Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'usb'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 14 results

  1. Lock USB Port to Prevent Data from Leakage What Does Gilisoft USB Lock Do? How often has your data been stolen because someone connected an unauthorized USB to your computer and copied your files? Well, you don’t need to worry because the solution to disable or enable USB Ports is pretty simple. GiliSoft USB Lock is a data leak prevention tool that prevents leakage and copy of your data to USB Drives (Android phone/iPhone), External Drives, CDs/DVDs or other such portable devices. Once installed, USB Lock lets you block all such drives and devices that do not belong to you. USB Lock can stop stealing or hacking and you can share your PC with anyone without fear of data theft. This is an easy USB Secure Software and powerful Endpoint DLP Suite that helps you to lock usb port,make dvd/cd burner read-only, block some websites, forbid some programs and disable more devices. For the convenience of enterprise users to deploy, or secondary development, we also provide the command-line version, please contact us if you need. [Hidden Content] [hide][Hidden Content]]
  2. Gilisoft USB Encryption Powerful USB Disk Encryption Tool Protects Data with Password USB Encryption password-protects your USB flash drive, external hard drive, thumb drive, pen drive, memory stick, memory card, and all other portable storage devices in the Windows system. The USB Encryption tool divides USB disk into two areas: a safe area and a public area, through create a password-locked safe area using free hard disk sectors with the industry standard AES encryption algorithm. USB Encryption locks the bad guys out, provides data security for personal, government, and business use. The safe area could be only opened by your password, while the public area would not need anything. USB copy protection is another Gilisoft software solution for anyone to see a file, but no one can copy the file. Copy protect PDF, Doc, XLS files, MP4 video files, MP3 audio files and more. [Hidden Content] [Hidden Content]
  3. Gilisoft USB Encryption Powerful USB Disk Encryption Tool Protects Data with Password USB Encryption password-protects your USB flash drive, external hard drive, thumb drive, pen drive, memory stick, memory card, and all other portable storage devices in the Windows system. The USB Encryption tool divides USB disk into two areas: a safe area and a public area, through create a password-locked safe area using free hard disk sectors with the industry standard AES encryption algorithm. USB Encryption locks the bad guys out, provides data security for personal, government, and business use. The safe area could be only opened by your password, while the public area would not need any. Without installing any extra program on a computer, you can open and read the data on the USB drive just by entering the correct password. [Hidden Content] [Hidden Content]
  4. Fast Locking Drive locking in few seconds through a simple but powerful user interface. Cross Platform When the drive is locked your files remain safe in all operating systems. Standard Device Works with all USB flash drives on the market formatted in FAT32/exFAT. Fully Portable Designed for Android & Windows for access without root or admin rights. [hide][Hidden Content]]
  5. USB flash drives are a really handy solution that can be used to quickly transfer files, share data or backup important documents, images, video and audio files. The downside to a really portable media such as a USB flash drive is they are physically very small and can easy be lost or stolen. In a worst case scenario, your data could fall into someone else’s hands. This is where a security tool like GiliSoft USB Stick Encryption comes into play. The app uses robust software that can encrypt a portable storage device and then divide it into two parts after it has been encrypted: A Secure Area and a Public Area. Key Features include: Uses 256-bit AES encryption. Password protection. User friendly interface. Supports all* Windows OS Free Lifetime Upgrade [Hidden Content] [hide][Hidden Content]]
  6. NOTE: This hack works only on outdated Windows 2000, XP,Vista and 7 How to hack passwords using USB Drive Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit: [Hidden Content] NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
  7. Restrict Access of Portable Drives Prevent data leaks by restricting USB drives, external devices, network computers and ports on your PC. Whitelist your own portable drives and block all others. [Hidden Content] [hide][Hidden Content]]
  8. How To Remove All Viruses From Computer Using Rescue USB Disk ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🌐 Today, we are going to share a few best methods to create a bootable USB of antivirus. So have a look at the complete steps discussed below. 🔹Step 1: First of all, connect a removable USB device to your computer. 🔹Step 2: Now you need, to download the ISO image of Kaspersky Rescue Disk. 🔹Step 3: Now follow the instructions given by Kaspersky to create a USB bootable Rescue disk. 🔹Step 6: Now Restart the computer with USB inserted and press F11 when the computer started to boot your USB. 🔹Step 7: Now Kaspersky interface will appear, proceed till you find the option to select from Graphic mode or Text mode, select the graphic mode. 🔹Step 8: Once Graphical User Interface fully loads onto the screen, you can perform a scan and remove all detected threats. ✅ That’s it! You are done. This is how you can use Kaspersky Rescue Disk to remove all viruses from Windows 10 computer.
  9. Privacy for anyone anywhere Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. [HIDE][Hidden Content]]
  10. USB Trojan Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features You can add the HWID of your PC to the black list and trojan will ignore it You can add any payload (executable file) Slient work Structure of the program Program.cs - Main part of the program HWID.cs - HWID generator Config.cs - Configuration file Shortcut.cs - This class creates shortcuts Tools.cs - Tools for trojan (net utils, and your payload) USB.cs - Infects disks and manages files Build Open Config.cs and edit HWID settings. Open Tools.cs, go to 50 line and modify RunPayload(object) method. Use Visual Studio 2015 or 2017 to build this project. Warning! This program may break your system or someone else's, be careful! Use VirtualBox and disable all external devices to test the program. I do not bear any material or moral responsibility. The software is provided as-is and is under development. Download: [HIDE][Hidden Content]]
  11. Well this USB stealer is not the same as in Windows OS, because on Linux you don't have permission to run scripts direct from USB. That's why you would need to copy script from USB to desktop for example, give permission to it and then just run the script! [Hidden Content]
  12. usbrip (derived from "USB Ripper", not "USB R.I.P." ) is an open source forensics tool with CLI interface that lets you keep track of USB device artifacts (aka USB event history, "Connected" and "Disconnected" events) on Linux machines. Table of Contents: Description Quick Start Screenshots Git Clone Dependencies System Log Structure DEB Packages PIP Packages Portable Installation pip or setup.py install.sh Paths cron uninstall.sh Usage Synopsis Help Examples Credits & References Post Scriptum Description usbrip is a small piece of software written in pure Python 3 (using some external modules though, see Dependencies/PIP) which parses Linux log files (/var/log/syslog*or /var/log/messages* depending on the distro) for constructing USB event history tables. Such tables may contain the following columns: "Connected" (date & time), "User", "VID" (vendor ID), "PID" (product ID), "Product", "Manufacturer", "Serial Number", "Port" and "Disconnected" (date & time). Besides, it also can: export gathered information as a JSON dump (and open such dumps, of course); generate a list of authorized (trusted) USB devices as a JSON (call it auth.json); search for "violation events" based on the auth.json: show (or generate another JSON with) USB devices that do appear in history and do NOT appear in the auth.json; *when installed with -s flag*create crypted storages (7zip archives) to automatically backup and accumulate USB events with the help of crontab scheduler; search additional details about a specific USB device based on its VID and/or PID. Quick Start usbrip is available for download and installation at PyPI: ~$ pip3 install usbrip Screenshots [Hidden Content]
  13. Android suffers from a directory traversal vulnerability leveraged over USB via injection in blkid output. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.