Search the Community

Showing results for tags 'written'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 19 results

  1. KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc Generator Features Encrypt Source Code Using AES 256 Bit Encryption Encrypt Source Code Using Base64 Encryption Packing Evil Exe Using UPX Packer Interactive Mode [Generator Ask Required Parameter] Debug Mode [Can Be Used In Debugging Payload] Persistence Payload 3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie) Built-in File Binder Useful Icons Inside icon Folder Virtual Machine Bypass Methods Includes Registry Check Processes and Files Check MAC Adderess Check Disclaimer This project was created only for good purposes and personal use. THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
  2. Usage Mandark.Load( (string) host, (byte[]) payload, (string) arguments ); Requirements Make sure you compile to 64-bit [hide][Hidden Content]]
  3. Ransomeware written in Python3 How to use install the libraries: subprocess, cryptography, re, json, requests, pathlib install pyinstaller (pip install pyinstaller) run the builder THIS IS ONLY FOR EDUCATIONAL PURPOSES! I DO NOT TAKE RESPONSABILITY FOR THE USE OF THIS TOOL! [hide][Hidden Content]]
  4. GoSpider – Fast web spider wrote in Go Features Fast web crawling Brute force and parse sitemap.xml Parse robots.txt Generate and verify link from JavaScript files Link Finder Find AWS-S3 from response source Find subdomains from response source Get URLs from Wayback Machine, Common Crawl, Virus Total, Alien Vault Format output easy to Grep Support Burp input Crawl multiple sites in parallel Random mobile/web User-Agent Changelog v1.1.3 c59ef01 Upgrade v1.1.3 7b01017 Merge pull request #27 from rayhan0x01/patch-1 20f8238 removing lower case conversion of paths and parameters 656e12f Fix typo in -q options 9d7a0df Update release [hide][Hidden Content]]
  5. What the heck is a ferox anyway? Ferox is short for Ferric Oxide. Ferric Oxide, simply put, is rust. The name rustbuster was taken, so I decided on a variation. What’s it do tho? feroxbuster is a tool designed to perform Forced Browsing. Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the web application but are still accessible by an attacker. feroxbuster uses brute force combined with a wordlist to search for unlinked content in target directories. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network address, etc… This attack is also known as Predictable Resource Location, File Enumeration, Directory Enumeration, and Resource Enumeration. Comparison w/ Similar Tools There are quite a few similar tools for forced browsing/content discovery. Burp Suite Pro, Dirb, Dirbuster, etc… However, in my opinion, there are two that set the standard: gobuster and ffuf. Both are mature, feature-rich, and all-around incredible tools to use. So, why would you ever want to use feroxbuster over ffuf/gobuster? In most cases, you probably won’t. ffuf in particular can do the vast majority of things that feroxbuster can, while still offering boatloads more functionality. Here are a few of the use-cases in which feroxbuster may be a better fit: You want a simple tool usage experience You want to be able to run your content discovery as part of some crazy 12 command unix pipeline extravaganza You want to scan through a SOCKS proxy You want auto-filtering of Wildcard responses by default You want recursion along with some other thing mentioned above (ffuf also does recursion) You want a configuration file option for overriding built-in default values for your scans [hide][Hidden Content]]
  6. Stealer + Clipper + Keylogger Stealer written on C#, logs will be sent to Telegram bot. Disclaimer I, the creator, am not responsible for any actions, and or damages, caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use. By using this software, you automatically agree to the above. Functions AntiAnalysis (VirtualBox, SandBox, Emulator, Debugger, VirusTotal, Any.Run) Steal system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Install keylogger & clipper Steam, Uplay, Minecraft session Desktop & Webcam screenshot ProtonVPN, OpenVPN, NordVPN Cryptocurrency Wallets Telegram sessions Pidgin accounts Discord tokens Filezilla hosts Process list Directories structure Product key Autorun module [hide][Hidden Content]] Scan
  7. Features Inject multiple payloads into all parameters Inject single payloads into all parameters Saves responses into output folder Displays Status Code & Response Length Can grep for patterns in the response Really fast Easy to setup [hide][Hidden Content]]
  8. Features Connection is encrypted using random RSA + AES key Multiple clients support Execute shell commands Download/Upload files Take screenshot Cross platform [hide][Hidden Content]]
  9. Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Interactive operation: 1.cross-references for strings, classes, methods and fields; 2.searching for strings, classes methods and fields; 3.comments for java code; 4.rename for methods,fields and classes; 5.save the analysis results in gda db file. … Utilities for Assisted Analysis: 1.extracting DEX from ODEX; 2.extracting DEX from OAT; 3.XML Decoder; 4.algorithm tool; 5.device memory dump; … New features: 1.Brand new dalvik decompiler in c++ with friendly GUI; 2.Support python script 3.packers Recognition; 4.Multi-DEX supporting; 5.making and loading signature of the method 6.Malicious Behavior Scanning by API chains; 7.taint analysis to preview the behavior of variables; 8.taint analysis to trace the path of variables; 9.de-obfuscate; 10.API view with x-ref; 11.Association of permissions with modules; Changelog v3.79 Fixed some problems. Decompile support for .jar files, class .files and .aar files. A rule-based static vulnerability scanner is added. Add the APK file forensics analysis tool. Fixed a bug in variable renaming. Dump tool adds custom dump. Further, optimize intelligent renaming. [hide][Hidden Content]]
  10. cf-check Check a Host is Owned by Cloudflare. [hide][Hidden Content]]
  11. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… New features: 1.Brand new dalvik decompiler in c++ with friendly GUI; 2.Support python script 3.packers Recognition; 4.Multi-DEX supporting; 5.making and loading signature of the method 6.Malicious Behavior Scanning by API chains; 7.taint analysis to preview the behavior of variables; 8.taint analysis to trace the path of variables; 9.de-obfuscate; 10.API view with x-ref; 11.Association of permissions with modules; Changelog v3.78 A lot of bugs fixed, GDAE Professional Edition was released. Provide the option of method Merge mode and separation mode. Fix the problem that the memory module cannot be dump in 64-bit system. Implement the vulnerability detection based on rule expression. Fix the aspect ratio of the window . Change and optimize color management to support various topics. Optimize the GUI, adjust the internal layout of some windows, and repair some GUI problems, making the operation more comfortable. Add the search function (Ctrl + F) to the dump device. Merge the multi Dex in the tree box. The default combination mode on the class display can be switched to separate mode by right-clicking. Add line number, module tag, and jump tag (under SmalI). Right-click to switch. Strengthen the structured algorithm to make the code more readable. De-duplicate the results of malscan. Adapt to the widescreen. Add basic information to view. [Hidden Content]
  12. GoSpider GoSpider – Fast web spider wrote in Go Features Fast web crawling Brute force and parse sitemap.xml Parse robots.txt Generate and verify link from JavaScript files Link Finder Find AWS-S3 from response source Find subdomains from response source Get URLs from Wayback Machine, Common Crawl, Virus Total, Alien Vault Format output easy to Grep Support Burp input Crawl multiple sites in parallel Random mobile/web User-Agent [Hidden Content]
  13. There are also various search engines supported by go-dork, including Google, Shodan, Bing, Duck, Yahoo and Ask. Changelog 52e2813 Update release workflow fffa745 Update build workflow 0b26760 Update build workflow c14f123 Update build workflow b80b8f6 Update build workflow 6e5d274 Update build workflow e28742c Update README cf11855 Add README 9ffd82b Add workflows & funding methods 8be4bce Add Go releaser 24be85b Add main function e60b9ad Initial commit [hide][Hidden Content]]
  14. Basic cryptor written in C# Method RC4 XOR StringToByteArray [HIDE][Hidden Content]]
  15. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Here, a new decompiler based on Dalvik bytecode, GDA(this project started in 2013 and released its first version 1.0 in 2015 at www.gda.com: 9090) , is proposed and implemented in C++ language to provide more sophisticated, fast and convenient decompilation support. GDA is completely self-independent. It supports APK, DEX, ODEX, oat files, and run without installation and Java VM support. GDA only takes up 2M of your disk space, and you can use it in any newly installed windows system and virtual machine system. In addition, GDA has more features as follows: Changelog v3.73 fix some crash and bug. change the main page. move Permissions to “DexFile->AccessPermission(click to view permissions)” [HIDE][Hidden Content]]
  16. A modern multiple reverse shell sessions/clients manager via terminal written in go Features Multiple service listening port Multiple client connections RESTful API Reverse shell as a service (Pop a reverse shell without remembering idle commands) Download/Upload file with progress bar Full interactive shell Using vim gracefully in reverse shell Using CTRL+C and CTRL+Z in reverse shell [HIDE][Hidden Content]]
  17. A simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed up his job (CPU intensive). Supported permutations: Capital Upper 1337 Append Prepend Additional functions: Test/Dry run Multiprocessing Multicore Possibility to adjust cores/processes number manually. Each generated password doesnt contain same word twice. [HIDE][Hidden Content]]
  18. A simple mailer to test the php mail function on a webserver or to simply send emails. Download: [hide][Hidden Content]]
  19. This is a simple CMS (Content Management System) written in PHP. Requirements: Xampp or any PHP enabled server Files: > add.html - Manage the database . Add - Add text to the database . View DB - View the text written to the database . Delete DB - Erases the database add.php - Add the text to the DB . Do not invoke directly, use add.html db.txt - Where the files are stored del.php - Delete the DB . Can be called directly but use add.html index.php - Show the text in the DB . This is the homepage - Text or HTML will show in here Online Demo [Hidden Content] You can navigate in the online demo. > add.html - Add/View/Delete text > index.php - View the text Download [hide][Hidden Content]] Virustotal [hide][Hidden Content]]