Search the Community
Showing results for tags 'token'.
-
Create Your Own Token ICO and Sell it without any registration : Multi – Currency : Multi Wallet Support [Hidden Content] [hide][Hidden Content]]
-
What is OTP token ? A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. One-time password tokens are often used as a part of two-factor and multifactor authentication. The use of one-time password tokens hardens a traditional ID and password system by adding another, dynamic credential. Depending upon the vendor, an OTP token will generate a PIN synchronously or asynchronously. Synchronous tokens use a secret key and time to create a one-time password. Asynchronous tokens use a challenge-response authentication mechanism (CRAM). In the past, OTP security tokens were usually pocket-size fobs with a small screen that displayed a number. The number changed every 30 or 60 seconds, depending on how the token is configured and the user entered his or her user name and password, plus the number displayed on the token. Today, OTP tokens are often software-based, and the passcode generated by the token is displayed on the user's smartphone screen. Software tokens make it easier for mobile users to enter authentication information and not have to keep track of a separate piece of hardware.
-
ICOWallet is the Complete Initial Coin offering Software for your CryptoCurrency Business. It has Token initialization and 6 Types of Payment gateways including Coin payment and GOURL. Here you can do any types of Coin offering services and You can Sell the Package to your Customers and will take investment from users. [Hidden Content] [hide][Hidden Content]]
-
Softnio introducing full functional dashboard for managing your ICO / STO token sale. TokenLite – ICO Script brings all kind of components, functional features that helps to Cryptocurrency Agencies / Startup to Lunching their ICO, sale their token, and get contribution from investor. [Hidden Content] [hide][Hidden Content]]
-
[hide][Hidden Content]]
-
Official Source of ItroublveTSC, totally open source. No virus or anything. Feel free to have a look :) [hide][Hidden Content]]
-
- 4
-
- itroublvetsc
- 6.1.3
-
(and 3 more)
Tagged with:
-
Proxies: Yes Bots: 100 Any Capture: Balance / Expiry [hide][Hidden Content]]
-
- 5
-
- [openbullet]
- proxylte.com
-
(and 6 more)
Tagged with:
-
Softnio introducing full functional dashboard for managing your ICO / STO token sale. TokenLite – ICO Script brings all kind of components, functional features that helps to Cryptocurrency Agencies / Startup to Lunching their ICO, sale their token, and get contribution from investor. [Hidden Content] [hide][Hidden Content]]
-
ICOWallet is the Complete Initial Coin offering Software for your CryptoCurrency Business. It has Token initialization and 6 Types of Payment gateways including Coin payment and GOURL. Here you can do any types of Coin offering services and You can Sell the Package to your Customers and will take investment from users. [Hidden Content] [hide][Hidden Content]]
-
✓ What is OTP token ? A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. One-time password tokens are often used as a part of two-factor and multifactor authentication. The use of one-time password tokens hardens a traditional ID and password system by adding another, dynamic credential. Depending upon the vendor, an OTP token will generate a PIN synchronously or asynchronously. Synchronous tokens use a secret key and time to create a one-time password. Asynchronous tokens use a challenge-response authentication mechanism (CRAM). In the past, OTP security tokens were usually pocket-size fobs with a small screen that displayed a number. The number changed every 30 or 60 seconds, depending on how the token is configured and the user entered his or her user name and password, plus the number displayed on the token. Today, OTP tokens are often software-based, and the passcode generated by the token is displayed on the user's smartphone screen. Software tokens make it easier for mobile users to enter authentication information and not have to keep track of a separate piece of hardware.
-
TokenGuard, protect your account, prevent token steal. Totally free and open source. TokenGuard is a program written in Python that aims to mitigate almost 100% the theft of Discord Tokens on your computer. The main features are: Simple GUI: TokenGuard has a graphic interface that is too simple, not very invasive and easy to use, which aims to adapt to all types of users. Constant Protection: The program is in charge of cleaning the traces of the Discord Token constantly, guaranteeing its safety at all times. Low Consumption: Despite the fact that it is constantly running, the consumption of both the CPU and RAM is very low.. [hide][Hidden Content]]
-
- tokenguard
- 1.0.0
-
(and 5 more)
Tagged with:
-
How To Make The Open Bullet Config Bypassing The Csrf Middle Token With Full Video [Hidden Content]
-
- 3
-
- encrypt.me
- vpn
-
(and 4 more)
Tagged with:
-
Softnio introducing full functional dashboard for managing your ICO / STO token sale. TokenLite – ICO Script brings all kind of components, functional features that helps to Cryptocurrency Agencies / Startup to Lunching their ICO, sale their token, and get contribution from investor. [Hidden Content] [hide][Hidden Content]]
-
Softnio introducing full functional dashboard for managing your ICO / STO token sale. TokenLite – ICO Script brings all kind of components, functional features that helps to Cryptocurrency Agencies / Startup to Lunching their ICO, sale their token, and get contribution from investor. [Hidden Content] [hide][Hidden Content]]
-
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also is a blog post for an explanation. It is heavily based on the code from the projects Invoke-SMBExec.ps1 and RoguePotato. I faced certain Offensive Security project situations in the past, where I already had the NTLM-Hash of a low-privileged user account and needed a shell for that user on the current compromised system – but that was not possible with the current public tools. Imagine two more facts for a situation like that – the NTLM Hash could not be cracked and there is no process of the victim user to execute shellcode in it or to migrate into that process. This may sound like an absurd edge case for some of you. I still experienced that multiple times. Not only in one engagement I spend a lot of time searching for the right tool/technique in that specific situation. My personal goals for a tool/technique were: Fully featured shell or C2-connection as the victim user-account It must to able to also Impersonate low privileged accounts – depending on engagement goals it might be needed to access a system with a specific user such as the CEO, HR-accounts, SAP-administrators, or others The tool can be used as C2-module [hide][Hidden Content]]
-
- 1
-
- namedpipepth:
- pass
-
(and 7 more)
Tagged with:
-
Discord Token Inviter Program That Invites Tokens To Any Server! Download: [Hidden Content] Password: level23hacktools.com
-
Discord token grabber First, launch pip install auto-py-to-exe in your command prompt Second, download this git, star and fork it for support kty Third, launch auto-py-to-exe launches a small terminal Follow the steps and there you go a small token-ip grabber [Hidden Content]
-
This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64). View the full article
-
This Metasploit module exploits a vulnerability in the PHP Laravel Framework for versions 5.5.40, 5.6.x up to 5.6.29. Remote command execution is possible via a correctly formatted HTTP X-XSRF-TOKEN header, due to an insecure unserialize call of the decrypt method in Illuminate/Encryption/Encrypter.php. Authentication is not required, however exploitation requires knowledge of the Laravel APP_KEY. Similar vulnerabilities appear to exist within Laravel cookie tokens based on the code fix. In some cases the APP_KEY is leaked which allows for discovery and exploitation. View the full article