Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'v2.3.1'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 10 results

  1. The Ultimate WordPress Performance Toolkit W3 Total Cache helps you speed up your WordPress website with all the necessary tools for beginner, intermediate and advanced WordPress users to accelerate your SEO, User Experience and Search Rankings. Grow your Brand with W3TC today! [Hidden Content] [hide][Hidden Content]]
  2. Cryptitan is a multi-featured Cryptocurrency exchange software. With support for multiple Cryptocurrencies, you are able to host buying & selling with direct bank transfer, credit cards or any other supported payment gateways. [Hidden Content] [hide][Hidden Content]]
  3. pagodo (Passive Google Dork) – Automate Google Hacking Database scraping The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet. There are 2 parts. The first is ghdb_scraper.py that retrieves Google Dorks and the second portion is pagodo.py that leverages the information gathered by ghdb_scraper.py. What are Google Dorks? The awesome folks at Offensive Security maintain the Google Hacking Database (GHDB) found here: [Hidden Content]. It is a collection of Google searches, called dorks, that can be used to find potentially vulnerable boxes or other juicy info that is picked up by Google’s search bots. Changelog v2.3.1 Added switches to optionally provide a file name for both text and JSON output. Thank you @cgeopapa for #68 [hide][Hidden Content]]
  4. SilentCryptoMiner v2.3.1 - Miner for ETH, ETC, XMR, RTM & more A silent (hidden) cryptocurrency miner capable of mining ETH, ETC, XMR, RTM and much more, with many features suited for mining silently. This miner can mine all the following algorithms and thus any cryptocurrency that uses one of them: Main Features Native & .NET - Miner installer/injector and watchdog coded in C#, Shellcode loader/injector coded in C, miner requires .NET Framework 4.5 Shellcode - All .NET C# parts are converted into Shellcode and injected using a native C loader, can be disabled Injection (Silent/Hidden) - Hide miner behind another process like explorer.exe, conhost.exe, svchost.exe and others Idle Mining - Can be configured to mine at different CPU and GPU usages or not at all while computer is or isn't in use Stealth - Pauses the miner and clears the GPU memory while any of the programs in the "Stealth Targets" option are open Watchdog - Monitors the miner file and replaces the file if removed and starts it if the injected miner is closed down Multiple Miners - Can create multiple miners to run at the same time, for example one XMR (CPU) miner and one ETH (GPU) miner CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) Windows Defender Exclusions - Can add exclusions into Windows Defender after being started to avoid being detected Process Killer - Constantly checks for any programs in the "Kill Targets" list and kills them if found Remote Configuration - Can get the miner settings remotely from a specified URL every 100 minutes Web Panel Support - Has support for monitoring and configuring all the miners efficiently in a self-hosted online web panel SilentCryptoMiner v2.3.1 Changed ETH miner to force desired CUDA settings, can increase hashrate on newer drivers/GPUs Changed ETH miner to not mine on integrated Intel GPUs, meaning CPUs with a GPU in them since they are not profitable and can cause lag Reworked manifest system to reduce overall detections Reduced C# detections greatly, especially helpful for those with "Shellcode Loader" disabled Changed "Entry Name" check to reallow backslashes for Task Scheduler subsections Improved "Disable Windows Update" function with better persistence and effectiveness Added advanced option to disable the miner from running after install so that it will only run on startup [Hidden Content]
  5. dizzy – Support Creators Content Script is a platform where content creators, youtubers, instagramers, designers, developers, photographers or any other branch can monetize their content by receiving subscriptions from their most loyal followers or just anyone who likes their work. [Hidden Content] [hide][Hidden Content]]
  6. Bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists. Included in BlackArch Linux pentesting distribution and Rawsec’s Cybersecurity Inventory since August 2019. The first idea was inspired by Cupp and Crunch. We could say that bopscrk is a wordlist generator situated between them, taking the best of each one. The challenge was to try to apply the Cupp’s idea to more generic-situations and amplify the shoot-range of the resultant wordlist, without losing this custom-wordlist-profiler feature. Changelog v2.3.1 2.3.1 version notes fixing namespace bug (related to aux.py module, renamed to auxiliars.py) when running on windows systems unittest (and simple unitary tests for transforms, excluders and combinators functions) implemented. 2.3 version notes (15/10/2020) Customizable configuration for artists and lyrics transforms using the cfg file Requirements at setup.py updated Multithreads logic improved Leet and case order reversed to improve operations efficiency BUG FIXED in lyrics space replacement BUG FIXED when remove duplicates (Type Error: unhashable type: ‘list’) Memory management and efficiency improved SPLIT INTO MODULES to improve project structure BUG FIXED in wordlists-exclusion feature 2.2 version notes (11/10/2020 Configuration file implemented NEW FEATURE: Allow to create custom charsets and transforms patterns trough the config file NEW FEATURE: Recursive leet transforms implemented (disabled by default, can be enabled in cfg file) 2.2~beta version notes (10/10/2020) The lyricpass integration have been updated to run with last version released by initstring --lyrics-all option removed (feature integrated in other options) [hide][Hidden Content]]
  7. Recaf is an open-source Java bytecode editor based on Objectweb’s ASM. ASM is a library that abstracts away the constant pool and class-file attributes. Since keeping track of the constant pool or managing proper stack frames are no longer necessary, complex changes can be made with relative ease. With additional features to assist in the process of editing Recaf is the most feature-rich free bytecode editor available. Changelog v2.3.1 Bug Fixes JADX mappings now retain existing package (5205059) [hide][Hidden Content]]
  8. Fhex – A Full-Featured HexEditor This project is born with the aim to develop a lightweight, but useful tool. The reason is that the existing hex editors have some different limitations (e.g. too many dependencies, missing hex coloring features, etc.). Features Search and replace (UTF-8, HEX, regex, inverse search supported) [CTRL + F] Colored output (white spaces, ASCII characters, 0xFF, UTF-8 and NULL bytes have different colors) Interpret selected bytes as an integer, long, unsigned long [CTRL + B] Copy & Paste [CTRL + C and CTRL + V] Copy selected Unicode characters [CTRL + Space] Zeroing all the selected bytes [CTRL + D] Undo & Redo [CTRL + Z and CTRL + Y] Find & Replace Drag & Drop (Hint: Drag&Dropping two files the editor will diff them) Overwrite the same file or create a new one [CTRL + S] Big files supported (Only on Linux, Windows has still several limitations on the supported file size) Goto offset [CTRL + G] Insert mode supported in order to insert new bytes instead to overwrite the existing one [INS] Create new instances [CTRL + N] Basic text viewer for the selected text [CTRL + T] Reload the current file [F5] Compare two different files at byte level Browsable Binary Chart (see later for details) [F1] Hex – Dec number converter [F2] Hex String escaper (e.g from 010203 to \x01\x02\x03) [F3] Pattern Matching Engine (see later for details) Shortcuts for all these features [hide][Hidden Content]]
  9. massExploitConsole a collection of tools with a cli ui disclaimer Please use this tool only on authorized systems, I’m not responsible for any damage caused by users who ignore my warning I do not own the code of adapted exploits or tools exploits are adapted from other sources, please refer to their author info Please note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugs Feature an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) google page crawler with gecko and Firefox (not fully working) a simple Baidu crawler (multi-threaded) censys host scan Changelog v2.3.1 separate proxy_check command [HIDE][Hidden Content]]
  10. Threadtear Threadtear is a multifunctional deobfuscation tool for java. Android application support is coming soon (Currently working on a Dalvik to java converter). Suitable for easier code analysis without worrying too much about obfuscation. Even the most expensive obfuscators like ZKM or Stringer are included. For easier debugging, there are also other tools included. Insert debug line numbers to better understand where exceptions originate or add .printStackTrace() to try-catch blocks without recompiling your code. Reverse compatibility is not a problem anymore if no version-specific methods are used. [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.