Search results

  1. C

    Big list of databases leaked

    wow that's a great contribution dude, thanks! how did you manage to compile that huge amount of databases leaked?
  2. C

    Best of Active Directory Enumeration

    Best of Active Directory Enumeration: - RPC Client: https://www.hackingarticles.in/active-directory.../ - BloodHound: https://www.hackingarticles.in/active-directory.../ - PowerView: https://www.hackingarticles.in/active-directory.../ - Active Directory Enumeration...
  3. C

    Some Bluetooth Tricks

    Is the Bluetooth system safe in 2023? Well....no. Everything may be compromised now. Some Bluetooth Tricks: 1. Bluejacking: They send unwanted messages to your device, interrupting your peace of mind and privacy. 2. Bluesnarfing: They stealthily access your stored data, such as contacts and...
  4. C

    Did you know LockBit 3.0?

    Did you know LockBit 3.0? its a variant of LockBit ransomware that was released in June 2022. Its more modular and elusive than its previous versions and shares similarities with BlackMatter and BlackCat ransomware. LockBit 3.0 spreads through a variety of methods, including: Infected file...
  5. C

    what Attacker can do with your IP Address?

    Hi guys, to keep them informed what would happen if an attacker gets your IP address? Let's see how he can control you... ✅GET SYSTEM & NETWORK INFORMATION The attacker can scan your IP Address to get System and Network Information such as: - Sysinfo - OS details - Open ports •Running Services...
  6. C

    TOP TOOLS FOR HACKERS

    Hi guys, these are some of the most popular and widely used hacking tools, for those who are just starting...keep learning, good luck! TOP TOOLS FOR HACKERS ✅SQLMAP sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and...
  7. C

    Secrets of Reverse Engineering

    nice share! reversing is quite interesting and useful, it helps to know more about how something works, to understand it better and learn more. Thanks for the book, I'll see it.
  8. C

    log of the folders copied or transferred

    Hi guys, do you know any tool or method that shows some log of the folders copied or transferred to an external device? with info of the device, time and date when it was done. thanks in advance
  9. C

    links related to malware

    Hey there, here are some links related to malware, their analysis and detection: *https://nodistribute.com -> Online Malware Detection *https://www.virustotal.com/es -> Online Malware Detection *https://any.run -> Online Malware Scanner Tool...
  10. C

    OSINT Tools

    Hi guys, Here are some tools to perform OSINT: *https://pipl.com -> People Search Engine *https://www.truecaller.com -> Reversal Phone Number *https://ipdata.co -> IPv4 Geolocation *https://ciberpatrulla.com/links -> OSINT Toolkit Repository *https://inteltechniques.com/menu.html -> OSINT...
  11. C

    A method for sharing Qiwi Webmoney without reference

    what is the difference between VCR and Kiwi, which one do you think is better to use? thanks for the help!
  12. C

    SSH 5.3 remote r00t EXploit

    The code you have shared is a fragment of an exploit designed to exploit a vulnerability in OpenSSH version 5.3p1 and earlier. This exploit aims to gain remote root access on a vulnerable system. As far as I can see the code connects to a remote server via SSH port (22) and sends a payload...
  13. C

    Fast FREE VPN | No Log's !

    I have not used it, but I can tell you that their website is down and always remember to be careful with the topic of the 0logs many times it is not true because in their policies they talk about the sale of information to third parties. I suggest you do more research on the subject of policies...
  14. C

    Working with huge Database Text filea

    This usually happens because of content compatibility, a good option is universal viewer. Foxit Reader: https://www.foxitsoftware.com/pdf-reader/ (PDF files) Notepad++: https://notepad-plus-plus.org/ (Text and source code files) Sublime Text: https://www.sublimetext.com/ (Text files and source...
  15. C

    What is the best ANDROID RAT software ?

    There are several on a trial basis: - AndroRAT: https://github.com/karma9874/AndroRAT - DroidJack: https://github.com/Pericena/Droidjack - AhMyth: https://github.com/AhMyth/AhMyth-Android-RAT - Cerberus: https://github.com/topics/cerberus-banking-trojan I hope you find it useful
  16. C

    CEPT 2022 COURSE

    When reviewing the repository and considering that the pentester is a recognized auditor specialized in the infosec community, the question arises: Is the flag located in the local machine or in a place external to the virtual machine? good contribution broth!
  17. C

    Hacxx Files Explorer 2 - Free Download

    Thank you for sharing!
  18. C

    Free VPN Service List

    This is a very good option for maintaining privacy, but it is very important to keep in mind that these free VPN services are free because they store information and traffic, so there are logs and that is the business of these VPN's, to store as much of the user's data as possible in order to...
  19. C

    Porn Star Angela White Onlyfans Leak

    wow nice share
Top Bottom