Search the Community

Showing results for tags 'your'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 22 results

  1. PasteBin Dumbs Also Check : Check if your account or other personal was "dumped" [Hidden Content]
  3. assender

    Adding 3rd party SDK to your apps?

    I know, a lot has been said now about adding some 3rd party SDK to your app, as Google started banning a lot of apps or developers recently. But tbh, most of the cases i have seen, were developers fault. As i have read, if your app has been removed due to having 3rd party SDK, its basically, coz you havent mentioned it properly in TOS. You had to change your TOS with providing info of what you have added, and what you are collecting, and then you could have reuploaded the app without the fear of getting banned. Most of developers havent done that, and just reuploaded apps back, without clearing up anything, which resulted in ban from store. TL;DR, do you think its still profitable doing that, if you make all the TOS clear, and do everything "by the book"?
  4. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Update Log: - Added more hosting services and url shorteners Download: [hide][Hidden Content]] Virus Scan: [hide][Hidden Content]]
  5. Hacxx Anonymous Torrent Search is a simple search engine that searches in popular torrent sites for your favorite torrents. The reason why Hacxx Anonymous Torrent Search was created was to bypass domain blocking from anti piracy filters and still give you access to the magnet file. Hacxx Anonymous Torrent Search doesn't break any law, the only thing that it does is give you access to the content. The search engine asks for a title and perform a search. After retrieving the results it will encapsulate the link with a proxy. The results page is very similar to HTSE but the link is proxied. Also due to the nature of BitTorrent, Hacxx Anonymous Torrent Search will not proxify the download or upload. (For this use a VPN like ZenMate - [Hidden Content]) Download: [Hidden Content] Virus Scan: [Hidden Content]
  6. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Download [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  7. Domain Broker is a simple interface to register domain names. Download: [hide][Hidden Content]] Virus Scan: [hide][Hidden Content]]
  8. Domain Broker is a simple interface to register domain names. (Currently it's use is a bit limited, only offering support to register .WS sites) Download: [hide][Hidden Content]] Virus Scan: [hide][Hidden Content]]
  9. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Download [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  10. [HIDE][Hidden Content]]
  11. In the archive below you will find a xml file that can be imported to a WordPress Instalation or hosted at WordPress. This file contains more than 1300 movie posts. If you want to create a movie blog and don't have the time to start from scratch than this archive is for you. Host your own movie blog as easy as 1,2,3. Download [Hidden Content] Visit and register your WordPress blog [Hidden Content]
  12. sQuoII

    BYOB (Build Your Own Botnet)

    Disclaimer: This project should be used for authorized testing or educational purposes only. [HIDE][Hidden Content]] BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT (Remote Administration Tool) or a C2 (Command & Control server) from scratch. The RAT's key feature is that arbitrary code/files can be remotely loaded into memory from the C2 and executed on the target machine without writing anything to the disk. Supports Python 2 & 3. Client Generate fully-undetectable clients with staged payloads, remote imports, and unlimited post-exploitation modules Remote Imports: remotely import third-party packages from the server without writing them to the disk or downloading/installing them Nothing Written To The Disk: clients never write anything to the disk - not even temporary files (zero IO system calls are made) because remote imports allow arbitrary code to be dynamically loaded into memory and directly imported into the currently running process Zero Dependencies (Not Even Python Itself): client runs with just the python standard library, remotely imports any non-standard packages/modules from the server, and can be compiled with a standalone python interpreter into a portable binary executable formatted for any platform/architecture, allowing it to run on anything, even when Python itself is missing on the target host Add New Features With Just 1 Click: any python script, module, or package you copy to the ./byob/modules/ directory automatically becomes remotely importable & directly usable by every client while your command & control server is running Write Your Own Modules: a basic module template is provided in ./byob/modules/ directory to make writing your own modules a straight-forward, hassle-free process Run Unlimited Modules Without Bloating File Size: use remote imports to add unlimited features without adding a single byte to the client's file size Fully Updatable: each client will periodically check the server for new content available for remote import, and will dynamically update its in-memory resources if anything has been added/removed Platform Independent: everything is written in Python (a platform-agnostic language) and the clients generated can optionally be compiled into a portable executable (Windows) or bundled into a standalone application (macOS) Bypass Firewalls: clients connect to the command & control server via reverse TCP connections, which will bypass most firewalls because the default filter configurations primarily block incoming connections Counter-Measure Against Antivirus: avoids being analyzed by antivirus by blocking processes with names of known antivirus products from spawning Encrypt Payloads To Prevent Analysis: the main client payload is encrypted with a random 256-bit key which exists solely in the payload stager which is generated along with it Prevent Reverse-Engineering: by default, clients will abort execution if a virtual machine or sandbox is detected Modules Post-exploitation modules that are remotely importable by clients Keylogger (byob.modules.keylogger): logs the user’s keystrokes & the window name entered Screenshot (byob.modules.screenshot): take a screenshot of current user’s desktop Webcam ( view a live stream or capture image/video from the webcam Ransom (byob.modules.ransom): encrypt files & generate random BTC wallet for ransom payment Outlook (byob.modules.outlook): read/search/upload emails from the local Outlook client Packet Sniffer (byob.modules.packetsniffer): run a packet sniffer on the host network & upload .pcap file Persistence (byob.modules.persistence): establish persistence on the host machine using 5 different methods Phone ( read/search/upload text messages from the client smartphone Escalate Privileges (byob.modules.escalate): attempt UAC bypass to gain unauthorized administrator privileges Port Scanner (byob.modules.portscanner): scan the local network for other online devices & open ports Process Control (byob.modules.process): list/search/kill/monitor currently running processes on the host iCloud (byob.modules.icloud): check for logged in iCloud account on macOS Spreader (byob.modules.spreader): spread client to other hosts via emails disguised as a plugin update Miner (byob.modules.miner): run a cryptocurrency miner in the background (supports Bitcoin & Litecoin)
  13. Private Paid Bitly Shortener V1 is a script to install on a web hosting site that you own. It will create short bitly links that points to a redirection setup on your website and located at page.php How to install? > 1) Open index.php with notepad. 2) Edit the line (Change the url [Hidden Content] to your domain/webhosting. 3) Open page.php with notepad. 4) Edit the line echo (Change the html code to your html code to display your ads on each redirection. Note: Currently the page.php is showing a adult advertising. 5) Copy your modified version of index.php and page.php to your site. 6) Make a test to check if everthing is working properly. 7) That's all. Launch index.html and create your short bitly links. Web Hosting Don't have a Web Hosting service? Register for free at [Hidden Content] Download: [Hidden Content] Virus Scan [Hidden Content]
  14. When it comes to blogging the most used software online is WordPress. WordPress can be used to create almost any type of blogs hosted locally or remotely. To use WordPress locally a user just need a server with support for PHP and MySQL aside from the WordPress files. To use WordPress remotely a user just need to register on a WordPress service provider such as Automattic, Inc and configure the user account. If you are looking for a WordPress service provider with 99% uptime, good protection, great support, lots of plugins and themes, etc then WordPress from Automattic is the site you should try out. Visit and register your WordPress blog [Hidden Content]
  15. In the archive below you will find a xml file that can be imported to a WordPress Instalation or hosted at WordPress. This file contains more than 500 music posts. If you want to create a music blog and don't have the time to start from scratch than this archive is for you. Host your own music blog as easy as 1,2,3. Download [Hidden Content] Visit and register your WordPress blog [Hidden Content]
  16. Register and Download [Hidden Content]
  17. Double Your Bitcoin Script Automatic 2018 suffers from a remote SQL injection vulnerability that allows for authentication bypass. View the full article
  18. Register and Download [Hidden Content]
  19. Step 1 - Setup your installation folder To make this easy create a folder c:\Install. This is where we will copy all the required files. Step 2 - 7Zip your installers Go to the folder that has your .msi and your setup.exe Select both the .msi and the setup.exe Right-Click and choose 7Zip --> "Add to Archive" Name your archive "Installer.7z" (or a name of your choice) Click Ok You should now have "Installer.7z". Copy this .7z file to your c:\Install directory Step 3 - Get the 7z-Extra sfx extension module Available in the link below Follow this link to download 7Zip + other necessary files [Hidden Content] Install 7zip and copy the other files to c:\Install Create a 7zip file with the name installer.7zip with your files and copy to c:\Install Copy the file "7zS.sfx" to c:\Install Copy config.txt to c:\Install or create your own Step 4 - Setup your config.txt Use Notepad for this but save the file in UTF-8 encoding. File > Save as > Encoding : UTF-8 Using windows explorer go to c:\Install right-click and choose "New Text File" and name it config.txt right-click and choose "Edit with notepad". Enter something like this: ;!@Install@!UTF-8! Title="SOFTWARE v1.0.0.0" BeginPrompt="Do you want to install SOFTWARE v1.0.0.0?" RunProgram="setup.exe" ;!@InstallEnd@! Edit this replacing [SOFTWARE v1.0.0.0] with your product name. Notes on the parameters and options for the setup file are here After adding the lines save as config.txt in encoded in UTF-8 CheckPoint You should now have a folder "c:\Install" with the following 3 files: Installer.7z 7zS.sfx config.txt Step 5 - Create the archive These instructions I found on the web but nowhere did it explain any of the 4 steps above. Open a cmd window, Window + R --> cmd --> press enter In the command window type the following cd \ cd Install copy /b 7zS.sfx + config.txt + Installer.7z MyInstaller.exe Look in c:\Install and you will now see you have a MyInstaller.exe You are finished Run the installer Double click on MyInstaller.exe and it will prompt with your message. Click OK and the setup.exe will run.
  20. If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before. The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids. The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment. The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.