Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'user'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Start your own saas site with my innovative product. Flexible pricing, reliable, fast, and dynamic, feature packed. Enjoy [Hidden Content] [hide][Hidden Content]]
  2. Hello People! I am new here, greetings for all
  3. Description Welcome to the exciting world of Linux! If you’re looking to master one of the most powerful and versatile operating systems out there, you’ve come to the right place. This brand new course is the ultimate resource for anyone looking to not only learn the basics of Linux but also gain practical experience. By the end of this course, you will feel very comfortable about Linux and you will become a confident Linux user. I guarantee that you’ll be able to handle most of the tasks that IT specialists face on a daily basis. Now, you might be thinking, “But there are so many Linux courses out there, why should I choose this one?” Oh, boy. You are a tough one. Okay, here are just three reasons why our course stands out from the crowd: Firstly, this course is all about hands-on experience. You won’t be stuck watching long, boring video tutorials. Instead, you’ll be actively engaged in the learning process with quizzes after each lecture. And to reinforce your learning, each practical section concludes with a hands-on lab or assignment where you can apply what you’ve learned and gain practical experience. Please also check course content to get familiar with the syllabus. Secondly, you will have an opportunity to use Google Cloud Platform to create virtual Linux instances. This means you’ll have a chance to practice your command line skills and explore different Linux distributions in a safe, sandboxed environment. And lastly, this course is taught by me who have actually worked for a tech firm using Linux in a real-world production environment. I also have 3+ years of experience teaching high school students. That means I know how to explain complex topics in a clear and simple way that anyone can understand. And I will push and challenge you to transform from a beginner with no prior knowledge of Linux to a confident Linux user who has a real hands-on experience with Linux. To be completely honest, the most exciting aspect is gaining access to our new online community. Here, you can ask any questions, engage with fellow students, and receive weekly tips and tricks to enhance your learning experience. If for any reason you’re not satisfied with the course, we offer a 30-day money-back guarantee with no questions asked. So, what are you waiting for? Sign up now and let’s start your Linux journey together! Who this course is for: Beginners seeking a comprehensive and practical understanding of the Linux operating system and command line. Anyone who recently transitioned to an IT career and is eager to learn This course is targeted primarily at beginners Requirements This Linux course is suitable for absolute beginners as it covers all the fundamentals from the ground up. You don’t need any prior experience to enroll and start learning. [Hidden Content] [hide][Hidden Content]]
  4. [Hidden Content] manual helped me learning windows 11 after move from windows 10
  5. What You Get: Module #1 Introduction Why user testing is your new unfair advantage Course content and expectations explained Module #2 What is User Testing? User testing defined Overview of the entire user testing process Ideal customer avatar explained Module #3 Brainstorming the User Testing Tasks Our tried and tested user testing tasks template (say that 3x fast!) Ideology and principles behind the tasks Inspiration and questions to ask yourself for formulating the perfect tasks Module #4 Live Walkthrough of Creating the User Testing Tasks No more theory – LIVE walkthrough of creating the tasks Clear reasoning behind why each task is given Remove any and all doubts you have about how to brainstorm your own tasks Module #5 Recruiting People to do the User Testing Where to find people to perform the user testing for you Quickly and easily find people suitable for any niche How to instantly get a refund for any user testers that do a poor job Module #6 User Testing Live Analysis Part 1 Live analysis of a real user testing session See exactly how Casey analyzes and interprets feedback Witness first-hand the incredible insights gained from user testing done the right way. Module #7 User Testing Live Analysis Part 2 Live analysis of a real user testing session See exactly how Casey analyzes and interprets feedback Whitness first-hand the incredible insights gained from user testing done the right way. Module #8 Final Words Quick recap of everything we just learned Reminders and things to keep in mind when doing this for yourself BONUS #1 Additional User Testing Analysis The course already includes a full website user testing analysis. However, we’ll include ANOTHER 45 min module showing the breakdown/analysis of another website, just to really drive the point home. BONUS #2 Ecom Profit Checklist We’ll also include a checklist of 50+ simple, revenue-boosting best practices. You can implement these on your website to see a noticeable lift in conversion rate RIGHT AWAY. This list was compiled by our revenue optimization team over the last 6 years and shows you how to get some quick, juicy wins. [Hidden Content] [Hidden Content]
  6. This resource will restore the FILES tab on user profile. Requirement: Downloads app Settings: Display TAB if the member has no file submitted Number of files per page Display Files TAB to chosen groups Display Files TAB from chosen groups Honor pinned files Hide Moderator options Important Notice: If you used the previous version of this resource (which was a plugin), follow the steps before install this application: Uninstall the plugin Via FTP, delete the following file from your file system: applications/downloads/extensions/core/Profile/Files.php. Install this application [Hidden Content] [hide][Hidden Content]]
  7. Start your own saas site with my innovative product. Flexible pricing, reliable, fast, and dynamic, feature packed. Enjoy. [Hidden Content] [Hidden Content]
  8. Fiberchat Admin app is used to manage & Control the Fiberchat User app. [Hidden Content] [hide][Hidden Content]]
  9. ForceAdmin is a c# payload builder, creating infinate UAC pop-ups until the user allows the program to be ran. The inputted commands are ran via powershell calling cmd.exe and should be using the batch syntax. Why use? Well some users have UAC set to always show, so UAC bypass techniques are not possible. However - this attack will force them to run as admin. Bypassing these settings [hide][Hidden Content]]
  10. Masky is a python library providing an alternative way to remotely dump domain users’ credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX, NT hashes, and TGT on a larger scope. This tool does not exploit any new vulnerability and does not work by dumping the LSASS process memory. Indeed, it only takes advantage of legitimate Windows and Active Directory features (token impersonation, certificate authentication via Kerberos & NT hashes retrieval via PKINIT). A blog post was published to detail the implemented technics and how Masky works. [hide][Hidden Content]]
  11. InfyVcards-SaaS is a Multi-user Digital Business Card Builder system, which allows many users to create their business digital card with lots of information and they can share it with their customers. [Hidden Content] [hide][Hidden Content]]
  12. Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use. When queried with an email address and password, the endpoint responds with an Azure AD Authentication and Authorization code. This code is then processed by Go365 and the result is printed to a screen or an output file. * User enumeration is performed in conjunction with a password guess attempt. Thus, there is no specific flag or functionality to perform only user enumeration. Instead, conduct your first password guessing attack, then parse the results for valid users. Changelog v2.0 7c2148e Bug notice temporary note 984b80e Update README.md 97f02b1 v2.0 aacf804 v2.0 [hide][Hidden Content]]
  13. WebGuard – Advanced PHP Login and User Management is a PHP application, written on CodeIgniter 4 framework with mysql database, which allows you to better manage your users and permissions. The application is also a useful script for developers who want to save many development hours when creating a framework from scratch. [Hidden Content] [hide][Hidden Content]]
  14. Description Linux servers often contain thousands of users and user files. It’s easier to maintain users if they are contained in groups, but only if the limitations of groups are understood and managed properly. In this course, instructor Grant McWilliams shows you how to manage Linux users and groups using command-line tools. Learn about Linux user authentication and account policies. Find out how to create, modify, and delete both user and group accounts, as well as assign users to groups, lock accounts and passwords, and force password resets. Explore elevating privileges using group passwords, changing to the super user, and honing your management skills with sudo as you get ready for your next steps as a Linux system administrator. [Hidden Content] [hide][Hidden Content]]
  15. Description I created this course, so students can learn from the amazing world of Ubuntu Linux. In this course you will learn, not only how to do things using the Graphical Interface, but also the Linux Bash. You will learn how to install and configure Ubuntu Desktop 21.10. Also you will learn the basics of virtualization with Virtualbox. In addition, you will learn how to perform post-installation task like: connecting to the WIFI network, updating packages, installation drivers. Become familiar with the Ubuntu Gnome interface. Setup default application and startup applications. This course contains a whole section on how to customize the default Ubuntu interface. Learn how to navigate the file system and manage files and directories. Navigate the Web with Firefox and email communication with Thunderbird. You will gain experience in Linux Networking as there’s a full section dedicated to network communication. Learn how to add storage devices, partition and format using disk app. Manage Users. Perform backup and restore lost data to your hard drive. And learn how to monitor system resources. Finally, The key to learning Ubuntu and Linux in general is to practice what you learn. I strongly advise you to watch the videos and follow by doing in your computer. Also, take the practice quiz at the end of each section. Including: Install Ubuntu Linux in Virtualbox and manage virtual machines Become proficient navigating Ubuntu desktop interface Managing files and directories using Ubuntu file manager Customize Ubuntu desktop interface Install Desktop and icon themes Update, upgrade, installing and removing packages Start applications automatically after login Setting default applications File and folder permission, sorting and searching files Internet and communication using the browser and email client Understanding ip configuration in Ubuntu Connecting to the network using WIFI and ethernet Testing network connectivity (ping, tracerout) Connecting to remote network share Securing the computer with firewall (gufw) User management (adding, removing users) Storage management (adding and removing disk) Mounting media Installing printers and printing documents Productivity with LibreOffice: learn how to create word documents, spread sheets and presentations Multimedia: play videos, music and manage your photos Create periodic backups Webcam with cheese Record your desktop Monitor system resources (cpu, ram, network, storage) Learn the basics of bash (Linux commands) Create and run bash scripts Who this course is for: This course is intended for all levels, but especially for beginners and intermediate users Requirements No experience required. No previous Ubuntu or Linux experience required [Hidden Content] [Hidden Content]
  16. The tool generates a wordlist based on a set of words entered by the user. For example, during penetration testing, you need to gain access to some service, device, account, or Wi-Fi network that is password protected. For example, let it be the Wi-Fi network of EvilCorp. Sometimes, a password is a combination of device/network/organization name with some date, special character, etc. Therefore, it is simpler and easier to test some combinations before launching more complex and time-consuming checks. For example, cracking a Wi-Fi password with a wordlist can take several hours and can fail, even if you choose a great wordlist because there was no such password in it like Evilcorp2019. Therefore, using the generated wordlist, it is possible to organize a targeted and effective online password check. Features The hashcat rule syntax is used to generate the wordlist. By default, the generator uses a set of rules "online.rule", which performs the following mutations: Adding special characters and popular endings to the end of the word - !,!@, !@#, 123! etc. evilcorp!, evilcorp!123 Adding digits from 1 to 31, from 01 to 12 - evilcorp01, evilcorp12. Adding the date 2018-2023 - evilcorp2018, evilcorp2019 Various combinations of 1-3 - evilcorp2018! Capitalize the first letter and lower the rest, apply 1-4. Evilcorp!2021 As a result, for the word evilcorp, the following passwords will be generated (216 in total): evilcorp Evilcorp EVILCORP evilcorp123456 evilcorp2018 Evilcorp!2021 Evilcorp!2022 Evilcorp2018!@# You can use your own hashcat rules, just click "Show rules" and put in the "Rules" textarea them with the list of rules you like best. Rules that are supported (source [Hidden Content]): [Hidden Content]
  17. About This File Staff Badge in User Profile plugin adds a badge for users who are administrators or have moderator privileges. This simple plugin was made at the request of one of the users. Phrases to translate: StaffBadgeUserProfile_title StaffBadgeUserProfile_desc Version Compatibility 4.5, 4.6 [Hidden Content] [hide][Hidden Content]]
  18. The Linux Command Line Bootcamp Beginner To Power User Level Up Your Skills And Take Control Of Your Machine, w/ Dozens of Commands, Projects, and Challenges! What you'll learn Master the Command Line and Dozens of Commands! Stop Relying On The Limited Graphical User Interface Write Your Own Commands From Scratch Automate Tasks and Schedule Jobs Using Cron Control Your Computer Completely From The Command Line! Master The Quirks Of File Permissions Learn Powerful Keyboard Shortcuts To Improve Your Efficiency Construct Powerful Command Pipelines Course content 21 sections • 165 lectures • 15h 44m total length Requirements No Prior Experience Required All You Need is a Windows, Linux, or Mac Computer Description Welcome to The Linux Command Line Bootcamp, a brand new course that aims to turn you into a command line power user! This course will teach you dozens and dozens of powerful commands (see the long list at the bottom), but more importantly it gives you the tools the continue to learn new commands and take full control of your machine. The skills you learn in this course will make you a stronger web developer, data scientist, machine learning engineer, game dev, or plain old computer user! You will feel POWERFUL!! Hi there, my name is Colt Steele. I've spent years leading in-person software engineering bootcamps and have helped thousands of students change careers. Online I've taught over a million students and have hundreds of thousands of 5 star ratings and reviews. This is an interactive course full of exercises and fun challenges that force you to practice the skills you are learning. You'll encounter some of the same assignments and projects that my in-person bootcamp students experience. Learning command after command can be a dreadfully boring experience, but I've tried my best to make this course as exciting and interesting as possible :) You may roll your eyes at my jokes, but you won't be bored! ============Curriculum: The Short Version============ This course covers a TON. Here's a short summary of the key points. Scroll down for a more in-depth explanation. Learn dozens and dozens of powerful commands (see the long list below) Understand the big picture: how ALL commands fit together Build complex data pipelines by stringing multiple commands together Master command-line navigation and Linux folder structure Create, delete, move, copy, and rename files and folders Decipher and manipulate Unix file permissions Use powerful searching commands like find, locate, and grep Master redirection of standard input, standard output, and standard error Write your own custom commands from scratch! Customize the shell: write your own helpful aliases, tweak the prompt, etc. Master Bash expansions and substitutions Automate tedious tasks using cron and cronjobs Edit files directly from the command-line using nano Master keyboard shortcuts to increase your command-line efficiency ============Curriculum: The Long Version============ The course starts with a deep dive into confusing technical terms like terminal, shell, kernel, Unix, Unix-Like, GNU, Linux, and Bash. It's important to understand the context and the WHY's around the command line and its history that still impacts our machines today. Then we shift our focus to the general patterns and structure that all commands follow including options and arguments. This blueprint we define will inform every single other topic we cover throughout the rest of the course. You'll also learn HOW to learn more about specific commands using the man, help, which, and type commands. Next, we cover the super-important Linux folder structure and learn essential commands for navigating our machines including ls, pwd, and cd. You'll be an expert navigator in no time! From there we learn to create new files and folders right from the command line using the commands touch, mkdir, and file. Next, we dive deep into a special text-editor built right into the command line called Nano. You'll learn to open and edit files using Nano, master various Nano shortcuts, and even learn how to configure nano's global settings. The next section covers the powerful commands rm, mv, and cp. You'll learn how to remove individual files and entire directories, move and rename files, and copy files and folders right from the command line. These are some of the most useful commands you can know! Then we take a quick break to focus on useful keyboard shortcuts you can use to improve your terminal efficiency, before diving into the history command and history expansion. The next section covers tons of commands that have to do with manipulating file contents, including less, cat, tac, rev, head, tail, wc, and sort. Then we cover the three standard streams: standard input, standard output, and standard error. You'll learn to redirect all three streams and take full control over your data. Next we move to my favorite topic: piping! In this section you'll learn how to construct complex and powerful pipelines by stringing together multiple individual commands. You'll also learn about the tr command and the tee command along the way. From there we learn to "speak" the language of the shell using Expansion and Substitution. You'll learn the ins and outs of pathname expansion using wildcard characters, tilde expansion, and the super powerful curly brace expansion. We also cover arithmetic expansion, command substitution, and single and double quoting. Next up we learn about two commands that help us find files on our machine: locate and find. We pay special attention to the find command and its many fancy options and use-cases. You'll learn how to find files by name, size, timestamps, and more. You'll also learn how to bulk-edit files using find's exec option and the xargs command. We then shift our focus to the grep command. You'll learn how to use grep to recursively search the contents of files and match complex files using regular expressions. Next, we spend some time discussing the details of file permissions. You'll learn how to read file attributes and understand read, write, and execute permissions. In the next section, we learn how to alter permissions using commands including chmod, chown, sudo, and su. In the next section, we learn how to customize our shell experience. You'll learn to write your own custom aliases, work with shell variables, and even create your own fancy prompt. Then we learn how to create our own complex commands from scratch and the basics of bash scripting! By the end you'll be writing and running your own programs. Finally, we learn about the mysterious cron daemon. You'll learn the odd-looking cron syntax to set up your own automated and scheduled cronjobs. ============THE END============ Whether you have some experience with basic commands or you're a complete beginner, this course will help take your skills to the next level. Learning the command-line is one of the rare skills that transcends the typical divisions between web development, data science, machine learning, or any other tech disciplines. If you work with a computer daily, you will benefit from mastering the command-line. The commands you learn in the course will change the way you interact with your machine, giving you all new workflows and strategies and POWER over your computer! More importantly, you'll leave this course prepared to conquer ALL the commands that are waiting for you out in the real world and on the job. =============================== Here's an incomplete list of the commands covered in the course: date cal ncal echo man help which type ls cd pwd touch mkdir nano rm rmdir mv cp cat less tac rev head tail wc sort tr tee locate du find grep xargs chmod sudo su chown addgroup adduser export source crontab tar Who this course is for: Anyone interested in becoming a command line power user! Computer users who want complete control over their machine Anyone interested in web development, data science, or a career that involves code! Students with some prior command line experience who want to gain complete mastery [Hidden Content] [hide][Hidden Content]]
  19. Are you stuck with setting up an admin panel in laravel? Radmin Laravel starter will be the best solution for you.REST API, Advanced user, roles & permission management , Serverside Datatable, Datatable Edit and Export( CSV, EXCEL, PRINT, PDF, COPY),Cache Clear, XSS protection and many more features. [Hidden Content] [hide][Hidden Content]]
  20. Go365 Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use. When queried with an email address and password, the endpoint responds with an Azure AD Authentication and Authorization code. This code is then processed by Go365 and the result is printed to a screen or an output file. * User enumeration is performed in conjunction with a password guess attempt. Thus, there is no specific flag or functionality to perform only user enumeration. Instead, conduct your first password guessing attack, then parse the results for valid users. Read these three bullets! This tool might not work on all domains that utilize o365. Tests show that it works with most federated domains. Some domains will only report valid users even if a valid password is also provided. Your results may vary! The domains this tool was tested on showed that it did not actually lock out accounts after multiple password failures. Your results may vary! This tool is intended to be used by security professionals that are authorized to “attack” the target organization’s o365 instance. Changelog v1.4 Updated Go365 to include the MS “graph” api through the URL login.microsoft.com/common/oauth2/token. Specify -endpoint graph to use this new endpoint. [hide][Hidden Content]]
  21. This tool only extracts information that is public, not use for private or illegal purposes. [hide][Hidden Content]]
  22. RemotePotato0 Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Briefly: It abuses the DCOM activation service and triggers an NTLM authentication of the user currently logged on in the target machine. It is required you have a shell in session 0 (e.g. WinRm shell or SSH shell) and that a privileged user is logged on in session 1 (e.g. a Domain Admin user). Once the NTLM type1 is triggered we set up a cross-protocol relay server that receives the privileged type1 message and relays it to a third resource by unpacking the RPC protocol and packing the authentication over HTTP. On the receiving end, you can set up a further relay node (eg. ntlmrelayx) or relay directly to a privileged resource. [hide][Hidden Content]]
  23. Targeting countries, OS, browsers, device types (mobile, tablet, PC), categories Click-fraud protection 2 payments model CPC (cost per click), CPM (cost per impression) Manage users, sites, campaigns, ads Impressions, clicks statistics Separate admin, advertiser/webmaster, moderator accounts 16 most popular banner sizes Responsive HTML 5 ad units Visual ad unit builder Internal user support system [Hidden Content] [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.