Ad End 1 February 2024
Ad Ends 13 January 2025
Ad End 26 February 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    Facebash - Facebook Brute Forcer In Shellscript Using TOR

    Facebook Brute Forcer in shellscript using TOR WARNING: Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h. Features Save/Resume sessions Anonymous attack through TOR Default Password List (+39k) Usage: Install requirements (Curl, Tor):
  2. File_closed07

    Python-Iocextract - Advanced Indicator Of Compromise (IOC) Extractor

    Advanced Indicator of Compromise (IOC) extractor. Overview This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It includes some encoded and "defanged" IOCs in the output, and optionally decodes/refangs them. The Problem It is common...
  3. File_closed07

    ANDRAX v3 - The First And Unique Penetration Testing Platform For Android

    ANDRAX The first and unique Penetration Testing platform for Android smartphones. Thanks to Jessica Helena she made ANDRAX v3 possible. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it...
  4. File_closed07

    Vulners Scanner for Android - Passive Vulnerability Scanning

    Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.It implements technology of passive vulnerability scanning based on software version fingerprint.The application does not perform any malicious requests, fuzzing or any other...
  5. File_closed07

    EASY HACKING WIFI ( TOOL AND TUTORIAL)

    Dumpper and Jumpstart are the two tools that can used to hack wifi networks. To hack using these tools you should have wireless adapter or laptop.if you have laptop you don't need wireless adapter. You also need a good wifi signal and the wifi shouldn't have mac. So first of all you need to...
  6. File_closed07

    How to make track1 with track2

    Short tutorial, on how to make track one with track 2. Take example of last dump Track2 (this is a dump): Example dump info: 4888603170607238=15051011203191805191 PATACSIL/DAVID Bank of America, N.A. (USA) CREDIT PLATINUM United States of America 4888603170607238=15051011203191805191...
  7. File_closed07

    JEx Bot v3 - Mass Shell UPload Bot - CPANEL FTP SMTP WP CRACK - AUTO GRAB URL

    JEx Bot v3 - (Anonfile mirror) : https://anonfile.com/Pfgb92X3ne/jexv3_zip Zip Pass: azizc99tn_ Features: Auto Grab Website list with dork?‍+ FAST Scan+ Auto Symlink, Get cpanels, Shells, FTP, SMTP, Configs, Sqli Targets, Dump Data and etc...? Upload Automatic Shells and BruteForce SMTP...
  8. File_closed07

    YouPHPTube 7.7 SQL Injection Vulnerability

    ---------------------------------------------------------------- YouPHPTube <= 7.7 (getChat.json.php) SQL Injection Vulnerability ---------------------------------------------------------------- [-] Software Link: https://www.youphptube.com [-] Affected Versions: Version 7.7 and prior...
  9. File_closed07

    Extended-SSRF-Search - Smart SSRF Scanner Using Different Methods

    PolyShell is a script that's simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot). This makes PolyShell a useful template for penetration testing as it can be executed on most systems without the need for target-specific payloads. PolyShell is also specifically designed...
  10. File_closed07

    Phonia Toolkit - One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free ResourcesattachFull484 Phonia Toolkit is one of the most ad

    Phonia Toolkit is one of the most advanced toolkits to scanphone numbers using only free resources. The goal is to first gatherstandard information such as country, area, carrier and line type onany international phone numbers with a very good accuracy. Phonia installation Phonia uninstallation...
  11. File_closed07

    NTLMRecon - A Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints

    A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains. NTLMRecon is built with flexibilty in mind. Need to run recon on a single URL, an IP address, an...
  12. File_closed07

    Evil SSDP - Spoof SSDP Replies And Create Fake UPnP Devices To Phish For Credentials And NetNTLM

    This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden...
  13. File_closed07

    SSRF Sheriff - A Simple SSRF-testing Sheriff Written In Go

    This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking Event, but it is now being open-sourced for other organizations to implement and contribute back to. Features Repsond to any HTTP method (GET, POST, PUT, DELETE, etc.)...
  14. File_closed07

    RedRabbit - Red Team PowerShell Script

    RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking. To Run: You can either run locally by downloading the script or run remotely using: Help Option info and help can be found here: https://securethelogs.com/redrabbit-ps1/
  15. File_closed07

    Sifter - A OSINT, Recon And Vulnerability Scanner

    Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit...
  16. File_closed07

    Pentest Tools Framework - A Database Of Exploits, Scanners And Tools For Penetration Testing

    Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. How to install PTF(Pentest Tools Framework)
  17. File_closed07

    Zelos - A Comprehensive Binary Emulation Platform

    Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess the dynamic behavior of binaries via command-line or python scripts. All syscalls are emulated to isolate the target binary. Linux x86_64 (32- and 64-bit)...
  18. File_closed07

    What is Hacking and How to Guard Against It?

    Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Cracking is the term which specifies the method by which the password or code is obtained. The...
  19. File_closed07

    Pickl3 - Windows Active User Credential Phishing Tool

    Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential. perational Usage - 1 Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old...
  20. File_closed07

    Obfuscapk - A Black-Box Obfuscation Tool For Android Apps

    Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the decompiled smali code, resources and manifest. The...
Ad End 1 February 2024
Top