Search the Community

Showing results for tags 'the'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 185 results

  1. Description During the Python Mega Course you will learn how to build 10 real-time Python programs. This is the only Joomla training course that covers all topics of web, database, web scripting, data science, web visualization, image processing and more. This tutorial is not just a simple Python coding course. This course carefully teaches how to build a wide range of applications from web applications to motion recognition software. Providing real examples with a variety of interactive exercises, quizzes and projects will ensure that you fully understand Python and that you have the skills to build any program you like. This course is suitable for anyone at any level. The first 5 percent of the course teaches the basics of Python, which is good for beginners. After completing this 5%, build 10 real Python 3 programs Be trained. What you'll learn Go from a total beginner to a confident Python programmer Create 10 real-world Python programs (no toy programs) Strengthen your skills with bonus practice activities throughout the course Create an English Thesaurus app that returns definitions of English words Create a personal website entirely in Python Create a mobile app that improves your mood Create a portfolio website and publish it on a real server Create a desktop app for storing data for books Create a webcam app that detects moving objects Create a web scraper that extracts real-estate data Create a data visualization app Create a database app Create a geocoding web app Send automated emails Analyze and visualize data Use Python to schedule programs based on computer events. Learn OOP (Object-Oriented Programming) Learn GUIs (Graphical-User Interfaces) This course includes 25 hours on-demand video 74 articles 38 downloadable resources 70 coding exercises Full lifetime access Access on mobile and TV Certificate of completion Requirements A computer (Windows, Mac, or Linux). No prior knowledge of Python is required. No previous programming experience needed. Who this course is for Those with no prior knowledge of Python. Those who know Python basics and want to master Python [hide][Hidden Content]]
  2. This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive. Examples of vulnerabilities that you can find So, the vulnerabilities identified, from which you can make personalized improvements are: Active Scan: XSS reflected and Stored SQL Injection error based Blind SQL injection Blind SQL injection time-based XXE Blind XXE SSRF CRLF Information disclosure Nginx off-by-slash vulnerability – From Orange Tsai Command injection Web cache poisoning Blind command injection Open Redirect Local File Inclusion Remote File Inclusion Path Traversal LDAP Injection XML Injection SSI Injection XPath Injection etc Passive Response Scan Security Headers Cookies attributes Endpoints extract Software versions Error strings In general any string or regular expression in the response. Passive Request Scan Interesting params and values In general any string or regular expression in the request. Changelog v3.3.5 Fixed bug with Payload and Payload without encoding match type Changed the default directory from user.dir to user.home Added and variables for printing issue details in Advisory. Fixed regex grep case sensitive Better redirection performance Fixed bug with Match And Replace [hide][Hidden Content]]
  3. HackBrowserData hack-browser-data is an open-source tool that could help you decrypt data[passwords|bookmarks|cookies|history] from the browser. It supports the most popular browsers on the market and runs on Windows, macOS, and Linux. Supported Browser Windows Browser Password Cookie Bookmark History Google Chrome (Full Version) Firefox Microsoft Edge 360 Speed Browser QQ Browser Internet Explorer [hide][Hidden Content]]
  4. This tool gives information about the phone number that you entered. What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provieded; ->Tries To Find Owner Of The Number ->Tries To Find Risk Level Of The Number ->Tries To Find Location,Time Zone Of The Number,Carrier ->Tries To Find Social Media Platforms That The Number Is Registered ->Tries To Find Links About Phone Number ->Tries To Find Comments About Phone Number ->Sends Sms To Phone Number With Amazon Aws [hide][Hidden Content]]
  5. The all-in-one Red Team browser extension for Web Pentesters HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more. Current functions: Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat) Shell Spawning (TTY Shell Spawning) XSS Payloads Basic SQLi payloads Local file inclusion payloads (LFI) Base64 Encoder / Decoder Hash Generator (MD5, SHA1, SHA256, SHA512) Useful Linux commands (Port Forwarding, SUID) Changelog v0.2 Handling CVE Search Exception ( AJAX error ) that cause extension crash Adding File Transfers snippets ( Exfiltration over BASH with TCP and HTTP / Python 2 / 3 http server +WGET and SCP ). [hide][Hidden Content]]
  6. Welcome Capstone is a lightweight multi-platform, multi-architecture disassembly framework. Our target is to make Capstone the ultimate disassembly engine for binary analysis and reversing in the security community. Highlight features Multi-architectures: Arm, Arm64 (Armv8), BPF, Ethereum Virtual Machine, M68K, M680X, Mips, MOS65XX, PowerPC, RISCV, Sparc, SystemZ, TMS320C64X, Web Assembly, XCore & X86 (include X86_64) (details). Clean/simple/lightweight/intuitive architecture-neutral API. Provide details on disassembled instruction (called “decomposer” by some others). Provide some semantics of the disassembled instruction, such as list of implicit registers read & written. Implemented in pure C language, with bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala available. Native support for Windows & *nix (with Mac OSX, iOS, Android, Linux, *BSD & Solaris confirmed). Thread-safe by design. Special support for embedding into firmware or OS kernel. High performance & suitable for malware analysis (capable of handling various X86 malware tricks). Distributed under the open source BSD license. [hide][Hidden Content]]
  7. The all-in-one Red Team browser extension for Web Pentesters HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more. With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12. Current functions: Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat) Shell Spawning (TTY Shell Spawning) XSS Payloads Basic SQLi payloads Local file inclusion payloads (LFI) Base64 Encoder / Decoder Hash Generator (MD5, SHA1, SHA256, SHA512) Useful Linux commands (Port Forwarding, SUID) [hide][Hidden Content]]
  8. [hide][Hidden Content]]
  9. Chris Eagle_ Kara Nance - The Ghidra Book-No Starch Press (2020) - True PDF Description: DANCE WITH THE DRAGON The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world’s most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere — and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra’s components, features, and unique capacity for group collaboration. You’ll learn how to: Navigate a disassembly Use Ghidra’s built-in decompiler to expedite analysis Analyze obfuscated binaries Extend Ghidra to recognize new data types Build new Ghidra analyzers and loaders Add support for new processors and instruction sets Script Ghidra tasks to automate workflows Set up and use a collaborative reverse engineering environment Designed for beginner and advanced users alike, The Ghidra Book will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro. [Hidden Content] [hide][Hidden Content]]
  10. ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point. Notes: ADCollector is not an alternative to the powerful PowerView, it just automates enumeration to quickly identify juicy information without thinking too much at the early Recon stage. Functions implemented in ADCollector are ideal for enumeration in a large Enterprise environment with lots of users/computers, without generating lots of traffic and taking a large amount of time. It only focuses on extracting useful attributes/properties/ACLs from the most valuable targets instead of enumerating all available attributes from all the user/computer objects in the domain. You will definitely need PowerView to do more detailed enumeration later. The aim of developing this tool is to help me learn more about Active Directory security in a different perspective as well as to figure out what’s behind the scenes of those PowerView functions. I just started learning .NET with C#, the code could be really terrible~ It uses S.DS namespace to retrieve domain/forest information from the domain controller(LDAP server). It also utilizes S.DS.P namespace for LDAP searching. Enumeration Current Domain/Forest information Domains in the current forest (with domain SIDs) Domain Controllers in the current domain [GC/RODC] (with ~~IP, OS Site and ~~Roles) Domain/Forest trusts as well as trusted domain objects[SID filtering status] Privileged users (currently in DA and EA group) Unconstrained delegation accounts (Excluding DCs) Constrained Delegation (S4U2Self, S4U2Proxy, Resources-based constrained delegation) MSSQL/Exchange/RDP/PS Remoting SPN accounts User accounts with SPN set & password does not expire account Confidential attributes () ASREQROAST (DontRequirePreAuth accounts) AdminSDHolder protected accounts Domain attributes (MAQ, minPwdLength, maxPwdAge lockoutThreshold, gpLink[group policies that linked to the current domain object]) LDAP basic info(supportedLDAPVersion, supportedSASLMechanisms, domain/forest/DC Functionality) Kerberos Policy Interesting ACLs on the domain object, resolving GUIDs (User-defined object in the future) Unusual DCSync Accounts Interesting ACLs on GPOs Interesting descriptions on user objects Sensitive & Not delegate account Group Policy Preference cpassword in SYSVOL/Cache Effective GPOs on the current user/computer Restricted groups Nested Group Membership Changelog v2.0 1. Complete Rewrite (more extensible) 2. Add Interactive Menu with command line choice 3. Use direct API call to enumerate Trust relationship 4. Update Applied GPO Enumeration with Security Filtering and WMI Filtering (WMIFilter needs to be checked manually) 5. Add LDAP DNS Record Enumeration 6. RunAs: Run ADCollector under another user context 7. Flexible SPN Scan, DNS Records, Nested Group Membership, ACL Enumeration 8. Add NetSessionEnum, NetLocalGroupGetMembers and NetWkstaUserEnum [hide][Hidden Content]]
  11. English | 2020 | ASIN: B08FJGB1HN | 159 Pages | PDF, EPUB, AZW3 | 2.45 MB Overview: Are you ready to unlock the keys to the future? If your answer is a resounding 'YES!', then this crash course on Python Programming is exactly what you need in your toolkit. In these days of the 3.0 era, there are essential tools that we must absolutely have at hand to solve everyday problems. And guess what? One of these skills consists of how to use programming languages. Can you imagine what we could do if we'd knew how to write a simple instruction for our PC? What we could achieve if we could create from scratch something that'd solve problems in just seconds? That would be absolutely amazing: no limits, no boundaries, no frontiers. A whole new world of possibilities in front of us! [hide][Hidden Content]]
  12. English | 2020 | ISBN: 0135264027 | 416 Pages | EPUB | 10 MB Updated for Xcode 11, Swift 5, and iOS 13, iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the know-how and the confidence you need to tackle iOS projects of your own. Based on Big Nerd Ranch’s popular iOS training and its well-tested materials and methodology, this bestselling guide teaches iOS concepts and coding in tandem. The result is instruction that is relevant and useful. Throughout the book, the authors explain what’s important and share their insights into the larger context of the iOS platform. You get a real understanding of how iOS development works, the many features that are available, and when and where to apply what you’ve learned. [Hidden Content] [Hidden Content]
  13. Coding With Python: The Essential Course To Master In A Smart Way Software Concepts, Tools English | 2020 | ASIN: B08DVC7SZX | 83 Pages | PDF/AZW3/KINDLE | 8.11 MB Do you want to learn the basics concepts of Phyton coding? Do you want to know more about Phyton and make things work in no time? Then this book is for you! The first thing we need to look at here is the keywords. These seem pretty straightforward, but it is so important to understand that they tell the compiler how it needs to act and behave with the projects that you are doing. These keywords are ones that are reserved to tell the compiler what it needs to do. Since they are reserved, the computer programmer needs to remember to use them properly so that the compiler can take that command and get things done. You need only to use them in the specified parts of the code, or it leads to error messages and other problems. If you properly use them, the compiler will be given command of what you want it to do, and it can then execute the code in the right way. These words are essential to the whole code and learning what they are is going to make code writing more comfortable as well. You will be able to notice a lot of these keywords as we progress through this guidebook and write some of our codes. [hide][Hidden Content]]
  14. Python programming : The Easiest Python Crash Course to Go Deep Through The Main Applications English | 2020 | ISBN: B08FDYH3YG | 41 Pages | PDF/AZW3 | 3.92 MB New in coding? Do you want to learn coding from scratch? This book will teach you the Python programming language that is widely used today. Keep reading to discover more about it! Python is presumably the easiest-to-learn and nicest-to-use programming language in widespread use. Python code is clear to read and write, and it is short without being cryptic. It is a very powerful language, which means that we can generally write far fewer lines of Python code than would be needed for an equivalent application written in, say, C++ or Java. [hide][Hidden Content]]
  15. Probably one of the worst free open source Discord token checker [hide][Hidden Content]]
  16. HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more. Current functions: Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat) Shell Spawning (TTY Shell Spawning) XSS Payloads Basic SQLi payloads Local file inclusion payloads (LFI) Base64 Encoder / Decoder Hash Generator (MD5, SHA1, SHA256, SHA512) Useful Linux commands (Port Forwarding, SUID) HackTools 0.1.2 for Chromium New features : Obfuscated PHP webshell payloads UI Menu is set to icon similar to the firefox version Installation Steps : Extract (you will obtain a folder named 'dist') In your chromium based web-browser upload the folder as an unpacked Extension. Enjoy ! [hide][Hidden Content]]
  17. sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections. Features implemented in sqlmap include: Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and HSQLDB database management systems. Full support for five SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query and stacked queries. Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. It is possible to provide a single target URL, get the list of targets from Burp proxy or WebScarab proxy requests log files, get the whole HTTP request from a text file or get the list of targets by providing sqlmap with a Google dork which queries Google search engine and parses its results page. You can also define a regular-expression based scope that is used to identify which of the parsed addresses to test. Tests provided GET parameters, POST parameters, HTTP Cookie header values, HTTP User-Agent header value and HTTP Referer header value to identify and exploit SQL injection vulnerabilities. It is also possible to specify a comma-separated list of specific parameter(s) to test. Option to specify the maximum number of concurrent HTTP(S) requests (multi-threading) to speed up the blind SQL injection techniques. Vice versa, it is also possible to specify the number of seconds to hold between each HTTP(S) request. Others optimization switches to speed up the exploitation are implemented too. HTTP Cookie header string support, useful when the web application requires authentication based upon cookies and you have such data or in case you just want to test for and exploit SQL injection on such header values. You can also specify to always URL-encode the Cookie. Automatically handles HTTP Set-Cookie header from the application, re-establishing of the session if it expires. Test and exploit on these values is supported too. Vice versa, you can also force to ignore any Set-Cookie header. HTTP protocol Basic, Digest, NTLM and Certificate authentications support. HTTP(S) proxy support to pass by the requests to the target application that works also with HTTPS requests and with authenticated proxy servers. Options to fake the HTTP Referer header value and the HTTP User-Agent header value specified by user or randomly selected from a textual file. Support to increase the verbosity level of output messages: there exist seven levels of verbosity. Support to parse HTML forms from the target URL and forge HTTP(S) requests against those pages to test the form parameters against vulnerabilities. Granularity and flexibility in terms of both user’s switches and features. Estimated time of arrival support for each query, updated in real time, to provide the user with an overview on how long it will take to retrieve the queries’ output. Automatically saves the session (queries and their output, even if partially retrieved) on a textual file in real time while fetching the data and resumes the injection by parsing the session file. Support to read options from a configuration INI file rather than specify each time all of the switches on the command line. Support also to generate a configuration file based on the command line switches provided. Support to replicate the back-end database tables structure and entries on a local SQLite 3 database. Option to update sqlmap to the latest development version from the subversion repository. Support to parse HTTP(S) responses and display any DBMS error message to the user. Integration with other IT security open source projects, Metasploit and w3af. More… 1.4.8 - 08-03-2020 - Fixes #4292 [hide][Hidden Content]]
  18. Would you like to get started as an ethical hacker? Do you want to become a professional penetration tester? Enroll now in The Complete Ethical Hacking Course and learn how to think like a hacker, and become familiar with the toolkit of a professional pentester. This course covers a wide range of topics relating to network security: Introduction to ethical hacking Reconnaissance Scanning and enumeration Network presence Attacking systems Web hacking Social engineering When you enroll in the course you will immediately receive access to 19+ hours of HD video tutorials, as well as additional supplemental resources for developing the necessary skills to succeed in the field. Learn by doing with demonstrations using popular pentesting tools such as Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, SQLmap, mitmproxy, Skipfish and more! Thank you for taking the time to read this, and we hope to see you in the course! [Hidden Content]
  19. What is it all about? Whether you are at the start of your journey into Malware Analysis, or perhaps you are looking to refine your skills in different areas, this course will be beneficial for you. With beginners in mind, the course is comprised of several modules, each focusing on a different aspect of Malware Analysis - this ranges from learning x86 Assembly and analyzing Visual Basic macros, to extracting configurations and learning about encryption algorithms What's included? 13 videos 1 file 1 text file Modules inside: Setting Up a Safe Environment The Many Variants of Malware + Terminology Analysing The First Sample: A .NET Info-Stealer The Basics of x86 Assembly Learning How to Use IDA Pro Free Learning How to Use x32/x64Dbg Looking at Common API Used in Malware Analysing an Advanced Sample: PandaBanker Analysing "Plaintext" Malware - Malicious Word Documents Analysing Command and Control Communications + InetSim Common Algorithms in Malware Unpacking Malware - Tips and Tricks to get the Payload faster Link to the Presentations on Google Drive Downloading the Samples Info: [Hidden Content] [hide][Hidden Content]]
  20. TinyTransfer is an online file sharing tool, 100% responsive,simple and clean File sending and sharing built with PHP,HTML5, CSS3, jQuery using spectre. [Hidden Content] [hide][Hidden Content]]
  21. xAnalyzer is a plugin for the x86/x64 x64dbg debugger by @mrexodia. This plugin is based on the APIInfo Plugin by @mrfearless, although some improvements and additions have been made. xAnalyzer is capable of doing various types of analysis over the static code of the debugged application to give more extra information to the user. This plugin is going to make extensive API functions call detections to add functions definitions, arguments and data types as well as any other complementary information, something close at what you get with OllyDbg analysis engine, in order to make it even more comprehensible to the user just before starting the debugging task. Features Some of the main features and improvements include: Extended function calls analysis (over 13,000 API’s definitions from almost 200 DLL’s) Defined and generic functions, arguments, data types and additional debugging info recognition. Automatic loops detection. User maintained definition files Changelog v2.5.5 Changes: Fixed “small buffer” issue (crash) on large modules with long instructions. ( closes #43 and #47 ) Fixed huge amount of ram usage for extended analysis on modules with a big number of functions/parameters ( closes #44 ) [hide][Hidden Content]]
  22. A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port. DESKTOP BUTTON OPTION For a full GUI experience you can add a desktop shortcut to your VM. You will need to add the following file --> taipan.desktop --> ~/.local/share/applications Make sure to edit the file with the path location where you downloaded the app. [hide][Hidden Content]]
  23. PixelPhoto v1.4.1 - The Ultimate Image Sharing & Photo Social Network Platform PixelPhoto is a photo sharing script, PixelPhoto is the best way to start your own photo sharing website! PixelPhoto is fast, secured, and it will be regularly updated. [Hidden Content] [hide][Hidden Content]]
  24. WoWonder is a PHP Social Network Script, WoWonder is the best way to start your own social network website! WoWonder is fast, secured, and it will be regularly updated. Demo: [Hidden Content] [hide][Hidden Content]]