Search the Community

Showing results for tags 'the'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 198 results

  1. The Complete Python 3 Course: Beginner to Advanced! Learn Python with projects covering game & web development, web scraping, MongoDB, Django, PyQt, and data visualization! If you want to get started programming in Python, you are going to LOVE this course! This course is designed to fully immerse you in the Python language, so it is great for both beginners and veteran programmers! Learn Python as Nick takes you through the basics of programming, advanced Python concepts, coding a calculator, essential modules, creating a "Final Fantasy-esque" RPG battle script, web scraping, PyMongo, WebPy development, Django web framework, GUI programming, data visualization, machine learning, and much more! We are grateful for the great feedback we have received! "This course it great. Easy to follow and the examples show how powerful python can be for the beginner all the way to the advanced. Even if the RPG may not be your cup of tea it shows you the power of classes, for loops, and others!" "Good course even for non-programmers too." "It's really well explained, clear. Not too slow, not too fast." "Very thorough, quick pace. I'm learning A TON! Thank you :)" "Good explanation, nice and easy to understand. Great audio and video quality. I have been trying to get into Python programming for some time; still a long way to go, but so far so good!" The following topics are covered in this course: Programming Basics Python Fundamentals JavaScript Object Notation (JSON) Web Scraping PyMongo (MongoDB) Web Development Django Web Framework Graphical User Interface (GUI) Programming (PyQt) Data Visualization Machine Learning This course is fully subtitled in English! Thank you for taking the time to read this and we hope to see you in the course! [Hidden Content] Download: [hide][Hidden Content]]
  2. Advanced Phishing Tool For Instagram, With Custom Templates Built According To Your Needs. Author:[Whit3H4tJr] Features: Port Forwarding with Ngrok Live Attack IP Grabber Location Capture [hide][Hidden Content]]
  3. HighExpress is a PHP eCommerce Multi-Vendor MarketPlace Script, HighExpress is the best way to create your own multi-vendor marketplace. The features of the HighExpress are, that it is very simple to install, a convenient and intuitive user interface, fast and secured, and also regularly updated. Highexpress allows any user to buy and also sell their products, and also includes all the necessary tools for managing the content of your store. Demo: [Hidden Content] [HIDE][Hidden Content]]
  4. itsMe

    On The Fly

    OLD Source [HIDE][Hidden Content]]
  5. Zoom Conference scanner. This scanner will check for a random meeting id and return information if available. Tangalanga This version does not have a prebaked tag. Traffic sniffing is needed before using. [HIDE][Hidden Content]]
  6. Burp Bounty – Scan Check Builder This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive. Examples of vulnerabilities that you can find So, the vulnerabilities identified, from which you can make personalized improvements are: Active Scan: XSS reflected and Stored SQL Injection error based Blind SQL injection Blind SQL injection time-based XXE Blind XXE SSRF CRLF Information disclosure Nginx off-by-slash vulnerability – From Orange Tsai Command injection Web cache poisoning Blind command injection Open Redirect Local File Inclusion Remote File Inclusion Path Traversal LDAP Injection XML Injection SSI Injection XPath Injection etc Passive Response Scan Security Headers Cookies attributes Endpoints extract Software versions Error strings In general any string or regular expression in the response. Passive Request Scan Interesting params and values In general any string or regular expression in the request. Changelog 3.3.0 20200607 Fixed bug with windows systems New look and feel A lot of code rewritten for further optimization [HIDE][Hidden Content]]
  7. Search by custom fields, post meta, taxonomies, tags, categories, authors, post types, post dates and more – The Ultimate WordPress Filter Plugin with Ajax! Demo: [Hidden Content] [HIDE][Hidden Content]]
  8. Sngine is a PHP Social Network Platform is the best way to create your own social website or online community. Launch it in just 1 minute with ultimate features. It’s fast, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  9. Yoast SEO is the most complete WordPress SEO plugin. It handles the technical optimization of your site & assists with optimizing your content. Demo: [Hidden Content] [HIDE][Hidden Content]]
  10. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler html CSS Javascripts Internal Links External Links Images robots sitemaps Links inside Javascripts Links from Wayback Machine from Last 1 Year DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver ThreatCrowd AnubisDB ThreatMiner Facebook Certificate Transparency API Auth Token is Required for this source, read Configuration below Traceroute Protocols UDP TCP ICMP Directory Searching Support for File Extensions Directories from Wayback Machine from Last 1 Year Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv [Hidden Content]
  11. A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests Every section contains the following files, you can use the _template_vuln folder to create a new chapter: - vulnerability description and how to exploit it Intruder - a set of files to give to Burp Intruder Images - pictures for the Files - some files referenced in the You might also like the Methodology and Resources folder : Methodology and Resources Active Directory Cloud - AWS Cloud - Azure Cobalt Strike - Linux - Linux - Privilege Metasploit - Methodology and Network Pivoting Network Reverse Shell Subdomains Windows - Download and Windows - Windows - Windows - Post Exploitation Windows - Privilege Windows - Using CVE Exploits [HIDE][Hidden Content]]
  12. SocialPwned SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks like Instagram, Linkedin, and Twitter to find the possible credential leaks in PwnDB. The purpose of this tool is to facilitate the search for vulnerable targets during the phase of Footprinting in Ethical Hacking. It is common for employees of a company to publish their emails in social networks, either professional or personal, so if these emails have their credentials leaked, it is possible that the passwords found have been reused in the environment to be audited. If it’s not the case, at least you would have an idea of the patterns that follow this target to create the passwords and be able to perform other attacks with a higher level of effectiveness. [HIDE][Hidden Content]]
  13. Sngine is the leading social network software packed with amazing and customizable features. A wide range of available settings allows you to configure the system to suit your needs. You may also easily disable features you do not need. Demo: [Hidden Content] [HIDE][Hidden Content]]
  14. Yoast SEO is the most complete WordPress SEO plugin. It handles the technical optimization of your site & assists with optimizing your content. Demo: [Hidden Content] [HIDE][Hidden Content]]
  15. "Print My Shell" is a python script, wrote to automate the process of generating various reverse shells based on PayloadsAllTheThings and Pentestmonkey reverse shell cheat sheets. Using this script you can easily generate various types of reverse shells without leaving your command line. This script will come in handy when you are playing CTF like challenges. Available Shell Types Bash Perl Ruby Golang Netcat Ncat Powershell Awk Lua Java Socat Nodejs Telnet Python [HIDE][Hidden Content]]
  16. NEX-Forms is a high quality and simple to use drag and drop/single click form creator offering a wide range of customizability, flexibility, design and usability that will make online form building a walk in the park. Do you have a need to easily create and customize professional and awesome looking forms on your WordPress website?...This forms builder is the one you need! Demo: [Hidden Content] [HIDE][Hidden Content]]
  17. Learn Cyber Security core concepts such as hacking, viruses, Encryption, Trojan, Spyware, Bots & Botnets, DMZ & more What you’ll learn Learn how to keep your kids and parents safe from cyber criminal actions. Understanding basic concepts and terminologies used in information security and cyber security. Bulletproof your online accounts (email, social media, etc.) and all the personal data that you’ve stored online. Understanding , Identifying & Preventing Malware. Learning about the most dangerous hacking attacks and their prevention. Learn About Browser Security Learning About BFA (Brute Force Attack) , IP Spoofing, Url Spoofing, LDAP Injection, SQL Injection, MIMA, Phishing Attacks and much more. Busting biggest cyber security Myths. Discover how cyber attacks work, How to avoid virus infections and How you can counteract their malicious consequences. Requirements Willingness to learn. You should know how to use a computer. You should know how to use an internet. Headphones / Earphones / Speakers ( OPTIONAL) . Description I know why you are here. You are an intelligent and curious guy always searching words like firewalls, encryption, viruses and malware sound but couldn’t get a satisfactory answer but don’t worry we have a course right for you that teaches you all the basics of both information and cyber security in a fun relaxed manner. This course is made in such a way that it fits absolutely perfect for you. It doesn’t matter if you don’t know anything about cyber security, because this course will help you understand what it’s all about. Even if you know the basics, you might still discover tips and tricks that really make a difference. So if you love gadgets, apps and everything that the Internet has to offer – you need this course! Remember: in the online world, with great opportunities come great threats as well. This course serves as an introduction to the exciting field of cyber security. As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cyber security. In this course, you will gain an overview of the cyber security landscape. PERFECT FOR COMPLETE BEGINNERS This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. What will you learn SECTION 1 (CYBER SECURITY COURSE) & SECTION 2 (CYBER SECURITY COURSE) will cover basic terminologies and hacking methodology and also learn about grey,blue,black,red,white hat hackers. SECTION 3 (CYBER SECURITY COURSE) Phishing Brute Force Attack DoS & DDoS Attacks Bots and Botnets SQL Injection LDAP Injection MITM URL Spoofing IP Spoofing and much more Then moving forward we will learn about Malware their types like viruses, trojan , spywares, ransomware etc. in SECTION -3 (CYBER SECURITY COURSE). SECTION 4 (CYBER SECURITY COURSE) Antivirus DMZ Encryption HoneyPots 2FA ( 2 Factor Authentication )and much more AND ALSO THERE IS A SMALL GIFT/SURPRISE FROM MY SIDE IN HERE ( You will love it !!!! ) JOB OUTLOOK Exciting career opportunities as security analyst, security engineer, security architect, forensics investigator, cybersecurity specialist, and more! Cyber security positions are expected to rise 6 million globally by 2019 (source: Forbes, January 2016) If you are already in the IT field, expect a 9% raise in pay for security expertise (source: Forbes, January 2016) Median salary for information security analyst for 2015 is $90,000 (source: US Bureau of Labor Statistics) THE DEMAND FOR CYBER SECURITY EXPERTS IS INCREASING AT A VERY HIGH RATE !!!!!!!!THEY ARE SEARCHING EXPERTS LIKE YOU …… This course will prove to be a steeping milestone in your cyber security & Ethical hacking career and by the end of this course you would be familiar with so many terminologies and would have gained sufficient knowledge that can help to jump start your career as an information security professional. So, what are you waiting for??????? Enroll now and fulfill all your dreams. DhabaleshwarWho this course is for: I created this course for everyone who wants to learn how to stay safe online. Students who want to learn the basics of computer and cyber security. Students who want to become IT or Cyber Security Experts. [HIDE][Hidden Content]]
  18. The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick one of the most famous social engineers in the world popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. * Examines social engineering, the science of influencing a target to perform a desired task or divulge information * Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access * Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers now you can do your part by putting to good use the critical information within its pages. [Hidden Content]
  19. Sngine is a PHP Social Network Platform is the best way to create your own social website or online community. Launch it in just 1 minute with ultimate features. It’s fast, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  20. Grow Your Email List, Website Traffic, and Social Media Followers with Viral Giveaways & Contests Demo: [Hidden Content] [HIDE][Hidden Content]]
  21. #1 Email Opt-In & Lead Generation Plugin. Guaranteed Increase in Subscribers & Conversions! Demo: [Hidden Content] [HIDE][Hidden Content]]