Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'tools'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. [Hidden Content] Privacy Tools Blacklist And Hot Tips Privacy Operation Systems Alternative Frontends Privacy Based Search Engines Leak Tools List Browsers For Your Privacy Firefox Addons Free Email Services One Time Emails Aecentralized And Social Networks Encrypted Online Communications Social Media Identity Privacy Why Privacy Matter Metadata Cleaners Youtube Alternatives News Readers And Aggregators Shared Logins Best Privacy Short Urls Services Guides Disk Encrypt Tools Privacy Sharing Texts List Files Sharing Anti-Privacy Tools. OSINT Tools Privacy Groups, Chats And Forums Mobile Privacy Alternatives Privacy Tools Deep Fakes Software Other Lists Backup Tools Free Email Forwarding Developer Privacy Free Privacy Email Clients Jabber Clients VPN Free Jabber Servers Other
  2. tools used when unpacking a modded confuserex including max settings [Hidden Content] [Hidden Content]
  3. [Hidden Content] Pass: level-23.info Mirror: [Hidden Content] Pass: level-23.info
  4. It’s an AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Features: Module Stomping for Memory scanning evasion DLL Unhooking by fresh ntdll copy IAT Hiding and Obfuscation & API Unhooking ETW Patching for bypassing some security controls Included sandbox evasion techniques & Basic Anti-Debugging Fully obfuscated (Functions – Keys – Shellcode) by XOR-ing Shellcode reversed and Encrypted Moving payload into hallowed memory without using APIs Runs without creating new thread & Suppoers x64 and x86 arch [hide][Hidden Content]]
  5. Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Download Link -> [Hidden Content]
  6. Collection of 1000+ osint tools Table of contents [Hidden Content]
  7. SCRIPT BULLET ALPHA V0.0.0.2 EARLY ACCESS USERNAME : admin PASSWORD : admin Tools: Proxy Checker Ninja Combo Editor Owo Autoplay Bot Checkers: Exxen Checker Dsmart Go Checker Tivibu Checker Blutv Checker Dolap Checker Disney+ Checker Trendyol Checker Netflix Checker BeinConnect Checker Tonguç Akademi [Hidden Content]
  8. Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. VPS-Bug-Bounty-Tools Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. [Hidden Content] Example during installation: [Hidden Content]
  9. Collection of 100+ tools and resources that can be useful for red teaming activities. Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context. Warning The materials in this repository are for informational and educational purposes only. They are not intended for use in any illegal activities. Tool List Red Team Tips Hiding the local admin account @Alh4zr3d Cripple windows defender by deleting signatures @Alh4zr3d Enable multiple RDP sessions per user @Alh4zr3d Sysinternals PsExec.exe local alternative @GuhnooPlusLinux Live off the land port scanner @Alh4zr3d Proxy aware PowerShell DownloadString @Alh4zr3d Looking for internal endpoints in browser bookmarks @Alh4zr3d Query DNS records for enumeration @Alh4zr3d Unquoted service paths without PowerUp @Alh4zr3d Bypass a disabled command prompt with /k Martin Sohn Christensen Stop windows defender deleting mimikatz.exe @GuhnooPlusLinux Check if you are in a virtual machine @dmcxblue Reconnaissance crt.sh -> httprobe -> EyeWitness Automated domain screenshotting jsendpoints Extract page DOM links nuclei Vulnerability scanner certSniff Certificate transparency log keyword sniffer gobuster Website path brute force dnsrecon Enumerate DNS records Shodan.io Public facing system knowledge base AORT (All in One Recon Tool) Subdomain enumeration spoofcheck SPF/DMARC record checker AWSBucketDump S3 bucket enumeration GitHarvester GitHub credential searcher truffleHog GitHub credential scanner Dismap Asset discovery/identification enum4linux Windows/samba enumeration skanuvaty Dangerously fast dns/network/port scanner Metabigor OSINT tool without API Gitrob GitHub sensitive information scanner gowitness Web screenshot utility using Chrome Headless Resource Development Chimera PowerShell obfuscation msfvenom Payload creation WSH Wsh payload HTA Hta payload VBA Vba payload Initial Access Bash Bunny USB attack tool EvilGoPhish Phishing campaign framework The Social-Engineer Toolkit Phishing campaign framework Hydra Brute force tool SquarePhish OAuth/QR code phishing framework King Phisher Phishing campaign framework Execution Responder LLMNR, NBT-NS and MDNS poisoner secretsdump Remote hash dumper evil-winrm WinRM shell Donut In-memory .NET execution Macro_pack Macro obfuscation PowerSploit PowerShell script suite Rubeus Active directory hack tool SharpUp Windows vulnerability identifier SQLRecon Offensive MS-SQL toolkit Persistence Impacket Python script suite Empire Post-exploitation framework SharPersist Windows persistence toolkit Privilege Escalation LinPEAS Linux privilege escalation WinPEAS Windows privilege escalation linux-smart-enumeration Linux privilege escalation Certify Active directory privilege escalation Get-GPPPassword Windows password extraction Sherlock PowerShell privilege escalation tool Watson Windows privilege escalation tool ImpulsiveDLLHijack DLL Hijack tool ADFSDump AD FS dump tool Defense Evasion Invoke-Obfuscation Script obfuscator Veil Metasploit payload obfuscator SharpBlock EDR bypass via entry point execution prevention Alcatraz GUI x64 binary obfuscator Credential Access Mimikatz Windows credential extractor LaZagne Local password extractor hashcat Password hash cracking John the Ripper Password hash cracking SCOMDecrypt SCOM Credential Decryption Tool nanodump LSASS process minidump creation eviltree Tree remake for credential discovery SeeYouCM-Thief Cisco phone systems configuration file parsing Discovery PCredz Credential discovery PCAP/live interface PingCastle Active directory assessor Seatbelt Local vulnerability scanner ADRecon Active directory recon adidnsdump Active Directory Integrated DNS dumping Lateral Movement crackmapexec Windows/Active directory lateral movement toolkit WMIOps WMI remote commands PowerLessShell Remote PowerShell without PowerShell PsExec Light-weight telnet-replacement LiquidSnake Fileless lateral movement Enabling RDP Windows RDP enable command Upgrading shell to meterpreter Reverse shell improvement Forwarding Ports Local port forward command Jenkins reverse shell Jenkins shell command ADFSpoof Forge AD FS security tokens kerbrute A tool to perform Kerberos pre-auth bruteforcing Collection BloodHound Active directory visualisation Snaffler Active directory credential collector Command and Control Havoc Command and control framework Covenant Command and control framework (.NET) Merlin Command and control framework (Golang) Metasploit Framework Command and control framework (Ruby) Pupy Command and control framework (Python) Brute Ratel Command and control framework ($$$) Exfiltration Dnscat2 C2 via DNS tunneling Cloakify Data transformation for exfiltration PyExfil Data exfiltration PoC Powershell RAT Python based backdoor GD-Thief Google drive exfiltration Impact Conti Pentester Guide Leak Conti ransomware group affilate toolkit SlowLoris Simple denial of service [hide][Hidden Content]]
  10. 66toolkit is the ultimate web tools PHP script available with 220+ tools available & included for both daily tasks and developers. [Hidden Content] [hide][Hidden Content]]
  11. A to Z SEO Tools v2 is a Search Engine Optimization Tools. We have more than 50 SEO Tools to keep track your SEO issues and help to improve the visibility of a website in search engines. It also helps to optimize web content by analyzing content for keywords, on-site links and other SEO considerations. [Hidden Content] [hide][Hidden Content]]
  12. WinZip Disk Tools – will scans your hard drive for performance improvements and safely cleans junk files to optimize your disk space. Maintain a healthy hard drive and enjoy increased storage space with these essential tools. WinZip Disk Tools cleans unnecessary data like junk files and temporary files from your hard drive, maximizing precious disk space and improving the overall performance of your computer. Its thorough search function identifies duplicate files and helps you quickly delete them. WinZip Disk Tools can scan and defragment your hard drive in minutes. The software boosts data access speeds and overall system performance, making it easier than ever to load programs and complete important tasks. Features • Clean junk files and restore PC performance • Optimize disk space for increased storage • Maintain a healthy and reliable hard drive [Hidden Content] [hide][Hidden Content]]
  13. Baymax Patch Tools releases a hijacked DLL for the target process to load the functional module PYG.DLL, realizing dynamic patching of the target process. it not only supports dynamically modifying instructions and data of the target module, but also simulates the OD break function, which can modify the corresponding registers, flag registers and memory data of the registers pointing to memory after breaking the target module, so as to achieve cracking it without modifying the target file. It supports the following two kinds of patching functions: Search and Replace Patch, which can directly modify the instruction code or memory data in the process memory by locating the memory address through the feature code or offset address. Exception Breakpoint Patch, support the abnormal interrupt function of the simulated debugger, by setting and triggering the interrupt after modifying registers, memory and other data to achieve the purpose of modifying the program execution process and so on. The tool is protected by a shell, and the antivirus may misreport the tool and the patch file! Due to the use of the shell SDK, all components of the tool (including the generated patches) do not contain networking capabilities! The generated patches will not modify any files in the system when running (except for overwriting patch files). The generated patches will not modify any files in the system when running (except for overwriting patch files). The tool itself has a verification mechanism and will load only after the module is successfully verified at startup, but for security reasons, please be sure to download and use it from the official site. Function introduction Support creating hijacking and injecting patches to achieve cracking without modifying the target file support for patching processes with dynamic base addresses (ASLR) support patching multiple DLL modules of the target process Support patching different EXEs of the same patch support patching the memory data of a process at a specified address support for patching processes using feature code matching support setting API HOOK decoding for shelled programs before patching data support patching data after setting hardware breakpoint interrupt for the process support setting exception breakpoints to modify the memory pointed to by registers or registers after interrupting the process support setting conditional breakpoints for processes to determine whether to execute Patch according to the number of interrupts, register or memory values Support setting different conditional breakpoints for the same address to perform Patch on the interrupts that meet the conditions support extracting global variables from assembly instructions to store and modify them support for storing data and using stored data during process execution support patching the memory pointed to by the memory marker after interrupt support basic operations on data after interrupt support for reading patch data from ini file support to create memory keymaker support for creating debug patches to troubleshoot patch problems by yourself Baymax Patch toOls v3.1 2023.01.18 x86/x64 v3.1.0 Support multi-language function adjusted and optimized the UI, text descriptions, etc. to improve the interactive experience fix the problem of occasional failure to create patches (thanks to feedback from 沐子) patch module: optimize the problem of slow start-up due to loading many Dlls (thanks to feedback from 真小白) patch program: patch module also supports multi-language function address format conversion tool: adjust the UI, optimize the interaction feature code search tool: optimize the search algorithm, support the search string, search results to increase the segment information, attributes. thanks to the group of friends for their strong support and help to Baymax. 2023.01.30 x86 v3.1.3 x64 v3.1.2 Fix compatibility issues with Windows XP system caused by shell Fix a bug introduced in version 3.1: setting When Running to Oep to generate a non-debug version of Loader will cause the target process to start up and get stuck (thanks to fairycn for the feedback) Fix the bug of wrong display of QWORD data for x64 edit condition breakpoints Fix a bug that when editing old bpt projects, the parsing of entries containing conditional breakpoints was wrong (thanks to 737008227 for the feedback) [hide][Hidden Content]]
  14. View File 43GB Hacking Tools Download: FREE Download users PRIV8 Note* link available until he dies. Run tools on VM Submitter dEEpEst Submitted 14/02/23 Category Files Password ********  
  15. 18 downloads

    Download: FREE Download users PRIV8 Note* link available until he dies. Run tools on VM
    From $110 PRIV8
  16. Windows File Tools is a tool that monitors changes in the Windows directory structure. It can detect file creations, modifications, deletions, and folder creations, among other changes. The tool is designed to help you keep track of changes to your files and folders, and can alert you when something has been added, modified, or deleted. One of the key features of Windows File Tools is its ability to monitor changes in real-time. This means that as changes occur, the tool will immediately detect and report on them. This can be useful for a variety of purposes, such as keeping track of changes made by other users, or ensuring that important files are not accidentally deleted or modified. However, it is important to note that Windows File Tools is no longer maintained, and may be limited in its ability to detect changes if too many occur at the same time. Despite this limitation, the tool can still be useful for basic monitoring of changes to your Windows directory structure. [Hidden Content]
  17. FREE Alternative Tools For Your Online Privacy. Search Engine Duck Duck Go Web Browser Brave Firefox Messenger Signal Telegram Operating System Any Linux based system Web Site Analytics Plausible Email ProtonMail Password Manager Bitwarden
  18. Checker tdata. Python3 should be installed - Requirements should be installed. - LogsPath should given to the tool to start checking. Guide to setting up in the archive. [hide][Hidden Content]]
  19. 66toolkit is the ultimate web tools PHP script available with 220+ tools available & included for both daily tasks and developers. [Hidden Content] [hide][Hidden Content]]
  20. Wagnardsoft Tools – Wagnardsoft Tools will help clean unused registry keys, remove temp files, and more. Wagnardsoft Tools allows you to remove temporary files from Windows, along with any current user and browser data, to free up space on your machine. It can also repair corrupted Windows system files, custom size SSD trimming, opening a command prompt (CMD.exe), and REGEDIT with system privilege for advanced file/registry manipulation. It can also enable/disable MSI (Message Signaled Interrupts) for Nvidia cards pre RTX3xxx (will support all PCI devices in a future update). Wagnardsoft Tools provides you the essentials to clean up target areas on your machine and, in turn, free up space. It is important to note, do not delete important registry keys and create a registry backup just in case. [Hidden Content] [Hidden Content]
  21. Defender Tools is management software antivirus virus default of windows. Windows Defender, also known by the original name is Microsoft AntiSpyware, is a product of Microsoft with the purpose of prevention and isolate the spyware. However, in a few cases, if not turn off Windows Defender, users will not be able to install additional software of 3rd party, especially the antivirus software. Can see Windows Defender not only did not have real effects as the user desired, but this tool is also quite "conservative" and cause discomfort when not allowed to install additional software from outside. The only way is to disable Windows Defender on the computer. Software Defender Tools is a program that allows you to add or delete a folder or file in case of exception. The file in the table exclude is blocked and can be removed from it at any time. Features of Defender Tools Easy to use Blocks single click / unblock Exclude path. [hide][Hidden Content]]
  22. HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing How the hackers do the hacking? Well, keep reading and you will find out.. [Hidden Content] [hide][Hidden Content]]
  23. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more. [Hidden Content] [hide][Hidden Content]]
  24. MoonTools is a collection of useful tools and utilities that people often search for on the internet. It has many great tools for your users to use in their daily tasks and we will continue to add new tools in updates. PHP 7.0+ huge performance boost Built with a fully responsive design based on the Latest Twitter Bootstrap to ensure your website looks flawless and beautiful on every mobile and desktop device. It also has strong cross-browser support. You can earn by placing Google Adsense Ads or similar Advertising platforms. There is a lot more for you to explore and we have great plans for future updates. [Hidden Content] [hide][Hidden Content]]
  25. CyberTools is a collection of useful tools and utilities that people often search for on the internet. It has a lot of amazing tools that your users can use in their day-to-day tasks we will keep adding new tools in updates. It is built on the Latest Laravel framework which utilizes PHP 8.0+ massive performance boost It is built with a fully responsive design based on Latest Twitter Bootstrap to ensure that your website will look flawless and beautiful on every mobile and desktop device. It also has strong cross-browser support. You can earn by placing Google Adsense Ads or similar Advertising platforms. We are adding subscriptions in the next update to convert it into a SaaS product. You can earn money by offering paid memberships to the users. There is a lot more to discover for you & we have great plans for future updates. [Hidden Content] [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.