Search results

  1. C

    How to find anything in Google Drive

    thanks bro, I didn't know that search engine, here is the link: https://www.dedigger.com/#gsc.tab=0 by the way, it's a pity that anonfiles doesn't work anymore :( what other sites like anonfiles, google drive, mega, catbox, etc... do you recommend?
  2. C

    Microsoft .DOC Exploit

    well this is very useful for me so I will try it, thanks for sharing. :ninja:
  3. C

    RustScan | Scans all 65k ports in 3 seconds.

    RustScan is a modern take on the port scanner. Sleek & fast. All while providing extensive extendability to you. Not to mention RustScan uses Adaptive Learning to improve itself over time, making it the best port scanner for you. https://github.com/RustScan/RustScan Features Scans all 65k ports...
  4. C

    EXPLOITS DATABASE

    Utility: Security research Penetration testing Malware development Exploits Database http://www.exploit-db.com Exploits Database is an exploit database located on the Offensive Security website. The database contains over 130,000 exploits for a wide range of operating systems, applications...
  5. C

    Types of malware

    Adware : Serves unwanted advertisements Example: Fireball Spyware: Collects user activity data without their knowledge Example: Pegasus Ransonware: Disrupts the victim's access to their data and withholds it until a ransom is paid. Example: WannaCry Fileless Malware :Makes changes to files...
  6. C

    JSSHELL | reverse shell

    Hi guys, I found a tool which serves to establish a "reverse shell" in cases of detection of stored XSS. JSSHELL, enables navigation within the container that hosts the XSS vulnerability, which in turn allows the inspection of various files, domains and users present in that environment, thanks...
  7. C

    Windows privilege escalation (cheatsheet)

    Hi, check out this cheat sheet, it's intended for OSCP wannabees to help them understand the various methods of privilege escalation on Windows and CTF based machines with examples. There are several ways to accomplish the same task. it's great...
  8. C

    firewall evasión | Packet fragmentation

    Packet fragmentation A common technique for evading firewalls is to fragment data packets so that they are sent in separate parts. This makes it difficult to detect malicious traffic, as the firewall may not be able to reconstruct the entire contents of the packet and analyze it properly...
  9. C

    Acquire a Free Temporary Number

    1.- Access this web page: http://vsimcard.com/member.php 2.- Log in with the credentials vscguest:vscguest. 3.-. In the center field, select any number with the label "Paid". 4.- click the Load SMS button and use the temporary number in the service you need. you can use this tool for...
  10. C

    Frosty VPN [ V2 ]

    When it comes to the security of a VPN connection, it is important to choose the right protocol. In general, it is recommended to use L2TP in combination with IPsec for a more secure VPN connection. This provides a higher level of encryption and data protection while transmitting through the VPN...
  11. C

    DNS Anonymous

    Great contribution bro it would be beneficial to separate code responsibilities into classes or methods, use more descriptive variable names, validate user input, handle exceptions more specifically, improve security, and separate the user interface from the business logic. These theoretical...
Top Bottom