Ad End 1 November 2025
Ad End 4 April 2026
banner Expire 10 August 2025
ad End 25 October 2025
Ad Ends 13 July 2025
banner Expire 25 October 2025
banner Expire 25 November 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    NTLMRecon - A Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints

    A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains. NTLMRecon is built with flexibilty in mind. Need to run recon on a single URL, an IP address, an...
  2. File_closed07

    Evil SSDP - Spoof SSDP Replies And Create Fake UPnP Devices To Phish For Credentials And NetNTLM

    This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden...
  3. File_closed07

    SSRF Sheriff - A Simple SSRF-testing Sheriff Written In Go

    This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking Event, but it is now being open-sourced for other organizations to implement and contribute back to. Features Repsond to any HTTP method (GET, POST, PUT, DELETE, etc.)...
  4. File_closed07

    RedRabbit - Red Team PowerShell Script

    RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking. To Run: You can either run locally by downloading the script or run remotely using: Help Option info and help can be found here: https://securethelogs.com/redrabbit-ps1/
  5. File_closed07

    Sifter - A OSINT, Recon And Vulnerability Scanner

    Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit...
  6. File_closed07

    Pentest Tools Framework - A Database Of Exploits, Scanners And Tools For Penetration Testing

    Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. How to install PTF(Pentest Tools Framework)
  7. File_closed07

    Zelos - A Comprehensive Binary Emulation Platform

    Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess the dynamic behavior of binaries via command-line or python scripts. All syscalls are emulated to isolate the target binary. Linux x86_64 (32- and 64-bit)...
  8. File_closed07

    What is Hacking and How to Guard Against It?

    Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Cracking is the term which specifies the method by which the password or code is obtained. The...
  9. File_closed07

    Pickl3 - Windows Active User Credential Phishing Tool

    Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential. perational Usage - 1 Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old...
  10. File_closed07

    Obfuscapk - A Black-Box Obfuscation Tool For Android Apps

    Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the decompiled smali code, resources and manifest. The...
  11. File_closed07

    shuffleDNS - Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains

    shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. Features Simple and modular code base making it easy to contribute. Fast And Simple...
  12. File_closed07

    AWSGen.py - Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names

    AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.
  13. File_closed07

    Pypykatz - Mimikatz Implementation In Pure Python

    Mimikatz implementation in pure Python. At least a part of it attachFull541 Runs on all OS's which support python>=3.6 WIKI Since version 0.1.1 the command line changed a little. Worry not, I have an awesome WIKI for you. Installing Install it via pip or by cloning it from github. The installer...
  14. File_closed07

    Rconfig 3.x Chained Remote Code Execution

    This Metasploit module takes advantage of a command injection vulnerability in the path parameter of the ajax archive file functionality within the rConfig web interface in order to execute the payload. Valid credentials for a user with administrative privileges are required . However, this...
  15. File_closed07

    SysWhispers - AV/EDR Evasion Via Direct System Calls

    SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported from Windows XP to 10. Example generated files available in example-output/. Introduction Various security products place hooks in user-mode APIs which...
  16. File_closed07

    LKWA - Lesser Known Web Attack Lab From Carders.ws

    Lesser Known Web Attack Lab is for intermediate pentester that can test and practice lesser known web attacks such as Object Injection, XSSI, PHAR Deserialization, variables variable ..etc. Write-ups are welcome. Installation Just clone the git with git clone https://github.com/weev3/LKWA and...
  17. File_closed07

    Free FUD Crypter Collection

    Free FUD Crypter Collection Free FUD Crypter Collection Free FUD Crypter Collection Modern Crypter Source http://lobatandawgs.com/crypter/21-moder...ource.html http://shanghaiblackgoons.com/24-modern-...ource.html Fuzion Crypter v2 http://shanghaiblackgoons.com/23-fuzion-crypter-v2.html...
  18. File_closed07

    900+ | NordVPN | Accounts Work + Freshly Checked

    900+ | NordVPN | Accounts Work + Freshly Checked https://throwbin.io/WXockUx https://pastebin.com/LXaGA5Ke
  19. File_closed07

    400+ Nord VPN Accounts

    400+ Nord VPN Accounts https://throwbin.io/ifOIyOE https://pastebin.com/E0PkMrQi
  20. File_closed07

    Best PHP Shell script

    Best PHP Shell script wso shell 2.5.1 http://shanghaiblackgoons.com/34-wso-shell-251.html http://lobatandawgs.com/shell-script/31-...l-251.html Symlink Sa 3.0 http://shanghaiblackgoons.com/33-symlink-sa-30.html http://lobatandawgs.com/shell-script/30-...sa-30.html Dhanush Shell...
Ad End 1 November 2024
Top