Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'username' or ''.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 13 results

  1. OSINT Tool: Generate username lists from companies on LinkedIn. This is a pure web-scraper, no API key required. You use your valid LinkedIn username and password to log in, it will create several lists of possible username formats for all employees of a company you point it at. Use an account with a lot of connections, otherwise, you’ll get crappy results. Adding a couple of connections at the target company should help – this tool will work up to third-degree connections. Note that LinkedIn will cap search results to 1000 employees max. You can use the features ‘–geoblast’ or ‘–keywords’ to bypass this limit. Look at the help below for more details. Here’s what you get: first.last.txt: Usernames like Joe.Schmoe flast.txt: Usernames like JSchmoe firstl.txt: Usernames like JoeS first.txt Usernames like Joe rawnames.txt: Full name like Joe Schmoe Optionally, the tool will append @domain.xxx to the usernames. Changelog v0.26 Fixes a key error related to name splitting Handles titles (Dr, PhD, etc) better [hide][Hidden Content]]
  2. Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP) Looks for enabled normal user accounts. No Windows audit logs were generated. High-speed ~ up to 10K/sec – go beyond 25K/sec with multiple servers! Tries to autodetect DC from environment variables on domain joined machines or falls back to machine hostname FQDN DNS suffix Reads usernames to test from stdin (default) or file Outputs to stdout (default) or file Parallelized, multiple connections to multiple servers (defaults to 8 servers, 8 connections per server) Shows a progressbar if you’re using both input and output files Evasive maneuvers: Use –throttle 20 for a 20ms delay between each request (slows everything down to a crawl) Evasive maneuvers: Use –maxrequests 1000 to close the connection and reconnect after 1000 requests in each connection (try to avoid detection based on traffic volume) Changelog v1.1 64921bd: Fixed output for detected DNS domain (Lars Karlslund) 6ea0cd7: Fixed closing of output when exiting (Lars Karlslund) 61637bd: Added option to dump rootDSE attributes as JSON (Lars Karlslund) [hide][Hidden Content]]
  3. LDAP Nom Nom Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP) Looks for enabled normal user accounts. No Windows audit logs were generated. High-speed ~ up to 10K/sec – go beyond 25K/sec with multiple servers! Tries to autodetect DC from environment variables on domain joined machines or falls back to machine hostname FQDN DNS suffix Reads usernames to test from stdin (default) or file Outputs to stdout (default) or file Parallelized, multiple connections to multiple servers (defaults to 8 servers, 8 connections per server) Shows a progressbar if you’re using both input and output files Evasive maneuvers: Use –throttle 20 for a 20ms delay between each request (slows everything down to a crawl) Evasive maneuvers: Use –maxrequests 1000 to close the connection and reconnect after 1000 requests in each connection (try to avoid detection based on traffic volume) [hide][Hidden Content]]
  4. OSINT Tool: Generate username lists from companies on LinkedIn. This is a pure web-scraper, no API key required. You use your valid LinkedIn username and password to log in, it will create several lists of possible username formats for all employees of a company you point it at. Use an account with a lot of connections, otherwise, you’ll get crappy results. Adding a couple of connections at the target company should help – this tool will work up to third-degree connections. Note that LinkedIn will cap search results to 1000 employees max. You can use the features ‘–geoblast’ or ‘–keywords’ to bypass this limit. Look at the help below for more details. Here’s what you get: first.last.txt: Usernames like Joe.Schmoe flast.txt: Usernames like JSchmoe firstl.txt: Usernames like JoeS first.txt Usernames like Joe rawnames.txt: Full name like Joe Schmoe Optionally, the tool will append @domain.xxx to the usernames. Changelog v0.22 This version, ironically, removes version checks. It’s the wild west! [hide][Hidden Content]]
  5. An OSINT tool to search fast for accounts by username across 115 sites. The Lockheed SR-71 "Blackbird" is a long-range, high-altitude, Mach 3+ strategic reconnaissance aircraft developed and manufactured by the American aerospace company Lockheed Corporation. [hide][Hidden Content]]
  6. Purpose of Maigret – collect a dossier on a person by username only, checking for accounts on a huge number of sites. This is a sherlock fork with cool features under heavy development. Don’t forget to regularly update source code from the repo. Currently supported more than 2000 sites (full list), by default search is launched against 500 popular sites in descending order of popularity. Main features Profile pages parsing, extracting personal info, links to other profiles, etc. Recursive search by new usernames found Search by tags (site categories, countries) Censorship and captcha detection Very few false positives Changelog v0.4.2 [ImgBot] Optimize images by @imgbot in #319 Bump pytest-asyncio from 0.17.0 to 0.17.1 by @dependabot in #321 Bump pytest-asyncio from 0.17.1 to 0.17.2 by @dependabot in #323 Disabled Ruboard by @soxoj in #327 Disable kinooh, sites list update workflow added by @soxoj in #329 Bump multidict from 5.2.0 to 6.0.1 by @dependabot in #332 Bump multidict from 6.0.1 to 6.0.2 by @dependabot in #333 Bump pytest-httpserver from 1.0.3 to 1.0.4 by @dependabot in #334 Bump pytest from 6.2.5 to 7.0.0 by @dependabot in #339 Bump pytest-asyncio from 0.17.2 to 0.18.0 by @dependabot in #340 Bump pytest-asyncio from 0.18.0 to 0.18.1 by @dependabot in #343 Bump pytest from 7.0.0 to 7.0.1 by @dependabot in #345 Bump typing-extensions from 4.0.1 to 4.1.1 by @dependabot in #346 Bump lxml from 4.7.1 to 4.8.0 by @dependabot in #350 Pin reportlab version by @cyb3rk0tik in #351 Fix reportlab not only for testing by @cyb3rk0tik in #352 Added some scripts by @soxoj in #355 Added package publishing instruction by @soxoj in #356 Added DB statistics autoupdate and write to sites.md by @soxoj in #357 CI autoupdate by @soxoj in #359 Op.gg fixes by @soxoj in #363 Wikipedia fix by @soxoj in #365 Disabled Netvibes and LeetCode by @soxoj in #366 Fixed several false positives, improved statistics info by @soxoj in #368 Fix false positives by @soxoj in #370 Fixed the rest of false positives for now by @soxoj in #371 Fix false positive and CI by @soxoj in #372 Added new sites to data.json by @kustermariocoding in #375 Fixed issue with str alexaRank by @soxoj in #382 Bump tqdm from 4.62.3 to 4.63.0 by @dependabot in #374 Bump pytest-asyncio from 0.18.1 to 0.18.2 by @dependabot in #380 Bump to 0.4.2 by @cyb3rk0tik in #385 [hide][Hidden Content]]
  7. Combo : mail:pass Capture : NAME Proxy : Yes [Hidden Content]
  8. The tool to Dox Names, UserNames, Emails and more. Based on DrizzyBot. Download: (Updated 24/01/2019) [Hidden Content] Virustotal: [Hidden Content]
  9. WordPress Wordfence plugin version 7.1.12 suffers from bypass, cross site scripting, and path disclosure vulnerabilities. View the full article
  10. WordPress Breadcrumb NavXT plugin version 6.1.0 suffers from a username disclosure vulnerability. View the full article
  11. This Metasploit module exploits an injection vulnerability in the Network Manager VPNC plugin to gain root privileges. This Metasploit module uses a new line injection vulnerability in the configured username for a VPN network connection to inject a `Password helper` configuration directive into the connection configuration. The specified helper is executed by Network Manager as root when the connection is started. Network Manager VPNC versions prior to 1.2.6 are vulnerable. This Metasploit module has been tested successfully with VPNC versions: 1.2.4-4 on Debian 9.0.0 (x64); and 1.1.93-1 on Ubuntu Linux 16.04.4 (x64). View the full article
  12. OpenSSH versions 2.3 up to 7.4 suffer from a username enumeration vulnerability. View the full article
  13. Username and password of naughty America
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.