Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      How To Get UMP9 Skin For Free In Pubg 

      1 post in this topic

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          OSINT Tool For Scraping Dark Websites
          Tested On
              Kali Linux 2019.2     Ubuntu 18.04     Nethunter     Arc Linux
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The usage of runtime packers by malware authors is very common, as it is a technique that helps to hinder analysis. Furthermore, packers are a challenge for antivirus products, as they make it impossible to identify malware by signatures or hashes alone.
          In order to be able to analyze a packed malware sample, it is often required to unpack the binary. Usually, this means, that the analyst will have to manually unpack the binary by using dynamic analysis techniques (Tools: OllyDbg, x64Dbg). There are also some approaches for automatic unpacking, but they are all only available for Windows. Therefore when targeting a packed Windows malware the analyst will require a Windows machine. The goal of our project is to enable platform-independent automatic unpacking by using emulation.
          Supported packers
              UPX: Cross-platform, open source packer     ASPack: Advanced commercial packer with a high compression ratio     PEtite: Freeware packer, similar to ASPack     FSG: Freeware, fast to unpack Any other packers should work as well, as long as the needed API functions are implemented in Unipacker. For packers that aren’t specifically known you will be asked whether you would like to manually specify the start and end addresses for emulation. If you would like to start at the entry point declared in the PE header and just emulate until section hopping is detected, press Enter

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By derbyhack

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Raccoon

          Hidden Content
          Give reaction to this post to see the hidden content. Offensive Security Tool for Reconnaissance and Information Gathering

          Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content. Features
           DNS details  DNS visual mapping using DNS dumpster  WHOIS information  TLS Data - supported ciphers, TLS versions, certificate details and SANs  Port Scan  Services and scripts scan  URL fuzzing and dir/file detection  Subdomain enumeration - uses Google dorking, DNS dumpster queries, SAN discovery and bruteforce  Web application data retrieval: CMS detection Web server info and X-Powered-By robots.txt and sitemap extraction Cookie inspection Extracts all fuzzable URLs Discovers HTML forms Retrieves all Email addresses Scans target for vulnerable S3 buckets and enumerates them for sensitive files  Detects known WAFs  Supports anonymous routing through Tor/Proxies  Uses asyncio for improved performance  Saves output to files - separates targets by folders and modules by files Roadmap and TODOs
           Expand, test, and merge the "owasp" branch with more web application attacks and scans ( Hidden Content
          Give reaction to this post to see the hidden content. )  Support more providers for vulnerable storage scan ( Hidden Content
          Give reaction to this post to see the hidden content. )  Add more WAFs, better detection  OWASP vulnerabilities scan (RFI, RCE, XSS, SQLi etc.)  Support multiple hosts (read from file)  Rate limit evasion  IP ranges support  CIDR notation support  More output formats (JSON at the very least) About
          Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
          It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
          As most of Raccoon's scans are independent and do not rely on each other's results, it utilizes Python's asyncio to run most scans asynchronously.
          Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing 
          Hidden Content
          Give reaction to this post to see the hidden content.  repository but different lists can be passed as arguments. For more options - see "Usage".
          Installation
          For the latest stable version:
          pip install raccoon-scanner # To run: raccoon [OPTIONS] Please note Raccoon requires Python3.5+ so may need to use pip3 install raccoon-scanner.
          You can also clone the GitHub repository for the latest features and changes:
          git clone https://github.com/evyatarmeged/Raccoon.git cd Raccoon python setup.py install # Subsequent changes to the source code will not be reflected in calls to raccoon when this is used # Or python setup.py develop # Changes to code will be reflected in calls to raccoon. This can be undone by using python setup.py develop --uninstall # Finally raccoon [OPTIONS] [TARGET] macOS
          To support Raccoon on macOS you need to have gtimeout on your machine.
          gtimeout can be installed by running brew install coreutils.
          Docker
          # Build the docker image docker build -t evyatarmeged/raccoon . # Run a scan, As this a non-root container we need to save the output under the user's home which is /home/raccoon docker run --name raccoon evyatarmeged/raccoon:latest example.com -o /home/raccoon Prerequisites
          Raccoon uses 
          Hidden Content
          Give reaction to this post to see the hidden content.  to scan ports as well as utilizes some other Nmap scripts and features. It is mandatory that you have it installed before running Raccoon.
          Hidden Content
          Give reaction to this post to see the hidden content.  is also used for TLS/SSL scans and should be installed as well. Usage
          Usage: raccoon [OPTIONS] TARGET Options: --version Show the version and exit. -d, --dns-records TEXT Comma separated DNS records to query. Defaults to: A,MX,NS,CNAME,SOA,TXT --tor-routing Route HTTP traffic through Tor (uses port 9050). Slows total runtime significantly --proxy-list TEXT Path to proxy list file that would be used for routing HTTP traffic. A proxy from the list will be chosen at random for each request. Slows total runtime -c, --cookies TEXT Comma separated cookies to add to the requests. Should be in the form of key:value Example: PHPSESSID:12345,isMobile:false --proxy TEXT Proxy address to route HTTP traffic through. Slows total runtime -w, --wordlist TEXT Path to wordlist that would be used for URL fuzzing -T, --threads INTEGER Number of threads to use for URL Fuzzing/Subdomain enumeration. Default: 25 --ignored-response-codes TEXT Comma separated list of HTTP status code to ignore for fuzzing. Defaults to: 302,400,401,402,403,404,503,504 --subdomain-list TEXT Path to subdomain list file that would be used for enumeration -sc, --scripts Run Nmap scan with -sC flag -sv, --services Run Nmap scan with -sV flag -f, --full-scan Run Nmap scan with both -sV and -sC -p, --port TEXT Use this port range for Nmap scan instead of the default --vulners-nmap-scan Perform an NmapVulners scan. Runs instead of the regular Nmap scan and is longer. --vulners-path TEXT Path to the custom nmap_vulners.nse script.If not used, Raccoon uses the built-in script it ships with. -fr, --follow-redirects Follow redirects when fuzzing. Default: False (will not follow redirects) --tls-port INTEGER Use this port for TLS queries. Default: 443 --skip-health-check Do not test for target host availability --no-url-fuzzing Do not fuzz URLs --no-sub-enum Do not bruteforce subdomains --skip-nmap-scan Do not perform an Nmap scan -q, --quiet Do not output to stdout -o, --outdir TEXT Directory destination for scan output --help Show this message and exit. Screenshots

          Hidden Content
          Give reaction to this post to see the hidden content. Web application data including vulnerable S3 bucket:

          Hidden Content
          Give reaction to this post to see the hidden content. Hidden Content
          Give reaction to this post to see the hidden content.  challenge example scan:

          Hidden Content
          Give reaction to this post to see the hidden content. Nmap vulners scan results:

          Hidden Content
          Give reaction to this post to see the hidden content. Results folder tree after a scan:

          Hidden Content
          Give reaction to this post to see the hidden content. Contributing
          Any and all contributions, issues, features and tips are welcome.
          Download:

          Hidden Content
          Give reaction to this post to see the hidden content.