Search the Community

Showing results for tags 'with'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 160 results

  1. Networker. Tech News WordPress Theme with Dark Mode Networker is a modern and clean WordPress theme for modern content-based blogs and magazines. [Hidden Content] [hide][Hidden Content]]
  2. Scan for a target wireless network. Launch the Handshake Snooper attack. Capture a handshake (necessary for password verification). Launch Captive Portal attack. Spawns a rogue (fake) AP, imitating the original access point. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. [hide][Hidden Content]]
  3. What you'll learn AWS Basics Cloud Computing Basics Internet Security Basics VPN Basics Build a VPN Launch A EC2 Server Requirements Basic Computer Knowledge Description VPNs are all the rage these days. But what if I told you that you can build your very own VPN server for free? In this course I'm going to teach you how to do just that. We're also going to tip our toes into cloud computing. AWS is leading the cloud computing market, and in this course we're going to be working with AWS to build our VPN server. Who this course is for: Beginners To Cloud Computing Beginners to AWS Anyone looking for a VPN solution [Hidden Content] [hide][Hidden Content]]
  4. What you'll learn What Raspberry Pi Where To Buy In Cheap Price Setup Raspberry Pi as Portable Hacking Machine WIFI Network Jamming Protect Your WiFi From Jamming WiFi Password Hacking Protect Your WiFi Password From Hacking Requirements Basic Computer & IT Skills PC/Laptop/Mobile Raspberry Pi and Accesories Hacking Attitude Description In this WiFi Hacking with Raspberry Pi - Black Hat Hackers Special! course, I will teach you how to setup raspberry pi for various type of wifi hacking technics and DIY projects which are used by black hat hackers and ethical hackers too. I designed this course in such a manner that you can easily learn from this course even if you don’t have any previous knowledge about raspberry pi or hacking. I can assure you from this course you will learn something new that no one will teach you in any other course. So, Click on Enroll to join this course and start learning how to hack with raspberry pi. This course is designed for beginners and professionals, if you are a beginner you want to start from zero or if you are a professional and want to improve your hacking skills so this course will increase your knowledge about hacking. In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to perform various advanced hacking techniques to hack any wifi password no matter it's using any types of security WEP/WPA/WPA2 Wi-Fi encryption key and also you will learn jamming any wifi connection and disconnect any device from any wifi using the Raspberry Pi. Notice: This course is only for educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices. Do not perform any hacks on other people's networks if you don't have permission to do so. I will not be responsible for your actions, Who this course is for: Anyone Who Wants To Become an Ethical Hacker, Penetration Tester or Black Hat Hackers Anyone Who Wants To Learn Hacking Using Raspberry Pi Like Black Hat Hackers Anyone Who Wants To Learn How To Hack WiFi Passwords Like Black Hat Hackers Anyone Who Wants To Learn How To Jam WiFi Like Black Hat Hackers [Hidden Content] [hide][Hidden Content]]
  5. What you'll learn How to use multiple methods to escalate privleges on modern versions of Windows 10 How to escalate privleges in CTFs such as HackTheBox, TryHackMe and more How to succeed in CTF style exams such as the OSCP, eCPPT and CEH How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career Requirements A HackTheBox VIP Subscription is Required Basic knowledge of virtual machines Description New Launch for Spring 2021! This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints. Everything is carefully, explained - step-by-step. Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments. Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course. The Techniques You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines Windows Kernel Exploits Weak Registry Permissions Token Manipulation CVE Exploits DPAPI Abuse (Three New Lectures Just Added January 2021!) The Tools You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more. You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more. My dream for you By the end of this course you should be able to use these techniques in: Your day to day work OSCP preparation CTF hacking About the lab There are 10 vulnerable machines. No lab setup is required as the entire environment is already established in HackTheBox VIP labs I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started. Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation. Tip: I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal. Never again will that happen. Who this course is for: Students interested in how attackers escalate privileges on modern Windows endpoints Beginning and Intermediate cyber security students. Students looking for OCSP practice [Hidden Content] [hide][Hidden Content]]
  6. itsMe

    How to Buy XRP with LTC

    [Hidden Content]
  7. Description So you’ve built an Android app, and you’re ready to share it with the world. Now what? There are many ways you can distribute your app, and in this course, Jon-Luke West shows you how to use the primary distribution channel, the Google Play Store, as well as the Amazon Appstore. Jon-Luke covers how to prepare the app for distribution by cleaning up and optimizing the code, creating a security certificate, and uploading an APK file. He then shows how to create multiple flavors of your app to include different features, how to register as a Google Play and Amazon developer, set the app description and pricing, and publish the app. Lastly, Jon-Luke looks at the post-publishing aspects, including how to track app usage, usage statistics, revenue, and crash reporting. [Hidden Content] [hide][Hidden Content]]
  8. Descripción del producto Dan Kaminsky is the Director of Penetration Testing for IOActive. Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. He is best known for his "Black Ops" series of talks at the well respected Black Hat Briefings conferences. He is also the only speaker who has attended and spoken at every single "Blue Hat" Microsoft internal training event. Dan focuses on design level fault analysis, particularly against massive-scale network applications. Dan regularly collects detailed data on the health of the worlwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan is one of the few individuals in the world to combine both technical expertise with executive level consulting skills and prowess. [Hidden Content] [hide][Hidden Content]]
  9. Official Website: [Hidden Content] Version 1.0 Features Complete WhatsApp Marketing Solution. Smooth Way of Sending Messages. Multiple Account Supported. Allows Unlimited Messages. Supports Multimedia Messages (Images, PDF, Docs, PPT). Number Filter Module. WhatsApp Groups Contacts Extractor Module. Anti Block Functionality With Multi Text Message. Advanced Sleep Control Feature. Advanced Speed Control Feature. Advanced Delay Control Feature. Group Extractor By Category From Web. Groups Verifier Module. Auto Group Join and Auto Group Posting. Dynamic Messages Creation. Spin Text Module. Multi-Language Functionality. Sending Customized Messages. Account Switching In Running Campaign. Compatible With Latest WhatsApp API. Speed & Performance. Image With Caption Enabled. Dual Mode Sending Features (Safe Mode & Blind Mode). Fetch Contact From WhatsApp Contact. Sending Multi-Files With Caption. Set Auto-Reply With Photos & Files. Set Auto-Rely Rules Related To Keywords With Photos and Files. Campaign Report Generator. Import From Excel, CSV And Text. Schedule Sending. Download : BulkWhatsAppMarketingSoftwareWithCatalogue[v1.0]_Cracked-rA9.rar
  10. What you'll learn Become an Expert in Using Metasploit Learn Ethical Hacking from scratch with Metasploit Importance of Penetration Testing Types of Penetration Testing Basics of Penetration Testing Metasploit Filesystem and Libraries The Architecture of MSF Auxiliary Modules Payload Modules Exploit Modules Encoder Modules Post Modules Metasploit Community Metasploit Interfaces Armitage MSFconsole Enumeration Nmap Integration and Port Scanning SMB and Samba Enumeration MySQL Enumeration FTP Enumeration SSH Enumeration HTTP Enumeration SNMP Enumeration MTP Enumeration Using Shodan with MSF Vulnerability Scanning Exploitation and Gaining Access Post-exploitation-Meterpreter Meterpreter Commands Pass The Hash with Metasploit John the Ripper Module Meterpreter Python/Powershell Extension Antivirus Evasion and Cleaning MSFvenom Using Custom Payload Generators Deceiving File System Using Timestomp The very latest up-to-date information and methods During the course you will learn both the theory and how to step by step setup each method Requirements Be able to download and install all the free software and tools needed to practice A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world Just you, your computer and your ambition to get started now! [Hidden Content] [hide][Hidden Content]]
  11. The course is a master one and covers every aspect of the Metasploit, it is higly practical and also it covers thery to make you understand clearly. This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become an expert level, and if you are a professional so this course will increase your knowledge about the hacking. Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more things. Tt consist more 3,000 plus modules, all are available with relevant links to other technical. All of the modules included in the Exploit Database. In this course your are going to learn: Lab setup Auxiliary modules backdoor tools and payloads Exploitation Module Post Exploitation Module Armitage Ruby on Metasploit Countermeasures This course is only for the educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices. Content Introduction Disclaimer Make Kali Linux Bootable Kali Linux VMWare Setup Kali Linux Latest Version Metaslpoit Basics command part 1 Metaslpoit Basics command part 2 Connect command - Metasploit Host command Metasploit Installing and Configuring PostgreSQL in Kali Linux Importing Nmap Results into Metasploit Route Command - Metasploit Search targets in Metasploit Exploring and Auditing a Network Using Nmap 1 Exploring and Auditing a Network Using Nmap 2 Exploring and Auditing a Network Using Nmap 3 Create Your Own Profile in Zenmap Zenmap Scanning [Hidden Content] [hide][Hidden Content]]
  12. What you'll learn You will have the basic knowledge of C# programming as well as an understanding of the popular IDE, Visual Studio You will learn the fundamentals of programming You will attain C# programming knowledge that will help you create basic, useful programs Requirements This is a beginner level course. No experience needed. Tools will be attained through course. You will need a computer with access to the internet Description Welcome to my Basic course on C# Programming with Visual Studio! My name is Matthew Dewey. I am an experienced programmer, having received several accommodations on programming in my formal education as well as tough several programming languages to thousands of students. My goal is to provide you, the budding programmer, the the knowledge you need on programming in an easy and fun manner. In this course I do just that and with one of the most useful IDEs coupled with the C# programming language. C# being one of the most elite programming languages in the programming world. C#, a wonderfully simple programming language that has encouraged many programmers to pursue careers involving C# over any other language. Of course, it goes without saying that C# is an excellent language, but do you know what is required of you to start programming C#? As with any programming language it is important you understand the fundamentals and that is exactly what I teach you in this course. I help you: Install your IDE Establish fundamental code Create and use variables Retrieve user input Process simple data Create basic programs Create simple, useful programs as well as BONUS methods and code! What about Visual Studio? A popular, widely used IDE that many large applications have been created in over the years. Do you know how to use it to its full potential? Well, in this course we will go through several lessons that will help you get comfortable with the IDE as well as more adept at program creation. Go no further if you're looking for the course that will guide you into the world of programming! With my course I can guarantee that the knowledge you learn will help you get a head-start in C# programming. I hope you enjoy the course and it helps you on your way into the world of programming! "Programming is a form of art. It is logical creativity!" Who this course is for: Students wanting to learn C# programming from the beginning C# Students Students interested in programming or app development [Hidden Content] [hide][Hidden Content]]
  13. What you’ll learn Instagram Automation Build a Bot with Python Requirements Basic Linux Command Line Python Basics An Instagram account Description Instagram is the fastest-growing social network, with 1 billion monthly users. It also has the highest engagement rate. To gain followers on Instagram, you’d have to upload engaging content, follow users, like posts, comment on user posts and a whole lot. This can be time-consuming and daunting. But there is hope, you can automate all of these tasks. In this course, we’re going to build an Instagram bot using Python to automate tasks on Instagram. We will look at using Python to upload images or videos, like posts, comment on posts and a whole lot. Who this course is for: Python developer who wants to learn Instagram Automation [hide][Hidden Content]]
  14. BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET. About BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. this botnet controller comes with a lot of features and the most secure panel for free Developed By: Black.Hacker What You Can Do Upload File From URL From Disk DDOS Attack [ TCP,UDP,ARME,Slowloris, HTTPGet, POSTHttp, Bandwidth Flood ] Start DDOS Stop DDOS Open Webpage Visible Hidden Show MessageBox Take Screenshot Steal Firefox Cookies Steal Saved Passwords Chrome Firefox NordVPN FileZilla Outlook Steal Chrome Cookies Steal Discord Token Steal Chrome History Steal Clipboard Data Execute Shell Commands CMD (Command Prompt) Powershell Send Spam Emails Run XMR Miner Seed a Torrent File From Disk From URL Keylogger Execute Scripts Execute Custom Plugins Computer Operations Restart Shutdown Logout Bitcoin Wallet Stealer Uninstall Client Move Client Blacklist Client Update Client Close Client Requirements PHP >= 7.3 NET Framework Stub >= 4.5 Builder >= 4.5 How to Install Pull the repo or Download the latest release Compress BlackNET panel folder and upload it to your hosting Create a database with any name you want Change the database information in config/config.php Change the "Panel URL" with your url in config/config.php Change all files and folders permission to 777 Make Sure that all DLLs are included in Plugins Folder FileSearcher.dll PasswordStealer.dll PluginExample.dll xmrig.exe Go to install.php fill-up the form and click install Create a cron job for ping.php and remove.php v3.7 Added more Charts and Stats Updated the stub .NET Framework to 4.5 Fixed a lot of HTTP Socket Issues and Stabilty More room for new features Fixed Discord Stealer Added PHPSpreadsheet Export Logs to Excel file insted of CSV Fixed "Stop DDoS" Bug Fixed "Take Screenshot" Bug Fixed "Delete Files" Bug Fixed "Installed Softwares" Bug Fixed Self Destruction Bug Added Code Documentation for Developers Added GPU and CPU information Added RAM Size Information Added DropBox Spread Added OneDrive Spread Added Downloader with Multiple Links Added XMR Miner Added Export Passwords to Excel Added Client Files Backup Function Added Torrent Seeder Added Disable Windows Defender Added Protect with Critical Process Added Modules Support Keylogger Start On Run [Optional] Modified File Binder Support Multiple Files Added "Client Information" Page Export Client Informtion to Excel Fixed 000webhost issue [ Tested ] Updated BlackNET Builder to .NET 4.5 Redesigned the Builder Modified the Password Stealer Doesn't require Newtonsoft.Json.dll Modified the File Searcher Doesn't require Ionic.zip.dll Modified the Icon Changer Modified "Schedule Task" Function Removed Chrome History Stealer Cleaner Code and File Structure Cleaner Database Structure Simple Template Engine to handle layouts The panel now depends on Composer Code Refactored with the standard PSR-12 Updated PHPMailer to 6.2.0 Updated BlackUpload to v1.5.2 Secrity Enhancement Small UI changes Small Installation Changes Improved Connection Speed Bug Fixes [Hidden Content]
  15. Hacking Tool Powerfull keylogger Advanced with keywords! Only Propuses Educatives [hide][Hidden Content]]
  16. Fhex – A Full-Featured HexEditor This project is born with the aim to develop a lightweight, but useful tool. The reason is that the existing hex editors have some different limitations (e.g. too many dependencies, missing hex coloring features, etc.). Features Search and replace (UTF-8, HEX, regex, inverse search supported) [CTRL + F] Colored output (white spaces, ASCII characters, 0xFF, UTF-8 and NULL bytes have different colors) Interpret selected bytes as an integer, long, unsigned long [CTRL + B] Copy & Paste [CTRL + C and CTRL + V] Copy selected Unicode characters [CTRL + Space] Zeroing all the selected bytes [CTRL + D] Undo & Redo [CTRL + Z and CTRL + Y] Find & Replace Drag & Drop (Hint: Drag&Dropping two files the editor will diff them) Overwrite the same file or create a new one [CTRL + S] Big files supported (Only on Linux, Windows has still several limitations on the supported file size) Goto offset [CTRL + G] Insert mode supported in order to insert new bytes instead to overwrite the existing one [INS] Create new instances [CTRL + N] Basic text viewer for the selected text [CTRL + T] Reload the current file [F5] Compare two different files at byte level Browsable Binary Chart (see later for details) [F1] Hex – Dec number converter [F2] Hex String escaper (e.g from 010203 to \x01\x02\x03) [F3] Pattern Matching Engine (see later for details) Shortcuts for all these features Changelog v2.4.1 This release includes heavy updates and bug fixes to the Pattern Matching engine. Now, the Pattern Matching engine can match strings or bytes. [hide][Hidden Content]]
  17. GHunt is an OSINT tool to extract information from any Google Account using an email. It can currently extract: Owner’s name The last time the profile was edited Google ID If the account is a Hangouts Bot Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.) Possible YouTube channel Possible other usernames Public photos (P) Phones models (P) Phones firmwares (P) Installed Softwares (P) Google Maps reviews (M) Possible physical location (M) Events from Google Calendar (C) The features marked with a (P) require the target account to have the default setting of Allow the people you share content with to download your photos and videos on the Google AlbumArchive, or if the target has ever used Picasa linked to their Google account. More info here. Those marked with a (M) require the Google Maps reviews of the target to be public (they are by default). Those marked with a (C) requires user to have Google Calendar set on public (default it is closed) [hide][Hidden Content]]
  18. ABOUT TOOL : mrphish is a bash based script which is officially made for phish*ng social media accounts with portforwarding and otp bypassing cntrole. This tool works on both rooted Android device and Non-rooted Android device. AVAILABLE ON : Termux TESTED ON : Termux REQUIREMENTS : internet php storage 400 MB ngrok Token FEATURES : [+] Instagram Login Page ! [+] Updated maintainence ! [+] 1 Port Forwarding Option ! [+] Easy for Beginners ! [hide][Hidden Content]]
  19. ABOUT TOOL : Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. AVAILABLE ON : Termux TESTED ON : Termux REQUIREMENTS : internet external storage permission storage 400 MB 1gb ram FEATURES : [+] Dangerous virus tool ! [+] Updated maintainence ! [+] Easy for beginners ! [+] Working virus tool for termux ! [hide][Hidden Content]]
  20. BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. About BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. this botnet controller comes with a lot of features and the most secure panel for free Developed By: Black.Hacker What You Can Do Upload File + From URL + From Disk Open Webpage + Visible + Hidden Show MessageBox Take Screenshot Steal Firefox Cookies Steal Saved Passwords + Chrome + Firefox + NordVPN + FileZilla + Outlook Steal Chrome Cookies Steal Discord Token Steal Chrome History Steal Clipboard Data 12. Execute Shell Commands + CMD (Command Prompt) + Powershell Send Spam Emails Keylogger Execute Scripts Execute Custom Plugins Computer Operations + Restart + Shutdown + Logout Bitcoin Wallet Stealer Uninstall Client Move Client Blacklist Client Update Client Close Client Requirements PHP >= 7.2 NET Framework How to Install PHP Panel Clone the Repo Compress BlackNET panel folder and upload it to your hosting Create a database with any name you want Change the database information in config/config.php Change files and folders permission to 777 [ Uploads Folder] Make Sure that all DLLs are included in Plugins Folder Go to install.php fill-up the form and click install to create the botnet tables automatically Enable a Cron Job for ping.php and remove.php Update notice If you have BlackNET installed you need Upload the new files Run update.php What's New v3.6.0 1. Replaced GeoPlugin API with GeoLite2 2. Added Upload from Disk Command 3. Added White Label Settings 4. Added SSL/TLS Support 5. Added Debug Mode 6. Added Software Name in Password Viewer 7. Added Dark Mode 8. Added Outlook Stealer 9. Added Update Client 10. Added "Delay Execution" Function 11. Custom Data Splitter 12. Enhanced HTTP Socket 13. Fixed PasswordStealer Bugs 14. Fixed LimeLogger UTF-8 Issues 15. Cleaner Panel Code 16. Better Settings Handling 17. Fixed "Password Reset Token" Bug 18. Updated ReCaptcha from v2 to v3 19. Updated PHPMailer to 6.1.8 20. Updated BlackUpload to v1.5.1 21. Small UI Changes 22. Faster C&C System 23. Less CPU Usage 24. Fixed Custom Plugin Bugs 25. Fixed Firefox Cookies Stealer 26. Updated Custom Plugin System 27. Cleaner Database Structure 28. Small Installation Changes 29. New Logo 30. Bugs Fixes [hide][Hidden Content]]
  21. OVOO is a powerful, flexible and User friendly Live TV & Movie Portal CMS with advance video contents management system. It’s easy to use & install. It has been created to provide a unique experience to movie lover & movie site owner. To observe of ISP needed we have made ovoo to use as multipurpose video cms. This application was built with advanced modules and many more powerful features for a complete video website management. Furthermore, it also supports CSS3, HTML5 and Bootstrap 3 Framework that help use refined any device with semantic accuracy and highly customizable PHP based (CodeIgniter) application. [Hidden Content] [hide][Hidden Content]]
  22. A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’. Appends a text file containing the server’s IPv4 address to ‘run.jar’. If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment. To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.14 Added an option to encrypt data sent to and from the backdoor. [hide][Hidden Content]]
  23. Description Darkshot is a scraper tool on steroids, to analyze all of the +2 Billions pictures publicly available on Lightshot. It uses OCR to analyze pictures and auto-categorize them thanks to keywords and detection functions. You can find pretty much everything : credentials, personal informations (emails, phone numbers, addresses, ID cards, passeports), banking information, etc. Since it's modulable, you can make your own detection function and use it as a monitoring tool. Features Multi-threading Anti-conflicting threads protection Auto-saving and resuming session 3 links generators : Ascending, Descending and Random Auto-translating keywords Auto-analyzing pictures with multiple OCR langs Auto-downloading OCR langs training data Auto-categorizing pictures with keywords, groups and detection functions Auto-exporting pictures per groups with their statistics in HTML Modulable : add your own detection functions and keywords [hide][Hidden Content]]
  24. Description GHunt is an OSINT tool to extract information from any Google Account using an email. It can currently extract: Owner's name Last time the profile was edited Google ID If the account is a Hangouts Bot Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.) Possible YouTube channel Possible other usernames Public photos (P) Phones models (P) Phones firmwares (P) Installed softwares (P) Google Maps reviews (M) Possible physical location (M) Latest news 02/10/2020 : Since few days ago, Google return a 404 when we try to access someone's Google Photos public albums, we can only access it if we have a link of one of his albums. Either this is a bug and this will be fixed, either it's a protection that we need to find how to bypass. 03/10/2020 : Successfully bypassed. (commit 01dc016) It requires the "Profile photos" album to be public (it is by default) [hide][Hidden Content]]
  25. Reverse PowerShell Functions that can be used to gain Reverse Shells with PowerShell. Invoke-ReversePowerShell function can be used to connect to Start-Listener as well as netcat and Metasploit modules or whatever other listeners you use. This is a PowerShell module meaning it only contains functions/cmdlets to be imported into a PowerShell session. If you wish to execute one of the commands whenever the file is run just add the command you wish to execute to the bottom of the file. BLUE TEAM DISCOVERY Find-ReverseShell.ps1 can be used to search the Windows Event Log for when a Reverse Shell is created that uses a System.Net.Sockets.TcpListener object. This will discover any reverse shell that creates a TcpListener object and not just the below module. This method does not catch PowerCat.ps1 which I am still looking for a good way to discover. This part is still a work in progress. [hide][Hidden Content]]