Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      C++ Tutorial for Complete Beginners.

      Recommended Posts

      Staff

      C++ Tutorial for Complete Beginners. 

      🌀Getting Started
      🌀Basic Syntax
      🌀Subroutines Reusable Blocks of Code
      🌀Object Oriented Coding
      🌀Pointers and Memory

      🔗Link :

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe
          CrackerJack is a Web GUI for Hashcat developed in Python.

          Hidden Content
          Give reaction to this post to see the hidden content. Architecture
          This project aims to keep the GUI and Hashcat independent. In a nutshell, here’s how it works:
              User uploads hashes select wordlist/rules/mask etc, and clicks “start”.
              Web server spawns a new screen.
                  Generates the hashcat command based on the settings.
                  Runs the command on the screen.
                  Monitors the screen’s output, parses it and displays it in the GUI.
          This allows CrackerJack to be future-proof as it ties to the input/output of Hashcat. Also, if the GUI is not working for whatever reason, hashcat will keep running.
          Features
              Minimal dependencies
                  Uses sqlite3, screen, and hashcat.
              Complete hashcat session management.
                  Start/stop/pause/restore running sessions.
                  Terminate cracking jobs after a specific date/time.
              Web interface for mask generation (?a?l?u).
              Web Push notifications when a password is cracked.
              Swagger 2.0 API.
              Create wordlists from already cracked passwords and feedback into the cracking session.
              Session history to track which attacks you have already performed.
              Multi-user support (local and/or LDAP).
              Wordlist/Mask/Rule support.
              Multiple theme support (Bootswatch).
              Straight-forward setup.
                  The entire configuration is via the GUI. No need for manually editing config files.
                  Run locally on Linux and Windows (WSL).
                  Install on a server using ansible scripts (Ubuntu 14/16/18 and CentOS 7/8).
                  Easy backups – all user data are in the ./data directory.
              Troubleshoot sessions via SSH.

          Hidden Content
          Give reaction to this post to see the hidden content. Limitations
              Not a solution for queueing jobs – it’s only for on-demand password cracking.
              Not meant to be a replacement for command-line usage. It’s complimentary and only supports basic and most common cracking tasks.
              Will not install any GPU drivers. The main assumption is that you have a cracking rig already set up and are looking for a Web GUI.
              Wordlists and rules should already be present in the system.
          Changelog v1.1.2
              [New] Added “Test Connection” feature to LDAP settings.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Goblin for Phishing Exercise Tools
          Goblin is a phishing rehearsal tool for red-blue confrontation. By using a reverse proxy, it is possible to obtain information about a user without affecting the user’s operation perceptibly or to induce the user’s operation. The purpose of hiding the server-side can also be achieved by using a proxy. Built-in plug-in, through a simple configuration, quickly adjusts the content of the web page to achieve a better exercise effect.
          Features
              Support for caching static files to speed up access.
              Supports dumping all requests, dumping requests that match the rules.
              Support quick configuration through plug-ins to adjust inappropriate jumps or content.
              Support for implanting specific javascript code.
              Support for modifying the content of responses or goblin requests.
              Support hiding real IP by proxy.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service.
          Adding New Hash Algorithms
          The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes.
          Installing HashDB
          Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests)
          Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GEF – GDB Enhanced Features
          GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development.
          It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support).
          Feature
              One single GDB script.
              Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable in 2 seconds (unlike PwnDBG).
              Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible (unlike PwnDBG).
              Provides more than 50 commands to drastically change your experience in GDB.
              Easily extendable to create other commands by providing more comprehensible layout to GDB Python API.
              Works consistently on both Python2 and Python3.
              Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc. (unlike PEDA)
              Suited for real-life apps debugging, exploit development, just as much as CTF (unlike PEDA or PwnDBG)
          Changelog
          GEF – v2021.10
          Highlights of Impractical Information
              93 commits, 5 Issues & 25 PRs closed
              Massive background re-work by @theguy147 , which includes (but not limited):
                  Better and more CI tests
                  More…

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole web page with DOM rendering stage, automatically fills and submits forms, with intelligent JS event triggering, and collects as many entries exposed by the website as possible. The built-in URL de-duplication module filters out a large number of pseudo-static URLs, still maintains a fast parsing and crawling speed for large websites, and finally gets a high-quality collection of request results.
          crawlergo currently supports the following features:
              chrome browser environment rendering
              Intelligent form filling, automated submission
              Full DOM event collection with automated triggering
              Smart URL de-duplication to remove most duplicate requests
              Intelligent analysis of web pages and collection of URLs, including javascript file content, page comments, robots.txt files and automatic Fuzz of common paths
              Support Host binding, automatically fix and add Referer
              Support browser request proxy
              Support pushing the results to passive web vulnerability scanners

          Hidden Content
          Give reaction to this post to see the hidden content.