Search the Community

Showing results for tags 'v2.0'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 11 results

  1. itsMe?

    BruteX v2.0

    ABOUT: Automatically brute force all services running on a target Open ports Usernames Passwords CHANGELOG: v2.0 Fixed issue with VNC port v1.9 Updated default credential lists for each service v1.8 Added improved default credential list for each service v1.7 Removed DNS brute forcing v1.7 Added -P0 to NMap scan options v1.6 Removed HTTP/HTTPS basic auth checks to normal scans. Use brutex port <80/443> to scan with that option... v1.5b Fixed issue with dirb v1.5a Removed clear command v1.5 Added install.sh v1.5 Fixed SNMP brute force options v1.5 Fixed http/https brute force options v1.4 Removed dirb web directory brute forcing v1.3d Added Fortinet user/pass v1.3d Added DirBuster for web brute forcing v1.3c Fixed error with DNS namelist.txt v1.3b Fixed brutex global DIR issue v1.3a Fixed HTTP proxy brute force options v1.3 added faster scan options for nmap v1.3 revised password brute force lists for more efficient service brute forcing v1.3 added wordlist directory with new wordlist selections v1.2 adds dnsenum / removes DNSDict6 as no longer supported on Kali 2.0 v1.2 removed wfuzz web file brute forcing as it was too error prone and noisy v1.2 adds the ability to specify a port to target (ie. 23 for telnet) to automatically brute force v1.2 added additional ports to scan and brute force v1.2 added additional default users to brute force [Hidden Content]
  2. Cracked [HIDE][Hidden Content]] Server.exe
  3. Capture_ Premium & Free Accounts + Capture Combos: Email:Pass / User:Pass [HIDE][Hidden Content]]
  4. itsMe?

    Fast RDP Brute GUI v2.0

    The capabilities of the shell is much better than the old official (Fast RDP Brute v1.2.1.1). They are as follows: 1. Built-in port scanner that scans a ce rtain IP-addresses and address ranges specified. Immediately, when a successful scan results will be ru nning too much steam username / password once for each host. 2. Now you can scan the RDP service on non-standard ports (eg 3390 or 3391). 3. Straight from the list of scanned hosts can cause a connection to a remote desktop press Ent er. 4. Unlike the older version, in our shell all the indicators of successful and unsuccessful rebounds, errors, and the search speed is calculated and displayed without error Smile 5. Hoods can be seen not only in the list of brute force, but also they are stored in a file in the program directory good.txt. Disadvantages: 1. Not supported blank password, authenti c ation at the network level (NLA), and the authorization server is disabled via RDP (i.e. password can be typed from the keyboard only at the input) to all such serv ers include Windows 2000 (XP and up to a You can also set up somehow). 2. If the server is configured for auto-login, the brute will issue a "buzzing" with any user / password. 3. With the sudden end of the program (via Task Manager) will be impossible to continue the scan and search with the break. Tips: [HIDE][Hidden Content]]
  5. itsMe?

    Origin Brute Checker v2.0

    [HIDE][Hidden Content]] Pass: level23hacktools.com Config Maker || itsMe?#3494
  6. itsMe?

    Unfx Proxy Parser v2.0

    Features Parsing from sites with tables Parsing from primitive sites Sorting proxies by countries Deep - Allow to follow links External - Allow to follow third-party domains Retry - Retries crawl/parse if been received bad response Results Saving proxies in ip : port format. NOTE: Double click - select/deselect all countries. [HIDE][Hidden Content]]
  7. itsMe?

    Tool-X v2.0

    Tool-X is a kali linux hacking tool installer. What is Tool-X ? Tool-X is a kali linux hacking Tool installer. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best hacking tools in Rooted or Non Rooted Android devices. In the Tool-X there are almost 261 hacking tools available for termux app and GNURoot Debian terminal. you can install any tool by single click. Tool-X is Specially made for Termux and GNURoot Debian Terminal. Now Tool-X is available for Ubuntu. How to use ? Type 0 : To install all tools. Type 1 : to sow all available tools and type the number of a tool which you want to install. Type 2 : to show tools category. Type 3 : for install operating system in termux Type 4 : if you want to update Tool-X. Type 5 : if you know About us. Type x : for exit. Tool-X is available for Android Ubuntu [HIDE][Hidden Content]] Termux: [HIDE][Hidden Content]]
  8. Version 2.0 Fixed colors bug Fixed permissions bug Added new option to scan single target Added new option to scan joomla & wordpress plugins [HIDE][Hidden Content]]
  9. 0x1

    FLARE VM v2.0

    FLARE VM is the first of its kind reverse engineering and malware analysis distribution on Windows platform. Since its introduction in July 2017, FLARE VM has been continuously trusted and used by many reverse engineers, malware analysts, and security researchers as their go-to environment for analyzing malware. Just like the ever-evolving security industry, FLARE VM has gone through many major changes to better support our users’ needs. FLARE VM now has a new installation, upgrade, and uninstallation process, which is a long anticipated feature requested by our users. FLARE VM also includes many new tools such as IDA 7.0, radare and YARA. Therefore, we would like to share these updates, especially the new installation process. Installation We strongly recommend you use FLARE VM within a virtualized environment for malware analysis to protect and isolate your physical device and network from malicious activities. We assume you already have experience setting up and configuring your own virtualized environment. Please create a new virtual machine (VM) and perform a fresh installation of Windows. FLARE VM is designed to be installed on Windows 7 Service Pack 1 or newer; therefore, you can select a version of windows that best suits your needs. From this point forward, all installation steps should be performed within your VM. Available Packages While we attempt to make the tools available as shortcuts within the FLARE folder, there are several available from command-line only. Please see the online documentation for the most up to date list. Here is an incomplete list of some major tools available on FLARE VM: Disassemblers: IDA Free 5.0 and IDA Free 7.0 Binary Ninja Radare2 and Cutter Debuggers: OllyDbg and OllyDbg2 x64dbg Windbg File Format parser: CFF Explorer, PEView, PEStudio PdfStreamdumper, pdf-parser, pdfid ffdec offvis and officemalscanner PE-bear Decompilers: RetDec Jd-gui and bytecode-viewer dnSpy IDR VBDecompiler Py2ExeDecompiler Monitoring tools: SysInternal suite RegShot Utilities: Hex Editors (010 editor, HxD and File Insight) FLOSS (FireEye Labs Obfuscated String Solver) Fakenet-NG Yara Malware Analyst Pack Once you have a VM with a fresh installation of Windows, use one of the following URLs to download the compressed FLARE VM repository onto your VM: Source && Download: [hide][Hidden Content]] Install Info : [hide][Hidden Content]]
  10. 0x1

    Trape v2.0

    People tracker on the Internet: Learn to track the world, to avoid being traced. Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control over their users through the browser, without them knowing, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals. At the beginning of the year 2018 was presented at BlackHat Arsenal in Singapore : and in multiple security events worldwide. Some benefits LOCATOR OPTIMIZATION: Trace the path between you and the target you’re tracking. Each time you make a move, the path will be updated, by means of this the location of the target is obtained silently through a bypass made in the browsers, allowing you not to skip the location request permit on the victim’s side , objective or person and at the same time maintain a precision of 99% in the locator. APPROACH: When you’re close to the target, Trape will tell you. REST API: Generates an API (random or custom), and through this you can control and monitor other Web sites on the Internet remotely, getting the traffic of all visitors. PROCESS HOOKS: Manages social engineering attacks or processes in the target’s browser. -- SEVERAL: You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target. -- INJECT JS: You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target’s browser. -- SPEECH: A process of audio creation is maintained which is played in the browser of the objective, by means of this you can execute personalized messages in different voices with languages in Spanish and English. PUBLIC NETWORK TUNNEL: Trape has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels; By this you can publish your content of trape server executed locally to the Internet, to manage hooks or public attacks. CLICK ATTACK TO GET CREDENTIALS: Automatically obtains the target credentials, recognizing your connection availability on a social network or Internet service. NETWORK: You can get information about the user’s network. -- SPEED: Viewing the target’s network speed. (Ping, download, upload, type connection) -- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the target network automatically. PROFILE: Brief summary of the target’s behavior and important additional information about your device. — GPU — ENERGY 30-session recognition: Session recognition is one of trape most interesting attractions, since you as a researcher can know remotely what service the target is connected to. USABILITY: You can delete logs and view alerts for each process or action you run against each target. How to use it First unload the tool. git clone [Hidden Content] cd trape python trape.py -h If it does not work, try to install all the libraries that are located in the file requirements.txt pip install -r requirements.txt Example of execution Example: python trape.py --url [Hidden Content] --port 8080 HELP AND OPTIONS user:~$ python trape.py --help usage: python trape.py -u <> -p <> [-h] [-v] [-u URL] [-p PORT] [-ak ACCESSKEY] [-l LOCAL] [--update] [-n] [-ic INJC] optional arguments: -h, --help show this help message and exit -v, --version show program's version number and exit -u URL, --url URL Put the web page url to clone -p PORT, --port PORT Insert your port -ak ACCESSKEY, --accesskey ACCESSKEY Insert your custom key access -l LOCAL, --local LOCAL Insert your home file -n, --ngrok Insert your ngrok Authtoken -ic INJC, --injectcode INJC Insert your custom REST API path -ud UPDATE, --update UPDATE Update trape to the latest version –url In this option you add the URL you use to clone Live, which works as a decoy. –port Here you insert the port, where you are going to run the trape server. –accesskey You enter a custom key for the trape panel, if you do not insert it will generate an automatic key. –injectcode trape contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token. –local Using this option you can call a local HTML file, this is the replacement of the –url option made to run a local lure in trape. –ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations. –version You can see the version number of trape. –update Option especially to upgrade to the latest version of trape. –help It is used to see all the above options, from the executable. Disclaimer This tool has been published educational purposes in order to teach people how bad guys could track them or monitor them or obtain information from their credentials, we are not responsible for the use or the scope that may have the People through this project. We are totally convinced that if we teach how vulnerable things are, we can make the Internet a safer place. Developer This development and others, the participants will be mentioned with name, Twitter and charge. CREATOR — Jose Pino - @jofpin - (Security Researcher) Happy hacking! I invite you, if you use this tool helps to share, collaborate. Let’s make the Internet a safer place, let’s report. License The content of this project itself is licensed under the Creative Commons Attribution 3.0 license, and the underlying source code used to format and display that content is licensed under the MIT license. Copyright, 2018 by Jose Pino Source && Download : [hide][Hidden Content]]
  11. dEEpEst

    Dedi Exploiter v2.0

    Download: [hide][Hidden Content]] Password: level23hacktools.com