Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      ohgud

      Will pay for VB Skin with (Bitcoins)

      Question

      Hello,

       

      Who got this Skin for VB 5

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      i need BlueFox skin for VB 5 and will pay with bitcoins.

       

      Please anyone got  let me know.

       

      Thanks

      Share this post


      Link to post
      Share on other sites

      1 answer to this question

      Recommended Posts

      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PwnFox
          PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit.
          If you are a chrome user you can check https://github.com/nccgroup/autochrome.
          Single click BurpProxy
          Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked.
          Containers Profiles
          PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp.
          PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++.
          Security header remover
          Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload.
          Headers stripped:
              Content-Security-Policy
              X-XSS-Protection
              X-Frame-Options
              X-Content-Type-Options


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. AutoDirbuster
          Automatically run and save Dirbuster scans for multiple IPs
          Why?
          OWASP Dirbuster is a great directory buster but running it against multiple IPs and ports is a very manual process with a lot of downtime between scans. This script attempts to automate that process and eliminates downtime between scans.
          What is the recommended usage?
          If attacking multiple targets:
              Run Nmap and find open ports, outputting the results with -oG or -oA
              Run AutoDirbuster with the Nmap results and a timeout (closed ports or non-HTTP based services are ignored)
                  python AutoDirbuster.py -g Nmap_results.gnmap -to 15
              As the pentest progresses, periodically review the Dirbust results using dirbust_read.py, which will ignore all Dirbuster error lines and only print the found directories and files
          If attacking a single target:
              python AutoDirbuster.py -st example.com:80
          What data does this need?
          The script can take three data sources:
              List of IP:port or hostname:port, one per line
              python AutoDirbuster.py ip_port_list.txt
              An Nmap Gnmap result file
              python AutoDirbuster.py -g Nmap_results.gnmap
              A single target
              python AutoDirbuster.py -st example.com:80
          How does this script work?
              A list of targets is provided
              A TCP connect scan is done on the target port to test if it’s open
              If it’s open, HTTP and HTTPS requests are sent to determine if the service is HTTP-based and whether it requires SSL
              If the service is HTTP, a check is done to determine if a previous report file is in the same directory. Report files follow the format: DirBuster-Report-IP-port.txt
              Dirbuster is run using Python’s subprocess.Popen(). If a timeout is specified, then after the timeout period, a SIGINT signal is sent to Dirbuster so it can safely shut down and write results to disk. A note is added to the report indicating that the scan timed out.
              The next IP:port goes through the same process (TCP connect, HTTP service query, dirbust)
          This script isn’t working
          Ensure the following
              Are all of the dependencies listed in requirements.txt installed?
              Is there a directory called “DirBuster” inside the same directory as AutoDirbuster.py?
              Does this “DirBuster” directory contain the Dirbuster JAR file named “DirBuster.jar”?
              Is “DirBuster.jar” version 0.12?
              Does this “DirBuster” directory contain a file called “directory-list-2.3-small.txt” (the default wordlist)?
              Does this “DirBuster” directory contain a subdirectory called “lib” with the default 13 required Dirbuster JAR dependencies?
              Is Java installed?
              Is Java in your path?
              Run AutoDirbuster with the –debug flag to view the subprocess command that AutoDirbuster is using to launch Dirbuster. Run this command from the terminal to view standard error as AutoDirbuster is configured to send subprocess standard error to /dev/null


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. watermark_disabler
          Disabling "Activate Windows" watermark made simple, the code in this repository is a PoC, and has not been tested above Windows 10 1803.
          How does this work?
          The function responsible for drawing whole desktop including the watermark is xxxDesktopPaintCallback located in win32kfull.sys. Both of the approaches used by this project were found while analyzing functions further down in the callstack.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. xeca is a project that creates encrypted PowerShell payloads for offensive purposes.
          Creating position independent shellcode from DLL files is also possible.
          How It Works
              Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt”
              The key to decrypt the payload is saved to a file named “safe.txt”
              Execute “launch.txt” on a remote host
                  The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt”
                  Decrypt the payload in memory
                  Execute the intended payload in memory
          Changelog v0.3
              ETW and Script Block Logging bypass added to all payloads.
              The bypasses can be disabled with –disable-etw and –disable-script-logging.


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in waybackmachine.
          Features
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.5.3
               – add setup.sh


          Hidden Content
          Give reaction to this post to see the hidden content.