide][Hidden Content]]
  6. FoneGeek iOS System Recovery – The program can fix any kinds of iOS system issues and get your iPhone/iPad back to normal, such as white Apple logo, DFU/recovery mode, looping on start, etc. In most cases, it’s able to fix iOS without data loss. Features • Fix various iOS issues like iPhone black screen, white Apple logo, boot loop, etc. • Repair your iOS/iPasOS/tvOS system errors without any data loss. • Downgrade iOS version without iTunes or jailbreak. • Fully compatible with the latest iOS 15 and all iPhone 12 models. What’s New * Fixed some minor bugs [Hidden Content] [hide][Hidden Content]]
  7. Simply the best System Repair Solution Get a faster, cleaner and smoother PC Advanced System Repair Pro brings you all the tools you need in one program to clean, fix, protect, optimize and boost your PC! Fix annoying PC issues Get a cleaner computer in minutes Speed up and revive your PC [Hidden Content] [hide][Hidden Content]]
  8. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.10 This test matrix goes through all of our hash database and: Updates the Hashcat mode Updates the John mode (if it can find it, not all of John the Ripper modes are easy to find) Checks the regex against that hash, ensuring all regex are correct [hide][Hidden Content]]
  9. Learn the art of System and Mobile Hacking. Learn to secure your devices like a Security Professional What you'll learn How to hack a Computer You will learn How different tools and techniques work in real world How to test the security of your system How to protect your Mobile from various external threats You will learn about System Security Hands-on Experience Requirements You will able to use PC You must have internet connection Description Learn by doing. You will learn most of the important tools and techniques used to test the security of your Computer System and Mobile Devices. You will learn how to hack your device and how to protect them from various external Threats. System Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of system hacking can be: using a password cracking tool to gain access to a computer system. You may also perform System Hacking without using any kind of tool. Learning computer hacking and security is an important aspect in today world. Let's have a look on the topics you will learn in this course. Topics Covered in this Course are: 1. Footprinting 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Clearing Tracks 6. Generating Reports 7. Quick Hacking Tips 8. Hands-on Training 9. Hacking Mobile Device 10. Securing your Computer and Mobile. Anyone who is interested to learn about Cyber Security may join this course. This course doesn't make you an expert in the field of cyber security. But, this course will teach you practical things which are must to learn for an individual if you want to know about latest attacks and their defence. Let's get started.... Who this course is for: Anyone who want to learn System and Mobile Security Anyone who is interested in Cyber Security [Hidden Content] [hide][Hidden Content]]
  10. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.9 Added popular function to API #105 Added 10 new hash types – PDF, 7-zip, SecureZIP (#107) @amadejpapez Bump click from 8.0.0 to 8.0.1 (#108) @dependabot Bump rich from 10.2.1 to 10.2.2 (#109) @dependabot Bump rich from 10.2.0 to 10.2.1 (#106) @dependabot Bump click from 7.1.2 to 8.0.0 (#103) @dependabot Bump rich from 10.1.0 to 10.2.0 (#104) @dependabot Bump pytest from 6.2.3 to 6.2.4 (#101) @dependabot [hide][Hidden Content]]
  11. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.8 Update setup.py and fix typo (#98) @SkeletalDemise Remove Loguru from pyproject.toml and poetry.lock (#97) @bee-san Added one new Office hash type and updated some of the old ones (#95) @amadejpapez Upgrade to GitHub-native Dependabot (#94) @dependabot-preview Fix for the latest office test (#93) @amadejpapez Added MS Office <= 2003, Blake2b-512, Telegram Mobile App Passcode (#92) @amadejpapez [hide][Hidden Content]]
  12. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.7.1 What’s Changed Forgot to delete print statement v1.7 What’s Changed Switched from Loguru to default logging Added Blake2b-256 (#81) @swanandx Added 3 hash types – WinZip, iTunes and Android Backup (#80) @amadejpapez Added all 3 Electrum Bitcoin Wallet hash types (#73) @amadejpapez Minor Updates docs: add swanandx as a contributor (#86) @allcontributors docs: add bee-san as a contributor (#85) @allcontributors docs: add SkeletalDemise as a contributor (#82) @allcontributors Bump rich from 10.0.1 to 10.1.0 (#77) @dependabot-preview Bump pytest from 6.2.2 to 6.2.3 (#76) @dependabot-preview Bump rich from 9.13.0 to 10.0.1 (#75) @dependabot-preview [hide][Hidden Content]]
  13. Parrot Security OS is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and developed by the Frozen box network. Lorenzo Faletra announces the release of Parrot Security OS 4.10, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. Changelog v4.11 Debian freezing and LTS plans Debian is in “feature freeze” state to prepare for the new stable release. Parrot 4.11 will benefit from this, and all the updates from now on will be subject to more tests. We will catch the opportunity of a new Debian release to convert the current branch into a Long Term Support branch with fewer updates for a very reliable user experience. The Long Term Support conversion plan will also re-introduce ARM support and init freedom. We are evaluating the idea of continuing to provide a Rolling Release branch along side the LTS one. Important updates Linux 5.10 is the default kernel of this new Parrot version, with better hardware support for very recent hardware. We plan to release Linux 5.11 as soon as possible as a later update. We have finally purged many old, broken and unmaintained tools, and revisited many of the existing ones. Our tool metapackages were revisited as well to reflect this little revolution. Parrot 4.11 provides cleaner metapackages, updated tools and a more consistent repository. Previous Parrot versions used to have un-needed services shut down by default, but such services happened to re-enable randomly after system updates. We have enforced some systemd rules to prevent this happening. Certain tools used for Linux local privilege escalation represented a security hazard for parrot, so we have disabled and unarmed them (i.e. xspy is no longer an executable file in /usr/bin). Alternate Editions Kde Plasma now works again as expected, and it was updated to provide a better look and feel. XFCE has been updated with several improvements and fixes. Noticeable updates for pentesters Metasploit framework was updated to 6.0.36, and we keep updating it weekly. Bettercap has finally been updated to 2.29, and 2.30 is coming very soon. Pompem was patched from Parrot team to properly handle down services and use the new wpvulndb server. Routersploit was updated to make it work with python 3.9. Xspy was patched to not be executable on host system. Fish and Zsh support is now available in our skel, including the latest zsh-autocomplete version. We can’t report all the updates done to our tools here. If you are interested in a particular package, please read its specific changelog in /usr/share/doc/packagename to know more. Noticeable updates for developers VSCodium, the open-source binary distribution of VSCode with telemetry removed at source level, is still our default development tool, and it was updated to its latest version (1.54). Geany (with some Parrot customizations) is also pre-installed for those running on less powerful hardware. Parrot now ships with Python 3.9. Python 2 is finally deprecated, and /usr/bin/python now points to /usr/bin/python3 by default. Parrot also includes Go 1.15, and Go 1.16 will come very soon. The default Gcc version is 10.2.1. Open a terminal window, type sudo apt show parrot-devel- and press TAB a couple of times to get the list of available packages from the bash autocompletion. Complete the command with the package of your choice to know more about the features delivered (i.e. apt show parrot-devel-golang). Additional metapackages for developers will come soon. Other updates from upstream providers As always, this version ships with all the latest updates from our upstream sources (mostly Debian), and every new fix, improvement (or bug) is now included in Parrot 4.11 as well. From the firefox browser to the mate desktop environment, all the awesome upates and security fixes from upstream sources since the previous release are now part of the Parrot repository and hence part of this new release. [hide][Hidden Content]]
  14. What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.6 What’s Changed Added cryptocurrency hashes (#68) @bee-san Added a space before “Summary” in the output if there is no john (#70) @amadejpapez More Kerberos hash types need to be separated into a salt and without a salt #72 [hide][Hidden Content]]
  15. What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.5 What’s Changed Added 5 new Kerberos hash types (#67) @amadejpapez docs: add amadejpapez as a contributor (#64) @allcontributors [hide][Hidden Content]]
  16. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.4 What’s Changed Fixing python dict issues & kerberos (#58) @bee-san [hide][Hidden Content]]
  17. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.2 What’s Changed Added Kerberos Hash & Fixed Base64 bug (#54) @bee-san Bump rich from 9.12.4 to 9.13.0 (#50) @dependabot-preview Bump rich from 9.12.3 to 9.12.4 (#49) @dependabot-preview Bump rich from 9.12.0 to 9.12.3 (#48) @dependabot-preview [hide][Hidden Content]]
  18. Simply the best System Repair Solution Power of Proof! Advanced System Repair, Inc. Third-Party validations certification is the best way to put the POWER of PROOF behind our claims. We are dedicated to testing our product to ensure we meet and go beyond the industry standard. [Hidden Content] [hide][Hidden Content]]
  19. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! Changelog v1.1.6 What’s Changed Fix typo in help dialogue (#47) @jgmoss Fixed bug that printed “hello” in non grep mode. [hide][Hidden Content]]
  20. Simply the best System Repair Solution Get a faster, cleaner and smoother PC Advanced System Repair Pro brings you all the tools you need in one program to clean, fix, protect, optimize and boost your PC! Fix annoying PC issues Get a cleaner computer in minutes Speed up and revive your PC [Hidden Content] [hide][Hidden Content]]
  21. 100% Speedrun TryHackMe Crack the Hashes 2.13 seconds Tired of going to every website to crack your hash? Search-That-Hash automates this process in less then 2 seconds. Search-That-Hash searches the most popular hash cracking sites and automatically inputs your hash(s) for cracking Please note that this in alpha stage so do not expect it to be perfect For bugs please open an issue. Features Auto-Type Identification - No need to know the hash type, Search-That-Hash uses Name-That-Hash to get accurate results on the type of the hash. Offline Mode - Not connected to the internet? No worries, Search-That-Hash will automatically run Hashcat for you. Fast - We're all busy people and that's why we've dedicated time to make Search-That-Hash as fast as possible. JSON API - As well as JSON output for CLI we also offer an API. Accessible - We are 100% Accessible. Extensible - Adding sites to Search-That-Hash is as easy as printing "hello world" ! Beautiful - The colours were hand-selected to be as gnarly and accessible as possible . Ethical - We search hashes ethically and legally. [hide][Hidden Content]]
  22. Name-That-Hash What is this? Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? Name-that-hash will name that hash type! Features Popularity Ratings – Name that hash will show you the most popular hashes first. In older systems, it would prioritise Skype Hash the same as Active Directory’s NTLM! Which makes as much sense as saying that my GitHub is as popular as VSCode ✍ Hash Summaries – no more wondering whether it’s MD5 or NTLM. It will summarise the main usage of each hash, allowing you to make an informed & decisive choice Colour Output – Don’t worry, the colours were hand-selected with a designer to be 100% accessible and gnarly JSON output && API – Want to use it in your project? We are API first, CLI second. Use JSON output or import us as a Python module! Updated! – HashID was last updated in 2015. Hash-Identifier in 2011! It is a 2021 project Accessible – We are 100% committed to making this an accessible hacking tool Extensible – Add new hashes as quickly as you can edit this README. No, seriously — it’s that easy! [hide][Hidden Content]]
  23. Advanced System Protector An Ultimate Security Suite To Safeguard Your PC Advanced System Protector is a spyware removal tool for Windows that protects your PC against Trojans, spyware, adware and other threats, thus protecting your data. Secure Your PC From Threats Advanced System Protector comes with a powerful engine that systematically scans and removes all infections and malicious files to keep your data secure. All-in-one Tool Advanced System Protector is loaded with features for complete protection. Highest Cleaning Ratio Clean 100% of detected threats for seamless browsing and computing experience. One-Click Scan Just click Start Scan Now to detect & remove infections from your PC. Different Scan Types Ensure thorough cleaning with Quick, Deep & Custom Scan modes. [Hidden Content] [hide][Hidden Content]]
  24. SysWhispers helps with AV/EDR evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported and example generated files available in the example-output/ folder. Difference Between SysWhispers 1 and 2 The usage is almost identical to SysWhispers1 but you don’t have to specify which versions of Windows to support. Most of the changes are under the hood. It no longer relies on @j00ru‘s syscall tables and instead uses the “sorting by system call address” technique popularized by @modexpblog. This significantly reduces the size of the syscall stubs. The specific implementation in SysWhispers2 is a variation of @modexpblog’s code. One difference is that the function name hashes are randomized on each generation. @ElephantSe4l, who had published this technique earlier, has another implementation based in C++17 which is also worth checking out. The original SysWhispers repository is still up but maybe deprecated in the future. Introduction Various security products place hooks in user-mode API functions which allow them to redirect execution flow to their engines and detect suspicious behavior. The functions in ntdll.dll that make the syscalls consist of just a few assembly instructions, so re-implementing them in your own implant can bypass the triggering of those security product hooks. This technique was popularized by @Cn33liz and his blog post has more technical details worth reading. SysWhispers provides red teamers the ability to generate header/ASM pairs for any system call in the core kernel image (ntoskrnl.exe). The headers will also include the necessary type of definitions. [hide][Hidden Content]]
  25. WSCC allows you to install, update, execute and organize the utilities from various system utility suites. WSCC can install and update the supported utilities automatically. Alternatively, WSCC can use the http protocol to download and run the programs. The portable edition doesn't require installation and can be run directly from a USB drive. WSCC supports the following major utility suites: Sysinternals Suite NirSoft Utilities 4.0.5.8 (January 4, 2021) [FIXED] minor fixes in the Update Manager [hide][Hidden Content]]