Search the Community

Showing results for tags 'your'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 89 results

  1. Descripción de la revista: Save money by building your own PC! Whether you have never seen the inside of a computer or you have some basic knowledge, this guide is the perfect way to increase your understanding and bolster your confidence in PC building. Helpfully broken up into three sections: Planning, Building and Software, this book is all you need to build a brilliant first PC. [Hidden Content] [hide][Hidden Content]]
  2. Complete guide to starting a YouTube channel, getting more views & subscribers, and building a brand with videos! What you’ll learn Create your own successful YouTube channel Grow your brand with a YouTube channel Get more YouTube views Get more YouTube subscribers Make high-quality videos on a budget Post and optimize videos with great titles, descriptions, and tags Create clickable thumbnails that get more views Make money with a YouTube channel Requirements You should have some idea for what type of YouTube channel you want to start You should create a Google account so you can sign up for a YouTube account (we’ll show you how in the course) Description You’re here because you want to create a popular YouTube Channel, right? Maybe you’re brand new to YouTube, or maybe you have some experience but need help growing your existing channel. YouTube is the perfect place to grow your own brand, drive traffic to your website, and earn money from YouTube ads and your product and service promotions. And this is the perfect course for you to jumpstart your YouTube Channel. What will you be able to do after taking this course? Start a channel from scratch Get views without subscribers Turn viewers into subscribers Create videos on a budget Navigate the YouTube platform Become a YouTube Partner Post and optimize your video with great titles, descriptions, tags, and thumbnails Grow your brand through YouTube videos Improve your channel by using analytics Make money with your YouTube videos – with ads, products and services, sponsors, and crowdfunding Use best practices for creating and growing a YouTube channel Improve Your YouTube Channel, Get More Views & Subscribers, and Make More Money [Hidden Content] Torrent File - Size: 7.03 GB [hide][Hidden Content]]
  3. WP-Hide Explained The convenient way to hide your WordPress from being visible through the code. A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code. Provide a clean method for removing any WordPress fingerprints including themes and plugins. No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved. [Hidden Content] [hide][Hidden Content]]
  4. Let your customers buy gift cards/certificates for your services & products directly on your WordPress website. [Hidden Content] [hide][Hidden Content]]
  5. A web application that makes it easy to run your pentest and bug bounty projects. Description The app provides a convenient web interface for working with various types of files that are used during the pentest, automate port scan and subdomain search. [hide][Hidden Content]]
  6. An engine to make Tor network your default gateway Summary The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other illicit purposes. Tor has been largely used by intelligence agencies, hacking groups, criminal activities and even ordinary users who care about their privacy in the digital world. Nipe is an engine, developed in Perl, that aims on making the Tor network your default network gateway. Nipe can route the traffic from your machine to the Internet through Tor network, so you can surf the Internet having a more formidable stance on privacy and anonymity in cyberspace. Currently, only IPv4 is supported by Nipe, but we are working on a solution that adds IPv6 support. Also, only traffic other than DNS requests destined for local and/or loopback addresses is not trafficked through Tor. All non-local UDP/ICMP traffic is also blocked by the Tor project. [hide][Hidden Content]]
  7. Hash Expand will sort your bases! - Multifunctional - Simple interface - Fast processing speed [hide][Hidden Content]]
  8. PwnFox PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit. If you are a chrome user you can check [Hidden Content]. Single click BurpProxy Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked. Containers Profiles PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp. PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++. Security header remover Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload. Headers stripped: Content-Security-Policy X-XSS-Protection X-Frame-Options X-Content-Type-Options [hide][Hidden Content]]
  9. jackdaw Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other a how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a password-cracking project by storing/looking up/reporting hashes/passwords/users. Features Data acquisition via LDAP LDAP enumeration phase acquires data on AD info, User, Machine, OU, Group objects which will be represented as a node in the graph, and as a separate table in the DB. Additionally, all aforementioned objects’ Security Description will be parsed and the ACLs for the DACL added to the DB. This, together with the membership information will be represented as edges in the graph. Additionally, custom SQL queries can be performed on any of the aforementioned data types when needed. via SMB SMB enumeration phase acquires data on shares, localgroups, sessions, NTLM data via connecting to each machine in the domain (which is acquired via LDAP) via LSASS dumps (optional) The framework allows users to upload LSASS memory dumps to store credentials and extend the session information table. Both will be used as additional edges in the graph (shared password and session respectively). The framework also uses this information to create a password report on weak/shared/cracked credentials. via DCSYNC results (optional) The framework allows users to upload impacket’s DCSYNC files to store credentials. This is used as additional edges in the graph (shared password). The framework also uses this information to create a password report on weak/shared/cracked credentials. via manual upload (optional) The framework allows manually extending the available DB in every aspect. Example: when user-session information on a given computer is discovered (outside of the automatic enumeration) there is a possibility to manually upload these sessions, which will populate the DB and also the resulting graph Graph The framework can generate a graph using the available information in the database and plot it via the web UI (nest). Furthermore, the graph generation and path calculations can be invoked programmatically, either by using the web API (/ui endpoint) or the graph object’s functions. Anomalies detection The framework can identify common AD misconfigurations without graph generation. Currently only via the web API. User User anomalies detection involves the detection of insecure UAC permissions and extensive user description values. This feature set is expected to grow in the future as new features will be implemented. Machine Machine anomalies detection involves detection of insecure UAC permissions, non-mandatory SMB singing, outdated OS version, out-of-domain machines. This feature set is expected to grow in the future as new features will be implemented. Password cracking The framework is not performing any cracking, only organizing the hashes and the cracking results currently main focus is on impacket and aiosmb’s dcsync results !NT and LM hashes only! Sample process is the following: Harvesting credentials as a text file via impacket/aiosmb or as memory dumps of the LSASS process via whatever tool you see fit. Upload the harvested credentials via the API Poll uncracked hashes via the API Crack them (hashcat?) Upload the results to the framework via the API Generate a report on the cracked/uncracked users and password strength and password sharing note from the author: This feature was implemented for both attackers and defenders. Personally I don’t see much-added value on either side since at the point one obtained the NT hash of a user it’s just as good as the password… Nonetheless, more and more companies are performing password strength exercises, and this feature would help them. As for attackers: it is just showing off at this point, but be my guest. Maybe scare management for extra points. Changelog v0.2.24 new release, lot of fixes, even more features [hide][Hidden Content]]
  10. uCloud enables freelancers, small businesses (such as media agencies) and webmasters to easily share their files online. It’s been built to be extremely robust, secure and very fast! [Hidden Content] [hide][Hidden Content]]
  11. How to Shut Down Your Computer Through C Program To shutdown your computer using C program, You'll need to call the system() function which will call the cmd. stdlib.h contain the system() function and it is used to run any executable file. C Program Code - [Hidden Content] Note - Save the file with .c extension. /s represents shutdown /t represents Time means after how much time you wanna shut down your pc. If you will not define the time, By default it will shut down your pc after 30sec.
  12. English | 2020 | ISBN: B08FDXVR2P | 107 Pages | PDF/AZW3 | 7.14 MB Do you want to learn a popular programming language in no time? Do you want to improve your skills in coding? Or do you want to learn coding to earn? If your answer to this question is yes, then keep reading! Java is a widely-used programming language on the Web and in computing applications. It is a free download solution that allows users to access the latest versions and implement updates. This particular programming language is present in the majority of today’s web applications and computing technologies. Java’s scalable characteristics make it suitable for deployment in a wide range of applications, including apps for small electronic devices like cell phones and software solutions for large scale operations such as data centers. The growing preference for deploying Java is attributable to its robust functional features and sound security credentials. [hide][Hidden Content]]
  13. CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible using concurrency and it's heavily inspired by @tomnomnom's Who, What, Where, When, Wordlist #NahamCon2020. [hide][Hidden Content]]
  14. [hide][Hidden Content]]
  15. Secure your confidential files and folders. Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can password protect any secret or embarrassing files. Hide your files and folders from prying eyes. Set your master password and lock your files. No one can access your files without your master password. Hide Files supports NTFS, exFAT, FAT32 and FAT16 file system types, local hard drives, external hard drives, SSD drives, SD/MMC memory cards and USB flash disks. The ability to hide and encrypt on bulk files and open them in a few seconds is the expertise of this software. Hide Files can lock and unlock your gigabytes of data within seconds. Hide Files supports drag and drop from Windows Explorer and supports lost password recovery. Hide Files stops locking process if any file or disk error occurs and helps you not to lose your important data. However it is always a good idea to backup your important files and folders first. Category: Security & Privacy - Encryption Tools Operating Systems: Windows Windows 10/8.1/8/7/Vista/XP [Hidden Content] [hide][Hidden Content]]
  16. Make your own Private Cloud with VueFileManager client powered by Laravel and Vue. [Hidden Content] [hide][Hidden Content]]
  17. Fast Coding Techniques that Every C# Developer Must Know _ What Will I Learn? Over 60 keyboard shortcuts that speed up your coding Learn to write more code with less typing Learn to use your keyboard like a pro and rely less on the mouse Learn to navigate in your projects and find files, classes and members more quickly Learn to compile, run and debug applications faster Learn about great add-ons that make coding fun and easy Requirements Visual Studio 2010 or higher Basic knowledge of Visual Studio Description If you want to be a real pro C# coder, you need to master your keyboard and Visual Studio. You need to be able to navigate in your code base, find and modify code in seconds. Great coders hardly ever use the mouse. They do everything with the keyboard. They use shortcuts and some tricks to type less and generate more code in less time. And that is what this course is all about. In this course, Mosh, author of six 5-star C# courses, shares with you lots of shortcuts and tricks that help you find, write and modify code in less time. In particular, you'll learn How to quickly find files, classes and methods. Say goodbye to Solution Explorer and navigating between folders to find classes. How to navigate in the code like a pro: no more clicking back and forth to navigate between members of classes. Jump from one method to another and come back to where you were. How to compile, run and debug applications faster and more effectively. 60+ shortcuts that will boost your productivity (both on Windows and Mac) How to reduce your chance of getting RSI (repetitive strain injury) [HIDE][Hidden Content]]
  18. About TorghostNG TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was tested on: Kali Linux Manjaro ... What's new in TorghostNG 1.2 Fixed update_commands and others in Changed a few things in Changed a few things in Now you can change Tor circuit with -r [HIDE][Hidden Content]]
  19. PayPro is a digital download payment gateway. Start a business simply by creating your own download payment gateway and offer Stripe, Paypal, Bitcoin, Litecoin and Dogecoin as an option. Receive a percentage of each product sold using your very own PayPro gateway by charging a gateway fee in the admin panel. Demo: [Hidden Content] [HIDE][Hidden Content]]
  20. It's not just about spreading, It's about targeting. This is an example of how to target high-end CPU GPU users while spreading the RAT. Our tool will generate a fake game cheat for COD and it will bypass AV to download and run our payload in the background. Not just that, also the user will give our payload a high privilege (UAC) with pleasure voluntarily. It's perfect for YouTube and gaming forums spreading! It was just a quick project. You can do more evasion and persistence techniques but I wanted to make it as simple as I can. [Hidden Content]
  21. dEEpEst

    Test your #XSS skill here

    [Hidden Content]
  22. Best way to Increase Your PC Speed (No Softwares ) Best way to increase your pc speed without Any Softwares . Working method ! [Hidden Content]