Ad End 1 November 2025
Ad End 4 April 2026
banner Expire 10 August 2025
ad End 25 October 2025
Ad Ends 13 July 2025
banner Expire 25 October 2025
banner Expire 25 November 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    Findomain - a cross-platform tool

    A cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. How it works? It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it...
  2. File_closed07

    Wafw00f v1.0.0

    WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. How does it work: To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of...
  3. File_closed07

    Pasteshr 1.6 sql injection

    PasteShr version 1.6 suffers from multiple remote SQL injection vulnerabilities. MD5 | 7a51baa5eca6c04a0eb42f1e84db549c Download ====================================================
  4. File_closed07

    Vmware workstation dll hijacking

    VMware Workstation versions prior to 15.1.0 suffer from a dll hijacking vulnerability. MD5 | e4ae43fff5271c25af6a88e2b9cdeb55 Download https://www.vmware.com/security/advisories/VMSA-2019-0007.html
  5. File_closed07

    Trigmap - a wrapper for nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  6. File_closed07

    Miteru - an experimental phishing kit detection tool

    Miteru is an experimental phishing kit detection tool. How it works It collects phishy URLs from the following feeds: CertStream-Suspicious feed via urlscan.io OpenPhish feed via urlscan.io PhishTank feed via urlscan.io Ayashige feed It checks each phishy URL whether it enables directory...
  7. File_closed07

    Brutemap - tool that automates testing accounts

    Brutemap - Tool That Automates Testing Accounts To The Site's Login Page Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also...
  8. File_closed07

    Bandit - tool designed to find common security

    Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
  9. File_closed07

    Scavenger - crawler searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  10. File_closed07

    Flashsploit - exploitation framework

    Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible (.ino) Scripts based on User Input and then Starts a Listener in Metasploit-Framework if Required by the Script, in Summary ...
  11. File_closed07

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  12. File_closed07

    How to HACK and Access Someone PC's How to hack computer 2019 Method

    first of all, you need them IP Address IP Address: Generate a Link which you send to your victim. If he clicks it, his IP will be sent to your email inbox. http://getthierip.com http://whatstheirip.com http://IPlogger.com - then, open up notepad and write this commands: ok after get him IP...
  13. File_closed07

    XSSCon - Simple XSS Scanner Tool

    Powerfull Simple XSS Scanner made with python 3.7 Installing Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: Usage Basic usage: Advanced usage see help: Roadmap v0.3B: Added custom options ( Such --proxy, --user-agent etc... ) First...
  14. File_closed07

    Kali Linux 2019.2 Release

    This release brings the kernel up to version 4.19.28, fixes numerous bugs, includes many updated packages, and most excitingly, features a new release of Kali Linux NetHunter! Kali NetHunter 2019.2 Release NetHunter now supports over 50 devices running all the latest Android versions, from...
  15. File_closed07

    Graffiti - A Tool To Generate Obfuscated One Liners

    Graffiti is a tool to generate obfuscated oneliners to aid in penetration testing situations. Graffiti accepts the following languages for encoding: Python Perl Batch Powershell PHP Bash Graffiti will also accept a language that is not currently on the list and store the oneliner into a...
  16. File_closed07

    Crosslinked - LinkedIn Enumeration Tool

    CrossLinked simplifies the processes of searching LinkedIn to collect valid employee names when performing password spraying or another security testing against an organization. Using similar search engine scraping capabilities found in tools like subscraper and pymeta, CrossLinked will find...
  17. File_closed07

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  18. File_closed07

    HiddenWall - Linux Kernel Module Generator

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
  19. File_closed07

    SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

    sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the...
Ad End 1 November 2024
Top