Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'useful'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 11 results

  1. Develop practical graphic design projects for your portfolio while mastering Adobe Photoshop fundamentals. What you’ll learn Recognize and grasp the guidelines and procedures of effective graphic design. Create a sizable portfolio to attract new customers or a new position. Study the creation of flyers for social media. Create an outstanding résumé by including Photoshop abilities. Learn how to use all of the basic Photoshop features. Learn how to create compelling designs and how to set up your office effectively. Multiple master adjustment layers Requirements No previous knowledge is required. A laptop and strong internet access are required. an open mind and a willingness to learn graphic design. Preferably the most recent Adobe Photoshop CC (Creative Cloud) version. Description By finishing this helpful Photoshop tutorial for total beginners, you may become an Adobe Photoshop designer in one month. The greatest and most thorough online training for novices is what we’re providing you. This course is for you if you have attempted to study Photoshop but have found it difficult to understand the concepts. Our Approach to Teaching We’ve implemented three different teaching strategies to better support our students’ learning after checking out several online Photoshop design classes and repeatedly feeling disappointed with the methodology. We teach our students how to construct their designs from the beginning, not just tell them what to do. Experiential Learning: We also work on projects in addition to Photoshop tutorials. This has consistently been shown to be the most effective way to comprehend our course content. What This Course Will Teach You The Basics of Adobe Photoshop Adobe Photoshop is used. Photoshop customization for Adobe Utilizing the move tool Knowing Adobe Photoshop’s components How to start a project and save it Using the marquee tool Utilizing the lasso tool How to utilize the magic wand and rapid selection tools Utilizing the crop tool Instructions on how to use the eyedropper, color sampler, ruler, note, and count tools How to utilize the Red Eye tool, Patch tool, Healing Brush tool, Spot Healing Brush tool, and Content-Aware Move tool. How to utilize the Mixer Brush tool, the Brush Tool, the Pencil tool, and the Color Replacement tool. How to utilize the history brush, clone stamp, pattern stamp, and magic eraser tools. Using the gradient tool Tools for smudging, sharpening, blurring, and painting Learn how to utilize the Dodge, Burn, Sponge, and Pen tools. How to handle a tool Tools for View Rotation, Zoom, and Color Who this course is for: People who to Photoshop want to learn how to design quickly without being overwhelmed by the program’s many features. Anyone wishing to start landing graphics design jobs quickly and who wants to pursue a career in the field is welcome. [hide][Hidden Content]]
  2. RedTeam Toolkit Red Team Toolkit is an Open-Source Django Offensive Web-App containing useful offensive tools used in the red-teaming together for the security specialist to identify vulnerabilities. The cybersecurity open-source projects are integrated with what will be a powerful toolkit together. Currently, it supports the following options: FullScan (scan ports and vulnerabilities/CVEs on the target – PDF output) Livehosts (scan all live hosts in the network scale – PDF output) DirScan (scan all directories on a target – PDF output) CVE Description ( CveID Search) SSH Dictionary Attack RDP BruteForce WebApps Section F5 BIG-IP PoC ( CVE-2022-1388 ) Apache Path Traversal PoC ( CVE-2021-41773 ) Automated XSS Finder Web Crawler for gathering URLs SubDomain Enumeration HTTP Verb Tampering (SQLi will be added soon) Windows Section (Being updated, other major CVEs will be added) Microsoft Exchange ProxyShell PoC ( CVE-2021-34523, CVE-2021-34473, CVE-2021-31207 ) Linux Section to implement major Linux CVEs (UNDER MAINTENANCE) Changelog v0.1.5 The Dockerized version (#19 ) of the RedTeam Toolkit. is deployed now Moreover, it now includes the following new modules: CVE-2022-1388 PoC (for F5 BIG-IP Automated XSS Finder to server a website and find XSS on that A new module for content discovery (Gathering all URLs) [hide][Hidden Content]]
  3. Description OAUTHScan is a Burp Suite Extension written in Java with the aim to provide some automatic security checks, which could be useful during penetration testing on applications implementing OAUTHv2 and OpenID standards. [hide][Hidden Content]]
  4. USEFUL WEBSITE-LIST 1. Screenr.com :- This website helps you Record movies on your computer and send them straight to YouTube. 2. Bounceapp.com :- For capturing full length screenshots of a web pages. 3. Goo.gl :- Shorten long URLs and convert URLs into QR codes. 4. untiny.me :- Find the original URLs that's hiding behind a short URLs. 5. localti.me :- Know more than just the local time of a city 6. copypastecharacter.com :- Copy-paste special characters that are not on your keyboard. 7. topsy.com :- A better search engine for twitter. 8. fb.me/AppStore :- Search iOS apps without launching iTunes. 9. iconfinder.com :- The best place to find icons of all sizes. 10. office.com :- Download templates, clipart and images for your Office documents. 11. woorank.com :- everything you wanted to know about a website. 12. virustotal.com :- Scan any suspicious file or email attachment for viruses. 13. wolframalpha.com :- Gets answers directly without searching . 14. printwhatyoulike.com :- Print web pages without the clutter. 15. joliprint.com :- Reformats news articles and blog content as a newspaper. 16. isnsfw.com :- When you wish to share a NSFW page but with a warning. 17. eggtimer.com :- A simple online timer for your daily needs. 18. coralcdn.org :- If a site is down due to heavy traffic, try accessing it through coral CDN. 19. random.org :- Pick random numbers, flip coins, and more. 20. mywot.com :- Check the trust level of any website . 21. viewer.zoho.com :- Preview PDFs and Presentations directly in the browser. 22. tubemogul.com :- Simultaneously upload videos to YouTube and other video sites. 23. truveo.com :- The best place for searching web videos. 24. scr.im :- Share your email address online without worrying about spam. 25. spypig.com :- Now get read receipts for your email. 26. sizeasy.com :- Visualize and compare the size of any product.
  5. LazyCSRF LazyCSRF is a more useful CSRF PoC generator that runs on Burp Suite. Motivation Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. The feature of Burp Suite that I like the most is Generate CSRF PoC. However, it does not support JSON parameters. It also uses the <form>, so it cannot send PUT/DELETE requests. In addition, multibyte characters that can be displayed in Burp Suite itself are often garbled in the generated CSRF PoC. Those were the motivations for creating LazyCSRF. Features Support JSON parameter (like a request to the API) Support PUT/DELETE (only work with CORS enabled with an unrestrictive policy) Support displaying multibyte characters (like Japanese) Generating CSRF PoC with Burp Suite Community Edition (of course, it also works in Professional Edition) The difference in the display of multibyte characters The following image shows the difference in the display of multibyte characters between Burp’s CSRF PoC generator and LazyCSRF. LazyCSRF can generate PoC for CSRF without garbling multibyte characters. This is only the case if the characters are not garbled on Burp Suite. [hide][Hidden Content]]
  6. A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests 🙂 Every section contains the following files, you can use the _template_vuln folder to create a new chapter: README.md - vulnerability description and how to exploit it Intruder - a set of files to give to Burp Intruder Images - pictures for the README.md Files - some files referenced in the README.md You might also like the Methodology and Resources folder : Methodology and Resources Active Directory Attack.md Cloud - AWS Pentest.md Cloud - Azure Pentest.md Cobalt Strike - Cheatsheet.md Linux - Persistence.md Linux - Privilege Escalation.md Metasploit - Cheatsheet.md Methodology and enumeration.md Network Pivoting Techniques.md Network Discovery.md Reverse Shell Cheatsheet.md Subdomains Enumeration.md Windows - Download and Execute.md Windows - Mimikatz.md Windows - Persistence.md Windows - Post Exploitation Koadic.md Windows - Privilege Escalation.md Windows - Using credentials.md CVE Exploits [HIDE][Hidden Content]]
  7. View File 2.5TB Of Courses & Other Useful Stuff ▪️ 2.5TB Of Courses & Other Useful Stuff ▫️ Collection Of 2.5 TB Of Courses And Books Related To Self Development, SEO, Marketing And Many Other Topics ━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user Submitter dEEpEst Submitted 11/08/19 Category Libro Online Password ********  
  8. 10 downloads

    ▪️ 2.5TB Of Courses & Other Useful Stuff ▫️ Collection Of 2.5 TB Of Courses And Books Related To Self Development, SEO, Marketing And Many Other Topics ━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user
    $110 PRIV8
  9. This could be helpful NOOBS IF YOU EVER WANT TO DO BUSINESS TOGETHER, START LEARNING Know more about your computer: [Hidden Content]
  10. " _ _ " " _ /|| . . ||\ _ " " ( } \||D ' ' ' C||/ { % " " | /\__,=_[_] ' . . ' [_]_=,__/\ |" " |_\_ |----| |----| _/_|" " | |/ | | | | \| |" " | /_ | | | | _\ |" It is all fun and games until someone gets hacked! ------------------------------------------------------------------------------------------ Explanations: cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. For instance, [cache:www.google.com] will show Google’s cache of the Google homepage. Note there can be no space between the “cache:” and the web page url. ------------------------------------------------------------------------------------------ link: The query [link:] will list webpages that have links to the specified webpage. For instance, [link:www.google.com] will list webpages that have links pointing to the Google homepage. Note there can be no space between the “link:” and the web page url. ------------------------------------------------------------------------------------------ related: The query [related:] will list web pages that are “similar” to a specified web page. For instance, [related:www.google.com] will list web pages that are similar to the Google homepage. Note there can be no space between the “related:” and the web page url. ------------------------------------------------------------------------------------------ info: The query [info:] will present some information that Google has about that web page. For instance, [info:www.google.com] will show information about the Google homepage. Note there can be no space between the “info:” and the web page url. ------------------------------------------------------------------------------------------ define: The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. The definition will be for the entire phrase entered (i.e., it will include all the words in the exact order you typed them). ------------------------------------------------------------------------------------------ stocks: If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols. For instance, [stocks: intc yhoo] will show information about Intel and Yahoo. (Note you must type the ticker symbols, not the company name.) ------------------------------------------------------------------------------------------ site: If you include [site:] in your query, Google will restrict the results to those websites in the given domain. For instance, [help site:www.google.com] will find pages about help within www.google.com. [help site:com] will find pages about help within .com urls. Note there can be no space between the “site:” and the domain. ------------------------------------------------------------------------------------------ allintitle: If you start a query with [allintitle:], Google will restrict the results to those with all of the query words in the title. For instance, [allintitle: google search] will return only documents that have both “google” and “search” in the title. ------------------------------------------------------------------------------------------ intitle: If you include [intitle:] in your query, Google will restrict the results to documents containing that word in the title. For instance, [intitle:google search] will return documents that mention the word “google” in their title, and mention the word “search” anywhere in the document (title or no). Note there can be no space between the “intitle:” and the following word. Putting [intitle:] in front of every word in your query is equivalent to putting [allintitle:] at the front of your query: [intitle:google intitle:search] is the same as [allintitle: google search]. ------------------------------------------------------------------------------------------ allinurl: If you start a query with [allinurl:], Google will restrict the results to those with all of the query words in the url. For instance, [allinurl: google search] will return only documents that have both “google” and “search” in the url. Note that [allinurl:] works on words, not url components. In particular, it ignores punctuation. Thus, [allinurl: foo/bar] will restrict the results to page with the words “foo” and “bar” in the url, but won’t require that they be separated by a slash within that url, that they be adjacent, or that they be in that particular word order. There is currently no way to enforce these constraints. ------------------------------------------------------------------------------------------ inurl: If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url. For instance, [inurl:google search] will return documents that mention the word “google” in their url, and mention the word “search” anywhere in the document (url or no). Note there can be no space between the “inurl:” and the following word. Putting “inurl:” in front of every word in your query is equivalent to putting “allinurl:” at the front of your query: [inurl:google inurl:search] is the same as [allinurl: google search]. ------------------------------------------------------------------------------------------ Nina Simone intitle:”index.of” “parent directory” “size” “last modified” “description” I Put A Spell On You (mp4|mp3|avi|flac|aac|ape|ogg) -inurl:(jsp|php|html|aspx|htm|cf|shtml|lyrics-realm|mp3-collection) -site:.info Bill Gates intitle:”index.of” “parent directory” “size” “last modified” “description” Microsoft (pdf|txt|epub|doc|docx) -inurl:(jsp|php|html|aspx|htm|cf|shtml|ebooks|ebook) -site:.info parent directory /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums filetype:config inurl:web.config inurl:ftp “Windows XP Professional” 94FBR ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential ext:inc "pwd=" "UID=" ext:ini intext:env.ini ext:ini Version=... password ext:ini Version=4.0.0.4 password ext:ini eudora.ini ext:ini intext:env.ini ext:log "Software: Microsoft Internet Information Services *.*" ext:log "Software: Microsoft Internet Information ext:log "Software: Microsoft Internet Information Services *.*" ext:log \"Software: Microsoft Internet Information Services *.*\" ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:mdb inurl:*.mdb inurl:fpdb shop.mdb filetype:SWF SWF filetype:TXT TXT filetype:XLS XLS filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:asp "Custom Error Message" Category Source filetype:asp + "[ODBC SQL" filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:asp DBQ=\" * Server.MapPath(\"*.mdb\") filetype:asp “Custom Error Message” Category Source filetype:bak createobject sa filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:bak inurl:\"htaccess|passwd|shadow|htusers\" filetype:conf inurl:firewall -intitle:cvs filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals filetype:dat "password.dat filetype:dat \"password.dat\" filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To" filetype:eml eml +intext:\"Subject\" +intext:\"From\" +intext:\"To\" filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To” filetype:inc dbconn filetype:inc intext:mysql_connect filetype:inc mysql_connect OR mysql_pconnect filetype:log inurl:"password.log" filetype:log username putty PUTTY SSH client logs can reveal usernames filetype:log “PHP Parse error” | “PHP Warning” | “PHP Error” filetype:mdb inurl:users.mdb filetype:ora ora filetype:ora tnsnames filetype:pass pass intext:userid filetype:pdf "Assessment Report" nessus filetype:pem intext:private filetype:properties inurl:db intext:password filetype:pst inurl:"outlook.pst" filetype:pst pst -from -to -date filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" filetype:reg reg +intext:\"defaultusername\" +intext:\"defaultpassword\" filetype:reg reg +intext:â? WINVNC3â? filetype:reg reg +intext:”defaultusername” +intext:”defaultpassword” filetype:reg reg HKEY_ Windows Registry exports can reveal filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype:sql "insert into" (pass|passwd|password) filetype:sql ("values * MD5" | "values * password" | "values * encrypt") filetype:sql (\"passwd values\" | \"password values\" | \"pass values\" ) filetype:sql (\"values * MD\" | \"values * password\" | \"values * encrypt\") filetype:sql +"IDENTIFIED BY" -cvs filetype:sql password filetype:sql password filetype:sql “insert into” (pass|passwd|password) filetype:url +inurl:"ftp://" +inurl:";@" filetype:url +inurl:\"ftp://\" +inurl:\";@\" filetype:url +inurl:”ftp://” +inurl:”;@” filetype:xls inurl:"email.xls" filetype:xls username password email index of: intext:Gallery in Configuration mode index.of passlist index.of perform.ini mIRC IRC ini file can list IRC usernames and index.of.dcim index.of.password intext:" -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board" intext:"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd intext:"#mysql dump" filetype:sql intext:"#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 intext:"A syntax error has occurred" filetype:ihtml intext:"ASP.NET_SessionId" "data source=" intext:"About Mac OS Personal Web Sharing" intext:"An illegal character has been found in the statement" -"previous message" intext:"AutoCreate=TRUE password=*" intext:"Can't connect to local" intitle:warning intext:"Certificate Practice Statement" filetype:PDF | DOC intext:"Certificate Practice Statement" inurl:(PDF | DOC) intext:"Copyright (c) Tektronix, Inc." "printer status" intext:"Copyright © Tektronix, Inc." "printer status" intext:"Emergisoft web applications are a part of our" intext:"Error Diagnostic Information" intitle:"Error Occurred While" intext:"Error Message : Error loading required libraries." intext:"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights- intext:"Fatal error: Call to undefined function" -reply -the -next intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu intext:"Generated by phpSystem" intext:"Generated by phpSystem" intext:"Host Vulnerability Summary Report" intext:"HostingAccelerator" intitle:"login" +"Username" -"news" -demo intext:"IMail Server Web Messaging" intitle:login intext:"Incorrect syntax near" intext:"Index of" /"chat/logs" intext:"Index of /network" "last modified" intext:"Index of /" +.htaccess intext:"Index of /" +passwd intext:"Index of /" +password.txt intext:"Index of /admin" intext:"Index of /backup" intext:"Index of /mail" intext:"Index of /password" intext:"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log intext:"Microsoft CRM : Unsupported Browser Version" intext:"Microsoft ® Windows * ™ Version * DrWtsn32 Copyright ©" ext:log intext:"Network Host Assessment Report" "Internet Scanner" intext:"Network Vulnerability Assessment Report" intext:"Network Vulnerability Assessment Report" intext:"Network Vulnerability Assessment Report" 本文来自 pc007.com intext:"SQL Server Driver][SQL Server]Line 1: Incorrect syntax near" intext:"Thank you for your order" +receipt intext:"Thank you for your order" +receipt intext:"Thank you for your purchase" +download intext:"The following report contains confidential information" vulnerability -search intext:"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the" intext:"phpMyAdmin MySQL-Dump" filetype:txt intext:"phpMyAdmin" "running on" inurl:"main.php" intextpassword | passcode) intextusername | userid | user) filetype:csv intextpassword | passcode) intextusername | userid | user) filetype:csv intitle:"index of" +myd size intitle:"index of" etc/shadow intitle:"index of" htpasswd intitle:"index of" intext:connect.inc intitle:"index of" intext:globals.inc intitle:"index of" master.passwd intitle:"index of" master.passwd 007电脑资讯 intitle:"index of" members OR accounts intitle:"index of" mysql.conf OR mysql_config intitle:"index of" passwd intitle:"index of" people.lst intitle:"index of" pwd.db intitle:"index of" spwd intitle:"index of" user_carts OR user_cart intitle:"index.of *" admin news.asp configview.asp intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com inurl:admin inurl:userlist Generic userlist files ------------------------------------------------------------------------------------------ Using special search string to find vulnerable websites: inurl:php?=id1 inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= andinurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= Source
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.