Search the Community

Showing results for tags 'tools'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 97 results

  1. Course List: Advance Course of Android Hacking Advance Of Black Hat Hacking Antivirus Evasion Course Complete Basic Course Of Android Hacking Complete Basic Course Of Kali Linux Complete Course Of Wifi Hacking Complete Course Of Carding ERC Course By DedSec Facebook & Instagram Hacking Manually Binding And Making FUD Payloads For Android Online Accounts Cracking Course Reverse Engineering Course – The Hacks Behind Cracking Spamming Practical Course – First Time In Internet History DedSec Latest FUD Ransomware [Hidden Content]
  2. NUUBI is a Recon Tools, Scanners, and tools for penetration testing. Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned. So it is an Incredible fast recon tool for penetration tester which is specially designed for the Reconnaissance phase. Features: Infromation Modules : Banner grabing Subnetlookup Cms detect Certificate Transparency log monitor Dnslookup Extract links GeoIP lookup Httpheaders Nmapscan Subdomain lookup Traceroute Find hosts sharing DNS servers URL and website scanner for potentially malicious websites Github username Whois Crawler Reverse ip Reverse DNS Zonetransfer Nping test Ping Response Check an Autonomous System Number (ASN) Cloudflare Cookie Scraper [hide][Hidden Content]]
  3. PwnFox PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit. If you are a chrome user you can check [Hidden Content]. Single click BurpProxy Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked. Containers Profiles PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp. PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++. Security header remover Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload. Headers stripped: Content-Security-Policy X-XSS-Protection X-Frame-Options X-Content-Type-Options [hide][Hidden Content]]
  4. Pipe different tools with google dork Scanner [hide][Hidden Content]]
  5. Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam. Why I was looking for a way to manage and keep up to date some tools that are not include in Kali-Linux. For exemple, I was looking for an easy way to manage privilege escalation scripts. One day I saw sec-tools from eugenekolo (which you can see at the bottom of the page) and it gave me the motivation to start working on mine right away. But keep in mind that is different. I built this for people that are working with Kali. Should work on others distro but I didn't include tool like Burp Suite or SQLmap because it comes in Kali by default. [hide][Hidden Content]]
  6. r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. Radare project started as a forensics tool, a scriptable command line hexadecimal editor able to open disk files, but later support for analyzing binaries, disassembling code, debugging programs, attaching to remote gdb servers, … radare2 is portable. The main tool of the whole framework. It uses the core of the hexadecimal editor and debugger. radare2 allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on. It implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, and visualizing. It can be scripted with a variety of languages, including Python, Ruby, JavaScript, Lua, and Perl. Architectures: 6502, 8051, CRIS, H8/300, LH5801, T8200, arc, arm, avr, bf, blackfin, xap, dalvik, dcpu16, gameboy, i386, i4004, i8080, m68k, malbolge, mips, msil, msp430, nios II, powerpc, rar, sh, snes, sparc, tms320 (c54x c55x c55+), V810, x86-64, zimg, risc-v. File Formats: ELF, Mach-O, Fatmach-O, PE, PE+, MZ, COFF, OMF, TE, XBE, BIOS/UEFI, Dyldcache, DEX, ART, CGC, Java class, Android boot image, Plan9 executable, ZIMG, MBN/SBL bootloader, ELF coredump, MDMP (Windows minidump), WASM (WebAssembly binary), Commodore VICE emulator, Game Boy (Advance), Nintendo DS ROMs and Nintendo 3DS FIRMs, various filesystems. Operating Systems: Windows (since XP), GNU/Linux, OS X, [Net|Free|Open]BSD, Android, iOS, OSX, QNX, Solaris, Haiku, FirefoxOS Bindings: Vala/Genie, Python (2, 3), NodeJS, Lua, Go, Perl, Guile, php5, newlisp, Ruby, Java, OCaml, … radare2 v4.6 has been released. [hide][Hidden Content]]
  7. Coding With Python: The Essential Course To Master In A Smart Way Software Concepts, Tools English | 2020 | ASIN: B08DVC7SZX | 83 Pages | PDF/AZW3/KINDLE | 8.11 MB Do you want to learn the basics concepts of Phyton coding? Do you want to know more about Phyton and make things work in no time? Then this book is for you! The first thing we need to look at here is the keywords. These seem pretty straightforward, but it is so important to understand that they tell the compiler how it needs to act and behave with the projects that you are doing. These keywords are ones that are reserved to tell the compiler what it needs to do. Since they are reserved, the computer programmer needs to remember to use them properly so that the compiler can take that command and get things done. You need only to use them in the specified parts of the code, or it leads to error messages and other problems. If you properly use them, the compiler will be given command of what you want it to do, and it can then execute the code in the right way. These words are essential to the whole code and learning what they are is going to make code writing more comfortable as well. You will be able to notice a lot of these keywords as we progress through this guidebook and write some of our codes. [hide][Hidden Content]]
  8. Introduction Pixload is an advanced set of tools that allows you to hide payloads within image files by either creating or injecting the intended payload into the desired image. Pixload: Image Payload Creating & Injecting Tools This set of tools has the ability to give you an access to some sophisticated hacking functions. Through it, you can create Polyglot files that can be used to sidestep the standard CSP security procedures by injecting the necessary attack scripts into a given image file. Polyglot files can be very effective when exploiting browsers such as Firefox, IE11, Edge, and Safari. One of the advantages of this type of exploit is that it can allow you to deploy attack files in the form of JavaScript or image files. The payloads which have been deployed can also be easily extracted without applying any external script during an attack. With Pixload you can also be able to exploit server-side misconfigurations by scripting malicious codes into the available system files.Through GD file manipulation PHP shells can be restructured in the form of PNG and IDAT chunks. Features: Bypassing CSP using polyglot JPEGs Encoding Web Shells in PNG IDAT chunks Hidden malvertising attacks (with Polyglot images) XSS payload revisiting (in PNG and IDAT chunks) XSS Facebook upload (Wonky and PNG content) [hide][Hidden Content]]
  9. itsMe

    Hacking Tools

    Options : 1-Whois 2-Port Scanner 3-Ping 4-GeoIP 5-DNS Lookup 6-Admin Finder 7-Get Response Headers 8-Reverse IP 9-Cloudflare Bypasser [hide][Hidden Content]]
  10. dEEpEst

    Advanced Web Hacking Tools

    23 downloads

    Tools Contains: Havij NetDatabaseScanner Open Web Spider Quick Web Site Hog Snippets Manager Spider mail SQL Injection SQL Map Project The Mole ZeroTeam ™ MD5 Password Encryptor Acunetix Web Vulnerability Scanner Advanced Deface Creator 1.3 Anonymous DNS Extractor-2013 Anonymous FTP Stealer Anonymous Text Encrypter Anonymous Tinypaste Uploader Ashiyane SQL Scanner Base64 Image Encoder-Decoder BTI Admin Page Finder v2 BTI HTML Encoder-Decoder BTI Multi Site Checker BTI Reverse IP Domain Check v2 ChromePasswordDecryptor CSS Minifier v2 Deface Page Created Dork Searcher Setup v1091 dorkinj DorkTools Eternals WebBrowser Explode Web Scanner ezDataBase_Defacer Fiddler Web Debugger Setup Gklspy Google URL Extractor Gr3eNoX LFi Exploiter Hacker’s Browser v2.0 Injection Framework - Automatized Sql Injection Tool Iron Web application Advanced Security testing Platform Joomla Security Scanner JSQL-Injection Mass Dork Scanner v1.0.0.1 Multi Vuln Checker nmap Spider mail SQL Exploiter Pro v2.10 SQL Helper SQLI-Hunter_v1.1 SQLI-Hunter_v1.2 SQL-Inject-Me-master sqlmap_win_v01 sqlmap-0.9 sqlninja-0.2.6-r1 SQLSentinel_v_0.3 Surf Excuse Survey Bypasser Tiny URL Shortener Vulcan Cleaner Vuln Hunter vulnerability master wapiti-2.3.0-win32-standalone Warbot VersaoSQL Tool v1.0 Alpha Build 6 Web Source Tools WebCruiser WebCruiserPro Websecurity Scanner 0.9 Website Blocker v2 WebSurgery-Setup-1.1.1 XCodeExploitScannerSept xSQL SCanner Size: 141MB Download: Free for Users PRIV8

    $100.00 PRIV8

  11. dEEpEst

    [on sale] .Advanced Web Hacking Tools

    View File Advanced Web Hacking Tools Tools Contains: Havij NetDatabaseScanner Open Web Spider Quick Web Site Hog Snippets Manager Spider mail SQL Injection SQL Map Project The Mole ZeroTeam ™ MD5 Password Encryptor Acunetix Web Vulnerability Scanner Advanced Deface Creator 1.3 Anonymous DNS Extractor-2013 Anonymous FTP Stealer Anonymous Text Encrypter Anonymous Tinypaste Uploader Ashiyane SQL Scanner Base64 Image Encoder-Decoder BTI Admin Page Finder v2 BTI HTML Encoder-Decoder BTI Multi Site Checker BTI Reverse IP Domain Check v2 ChromePasswordDecryptor CSS Minifier v2 Deface Page Created Dork Searcher Setup v1091 dorkinj DorkTools Eternals WebBrowser Explode Web Scanner ezDataBase_Defacer Fiddler Web Debugger Setup Gklspy Google URL Extractor Gr3eNoX LFi Exploiter Hacker’s Browser v2.0 Injection Framework - Automatized Sql Injection Tool Iron Web application Advanced Security testing Platform Joomla Security Scanner JSQL-Injection Mass Dork Scanner v1.0.0.1 Multi Vuln Checker nmap Spider mail SQL Exploiter Pro v2.10 SQL Helper SQLI-Hunter_v1.1 SQLI-Hunter_v1.2 SQL-Inject-Me-master sqlmap_win_v01 sqlmap-0.9 sqlninja-0.2.6-r1 SQLSentinel_v_0.3 Surf Excuse Survey Bypasser Tiny URL Shortener Vulcan Cleaner Vuln Hunter vulnerability master wapiti-2.3.0-win32-standalone Warbot VersaoSQL Tool v1.0 Alpha Build 6 Web Source Tools WebCruiser WebCruiserPro Websecurity Scanner 0.9 Website Blocker v2 WebSurgery-Setup-1.1.1 XCodeExploitScannerSept xSQL SCanner Size: 141MB Download: Free for Users PRIV8 Submitter dEEpEst Submitted 24/07/20 Category Files Password ********  
  12. Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project. [hide][Hidden Content]]
  13. The Most Complete Visitor Analytics & SEO package including visitor analytics (unique visitor, page view, bounce rate, average stay time, average visit, traffic analysis, top refferer, new & returning visitor, content overview, country & browser report, os & device report etc.) , web analytics (alexa data, whois data, social media data, moz check, search engine index, google page rank, IP analysis, malware check ) , SEO tools (link analysis, keyword position analysis, auto keyword suggestion,page status check etc.) Demo: [Hidden Content] [hide][Hidden Content]]
  14. wsltools is an elegant and simple Web Scan auxiliary library for Python. User Guide Tree: urlclean ast etl pathSplit mixPayload checksec Check Web Application Firewall checkWaf updateRules Check HTTP Response Headers checkHeaders x_xss_protection content_security_policy content_security_policy_report_only x_content_security_policy x_webkit_csp feature_policy x_frame_options access_control_allow_methods access_control_allow_headers access_control_expose_headers strict_transport_security public_key_pins public_key_pins_report_only Other about Security Header datatype datatype isnumeric istext isxml isjson isjsonp isurl isip isdomain isserialize isimage isaudio isvideo isdocument isarchive isurl Support Schemes Stream Support Types similar similar faker Instance profile userAgent creditCard email name ssn phone job company address Support Credit Card Types Support Locales code domaintools domain valid main sld tld subdomain sublevel subMatch updateTLDS [hide][Hidden Content]]
  15. ehtools framework Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it’s easy to install, set up, and utilize. Attacking frameworks Most new Wi-Fi hacking tools rely on many of the same underlying attacks, and scripts that automate using other more familiar tools like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program. An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this makes the process of using these tools easier to remember and can be seen as sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself. An example of this we’ve covered is the Airgeddonframework, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters but has the disadvantage of preventing beginners from understanding what’s happening “under the hood” of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network. [hide][Hidden Content]]
  16. massExploitConsole a collection of tools with a cli ui disclaimer Please use this tool only on authorized systems, I’m not responsible for any damage caused by users who ignore my warning I do not own the code of adapted exploits or tools exploits are adapted from other sources, please refer to their author info Please note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugs Feature an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) google page crawler with gecko and Firefox (not fully working) a simple Baidu crawler (multi-threaded) censys host scan Changelog v2.3.2 bug fixes [HIDE][Hidden Content]]
  17. Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers Table of Contents Weapons Awesome Burp and ZAP Extensions Contribute Thanks to contributor [HIDE][Hidden Content]]
  18. View File BLACKHAT HACKING < TOOLS & TUTORIALS [ 10Gb ] BLACKHAT HACKING < TOOLS & TUTORIALS MEGA Package Of Creditcard, Paypal, Amazon, Ebay, Fraud Package LINK :- Download Free for Users PRIV8 Submitter dEEpEst Submitted 28/05/20 Category Files Password ********  
  19. APK Utilities A cross-platform suite of scripts and utilities for working with APK files Features Pull adb-pull - pull an app's APK files from a connected device to the project directory adb-lp-pull - pull all LP modified files to the project directory clean - clean the project directory Extract apktool-decode - decode an apk to sources baksmali - decompile a dex to smali aapt-dump - dump Android-specific data (resources, manifest) from an apk enjarify - convert an apk to a jar dexify - convert a jar to a dex Build apktool-build - build previously decoded sources to a patched apk smali - build previously decompiled smali to a patched dex sign - sign a patched apk to a signed apk Push adb-install - install an apk file adb-install-multiple - install multiple apk files adb-lp-push - push files to the LP data directory [HIDE][Hidden Content]]
  20. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. Demo: [Hidden Content] [HIDE][Hidden Content]]
  21. Onex “onex a hacking tools library.” Onex is a Kali Linux hacking tools installer for termux and other Linux distribution. It’s package manager for hackers. onex manages large numbers of hacking tools that can be installed on a single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ Kali Linux hacking tools. use onex install [tool_name] command to install any hacking tool. onex works on any of the following operating systems: Android (Using the Termux App) Linux (Linux Based Systems) How to use onex ? CLI Mode : onex -h or onex help for help. Options : onex install [tool_name] install any tool. onex -i [tool_name] install any tool. onex search [tool_name] search any tool. onex -s [tool_name] search any tool. onex list list all tools. onex list -a list all tools. onex -l list all tools. onex -l -a list all tools. onex help get help. onex -h get help. Menu Mode : onex start to start onex menu mode. Enter a Number for a specific output: (1) : To show all available tools and type the number of a tool which you want to install. (2) : To show tools category. (3) : If you want to update onex. (4) : If you want to know About Us. (5) : To exit the tool. [HIDE][Hidden Content]]
  22. massExploitConsole a collection of tools with a cli ui disclaimer Please use this tool only on authorized systems, I’m not responsible for any damage caused by users who ignore my warning I do not own the code of adapted exploits or tools exploits are adapted from other sources, please refer to their author info Please note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugs Feature an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) google page crawler with gecko and Firefox (not fully working) a simple Baidu crawler (multi-threaded) censys host scan Changelog v2.3.1 separate proxy_check command [HIDE][Hidden Content]]
  23. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. BlackArch Linux is an open-source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up to be used by security professionals for penetration testing tasks. ChangeLog 2020.06.01: added more than 150 new tools disabled iptables/ip6tables service remove unneeded virtualbox services (drag’n’drop, vmsvga-x11) replace wicd with wifi-radar (gui) and wifi-menu (curses -> netctl) updated blackarch-installer to v1.1.45 included linux kernel 5.6.14 QA’ed and fixed a lot of packages (runtime exec, missing dependencies) updated all vim plugins and improved vim config options updated all blackarch tools and packages including config files updated all system packages updated all window manager menus (awesome, fluxbox, openbox) [HIDE][Hidden Content]]
  24. 35 downloads

    BLACKHAT HACKING < TOOLS & TUTORIALS MEGA Package Of Creditcard, Paypal, Amazon, Ebay, Fraud Package LINK :- Download Free for Users PRIV8

    $100.00 PRIV8

  25. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. Demo: [Hidden Content] [HIDE][Hidden Content]]