Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
banner Expire 25 October 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
best shop
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version...
  2. File_closed07

    H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

    A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Features Fast and portable - install hyper and run. Multiconnection scanning. Multithreaded connections. Scalable: scans can be as docile or aggressive as you configure them to be. h2 and...
  3. File_closed07

    Kubolt - Utility For Scanning Public Kubernetes Clusters

    Kubolt is a simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Why? Sometimes, the kubelet port 10250 is open to unauthorized access and makes it possible to run commands inside the containersusing getrun function from kubelet: How? Okay...
  4. File_closed07

    Brutality - A Fuzzer For Any GET Entries

    A fuzzer for any GET entries. Features Multi-threading on demand Fuzzing, bruteforcing GET params Find admin panels Colored output Hide results by return code, word numbers Proxy support Big wordlist Colored Usages Install Download Brutality
  5. File_closed07

    New Way To Relive Some Zinio File

    New Way To Relive Some Zinio File In order to be able to read the mags, you have to be connected to the internet when you open them for the first time. It creates an .xml file in a folder called "ContentGuard", located in "C:\Documents and Settings\User\Application Data\ContentGuard". (User is...
  6. File_closed07

    Wpbullet - A Static Code Analysis

    A static code analysis for WordPress Plugins/Themes (and PHP) Installation Simply clone the repository, install requirements and run the script Usage Available options: Creating modules Creating a module is flexible and allows for override of the BaseClass methods for each module as well as...
  7. File_closed07

    PhoneSploit - Using Open Adb Ports We Can Exploit A Devive

    Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” I will soon make a tutorial on how to use PhoneSploit Install
  8. File_closed07

    Amass - In-depth DNS Enumeration And Network Mapping

    The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the...
  9. File_closed07

    Userrecon-Py - Find Usernames In Social Networks

    Find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): Install with pip3: Building from Source Clone this repository, and: Update To update this tool to the latest version, run: Usage Start by printing the available actions by running userrecon-py --help...
  10. File_closed07

    Amass - In-depth DNS Enumeration And Network Mapping

    The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the...
  11. File_closed07

    Facebash - Facebook Brute Forcer In Shellscript Using TOR

    Facebook Brute Forcer in shellscript using TOR WARNING: Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h. Features Save/Resume sessions Anonymous attack through TOR Default Password List (+39k) Usage: Install requirements (Curl, Tor):
  12. File_closed07

    Python-Iocextract - Advanced Indicator Of Compromise (IOC) Extractor

    Advanced Indicator of Compromise (IOC) extractor. Overview This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It includes some encoded and "defanged" IOCs in the output, and optionally decodes/refangs them. The Problem It is common...
  13. File_closed07

    ANDRAX v3 - The First And Unique Penetration Testing Platform For Android

    ANDRAX The first and unique Penetration Testing platform for Android smartphones. Thanks to Jessica Helena she made ANDRAX v3 possible. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it...
  14. File_closed07

    Vulners Scanner for Android - Passive Vulnerability Scanning

    Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.It implements technology of passive vulnerability scanning based on software version fingerprint.The application does not perform any malicious requests, fuzzing or any other...
  15. File_closed07

    EASY HACKING WIFI ( TOOL AND TUTORIAL)

    Dumpper and Jumpstart are the two tools that can used to hack wifi networks. To hack using these tools you should have wireless adapter or laptop.if you have laptop you don't need wireless adapter. You also need a good wifi signal and the wifi shouldn't have mac. So first of all you need to...
  16. File_closed07

    How to make track1 with track2

    Short tutorial, on how to make track one with track 2. Take example of last dump Track2 (this is a dump): Example dump info: 4888603170607238=15051011203191805191 PATACSIL/DAVID Bank of America, N.A. (USA) CREDIT PLATINUM United States of America 4888603170607238=15051011203191805191...
  17. File_closed07

    JEx Bot v3 - Mass Shell UPload Bot - CPANEL FTP SMTP WP CRACK - AUTO GRAB URL

    JEx Bot v3 - (Anonfile mirror) : https://anonfile.com/Pfgb92X3ne/jexv3_zip Zip Pass: azizc99tn_ Features: Auto Grab Website list with dork?‍+ FAST Scan+ Auto Symlink, Get cpanels, Shells, FTP, SMTP, Configs, Sqli Targets, Dump Data and etc...? Upload Automatic Shells and BruteForce SMTP...
  18. File_closed07

    YouPHPTube 7.7 SQL Injection Vulnerability

    ---------------------------------------------------------------- YouPHPTube <= 7.7 (getChat.json.php) SQL Injection Vulnerability ---------------------------------------------------------------- [-] Software Link: https://www.youphptube.com [-] Affected Versions: Version 7.7 and prior...
  19. File_closed07

    Extended-SSRF-Search - Smart SSRF Scanner Using Different Methods

    PolyShell is a script that's simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot). This makes PolyShell a useful template for penetration testing as it can be executed on most systems without the need for target-specific payloads. PolyShell is also specifically designed...
  20. File_closed07

    Phonia Toolkit - One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free ResourcesattachFull484 Phonia Toolkit is one of the most ad

    Phonia Toolkit is one of the most advanced toolkits to scanphone numbers using only free resources. The goal is to first gatherstandard information such as country, area, carrier and line type onany international phone numbers with a very good accuracy. Phonia installation Phonia uninstallation...
Ad End 1 November 2024
Top