Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      1337day-Exploits

      Tor Browser 7.x NoScript Bypass

      Recommended Posts

      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Anti-malware scanning interface (AMSI) Patching (and Hooking)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Bypass 4xx HTTP response status codes.
          To see all the test cases, check the source code - follow the NOTE comments.
          Script uses multithreading, and is based on brute forcing so might have some false positives. Script uses colored output.
          Results will be sorted by HTTP response status code ascending, content length descending, and ID ascending.
          Extend this script to your liking.
          Tested on Kali Linux v2021.4 (64-bit).
          Made for educational purposes. I hope it will help!
          Tests:
              various HTTP methods,
              various HTTP methods with 'Content-Length: 0' header,
              cross-site tracing (XST) with HTTP TRACE and TRACK methods,
              file upload with HTTP PUT method,
              various HTTP method overrides,
              various HTTP headers,
              various URL overrides,
              URL override with two 'Host' headers,
              various URL path injections,
              basic authentication/authorization including null session.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          ScareCrow is a payload creation framework for side loading (not injecting) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, it utilizes a technique to flush an EDR’s hook out of the system DLLs running in the process's memory. This works because we know the EDR’s hooks are placed when a process is spawned. ScareCrow can target these DLLs and manipulate them in memory by using the API function VirtualProtect, which changes a section of a process’ memory permissions to a different value, specifically from Execute–Read to Read-Write-Execute.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. How to use: (below is the .gif of 2.39mb which will take time to load depending on your Internet speed, so bear with me 🙂)
          Detail:
          This tool can bypass and repair file verification checks of all the versions of ZProtect HWID protected executables. It was originally posted in 52pojie forum in Chinese lang, also it didn't work on Windows 10. But I unpacked it (vmprotect), fixed the issue (WIN10) and translated it into English.
          All credit goes to Kido (developer of this tool)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole web page with DOM rendering stage, automatically fills and submits forms, with intelligent JS event triggering, and collects as many entries exposed by the website as possible. The built-in URL de-duplication module filters out a large number of pseudo-static URLs, still maintains a fast parsing and crawling speed for large websites, and finally gets a high-quality collection of request results.
          crawlergo currently supports the following features:
              chrome browser environment rendering
              Intelligent form filling, automated submission
              Full DOM event collection with automated triggering
              Smart URL de-duplication to remove most duplicate requests
              Intelligent analysis of web pages and collection of URLs, including javascript file content, page comments, robots.txt files and automatic Fuzz of common paths
              Support Host binding, automatically fix and add Referer
              Support browser request proxy
              Support pushing the results to passive web vulnerability scanners

          Hidden Content
          Give reaction to this post to see the hidden content.