Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Monitor Folder [SRC] Files and Folders

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.


      I did it for fun.
      Checks if any files or folders were created on the desktop.
      The folder path to be monitored can be changed.

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By lk.hc2010
          What better program to monitor there is malware and trojans on my pc?
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in waybackmachine.
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.5.3
               – add setup.sh

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn’t require setting up a server on the internet somewhere or using a third party file-sharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you.
              A user-friendly drag-and-drop graphical user interface that works in Windows, Mac OS X, and Linux
              Ability to share multiple files and folders at once
              Support for multiple people downloading files at once
              Automatically copies the unguessable URL to your clipboard
              Shows you the progress of file transfers
              When file is done transferring, automatically closes OnionShare to reduce the attack surface
              Localized into several languages, and supports international Unicode filenames
          Changelog v2.3
              Major new feature: Multiple tabs, including better support for persistent services, faster Tor connections
              New feature: Chat anonymously mode
              New feature: All new design
              New feature: Ability to display QR codes of OnionShare addresses
              New feature: Web apps have responsive design and look better on mobile
              New feature: Flatpak packaging for Linux
              Several bug fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Stowaway is a Multi-hop proxy tool for security researchers and pentesters
          Users can easily proxy their network traffic to intranet nodes (multi-layer)
          PS: The files under demo folder are Stowaway’s beta version, it’s still functional, you can check the detail by README.md file under the demo folder
          This tool is limited to security research and teaching, and the user bears all legal and related responsibilities caused by the use of this tool! The author does not assume any legal and related responsibilities!
              Obvious node topology
              Clear information display of nodes and keep them permanently
              Active/passive connect mode between nodes
              Reverse connection between nodes through socks5 proxy
              Ssh tunnel mode
              Can be used on multiple platforms
              Multi-hop socks5 traffic proxy(Support UDP/TCP,IPV4/IPV6)
              Multi-hop ssh traffic proxy
              Remote interactive shell
              Upload/download functions
              Port Mapping(local to remote/remote to local)
              Port Reuse
              Open or Close all the services arbitrarily
              Authenicate each other between nodes
              Network traffic encryption with AES-256(CBC mode

          Hidden Content
          Give reaction to this post to see the hidden content.