Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Theft of cars with signal amplifiers

      Recommended Posts

      Staff

      Theft of cars with signal amplifiers
      The image of the thief with a black box approaching the door of the house fits with the modus operandi of the thefts through signal amplifiers. The systems of wireless opening of the cars have a very limited reach, the sufficient one so that that that tries to open the car takes the control in the pocket. But as we saw earlier and theorized years ago in Microsiervos, in cases where the remote control is relatively close to the car, for example parked in the door of a house, the use of a signal amplifier can be more than enough to that the car's system recognizes the key, and it sends a response signal to open it, and even start the engine.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. OVOO is a powerful, flexible and User friendly Live TV & Movie Portal CMS with advance video contents management system. It’s easy to use & install. It has been created to provide a unique experience to movie lover & movie site owner. To observe of ISP needed we have made ovoo to use as multipurpose video cms. This application was built with advanced modules and many more powerful features for a complete video website management. Furthermore, it also supports CSS3, HTML5 and Bootstrap 3 Framework that help use refined any device with semantic accuracy and highly customizable PHP based (CodeIgniter) application.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A backdoor is a tool used to gain remote access to a machine.
          Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks.
          Features
          BetterBackdoor can create and control a backdoor.
          This created backdoor can:
              Run Command Prompt commands
              Run PowerShell scripts
              Run DuckyScripts to inject keystrokes
              Exfiltrate files based on the extension
              Exfiltrate Microsoft Edge and WiFi passwords
              Send and receive files to and from the victim’s computer
              Start a KeyLogger
              Get a screenshot of the victim’s computer
              Get text copied to victim’s clipboard
              Get contents from a victim’s file (cat)
          This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor.
          To create the backdoor, BetterBackdoor:
              Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’.
              Appends a text file containing the server’s IPv4 address to ‘run.jar’.
              If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment.
          To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC.
          If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar.
          This will start the backdoor on the victim’s PC.
          Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer.
          Changelog v1.14
              Added an option to encrypt data sent to and from the backdoor.


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          Darkshot is a scraper tool on steroids, to analyze all of the +2 Billions pictures publicly available on Lightshot.
          It uses OCR to analyze pictures and auto-categorize them thanks to keywords and detection functions.
          You can find pretty much everything : credentials, personal informations (emails, phone numbers, addresses, ID cards, passeports), banking information, etc.
          Since it's modulable, you can make your own detection function and use it as a monitoring tool.
          Features
          👉 Multi-threading
          👉 Anti-conflicting threads protection
          👉 Auto-saving and resuming session
          👉 3 links generators : Ascending, Descending and Random
          👉 Auto-translating keywords
          👉 Auto-analyzing pictures with multiple OCR langs
          👉 Auto-downloading OCR langs training data
          👉 Auto-categorizing pictures with keywords, groups and detection functions
          👉 Auto-exporting pictures per groups with their statistics in HTML
          👉 Modulable : add your own detection functions and keywords

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          GHunt is an OSINT tool to extract information from any Google Account using an email.
          It can currently extract:
              Owner's name
              Last time the profile was edited
              Google ID
              If the account is a Hangouts Bot
              Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.)
              Possible YouTube channel
              Possible other usernames
              Public photos (P)
              Phones models (P)
              Phones firmwares (P)
              Installed softwares (P)
              Google Maps reviews (M)
              Possible physical location (M)
          Latest news
              02/10/2020 : Since few days ago, Google return a 404 when we try to access someone's Google Photos public albums, we can only access it if we have a link of one of his albums.
              Either this is a bug and this will be fixed, either it's a protection that we need to find how to bypass.
              03/10/2020 : Successfully bypassed. 🕺 (commit 01dc016)
              It requires the "Profile photos" album to be public (it is by default)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Reverse PowerShell
          Functions that can be used to gain Reverse Shells with PowerShell. Invoke-ReversePowerShell function can be used to connect to Start-Listener as well as netcat and Metasploit modules or whatever other listeners you use. This is a PowerShell module meaning it only contains functions/cmdlets to be imported into a PowerShell session. If you wish to execute one of the commands whenever the file is run just add the command you wish to execute to the bottom of the file.

          BLUE TEAM DISCOVERY
          Find-ReverseShell.ps1 can be used to search the Windows Event Log for when a Reverse Shell is created that uses a System.Net.Sockets.TcpListener object. This will discover any reverse shell that creates a TcpListener object and not just the below module. This method does not catch PowerCat.ps1 which I am still looking for a good way to discover. This part is still a work in progress.

          Hidden Content
          Give reaction to this post to see the hidden content.