Search the Community

Showing results for tags 'your'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 82 results

  1. Hash Expand will sort your bases! - Multifunctional - Simple interface - Fast processing speed [hide][Hidden Content]]
  2. PwnFox PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit. If you are a chrome user you can check [Hidden Content]. Single click BurpProxy Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked. Containers Profiles PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp. PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++. Security header remover Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload. Headers stripped: Content-Security-Policy X-XSS-Protection X-Frame-Options X-Content-Type-Options [hide][Hidden Content]]
  3. jackdaw Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other a how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a password-cracking project by storing/looking up/reporting hashes/passwords/users. Features Data acquisition via LDAP LDAP enumeration phase acquires data on AD info, User, Machine, OU, Group objects which will be represented as a node in the graph, and as a separate table in the DB. Additionally, all aforementioned objects’ Security Description will be parsed and the ACLs for the DACL added to the DB. This, together with the membership information will be represented as edges in the graph. Additionally, custom SQL queries can be performed on any of the aforementioned data types when needed. via SMB SMB enumeration phase acquires data on shares, localgroups, sessions, NTLM data via connecting to each machine in the domain (which is acquired via LDAP) via LSASS dumps (optional) The framework allows users to upload LSASS memory dumps to store credentials and extend the session information table. Both will be used as additional edges in the graph (shared password and session respectively). The framework also uses this information to create a password report on weak/shared/cracked credentials. via DCSYNC results (optional) The framework allows users to upload impacket’s DCSYNC files to store credentials. This is used as additional edges in the graph (shared password). The framework also uses this information to create a password report on weak/shared/cracked credentials. via manual upload (optional) The framework allows manually extending the available DB in every aspect. Example: when user-session information on a given computer is discovered (outside of the automatic enumeration) there is a possibility to manually upload these sessions, which will populate the DB and also the resulting graph Graph The framework can generate a graph using the available information in the database and plot it via the web UI (nest). Furthermore, the graph generation and path calculations can be invoked programmatically, either by using the web API (/ui endpoint) or the graph object’s functions. Anomalies detection The framework can identify common AD misconfigurations without graph generation. Currently only via the web API. User User anomalies detection involves the detection of insecure UAC permissions and extensive user description values. This feature set is expected to grow in the future as new features will be implemented. Machine Machine anomalies detection involves detection of insecure UAC permissions, non-mandatory SMB singing, outdated OS version, out-of-domain machines. This feature set is expected to grow in the future as new features will be implemented. Password cracking The framework is not performing any cracking, only organizing the hashes and the cracking results currently main focus is on impacket and aiosmb’s dcsync results !NT and LM hashes only! Sample process is the following: Harvesting credentials as a text file via impacket/aiosmb or as memory dumps of the LSASS process via whatever tool you see fit. Upload the harvested credentials via the API Poll uncracked hashes via the API Crack them (hashcat?) Upload the results to the framework via the API Generate a report on the cracked/uncracked users and password strength and password sharing note from the author: This feature was implemented for both attackers and defenders. Personally I don’t see much-added value on either side since at the point one obtained the NT hash of a user it’s just as good as the password… Nonetheless, more and more companies are performing password strength exercises, and this feature would help them. As for attackers: it is just showing off at this point, but be my guest. Maybe scare management for extra points. Changelog v0.2.24 new release, lot of fixes, even more features [hide][Hidden Content]]
  4. uCloud enables freelancers, small businesses (such as media agencies) and webmasters to easily share their files online. It’s been built to be extremely robust, secure and very fast! [Hidden Content] [hide][Hidden Content]]
  5. How to Shut Down Your Computer Through C Program To shutdown your computer using C program, You'll need to call the system() function which will call the cmd. stdlib.h contain the system() function and it is used to run any executable file. C Program Code - [Hidden Content] Note - Save the file with .c extension. /s represents shutdown /t represents Time means after how much time you wanna shut down your pc. If you will not define the time, By default it will shut down your pc after 30sec.
  6. English | 2020 | ISBN: B08FDXVR2P | 107 Pages | PDF/AZW3 | 7.14 MB Do you want to learn a popular programming language in no time? Do you want to improve your skills in coding? Or do you want to learn coding to earn? If your answer to this question is yes, then keep reading! Java is a widely-used programming language on the Web and in computing applications. It is a free download solution that allows users to access the latest versions and implement updates. This particular programming language is present in the majority of today’s web applications and computing technologies. Java’s scalable characteristics make it suitable for deployment in a wide range of applications, including apps for small electronic devices like cell phones and software solutions for large scale operations such as data centers. The growing preference for deploying Java is attributable to its robust functional features and sound security credentials. [hide][Hidden Content]]
  7. [Hidden Content]
  8. CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible using concurrency and it's heavily inspired by @tomnomnom's Who, What, Where, When, Wordlist #NahamCon2020. [hide][Hidden Content]]
  9. [hide][Hidden Content]]
  10. Secure your confidential files and folders. Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can password protect any secret or embarrassing files. Hide your files and folders from prying eyes. Set your master password and lock your files. No one can access your files without your master password. Hide Files supports NTFS, exFAT, FAT32 and FAT16 file system types, local hard drives, external hard drives, SSD drives, SD/MMC memory cards and USB flash disks. The ability to hide and encrypt on bulk files and open them in a few seconds is the expertise of this software. Hide Files can lock and unlock your gigabytes of data within seconds. Hide Files supports drag and drop from Windows Explorer and supports lost password recovery. Hide Files stops locking process if any file or disk error occurs and helps you not to lose your important data. However it is always a good idea to backup your important files and folders first. Category: Security & Privacy - Encryption Tools Operating Systems: Windows Windows 10/8.1/8/7/Vista/XP [Hidden Content] [hide][Hidden Content]]
  11. Make your own Private Cloud with VueFileManager client powered by Laravel and Vue. [Hidden Content] [hide][Hidden Content]]
  12. Fast Coding Techniques that Every C# Developer Must Know _https://www.udemy.com/course/visual-studio-tips-tricks/ What Will I Learn? Over 60 keyboard shortcuts that speed up your coding Learn to write more code with less typing Learn to use your keyboard like a pro and rely less on the mouse Learn to navigate in your projects and find files, classes and members more quickly Learn to compile, run and debug applications faster Learn about great add-ons that make coding fun and easy Requirements Visual Studio 2010 or higher Basic knowledge of Visual Studio Description If you want to be a real pro C# coder, you need to master your keyboard and Visual Studio. You need to be able to navigate in your code base, find and modify code in seconds. Great coders hardly ever use the mouse. They do everything with the keyboard. They use shortcuts and some tricks to type less and generate more code in less time. And that is what this course is all about. In this course, Mosh, author of six 5-star C# courses, shares with you lots of shortcuts and tricks that help you find, write and modify code in less time. In particular, you'll learn How to quickly find files, classes and methods. Say goodbye to Solution Explorer and navigating between folders to find classes. How to navigate in the code like a pro: no more clicking back and forth to navigate between members of classes. Jump from one method to another and come back to where you were. How to compile, run and debug applications faster and more effectively. 60+ shortcuts that will boost your productivity (both on Windows and Mac) How to reduce your chance of getting RSI (repetitive strain injury) [HIDE][Hidden Content]]
  13. About TorghostNG TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was tested on: Kali Linux Manjaro ... What's new in TorghostNG 1.2 Fixed update_commands and others in torghostng.py Changed a few things in theme.py Changed a few things in install.py Now you can change Tor circuit with -r [HIDE][Hidden Content]]
  14. PayPro is a digital download payment gateway. Start a business simply by creating your own download payment gateway and offer Stripe, Paypal, Bitcoin, Litecoin and Dogecoin as an option. Receive a percentage of each product sold using your very own PayPro gateway by charging a gateway fee in the admin panel. Demo: [Hidden Content] [HIDE][Hidden Content]]
  15. It's not just about spreading, It's about targeting. This is an example of how to target high-end CPU GPU users while spreading the RAT. Our tool will generate a fake game cheat for COD and it will bypass AV to download and run our payload in the background. Not just that, also the user will give our payload a high privilege (UAC) with pleasure voluntarily. It's perfect for YouTube and gaming forums spreading! It was just a quick project. You can do more evasion and persistence techniques but I wanted to make it as simple as I can. [Hidden Content]
  16. dEEpEst

    Test your #XSS skill here

    [Hidden Content]
  17. Best way to Increase Your PC Speed (No Softwares ) Best way to increase your pc speed without Any Softwares . Working method ! [Hidden Content]
  18. How To Write Your Own C# Checkers And Find Login Apis [Hidden Content]
  19. [Hidden Content]
  20. Facts About Hacking That Will Blow Your Mind 1. There Is A Hacker Attack Every 39 Seconds. 2. Cybercrime Is More Profitable Than The Global Illegal Drug Trade. 3. Hackers Steal 75 Records Every Second. 4. 66% Of Businesses Attacked By Hackers Weren’t Confident They Could Recover. 5. Hackers Create 300,000 New Pieces Of Malware Daily. 6. The Cybersecurity Budget In The US Is $14.98 Billion In 2019. 7. White Hat Hackers Earned Over $19 Million In Bounties In 2018. 8. Russian Hackers Can Infiltrate A Computer Network In 18 Minutes. 9. You Can Purchase A Consumer Account For $1 On The Dark Market. 10. 92% Of ATMs Are Vulnerable To Hacker Attacks.
  21. DarksProtector is an app that allows you to protect all of your .NET apps for free and with the best obfuscation! I will push updates sometimes, so stay tuned! KoiVM/DarksVM finally fixed and improved! Protections · Add Junk · Anti De4Dot · Anti Debug · Anti Dump · Anti ILDasm · Anti Tamper · Calli Protection · Constant Disintegration · Constants · Control Flow · Fake Native · Hide Methods · Invalid Metadata · Locals to Fields + v2 · MD5 Checksum · Mid Reference Proxy · Mutate Constants · Mutations · Module Flood · Reference Proxy · Renamer · Resources + v2 · Stack Underflow · Virtualization (finally updated, sources here) · Type Scrambler Others features · Custom Renamer · Premade Presets · Project Manager (to save your preset) [HIDE][Hidden Content]]