Search the Community

Showing results for tags 'with'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 286 results

  1. Complete Ethical Hacking With Termux : Android Tutorial 2020 Fun With Termux : Best Way To Use Android As A Hacking Device Hello, Welcome to my course Complete Ethical Hacking With Termux : Android Tutorial 2020 In this course you will learn how to Hack and Secure with termux with your Android device from scratch, you don't need to have any prior knowledge about Hacking, Linux, Android and even Computers. This course is designed for everyone out there who want to learn how to learn ethical hacking in new and fun way with Android devices. This Course Includes Complete Termux Tutorials In Ethical Hacking & Information Security. Imp notice - ### **** We are also giving you study material as pdf in our course . you can download it when you enroll in our course. ¿Para quién es este curso? A willingness to learn about Ethical Hacking & Cyber Security ### **** We are also giving you study material as pdf in our course . you can download it when you enroll in our course ****### This course is for anyone who wants to become an expert in security, privacy, and anonymity. Person who want to learn ethical hacking with Termux. [Hidden Content] DOWNLOAD: [hide][Hidden Content]]
  2. TikTok Video Downloader lets you download Image or/Video post from TikTok by just a Video URL. Our tool automatically Generates download link of the video. Demo: [Hidden Content] [hide][Hidden Content]]
  3. Do you want to grow your business with a technology bot? Facebook Messenger Chat with Bot for WordPress uses Facebook Messenger Bot API to help you make a bot which can automatically answer questions from your customers/visitors. This is the best way to help you save time and grow your business – Your customers can receive answers instantly when you are not online. The bot does that. It’s amazing!!! Demo: [Hidden Content] [hide][Hidden Content]]
  4. gorybloodfest

    Get a free shared drive with google

    Need some extra space in google for your data? Go to [Hidden Content] Input a fake gmail account (fake recommended but not required) Enter a name The current CH that is there doesnt work so just choose one that works. (you will have to refresh the page everytime it doesnt work then choose another CH) Enjoy if an alert says its done then you should see the shared drive under your google drive shortly!
  5. Fhex – A Full-Featured HexEditor This project is born with the aim to develop a lightweight, but useful tool. The reason is that the existing hex editors have some different limitations (e.g. too many dependencies, missing hex coloring features, etc.). Features Search and replace (UTF-8, HEX, regex, inverse search supported) [CTRL + F] Colored output (white spaces, ASCII characters, 0xFF, UTF-8 and NULL bytes have different colors) Interpret selected bytes as an integer, long, unsigned long [CTRL + B] Copy & Paste [CTRL + C and CTRL + V] Copy selected Unicode characters [CTRL + Space] Zeroing all the selected bytes [CTRL + D] Undo & Redo [CTRL + Z and CTRL + Y] Find & Replace Drag & Drop (Hint: Drag&Dropping two files the editor will diff them) Overwrite the same file or create a new one [CTRL + S] Big files supported (Only on Linux, Windows has still several limitations on the supported file size) Goto offset [CTRL + G] Insert mode supported in order to insert new bytes instead to overwrite the existing one [INS] Create new instances [CTRL + N] Basic text viewer for the selected text [CTRL + T] Reload the current file [F5] Compare two different files at byte level Browsable Binary Chart (see later for details) [F1] Hex – Dec number converter [F2] Hex String escaper (e.g from 010203 to \x01\x02\x03) [F3] Pattern Matching Engine (see later for details) Shortcuts for all these features [hide][Hidden Content]]
  6. “Wallet KING” is a complete solution for an online payment gateway. Client can use this system for send and receive money from other clients. In every transaction and withdraw the system owner will get a profit from the clients. This CMS Includes almost everything you need to make an online payment gateway. You can integrate this system with ecommerce business website too. It’s API system is very easy to use and you will have full source code without any kind of encryption. Demo: [Hidden Content] [hide][Hidden Content]]
  7. Fast Coding Techniques that Every C# Developer Must Know _https://www.udemy.com/course/visual-studio-tips-tricks/ What Will I Learn? Over 60 keyboard shortcuts that speed up your coding Learn to write more code with less typing Learn to use your keyboard like a pro and rely less on the mouse Learn to navigate in your projects and find files, classes and members more quickly Learn to compile, run and debug applications faster Learn about great add-ons that make coding fun and easy Requirements Visual Studio 2010 or higher Basic knowledge of Visual Studio Description If you want to be a real pro C# coder, you need to master your keyboard and Visual Studio. You need to be able to navigate in your code base, find and modify code in seconds. Great coders hardly ever use the mouse. They do everything with the keyboard. They use shortcuts and some tricks to type less and generate more code in less time. And that is what this course is all about. In this course, Mosh, author of six 5-star C# courses, shares with you lots of shortcuts and tricks that help you find, write and modify code in less time. In particular, you'll learn How to quickly find files, classes and methods. Say goodbye to Solution Explorer and navigating between folders to find classes. How to navigate in the code like a pro: no more clicking back and forth to navigate between members of classes. Jump from one method to another and come back to where you were. How to compile, run and debug applications faster and more effectively. 60+ shortcuts that will boost your productivity (both on Windows and Mac) How to reduce your chance of getting RSI (repetitive strain injury) [HIDE][Hidden Content]]
  8. SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop to encode given binary instructions similar to LSFR. This project is the reimplementation of the original Shikata ga nai in golang with many improvements. How? & Why? For offensive security community, the original implementation of shikata ga nai encoder is considered to be the best shellcode encoder(until now). But over the years security researchers found several pitfalls for statically detecing the encoder(related work FireEye article). The main motive for this project was to create a better encoder that encodes the given binary to the point it is identical with totally random data and not possible to detect the presence of a decoder. With the help of keystone assembler library following improvments are implemented. 64 bit support. Finally properly encoded x64 shellcodes ! New smaller decoder stub. LFSR key reduced to 1 byte Encoded stub with pseudo random schema. Decoder stub is also encoded with a psudo random schema No visible loop condition Stub decodes itself WITHOUT using any loop conditions !! Decoder stub obfuscation. Random garbage instruction generator added with keystone Safe register option. Non of the registers are clobbered (optional preable, may reduce polimorphism) [HIDE][Hidden Content]]
  9. BetterBackdoor A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.13 When running command prompt commands, the working directory is now consistent. [HIDE][Hidden Content]]
  10. BetterBackdoor A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’. Appends a text file containing the server’s IPv4 address to ‘run.jar’. If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment. To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.12.0 Added a feature where if multiple clients attempt to connect to the attacking computer, the user is prompted to select which client to connect to [HIDE][Hidden Content]]
  11. Malware indetectable, with AV bypass techniques, anti-disassembly, etc. GhostShell In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning more. I'm not responsible for your actions. Bypass Techniques Anti-Debugger To try bypass the Debuggers, I'm using the "IsDebuggerPresent()" of "Windows.h" librarie to checks if a debugger is running. Anti-VM / Anti-Sandbox / Anti-AV Enumerate Process Function Enumerates all process running on the system, and compares to the process in the black-list, if found a process and this is equal to any process in the black-list returns -1 (identified). Sleep Acceleration Check Function First, gets the current time, and sleeps 2 minutes, then, gets the time again, and compare, if the difference is less than 2, returns -1 (identified). Mac Address Check Function Gets the system mac address and compare to the macs, in the black-list, if the system mac address is equal to any mac in the black-list returns -1 (identified). [HIDE][Hidden Content]]
  12. TikTok Video Downloader lets you download Image or/Video post from TikTok by just a Video URL. Our tool automatically Generates download link of the video. Demo: [Hidden Content] [HIDE][Hidden Content]]
  13. apk Anubis gluer with any white application I merge the Anubis gluer, which was sold at Expo for $ 3k. As they wrote in the topic of the salesman: "Anubis gluer with any white application is offered. The price is 3K. Full FOOD on the virus. You no longer need to crypt files !!! And feed the crypt services. I do not know how much this is so, I tried to glue Anubis with the application that was already there. All nishtyak, it works. I did not try to glue with others since I do not need it. lo siento por el tipo de enlace [HIDE][Hidden Content]]
  14. Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING DISCLAIMER TO BE USED FOR EDUCATIONAL PURPOSES ONLY The use of the HiddenEye & its resources/phishing-pages is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program. Also we inform you that some of your your actions may be ILLEGAL and you CAN NOT use this software to test person or company without WRITTEN PERMISSION from them. AVAILABLE TUNNELLING OPTIONS** LOCALHOST LOCALXPOSE ([Hidden Content]) SERVEO ([Hidden Content]) NGROK ([Hidden Content]) LOCALTUNNEL (Package Version) ([Hidden Content]) OPENPORT ([Hidden Content]) PAGEKITE ([Hidden Content]) QUICK FIX [0.5.4] @An0nUD4Y An0nUD4Y released this 5 days ago This Release made to cover the issues Occured During/After the Github Mistakely Disable the Repo. QUICK CHANGES MADE Ngrok Fixed Few More Tunnels Got Fixed Installation Interface improved Few Phishing Pages Fixed Small issues Fixed Created A Backup Repo At GitLab (Check Readme) [HIDE][Hidden Content]]
  15. Seosight - SEO, Digital Marketing Agency WP Theme with Shop Seosight WordPress Theme is a fresh idea for the SEO Agency, Marketing Company, Digital Agency and e-Commerce. Exceptional and eye-catching design will be a strong point of a website. There is nothing similar to this SEO theme. Seosight becomes an interesting website for visitors because they have never seen anything similar. Make a website remarkable for visitors and get much more profit than you expect. SEOsight is created to require to all needs of SEO agencies, experts & freelancers, Online Marketing, Digital Marketing Agencies, Web Studios, Digital Agencies, Advertising Agencies, SMM experts, Lead Generation specialists, designers, Landing Pages, corporate website development, web development, etc. This SEO theme can lead any business to success! [Hidden Content] [HIDE][Hidden Content]]
  16. BetterBackdoor A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks. Features BetterBackdoor can create and control a backdoor. This created backdoor can: Run Command Prompt commands Run PowerShell scripts Run DuckyScripts to inject keystrokes Exfiltrate files based on the extension Exfiltrate Microsoft Edge and WiFi passwords Send and receive files to and from the victim’s computer Start a KeyLogger Get a screenshot of the victim’s computer Get text copied to victim’s clipboard Get contents from a victim’s file (cat) This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor. To create the backdoor, BetterBackdoor: Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’. Appends a text file containing the server’s IPv4 address to ‘run.jar’. If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment. To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC. If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar. This will start the backdoor on the victim’s PC. Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer. Changelog v1.11 -Added zip and unzip commands -Added directory transferring -When running ‘exfiles’ or ‘expass’ exfiltrated files/passwords are immediately sent to the attacking computer -Added the choice to select where keystrokes should be logged when the backdoor is not running from the C drive -Fixed an error with FTP some users were experiencing [HIDE][Hidden Content]]
  17. YT Tool Station is a bundled collection of best tools for YouTube videos.Such as Tags generator, y2mp3 Converter, live subscribers counter & more. Demo: [Hidden Content] [HIDE][Hidden Content]]
  18. How to decompile an apk file using apk tool [Hidden Content]
  19. NekoBot is an auto exploit tool to facilitate the penetration of one or many websites (Wordpress, Joomla, Drupal, Magento, Opencart,and Etc). Features : [+] Wordpress : 1- Cherry-Plugin 2- download-manager Plugin 3- wysija-newsletters 4- Slider Revolution [Revslider] 5- gravity-forms 6- userpro 7- wp-gdpr-compliance 8- wp-graphql 9- formcraft 10- Headway 11- Pagelines Plugin 12- WooCommerce-ProductAddons 13- CateGory-page-icons 14- addblockblocker 15- barclaycart 16- Wp 4.7 Core Exploit 17- eshop-magic 18- HD-WebPlayer 19- WP Job Manager 20- wp-miniaudioplayer 21- wp-support-plus 22- ungallery Plugin 23- WP User Frontend 24- Viral-options 25- Social Warfare 26- jekyll-exporter 27- cloudflare plugin 28- realia plugin 29- woocommerce-software 30- enfold-child Theme 31- contabileads plugin 32- prh-api plugin 33- dzs-videogallery plugin 34- mm-plugin 35- Wp-Install 36- Auto BruteForce [+] Joomla 1- Com_adsmanager 2- Com_alberghi 3- Com_CCkJseblod 4- Com_extplorer 5- Com_Fabric 6- Com_facileforms 7- Com_Hdflvplayer 8- Com_Jbcatalog 9- Com_JCE 10- Com_jdownloads 11- Com_Joomanager 12- Com_Macgallery 13- Com_media 14- Com_Myblog 15- Com_rokdownloads 16- Com_s5_media_player 17- Com_SexyContactform 18- Joomla core 3.x RCE 19- Joomla core 3.x RCE [2019] 20 - Joomla Core 3.x Admin Takeover 21 - Auto BruteForce 22 - Com_b2jcontact 23 - Com_bt_portfolio 24 - Com_civicrm 25 - Com_extplorer 26 - Com_facileforms 27 - Com_FoxContent 28 - Com_jwallpapers 29 - Com_oziogallery 30 - Com_redmystic 31 - Com_simplephotogallery 32 - megamenu module 33 - mod_simplefileuploadv1 [+] Drupal : 1- Drupal Add admin geddon1 2- Drupal RCE geddon2 3- Drupal 8 RCE RESTful 4- Drupal mailchimp 5- Drupal php-curl-class 6- BruteForce 7- Drupal SQL Add Admin 8- Drupal 7 RCE 9- bartik 10- Avatarafd Config 11- Drupal 8 12- Drupal Default UserPass [+] Magento : 1- Shoplift 2- Magento Default user pass [+] Oscommerce 1- OsCommerce Core 2.3 RCE Exploit opencart [+] OTHER : 1- Env Exploit 2- SMTP CRACKER 3- CV [HIDE][Hidden Content]]
  20. dEEpEst

    VPS Websites With Trials

    [Hidden Content]
  21. thegreatsamarr

    Im back with a bang!!

    So im active now here i have spended my time in learning and researching alot with the Various technical fileds like Security, Cloud, Virtualisation, Development, DevOps, AR and etc. It took me more then a year to gain and to build something new. So lets start with the Security field. So from past few months i was working for the android development adn was to deal with android rat stuffs, also ive been working alot to make android RATS fully undetectable and i got success in that. So lets start the fresh journey here in this forum hope that will get support from you all will also be posting various technical reseach based methods based on my personal research and learning.
  22. Are you selling some products on Instagram or do you have a big fan page? Don’t you have time to respond quickly to your customers or don’t want to waste time with junk messages? That’s not problem. Take advantage of Google’s unique Artificial Intelligence algorithm and our flawless plug-in to respond to your customers 24/7 automatically from your Wordpress sites very easily. Share information about your products and do more. Add welcome messages and define the words you want. It all depends on your imagination! Demo: [Hidden Content] [HIDE][Hidden Content]]
  23. Logs: Keylogger Cookies Location Remote IP User-Agents [HIDE][Hidden Content]]
  24. WRITING A CHECKER IN C# (BASICS) - FULL PDF WITH VISUAL EXPLANATIONS With this tutorial you can easily start writing your own checker in C# Features: Easy as fuck Noob friendly Visual examples Cons: Capturing data & Parsing tokens are not included (This is only basics) [Hidden Content]