Search the Community

Showing results for tags 'v1.1'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 31 results

  1. itsMe

    Windows Memory Cleaner v1.1

    This is a RAM cleaner. There are times when programs do not release the memory they used, making the machine slow, but you don’t want to restart the system to get the used memory back. This is where you use Windows Memory Cleaner to clean your memory, so you can carry on working without wasting time restarting your Windows. [Hidden Content]
  2. [hide][Hidden Content]]
  3. Beaconator Beaconator is an aggressor script for Cobalt Strike used to generate a raw stageless shellcode and packing the generated shellcode using PEzor. Changelog v1.1 Fixed error check with the use of x86 arch & syscalls Fixed the “null value error” due to missing output folder Fixed issue with options persisting to subsequent payload generations Added PEzor’s BOF format Added the -cleanup option for BOFs Added the -sleep option Added more error checks Cleaned up the code [hide][Hidden Content]]
  4. itsMe

    Nano Proxy v1.1 Scraper/Checker

    A fast proxy checker made in Java. Requirements IDE IntelliJ IDEA 2021.1 JavaToolkit v1.4 for Release versions, v1.4 for Dev code AdoptOpenJDK 11 Nano Proxy v1.1 Tons of changes, but the most notable ones : Much better accuracy. Added CPM in the title. [hide][Hidden Content]]
  5. Stealer written on C# This malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & Telegram data and sends it to drop-box using dropbox-Api. Features Steal system info Telegram sessions - hijack victim's telegram account Chromium based browsers password Gecko based browsers(firefox) password Chrome Cookies Stored Credit Cards in Chrome Firefox cookies Discord Tokens Task Scheduler runs every day Auto startup Get results over discord & token over discord [hide][Hidden Content]]
  6. SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercises and would be reminded to take prior permission from the targeted organization to avoid legal implications. Main Features Web tracker code generation – track your website visits and form submissions independently Create and schedule Phishing mail campaigns Combine your phishing site with an email campaign for centrally tracking An independent “Simple Tracker” module for quick tracking an email or web page visit Advance report generation – generate reports based on the tracking data you needed Custom tracker images and dynamic QR codes in messages Track phishing message replies [hide][Hidden Content]]
  7. 3klCon Project Full Automation Recon tool which works with Small and Medium scopes. Recommended to use it on VPS machine, it’ll discover secrets and searching for vulnerabilities. Tools used Subfinder Assetfinder Altdns Dirsearch Httpx Waybackurls Gau Git-hound Naabu Gf Gf-templates Nuclei Nuclei-templets Subjack Changelog v1.1 Editing the tool’s methodology, you can check it there:”” Editing the selected tools, change some, and use more tools Upgrading to python3 Editing some processes to be as a user option like directory bruteforcing and port scan [hide][Hidden Content]]
  8. Osintgram Osintgram is a tool for OSINT on Instagram. Osintgram is a fork of [Hidden Content] and [Hidden Content]. Changelog v1.1 Enhancements Improved command parser (#86) Improved errors handling (8bd1abc) Add new line when input command is empty (f5211eb) Added new commands to catch phone number of users (#111) Added support for Windows (#100) Bug fixes Fix commands output limit bug (#87) Fix setting target with “.” in username (9082990) Readline installing error (#94 ) [hide][Hidden Content]]
  9. Changelog: - Added config.ini file - Solved Discord RPC bug (you can enable or disable the option) [hide][Hidden Content]]
  10. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records DMARC Records Subdomain Enumeration Data Sources BuffOver ThreatCrowd AnubisDB ThreatMiner Traceroute Protocols UDP TCP ICMP Directory Searching Port Scan Fast Top 1000 Ports Open Ports with Standard Services Export Formats txt xml csv Changelog v1.1.0 root is not required, other minor changes [hide][Hidden Content]]
  11. itsMe

    Proxy Leecher v1.1

    [hide][Hidden Content]]
  12. capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate. Changelog v1.1 RC1 draft release to test and verify automated builds. [hide][Hidden Content]]
  13. itsMe

    TihonTheSpammer v1.1

    TihonTheSpammer TihonTheSpammer - python script for spam Emails WARNING! USE FOR EDUCATIONAL PURPOSE ONLY!DEVELOPER IS NOT RESPONSIBLE!RUN AT YOUR OWN RISK! Tihon enables you to spam E-Mails of your victims up to 1000 Letters, every single will be send during one second! Made with Help of LEX Made with love for you and [hide][Hidden Content]]
  14. Brutezip v1.1 Crack compress files: ZIP, RAR, 7z [HIDE][Hidden Content]]
  15. CryDroid v1.1 Android Crypter/Decrypter source code for researchers. Features: Encryption extensions: txt, png, bmp, jpg, mp3, mp4, mpeg, doc, docx, etc (edit app/crypter.part3 to add more) Encrypter/Decrypter using Custom Password [HIDE][Hidden Content]]
  16. The following is a PHP script for running dictionary attacks against both salted and unsalted password hashes. It is capable of attacking every hash function supported by PHP's hash function, as well as md5(md5), LM, NTLM, MySQL 4.1, and crypt hashes. It also supports crashed session recovery. [HIDE][Hidden Content]]
  17. DWARF Aka my wip gui for android reverse engineers and crackers. Built on top of pyqt5 (compatible with all os’s), Frida and some terrible code. Features Quick spawn, inject and sleep at application onCreate Hook natives, java and loading modules cycle before initializations Hooks conditions and js script logic Manipulate memory and arguments Memory and disasm view (Powered by capstone) Switch between hooks on different threads Inputs are evaluated. Frida js api and dwarf shortcuts are usable in almost any input field Variables creation Save and load back hooks and variables [HIDE][Hidden Content]]
  18. Read the license before using any part from this code Reverse Shell in Shortcut File (.lnk) How it works? Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an executable file, instead of having to navigate to the executable. LNK files contain some basic properties, such as the path to the executable file and the “Start-In” directory. LNK files use a curled arrow to indicate they are shortcuts, and the file extension is hidden (even after disabling “Hide Extensions for Known File Types” in Windows Explorer). The script creates a .lnk file that points to the user's "cmd.exe" file (located in the default folder C:\Windows\System32\cmd.exe) to run a reverse shell through arguments. Features: Reverse TCP Port Forwarding using [HIDE][Hidden Content]]
  19. What’s PAKURI Sometimes, penetration testers love to perform a complicated job. However, I always prefer the easy way. PAKURI is a semi-automated user-friendly penetration testing tool framework. You can run the popular pentest tools using only the numeric keypad, just like a game. It is also a good entry tool for beginners. They can use PAKURI to learn the flow to penetration testing without struggling with a confusing command line/tools. Abilities of “PAKURI”. Intelligence gathering. Vulnerability analysis. Visualize. Brute Force Attack. Exploitation. For beginner: (d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters. NOTE If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legal liability for your action. Features Scan enum4linux Nikto Nmap OpenVAS Skipfish sslscan SSLyze Exploit BruteSpray Metasploit Visualize Faraday CUI-GUI switching PAKURI can be operated with CUI and does not require a high-spec machine, so it can be operated with Raspberry Pi. [HIDE][Hidden Content]]
  20. [HIDE][Hidden Content]]
  21. Facebook Graph Search - Facebook Data Scraper Premium by 0x1 Facebook Graph Search help you to finding peoples, stories/posts, groups, pages, events, places, apps with more criteria. Searching for the the best selling and trending products explore new ideas. Searching and mapping the interest to sharpen or expand the range of ad targeting ads. Easy to scrape/extract details (id, name, email ...) of peoples, stories, groups, events. Demo Video FACEBOOK GRAPH SEARCH HELP YOU TO Searching for the viral post, video, pictures, articles, etc. Searching for the best selling and trending products in teespring, viralstyle, amazon, etc. Looking for peoples who are currently in need of your product with more criteria. Searching and building relationships with people who potentially. Potential business partners, distributors, resellers, recruiting a downline, looking for employees, etc. Searching for a group that contains people who want your product. Searching for pages that liked by target audience. Mapping the topic and explore new ideas for your next product. Searching and mapping the interest to sharpen or expand the range of ad targeting ads. Knowing who your competitors and Dismantling of their marketing strategy on Facebook. Scraping user details (id, facebook email, location ...) from ids. Scraping users from joined to a group, pages or an event ... Scraping group details (id, name, status joined/unjoin, members ...) from ids. Scraping page details (id, name, category, email, website, phone ...) from ids. Scraping users who liked a post, go/went/invited to an event, liked a page ... There are still dozens of other benefits that you can get ... USAGE IDEAS Looking for viral content Photo, Video, Articles which you can use to * Boost the post on your fanpage. * Increase CTR ads on Facebook. * Bring new users to your website/blog. Break the marketing strategies of competitors. You can know: * How competitors are doing promotions. AND MORE Even if you do not use Facebook for your BUSINESS MARKETING, The Facebook Graph Search can make your activities on Facebook become more enjoyable. You can search for posts from your friends. Revived old memories together with a friend. Facebook Graph Search help you to searching for peoples by specify criteria. Here is the complete list of filters that you can use Download Premium Version [HIDE][Hidden Content]]
  22. jadx - Dex to Java decompiler Command line and GUI tools for produce Java source code from Android Dex and Apk files Main features: decompile Dalvik bytecode to java classes from APK, dex, aar and zip files decode AndroidManifest.xml and other resources from resources.arsc deobfuscator included jadx-gui features: view decompiled code with highlighted syntax jump to declaration find usage full text search [HIDE][Hidden Content]]
  23. itsMe

    WIFI-Brute-Force V1.1

    This is a WIFI Brute Force . script undetectable and secure! Available command line options usage: [options] [HIDE][Hidden Content]]
  24. dEEpEst

    Black Leecher v1.1

    Features : 1. Proxy Checker & Graber 2. VCC Generator 3. Discord Token Graber 4.Combo Tools Download: [HIDE][Hidden Content]] Password:
  25. (1.1): Lista de cambios "Correcciones" - Restaurado al estado después de una reciente actualización de autorización en una cuenta EA. "Cambios" - Se ha mejorado el algoritmo de contar el tiempo antes de que se complete la comprobación. - Las cuentas básicas ahora se mantienen separadas de las cuentas de suscripción Premier. - Se ha cambiado el diseño de la configuración adicional de la ventana. "Nuevo" - Se ha añadido la capacidad de descargar proxies en el enlace q Auto-update proxy en el enlace. - Se ha añadido una visualización del progreso actual del icono del programa en la barra de tareas. - Se han añadido dos tipos de edición al filtro: Test Edition, Play Free. - Se ha añadido una sugerencia al escribir el nombre del juego en la barra de búsqueda. - Se ha añadido el historial de búsqueda. - Se han añadido opciones de búsqueda adicionales. - Se ha añadido la capacidad de guardar el resultado de la búsqueda en formato de registro y mailpass. - Añadida información al registro sobre la presencia de una tarjeta empatada y un Paypal empatado. - Se ha añadido información al registro sobre la presencia de una Xbox y UN PSN conectados. - Añadida clasificación de cuentas por juego. (Configuración Dop. - Archivos - Ordenar cuentas por juego). - Se ha añadido una selección de modo de operación con la lista de proxy. No1: En orden. No2: Al azar. No.3: Avanzado. (Durante el proceso de verificación, el programa agregará proxies válidos a una lista separada. Cuando hay suficientes proxies (más de 20pc) en esta lista, el programa comenzará a usarlos en lugar de la lista principal. Este modo es el más rápido y se utiliza de forma predeterminada, y reduce el número de errores a veces). No4: Avanzado. (La lista de proxies válidos solo se utilizará para el exceso de trabajo).) [Hidden Content]