Ad End 1 February 2024
Ad Ends 13 January 2025
Ad End 26 February 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    One-Lin3r v2.0 - Gives You One-Liners That Aids In Penetration Testing Operations

    One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing(Windows, Linux, macOS or even BSD systems) or hacking generally with a lot of new features to make all of this fully automated (ex: you won't even need to copy the...
  2. File_closed07

    VulnX v1.7 - An Intelligent Bot Auto Shell Injector

    Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection, information gathering and vulnerability Scanning of the target like subdomains, IP addresses, country, org, timezone, region, and and more ... Instead of injecting each and...
  3. File_closed07

    PivotSuite - A Network Pivoting Toolkit

    PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. PivotSuite as a Server: If the...
  4. File_closed07

    PivotSuite - A Network Pivoting Toolkit

    PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. PivotSuite as a Server: If the...
  5. File_closed07

    New Method Inbound Tesco Bank

    New Method Inbound Tesco Bank Application method will be added today for £100 - Get a UK current account, with debit card, pin & chequebook using Fullz - Base method is written to work WITHOUT any ID documentation - Includes a sub-method to work WITH ID documentation (for those with more...
  6. File_closed07

    0xsp-Mongoose - Privilege Escalation Enumeration Toolkit

    Using 0xsp mongoose you will be able to scan a targeted operating system for any possible way for privilege escalation attacks, starting from collecting information stage until reporting information through 0xsp Web Application API. user will be able to scan different Linux os system at the same...
  7. File_closed07

    Spyse.Py - Python API Wrapper And Command-Line Client

    Python API wrapper and command-line client for the tools hosted on spyse.com. "Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remotesystem administrators, SSL / TLS encryption certificate providers, data centers and business...
  8. File_closed07

    SQLMap v1.3.7 - Automatic SQL Injection And Database Takeover Tool

    SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches...
  9. File_closed07

    Sherlock - Find Usernames Across Social Networks

    Installation NOTE: Python 3.6 or higher is required. clone the repo change the working directory to sherlock nstall the requirements
  10. File_closed07

    Icebox - Virtual Machine Introspection, Tracing & Debugging

    Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based on project Winbagility. Files which might be helpful: INSTALL.md: how to install icebox. BUILD.md: how to build icebox. Project Organisation fdp: Fast...
  11. File_closed07

    Hash-Identifier - Software To Identify The Different Types Of Hashes Used To Encrypt Data And Especially Passwords

    Software to identify the different types of hashes used to encrypt data and especially passwords. Encryption formats supported: ADLER-32 CRC-32 CRC-32B CRC-16 CRC-16-CCITT DES(Unix) FCS-16 GHash-32-3 GHash-32-5 GOST R 34.11-94 Haval-160 Haval-192 110080 ,Haval-224 114080 ,Haval-256 Lineage II...
  12. File_closed07

    Dropping Tutorial ᴄᴄ ᴛᴏ ᴡᴇsᴛᴇʀɴ ᴜɴɪᴏɴ ᴄᴀsʜᴏᴜᴛ ᴍᴇᴛʜᴏᴅ

    1. ᴀ ᴄᴏᴍᴘʟᴇᴛᴇ ʙᴀᴄᴋɢʀᴏᴜɴᴅ ᴄʜᴇᴄᴋ ᴏғ ᴛʜᴇ ᴄᴀʀᴅ ʜᴏʟᴅᴇʀ ᴛʜɪs ɪs ʙᴇᴄᴀᴜsᴇ ɪғ ʏᴏᴜ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴛʀʏ ᴀɴᴅ ᴛʀᴀɴsғᴇʀ ᴀɴʏᴛʜɪɴɢ ᴏᴠᴇʀ $100 ᴅᴏʟʟᴀʀs ᴜsᴅ ᴛʜᴇʏ ᴡɪʟʟ ᴀsᴋ ʏᴏᴜ ᴠᴀʀɪᴏᴜs ǫᴜᴇsᴛɪᴏɴs sᴜᴄʜ ᴀs ʏᴏᴜʀ ᴘʀᴇᴠɪᴏᴜs ᴀᴅᴅʀᴇss, sᴏᴄɪᴀʟ sᴇᴄᴜʀɪᴛʏ ɴᴜᴍʙᴇʀ, ᴅᴀᴛᴇ ᴏғ ʙɪʀᴛʜ, ᴍᴏᴛʜᴇʀs ᴍᴀɪᴅᴇɴ ɴᴀᴍᴇ, ᴡʜᴀᴛ ʏᴏᴜʀ ᴍɪᴅᴅʟᴇ ɴᴀᴍᴇ ɪs, ᴡʜᴀᴛ...
  13. File_closed07

    WorldRemit Cash Out Method

    WorldRemit Cash Out Method THINGS NEEDED: REMOTE DESKTOP CONNECTION (RDP) CREDIT CARD (CC) CORRECT PHONE NUMBER METHOD: Buy A World Remit Old Account (it's Important) 1.You Buy A CC With Details (ESPECIALLY PHONE NUMBER) 2.You Will Need Correct Phone Number Like In The CC Details...
  14. File_closed07

    SPAMMING TOOLS TUTORIALS

    >>================= >>Hi there, >>New available tools, please check below >> >>(1) Botnets and Rats (Crypt) >>Mirai botnet with bulletproof hosting >>Smoke load botnet with dedicated servers >>Loki botnet with bulletproof hosting >>Pony Botnet with bulletproof hosting >>Formbook Botnet with...
  15. File_closed07

    How to Hack Wifi Tutorial Cracking WPA2-PSK Password Using Aircrack-Ng Lots Of Pictures Easy to Follow

    HOW TO HACK WI-FI Cracking WPA2-PSK Passwords Using Aircrack-Ng When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. As a replacement, most...
  16. File_closed07

    CC to BTC TUTOR

    1-Netwire or Ip 100% clean if you do not want to pay $ 40 for the software netwire the best solution is to take the laptop and take a walk through your house to find WIFI. [To purchase Netwire GB http://www.worldwiredlabs.com/netwire_/ Buy version 6 months was $ 40 Spreader your server wawa...
  17. File_closed07

    O365-Attack-Toolkit - A Toolkit To Attack Office365

    o365-attack-toolkit allows operators to perform an OAuth phishing attack and later on use the Microsoft Graph API to extract interesting information. Some of the implemented features are : Extraction of keyworded e-mails from Outlook. Creation of Outlook Rules. Extraction of files from...
  18. File_closed07

    Cloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail

    Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using. Also create a empty text file called none.txt in the data folder, that way it doesn't do a subdomain brute when testing. Cloudcheck will automatically change your...
  19. File_closed07

    Pyattck - A Python Module To Interact With The Mitre ATT&CK Framework

    A Python Module to interact with the Mitre ATT&CK Framework. pyattck has the following notable features in it's current release: Retrieve all Tactics, Techniques, Actors, Malware, Tools, and Mitigations All techniques have suggested mitigations as a property For each class you can access...
  20. File_closed07

    Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting

    The ultimate WinRM shell for hacking/pentesting. Description & Purpose This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows hardware and operating...
Ad End 1 February 2024
Top