Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
adv exp at 30 July 2025
banner Expire 25 October 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. Dark_Code_x

    Bitmain CFO arrested for attacking Mikri Zhang

    Last October, Micree Zhan was ousted from his post as CEO of Bitmain without any notice. Bitmain co-founder Jihan Wu took his place again. In an attempt to regain control of the mining company and restore his position, Mikri Zhang filed several lawsuits in court, but the hearing scheduled for...
  2. Dark_Code_x

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  3. Dark_Code_x

    TeleShadow v3 - Telegram Desktop Session Stealer (Windows)

    Click to expand... Teleshadow3- Advanced Telegram Desktop Session Hijacker! Download Click HERE to download the latest version! Stealing desktop telegrams has never been so easy! Set the email and sender details of the sender and recipient or use Telegram API! and send it to the victim after...
  4. Dark_Code_x

    Hackers stole $ 250 thousand from users of the Bisq cryptocurrency exchange

    Attackers exploited the vulnerability in updating the platform, designed to increase its stability. The Bisq cryptocurrency exchange was forced to stop trading due to a cyber attack, as a result of which about $ 250 thousand in cryptocurrency was stolen from its users. According to a...
  5. Dark_Code_x

    Australian authorities counterattack hackers using the COVID-19 theme

    The Australian Radio Defense Authority has toughened up the fight against cybercriminals exploiting the theme of coronavirus. As the coronavirus pandemic spreads, so does the number of attacks exploiting this topic. At such a difficult time, the Australian Signals Directorate (ASD) decided...
  6. Dark_Code_x

    Facebook tried to buy spyware from NSO Group

    The company wanted to acquire Pegasus software for monitoring iPhone users. Facebook was trying to buy Pegasus software from the Israeli spyware manufacturer NSO Group Technologies in order to monitor the activity of users of iOS devices. According to court documents published by NSO...
  7. Dark_Code_x

    Five Chinese APTs have been quietly attacking Linux, Windows, and Android devices for ten years

    Groupings carry out cross-platform attacks on internal servers of companies. BlackBerry experts reported a massive malware campaign in which 5 Chinese cybercriminals compromised organizations from various industries in an attempt to steal intellectual property and other sensitive business...
  8. Dark_Code_x

    H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

    A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Features Fast and portable - install hyper and run. Multiconnection scanning. Multithreaded connections. Scalable: scans can be as docile or aggressive as you configure them to be. h2 and h2c...
  9. Dark_Code_x

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version...
  10. Dark_Code_x

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  11. Dark_Code_x

    HiddenWall - Linux Kernel Module Generator

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
  12. Dark_Code_x

    Let’s Do the Time Warp Again: The Verge Hack, Part Deux

    The pitfalls of Frankenstein codebases, whether “size matters” wrt blockchains, why inadequately fixing broken things is a bad idea, and a plea against blind, tribalistic crypto-shilling — plus colorful charts and graphs! Note: This is a follow-up post; you may want to first read part 1 here. If...
  13. Dark_Code_x

    The Fourth Industrial Revolution: The Rise Of The Autonomous Economy

    To understand the present, one has to research the past. To see the future, one has to feel the momentum building in the present. When examining the past, it becomes clear that advancements in technology have undoubtedly been the leading driver in the progression of human civilization. Just...
  14. Dark_Code_x

    Bithumb hacked (once again), hacker stole $19 million in cryptocurrencies

    Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures' Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb's...
  15. Dark_Code_x

    Elfin hacking group targets multiple u.s. and saudi arabian forms

    An Iran-linked cyber-espionage group that has been found targeting critical infrastructure, energy and military sectors in Saudi Arabia and the United States two years ago continues targeting organizations in the two nations, Symantec reported on Wednesday. Widely known as APT33, which Symantec...
  16. Dark_Code_x

    Recognize the name of the hidden Wi Fi network

    The owners of some wireless access points configure them so that they do not broadcast their name (ESSID). This is considered, in their opinion, additional protection (along with the password) TD. Simply put, a hidden Wi-Fi network (hidden) is a network that is not visible in the list of...
  17. Dark_Code_x

    How to start learning Kali Linux

    Speaking about learning Kali Linux usually mean working with programs. Although the Kali Linux operating system also has many questions to study (creating a custom ISO, installing on removable media, encrypting permanent partitions and much more), it is also possible to use the system without...
  18. Dark_Code_x

    Top 25 list of Windows PowerShell commands

    Let's take a look at 25 very common tasks you can accomplish with Windows PowerShell. Common entries (just to get started) 1. Navigate the Windows Registry like the file system: cd hkcu: 2. Search recursively for a certain string within files: dir –r | select string "searchforthis" 3. Find...
  19. Dark_Code_x

    Docker Hub Suffers a Data Breach, Asks Users to Reset Password

    Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown attacker gained access to the company's single Hub database. Docker Hub is an online repository service where users and partners can create, test, store and distribute...
  20. Dark_Code_x

    Internet fraudsters lured $ 16.6 thousand from a Grodno resident

    A Grodno resident decided to make money online and lost $ 16.6 thousand, BelTA learned from the press service of the Internal Affairs Directorate of the Grodno Regional Executive Committee. A man, born in 1975, suffered from the actions of intruders. In November 2018, a representative of one of...
Ad End 1 November 2024
Top