Search the Community

Showing results for tags 'tool'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 137 results

  1. itsMe

    Proxy Tool v2 [Source]

    [Hidden Content]
  2. YT Tool Station is a bundled collection of best tools for YouTube videos.Such as Tags generator, y2mp3 Converter, live subscribers counter & more. Demo: [Hidden Content] [HIDE][Hidden Content]]
  3. Tool For Edit Combo Convert Combo Email:pass to user:pass remove user / email [HIDE][Hidden Content]]
  4. Features: [+] Most Accurate Anonymity Results [+] Most Stable Release [+] Multi Threaded [+] Filter & Sort easily by one click! [+] Socks 4/5 Checker [+] Deep Scan for scraping proxies [+] Export as CSV (Excel) [+] Check Valid Proxy Sources [+] Auto saves proxies separately (Elite/Anon/Transparent/Scraped) [+] Load own source to scrape proxy from [+] Auto Removes Duplicate Proxies [+] Export By Country , Proxy Anonymity Type , Url Passed [+] Accurate Results [HIDE][Hidden Content]]
  5. Operating Systems Tested Kali Linux 2020.1 Windows 10 Ubuntu 19.10 [HIDE][Hidden Content]]
  6. [+] Disclaimer : Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools. [+] Features: [+] Latest Login Pages ! [+] New Instagram Auto Follower Page ! [+] All types of Bugs Fixed ! [+] Useful for Beginners ! [HIDE][Hidden Content]]
  7. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver ThreatCrowd AnubisDB ThreatMiner Traceroute Protocols UDP TCP ICMP Directory Searching Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv [HIDE][Hidden Content]]
  8. [HIDE][Hidden Content]]
  9. How to use Extrem Leecher To Get Good combo 1 Firs you need HQ Keyword To get beter Results 2 Select Pestbin +Anoonfile+ Pestbin+throwbin 3 select 500 in Pages to grab a lot links in search engine 4 Grab urls and feltring and get data dont forget to click ok to remove invalid results 5 remove duplicate 6 Leech your combo just click leech data you don't need to save Links 7 Use proxy for beter Results 8 You must have a good internet speed [Hidden Content]
  10. Katana-ds Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and supports Tor It becomes more powerful in combination with GHDB Google Mode : Google mode gives you 2 inputs the “Dork” and the “TLD” (Top Level Domain) that gives you the ability to search in specific countries. e.g : com for Usa / for Morocco / be for Belgium For more please see the included TLDs.txt file. [HIDE][Hidden Content]]
  11. Linkedot is a LinkedIn automation tool that automates various activities on LinkedIn such as sending personalized messages, building connections, auto-follow ups, profile visits, remove connections etc. Demo: [Hidden Content] [HIDE][Hidden Content]]
  12. Xencrypt - A PowerShell Script Anti-Virus Evasion Tool Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it be awesome if you could take any script and automatically and with almost no effort generate a near-infinite amount of variants in order to defeat signature-based antivirus detection mechanisms? WELL, NOW YOU CAN! For the low low price of free! Xencrypt is a PowerShell crypter that uses AES encryption and Gzip/DEFLATE compression to with every invocation generate a completely unique yet functionally equivalent output script given any input script. It does this by compressing and encrypting the input script and storing this data as a payload in a new script which will unencrypt and decompress the payload before running it. In essence, it is to PowerShell what a PE crypter is. Features Xencrypt: Bypasses AMSI and all modern AVs in use on VirusTotal (as of writing) Compresses and encrypts powershell scripts Has a minimal and often even negative (thanks to the compression) overhead Randomizes variable names to further obfuscate the decrypter stub Randomizes encryption, compression and even the order that the statements appear in the code for maximum entropy! Super easy to modify to create your own crypter variant Supports recursive layering (crypter crypting the crypted output), tested up to 500 layers. Supports Import-Module as well as standard running as long as the input script also supported it GPLv3 -- Free and open-source! All features in a single file so you can take it with you anywhere! Is despite all of the above not a silver bullet for every configuration -- caveat emptor! [HIDE][Hidden Content]]
  13. Obfuscapk – A black-box obfuscation tool for Android apps. Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the decompiled smali code, resources and manifest. The obfuscated app retains the same functionality as the original one, but the differences under the hood sometimes make the new application very different from the original (e.g., to signature-based antivirus software). [HIDE][Hidden Content]]
  14. APK Easy Tool 1.56 / 1.57 beta-1 Apk Easy Tool is a lightweight application that enables you to manage, sign, compile and decompile the APK files for the apps you are working on. Allows you to manage the updates and fixes from one place The program comes with a clean and user-friendly interface that is unlikely to give you troubles. You can get started by selecting the desired file via the browsing function of the tool or drag and drop. The interface displays various information about the APK files, including package name, version, minimum SDK version and version code. From the main window, you can make the desired modifications as the main functions and additional options are all available in this tab. Speaking of functionality, some of the main operations you can perform via this tool, you can count compiling, decompiling, signing, extracting and installing the APK. In case you are working with ROMs only, then you can make further changes from the Framework tab. Moreover, if you feel you missed something, you can check all operations performed from the Log output tab. A straightforward app for managing APK files efficiently A noteworthy feature of the tool is that you can create the new code separately and overwrite the current APK with a simple drag and drop. It goes without saying that this operation can save you a lot of time and effort. In the eventuality that you provide frequent fixes and updates for your Android games or tools and want to be able to manage this processes smoother, then perhaps Apk Easy Tool could come in handy. - Softpedia Same as apktool, APK Easy Tool is neither intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms, analyzing applications and much more. APK Easy Tool is absolute free for commercial and non-commercial use. Requirements: Windows 7 or above .NET Framework 4.6.2 or above Java SE/JDK for decompile, compile, and sign APK. If you don't have Java installed, you can only use Zipalign or Install APK Features: Decompile/Compile Decomile and compile APK, DEX and JAR files, with SPACE, symbols and germany, danish, swedish etc... characters support. Can cancel during operation Sign/Zipalign Signing and ZipAligning of APK/JAR files. Can cancel during operation Extract/Zip APK Extract and zip APK with 7z Compression-level 0-9. Can cancel during operation APK Infomation Show APK infomation with icon using aapt dump badging and link to Play Store Framework Install your framework and manage framework paths Log output View your logs to find errors. Set date to view your previous logs Sided log output is only available for higher resolution with 1250 width and above. Options Change options of tool, decompile, compile, sign and zipalign. Options: Java heap, Apktool version, apksigner version, directories, java path, Windows explorer integration, remeber window position and more All options and textboxes are saved as config.xml and will load on launch Quick options on main. Drag and drop Drop APK, DEX, JAR files and Decompiled folder on buttons to perform actions. Drop outside buttons to select/open as file/folder Apktool.jar version selection Can switch to other versions of apktool.kar on options Add other apktool.jar in "Apktool" folder Shortcuts 4 buttons to open work directories of decompiled APK, compiled APK, extracted APK and zipped APK Jumplist shortcuts Windows explorer integration Do actions by just right-clicking on APK file and choose the following options, decomile or compile APK, DEX, and JAR files, Zipalign APK, Check align, Sign APK and Install APK Getting started: Download .msi or zip file, If you download .msi, open it and simply install it. If you download portable version .zip, extract to the portable drive you like to. Launch APK Easy Tool, directory are automatically set Select the APK file you want to work with or drop the APK to perform an action Do some work and good luck You do not need to select APK and set the directory if you do drag and drop actions. Framework are for ROM developers and System App modder only It works the same way as the command line version Download links: Both stable and beta versions && Setup and Portable are included [Hidden Content]
  15. #1 Email Opt-In & Lead Generation Plugin. Guaranteed Increase in Subscribers & Conversions! Demo: [Hidden Content] [HIDE][Hidden Content]]
  16. PHANTOM EVASION 3.0 Python AV evasion tool capable to generate FUD executable Phantom-Evasion is an antivirus evasion tool written in python (both compatible with python and python3) capable to generate (almost) fully undetectable executable even with the most common x86 msfvenom payload. The following OSs officialy support automatic setup: Kali Linux Parrot Security The following OSs likely support automatic setup but require manual installation of metasploit-framework: OSX (tested on Catalina) Ubuntu Linux Mint Elementary Deepin other Debian distro Centos Fedora Blackarch The following OSs require manual setup: Windows 10 Simply git clone or download and unzip Phantom-Evasion folder [HIDE][Hidden Content]]
  17. Stitch - Python Remote Administration Tool (RAT) A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. [Hidden Content]
  18. Allows One To Identify And Fingerprint Web Application Firewall (WAF) Products Protecting A Website The Web Application Firewall Fingerprinting Tool. — From Enable Security How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is. If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks. For further details, check out the source code on our main repository. [HIDE][Hidden Content]]
  19. Features Shake to hide or show the black bubble. (support both device and simulator) Long press the black bubble to show UIDebuggingInformationOverlay. (Apple’s Private API, support iOS 10/11/12) Application memory usage and FPS. List all print() and NSLog() messages which have been written by the developer in Xcode. (optional) List of all the network requests sent by the application. (optional) List crash errors. (optional) Share network details via email or copy to clipboard when you are in the Network Details page. Copy logs. (long press the text, then select all or select copy) Search logs by keyword. List application and device informations, including: version, build, bundle name, bundle id, screen resolution, device, iOS version List all sandbox folders and files, supporting to preview and edit. List HTML logs, including console.log(),console.debug(),console.warn(),console.error(),console. info(). (support both WKWebView and UIWebView). (optional) [HIDE][Hidden Content]]
  20. F B I

    CEH V10 Tool

    [Hidden Content]
  21. identYwaf is an identification tool that can recognize web protection type (i.e. WAF) based on blind inference. The blind inference is being done by inspecting responses provoked by a set of predefined offensive (non-destructive) payloads, where those are used only to trigger the web protection system in between (e.g. [Hidden Content] AND 2>1). Currently, it supports more than 80 different protection products (e.g. aeSecure, Airlock, CleanTalk, CrawlProtect, Imunify360, MalCare, ModSecurity, Palo Alto, SiteGuard, UrlScan, Wallarm, WatchGuard, Wordfence, etc.), while the knowledge-base is constantly growing. Also, as part of this project, screenshots of characteristic responses for different web protection systems are being gathered (manually) for future reference. [HIDE][Hidden Content]]
  22. The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn’t be able to get from just looking at their profile. The information includes: Username Profile Name URL Followers Following Number of Posts Bio Profile Picture URL Is a Business Account? Connected to a FB account? External URL Joined Recently? Business Category Name Is private? Is Verified? Downloads Public Photos [HIDE][Hidden Content]]
  23. dEEpEst

    DbgChild - Debug Child Process Tool

    DbgChild - Debug Child Process Tool DbgChild is a stand alone tool for debugging child processes (auto attach). DbgChild can be used in conjunction with a plugin for a debugger. Currently DbgChild supports a plugin for the x86/x64 x64dbg debugger. Support for DbgChild can be extended to OllyDbg and Immunity debugger if so required via crowdfunding: [Hidden Content]
  24. TeleGram-Scraper telegram group scraper tool. It fetches all the information about group members. API Setup Go to [Hidden Content] and log in. Click on API development tools and fill the required fields. put app name you want & select other in platform Example : copy “api_id” & “api_hash” after clicking create an app ( will be used in ) [HIDE][Hidden Content]]
  25. Turbolist3r - Subdomain Enumeration Tool With Analysis Features For Discovered Domains Turbolist3r is a fork of the sublist3r subdomain discovery tool. In addition to the original OSINT capabilties of sublist3r, turbolist3r automates some analysis of the results, with a focus on subdomain takeover. Turbolist3r queries public DNS servers for each discovered subdomain. If the subdomain exists (i.e. the resolver replied with an address), the answer is categorized as CNAME or A record. By examining A records, it is possible to discover potential penetration testing targets for a given domain. Likewise, the process of looking for subdomain takeovers is simple; view the discovered CNAME records and investigate any that point to applicable cloud services. Please do not use for illegal purposes. [HIDE][Hidden Content]]