Search the Community

Showing results for tags 'tutorial'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 48 results

  1. This video is original content created by Apoorv Gupta(The Decent Coder). In this video, I have provided you with knowledge regarding how to perform "OSINT" on Instagram accounts using a tool named "OSINTGRAM". This tutorial is a part of ethical hacking playlist of mine and no offensive techniques are used in this video. The information gathered using this tool is publicly available information like info, number of followers etc. It just provides you with all the info in an elegant way out. Also, tell me if you want more ethical hacking and coding tutorials for free. [Hidden Content]
  2. itsMe

    TUTORIAL DE AUTOIT

    [hide][Hidden Content]]
  3. Dorking is the art of understanding and utilizing a search engine to emit the desired results. If I wanted to find a file on anonfile; I can go on Google and use this search query, inurl:anonfile.com + Target File. I can find a Tweet with the exact same syntax, and I can repeat this for almost any target that is at public discretion and isn’t banned from Google. Here we post one of the best dorking tutorial book. What is a Dork? A Dork is a search query that a search engine can read and interpret to provide the most precise URLs that correlate to that query. Why do we use Dorks? Cracking is, at its simplest form, finding basic, unprotected sites, compromising its security measures or lack of; exporting information of which is desired and then use them for other purposes. This is important because this next part will be complementary to our injection criteria. Chapters Chapter 1 : Dorking What is a Dork? Why do we use Dorks? Forms Keywords Page Extensions Files Page Types and Page Extensions Chapter 2 : Syntax (Google) Quotation Syntax Ordering & Capitalization Ordering Extended Search Operators Syntax Search Operator List Search Functions Chapter 3 : Let’s get Started Basic Dorks Complex Dorks The Big Questions How to make Dork Types Keywords and Parameters More Advanced Keywords Parameters Parameters Detailed Testing Parameters Parameter Methods Advanced Dorking Chapter 4 : Syntax Google Regex System Regex Wildcards Regex Groups Regex Escape GRS Advanced Explanation and Usage for GRS Wildcards Regex Groups Breaking Regex & Syntax Chapter 5 : Extensive Google Syntax Basics and Rules Testing Dorks Regex Dorking Targeting Parameters Page Extensions | When to Target Bypassing Google Bot-Detection Chapter 6 : Google Search Settings INURL Chapter 7 : Numeric Dorks Chapter 8 : Database Errors | Vulnerability Method Most Known SQLi Error Vulnerability (Stupidity Error) Less Known Error Dorking True Error | Unsearched but Practical Chapter 9 : Stringed / Extended Dorks Stringed Dorks Extended Dorks Chapter 10 : Dork Types | The Right : The Wrong : And The Bullshit Chapter 11 : Google Search Exploits Anti-Parameter Dorks Comma Dorks inurl: Spaces via Regex Exploit Chapter 12 : Dorking for Plugins and Drivers Chapter 13 : Email Access Dorks |Exposure | Psychographic Psychographic Understanding Chapter 14 : Default Directory Dorks | Common Directory Chapter 15 : Bing vs Google Chapter 16 : Generating vs Handwriting What are Generated Dorks? Problem 1 | Mismatch Combinations Problem 2 | Invalid Dorks (Killing Proxies) Handwritten Dorks What are Handwritten Dorks? Problems Chapter 17 : Exploitation Targeting on Google Chapter 18 : Administrator Panel Targeting Chapter 19 : Bing A-Z Chapter 20 : Post SQLi Targeting Chapter 21 : LFI Targeting Chapter 22 : Public WWW | Vulnerability & Exploit Targeting Chapter 23 : Google vs Google API (Custom Search Engine) Chapter 24 : GitHub Dorking [hide][Hidden Content]]
  4. dEEpEst

    C++ Tutorial for Complete Beginners.

    C++ Tutorial for Complete Beginners. Getting Started Basic Syntax Subroutines Reusable Blocks of Code Object Oriented Coding Pointers and Memory Link : [Hidden Content]
  5. Chapters Chapter 1 : Dorking What is a Dork? Why do we use Dorks? Forms Keywords Page Extensions Files Page Types and Page Extensions Chapter 2 : Syntax (Google) Quotation Syntax Ordering & Capitalization Ordering Extended Search Operators Syntax Search Operator List Search Functions Chapter 3 : Let’s get Started Basic Dorks Complex Dorks The Big Questions How to make Dork Types Keywords and Parameters More Advanced Keywords Parameters Parameters Detailed Testing Parameters Parameter Methods Advanced Dorking Chapter 4 : Syntax Google Regex System Regex Wildcards Regex Groups Regex Escape GRS Advanced Explanation and Usage for GRS Wildcards Regex Groups Breaking Regex & Syntax Chapter 5 : Extensive Google Syntax Basics and Rules Testing Dorks Regex Dorking Targeting Parameters Page Extensions | When to Target Bypassing Google Bot-Detection Chapter 6 : Google Search Settings INURL Chapter 7 : Numeric Dorks Chapter 8 : Database Errors | Vulnerability Method Most Known SQLi Error Vulnerability (Stupidity Error) Less Known Error Dorking True Error | Unsearched but Practical Chapter 9 : Stringed / Extended Dorks Stringed Dorks Extended Dorks Chapter 10 : Dork Types | The Right : The Wrong : And The Bullshit Chapter 11 : Google Search Exploits Anti-Parameter Dorks Comma Dorks inurl: Spaces via Regex Exploit Chapter 12 : Dorking for Plugins and Drivers Chapter 13 : Email Access Dorks |Exposure | Psychographic Psychographic Understanding Chapter 14 : Default Directory Dorks | Common Directory Chapter 15 : Bing vs Google Chapter 16 : Generating vs Handwriting What are Generated Dorks? Problem 1 | Mismatch Combinations Problem 2 | Invalid Dorks (Killing Proxies) Handwritten Dorks What are Handwritten Dorks? Problems Chapter 17 : Exploitation Targeting on Google Chapter 18 : Administrator Panel Targeting Chapter 19 : Bing A-Z Chapter 20 : Post SQLi Targeting Chapter 21 : LFI Targeting Chapter 22 : Public WWW | Vulnerability & Exploit Targeting Chapter 23 : Google vs Google API (Custom Search Engine) Chapter 24 : GitHub Dorking [hide][Hidden Content]]
  6. Worm, Virus & Trojan Horse: Ethical Hacking Tutorial Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives. In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. We will also look at the countermeasures that can be used to protect against such activities. What is a Trojan horse? A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc. The list below shows some of the activities that the attacker can perform using a Trojan horse. Use the user’s computer as part of the Botnet when performing distributed denial of service attacks. Damage the user’s computer (crashing, blue screen of death, etc.) Stealing sensitive data such as stored passwords, credit card information, etc. Modifying files on the user’s computer Electronic money theft by performing unauthorized money transfer transactions Log all the keys that a user presses on the keyboard and sending the data to the attacker. This method is used to harvest user ids, passwords, and other sensitive data. Viewing the users’ screenshot Downloading browsing historyhistor What is a worm? A worm is a malicious computer program that replicates itself usually over a computer network. An attacker may use a worm to accomplish the following tasks; Install backdoors on the victim’s computers. The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. the backdoors can also be exploited by other malware. Worms may also slowdown the network by consuming the bandwidth as they replicate. Install harmful payload code carried within the worm. What is a Virus? A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent. Viruses can consume computer resources such as memory and CPU time. The attacked programs and files are said to be “infected”. A computer virus may be used to; Access private data such as user id and passwords Display annoying messages to the user Corrupt data in your computer Log the user’s keystrokes Computer viruses have been known to employ social engineering techniques. These techniques involve deceiving the users to open the files which appear to be normal files such as Word or Excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do. Trojans, Viruses, and Worms counter measures To protect against such attacks, an organization can use the following methods. A policy that prohibits users from downloading unnecessary files from the Internet such as spam email attachments, games, programs that claim to speed up downloads, etc. Anti-virus software must be installed on all user computers. The anti-virus software should be updated frequently, and scans must be performed at specified time intervals. Scan external storage devices on an isolated machine especially those that originate from outside the organization. Regular backups of critical data must be made and stored on preferably read-only media such as CDs and DVDs. Worms exploit vulnerabilities in the operating systems. Downloading operating system updates can help reduce the infection and replication of worms. Worms can also be avoided by scanning, all email attachments before downloading them.
  7. What you'll learn We are also giving you study material as pdf in our course . The very latest up-to-date information and methods. Practical Ethical Hacking and Penetration Testing Skills Fun With Ethical Hacking Guide In Android Termux Tutorial A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords. Requirements Only Basic Knowledge About Internet & Android NO previous hacking knowledge required Description Welcome to my course Learn Ethical Hacking With Termux : Android Tutorial 2021. In this course you will learn how to Hack and Secure with termux with your Android device from scratch, you don't need to have any prior knowledge about Hacking, Linux, Android and even Computers. This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics. In this course, you will learn the practical side of ethical hacking.This course is designed for everyone out there who want to learn how to learn ethical hacking in new and fun way with Android devices. This Course Includes Complete Termux Tutorials In Ethical Hacking & Information Security. Features :- It allow you to ssh your remote server via openssh. You can also ssh into your android devices from any remote system You could choose any shells such as BASH, ZSH AND FIST ETC You can choose different text editor such as emacs, nano. and vim to edit/ view files. Install any packages of your choice in your android devices using apt packages manager. up to date version of git, perl, python, ruby and node. js are all available. Connect your android device with a bluetooth, keyboard, mouse and external display and use it like a convergence device. Termux supports keyboard shortcuts. Termux allows you to run almost all GNU/ LINUX Commands. Important notice - We are also giving you study material as pdf in our course . you can download it when you enroll in our course. Who this course is for: Beginner students Students curious about Ethical Hacking and Information Security Anybody interested in learning how hackers hack the systems Person who want to learn ethical hacking with Termux. We are also giving you study material as pdf in our course . you can download it when you enroll in our course [Hidden Content] [hide][Hidden Content]]
  8. In this video we're going to review the widely used tool: OllyDbg. Ollydbg is a tool for debugging used for binary code analysis. It converts the binary language to an assembly language. Assembly language is an ISA (Instruction Set Architecture) based low level language which is user friendly and has an efficient code. It is an application to figure out the bugs in a program, troubleshoot it and run specific parts of it and see how it works. We talk about Pros and Cons of OllyDbg, how to install it and it's uses. [hide][Hidden Content]]
  9. Debugging iOS Applications with IDA Pro Tutorial We have updated our iOS Debugging Tutorial. It has some new sections that should be of particular interest: “Debugging the DYLD Shared Cache” discusses how to combine IDA’s incremental dyldcache loading functionality with the iOS Debugger. “Debugging System Applications” is a concrete example of how to use IDA to debug an iOS system daemon on a jailbroken device. We hope you will find these new examples engaging and useful! [hide][Hidden Content]]
  10. Wifi Hacking Tutorial 2020 Learn to hack wifi using this tutorial well demanded one for free! [Hidden Content]
  11. View File Get 100k Followers [ Tutorial ] Get 100k Followers [ Tutorial ] How to get 100k Followers Paid Method Leaked ! Full Tutorial Worth $$ Link : FREE FOR USERS PRIV8 Submitter dEEpEst Submitted 13/03/20 Category Libro Online Password ********  
  12. 31 downloads

    Get 100k Followers [ Tutorial ] How to get 100k Followers Paid Method Leaked ! Full Tutorial Worth $$ Link : FREE FOR USERS PRIV8

    $100.00 PRIV8

  13. In this course, we'll be looking at database management basics and SQL using the MySQL RDBMS. The course is designed for beginners to SQL and database management systems, and will introduce common database management topics. Throughout the course we'll be looking at various topics including schema design, basic C.R.U.D operations, aggregation, nested queries, joins, keys and much more. Contents (0:00) Introduction (2:36) What is a Database? (23:10) Tables & Keys (43:31) SQL Basics (52:26) MySQL Windows Installation (1:01:59) MySQL Mac Installation (1:15:49) Creating Tables (1:31:05) Inserting Data (1:38:17) Constraints (1:48:11) Update & Delete (1:56:11) Basic Queries (2:08:37) Company Database Intro (2:14:05) Creating Company Database (2:30:27 ) More Basic Queries (2:26:24) Functions (2:45:13) Wildcards (2:53:53) Union (3:01:36) Joins (3:11:49) Nested Queries (3:21:52) On Delete (3:30:05) Triggers (3:42:12) ER Diagrams Intro (3:55:53) Designing an ER Diagram (4:08:34) Converting ER Diagrams to Schemas [Hidden Content]
  14. 9 downloads

    Programming languages tutorial collection [500 GB] - C - C++ - Citrix - Go - Android - Javascript - Linux - Php - Python - Ruby And general Stuff Free download for users PRIV8

    $100.00 PRIV8

  15. View File Programming languages tutorial collection [500 GB] Programming languages tutorial collection [500 GB] - C - C++ - Citrix - Go - Android - Javascript - Linux - Php - Python - Ruby And general Stuff Free download for users PRIV8 Submitter dEEpEst Submitted 15/01/20 Category Libro Online Password ********  
  16. Laravel 5.4 complete tutorial for Beginners and Intermediate An easy way to learn one of the widely used PHP Laravel 5.4. This is a tutorial series on Laravel 5.4 complete tutorial for Beginners and Intermediate. This course is designed to help the students to learn and understand some of the basic and advanced concepts that are used to design and develop a professional web application using Laravel 5.4. This course will boost the confidence of students and they will be confident enough to take the new challenges and perform better in their career. After watching this complete course students will get the immense confidence and knowledge to develop small and medium scale web application and web portals. [Hidden Content]
  17. [Hidden Content]
  18. 8 downloads

    [FREE PRIV8] 1,000 Hacking Tutorial E-Books ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user.

    $100.00 PRIV8

  19. View File [FREE PRIV8] 1,000 Hacking Tutorial E-Books [FREE PRIV8] 1,000 Hacking Tutorial E-Books ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user. Submitter dEEpEst Submitted 07/11/19 Category Libro Online Password ********  
  20. Shopify Dropshipping Tutorial For Beginners 2019 - How To Create A Profitable Shopify Store "In this video I'll show you how to create a profitable shopify store from scratch using Oberlo and Aliexpress (Dropshipping). I created this long tutorial because I want everyone to be able to set up a shopify store and start making the first sales without spending a fortune on useless courses. I recommend to follow along with me because in the video you'll find EVERYTHING you need build a shopify business from start to finish!" [Hidden Content]
  21. Saefko Attack Systems the most advance RAT-BOT-AGENT ever created This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql. This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither. Fast Setup Youtube : Main Windows Public HTTP Tasks Windows Build Android Build Command And Control Sections Android Command And Control Sections Android IRC Commands ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands Android Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Now Windows Command And Control Windows IRC Commands WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe [Hidden Content]'. [hdexe] Download and execute a file in hidden mode eg : 'dexe [Hidden Content]'. [vistpage] Vist a webpage in visible mode eg : 'vistpage [Hidden Content]'. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage [Hidden Content]'. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Windows TCP Commands Windows Private HTTP Tasks HTTP Tasks Types Download And execute Show Message Box Visit Website Shell Commands Download: [Hidden Content]
  22. [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. [HIDE][Hidden Content]]