Search results

  1. H

    Introduccion C#

    as far as I can see you can't load the pdf bro, could you share your source or update the link please
  2. H

    browser to check dubious links

    It is like browserling (already well known) but this one takes about 10 minutes per session, unlike the other one which takes 3 minutes. It is good to know more options I share both links with you https://browser.lol/create https://www.browserling.com/
  3. H

    Cobaltstrike UDRL with memory evasion

    OdinLdr (https://github.com/RtlDallas/OdinLdr) Feature : • Redirect all WININET call over callstack crafting • Encrypt beacon during sleep • Encrypt beacon heap during sleep • Self delete of loader Execution of loader: 1 - Create heap for beacon usage 2 - Allocation of RWX area with beacon...
  4. H

    CVE-2024-23897: Jenkins RCE PoC

    CVE-2024-23897: Jenkins RCE PoC https://github.com/binganao/CVE-2024-23897 https://github.com/wjlin0/CVE-2024-23897 scanner: https://github.com/xaitax/CVE-2024-23897
  5. H

    Source code trojans/botnets

    Thanks bro, is there any tutorial on how to use it, I'm not good with programming 😖
  6. H

    Easyliker Script - Facebook Autolike

    thanks for sharing, the link works fine, let's try it...
  7. H

    data contains 696 names, addresses, phone numbers, emails and full credit card detail

    thanks bro where and when is the data from?
  8. H

    job interview questions?

    for cybersecurity analyst or related job positions for example.
  9. H

    How to start hacking?

    I forgot to put reply 😅
  10. H

    New google dork for simplenews/admin

    Interesting, it didn't show me many results but it's good to know a new specialized search by google, thanks for sharing.
  11. H

    [SQL Injection] Error Based

    thanks for sharing bro, it's very useful for my manual tests.
  12. H

    How to start hacking?

    mmm you can start by using osint tools, then see a little web penetration for this you must have knowledge of linux and burp suite, in the forum there are quite a few courses, I recommend that you search :)
  13. H

    Best free proxy scraper software that you should known

    very useful tool, the best thing is free, thanks man, I will check it out and hope it works.:)
  14. H

    Antivirus evasion tools

    Some people believe that scanning files on websites like VirusTotal guarantees that the file is clean. Which is not so true.... there are antivirus evasion tools, for example: Antivirus Evasion Tool (AVET): post-processing exploits containing executable files that target Windows machines to...
  15. H

    (FREE) [Blackhat] - Javascript Injection Tutorial

    interesting, I'm a little late but thanks for the info bro, I'll try my luck
  16. H

    how to brute force

    What methods or processes do you think are best or have worked best for you to perform brute force?
  17. H

    6 Ethical Hacking Ebook

    nice! I had heard of some, the new ones I looked at look interesting, it's always interesting and fun to read and more this kind of books, thank you very much for sharing.
  18. H

    Need Crypter

    404 Cryptor is good -> https://crackingteam.to/threads/404-crypter-cracked.59254/ Crypts and Folders Pack -> https://crackingteam.to/threads/crypters-binders-pack.32078/ I hope it helps you :)
  19. H

    BucketLoot (Offensive Security Tool)

    BucketLoot -> Offensive Security Tool An Automated S3-compatible Bucket Inspector This tool is capable of inspecting buckets deployed on Amazon Web Services (AWS), Google Cloud Storage (GCS), DigitalOcean Spaces, and even custom domains/URLs that may be linked to these platforms. It provides...
  20. H

    programming languages for pentesters

    PYTHON Python is the most popular choice for penetration testers due to its versatility and extensive libraries for cybersecurity. Difficulty level: Beginner friendly Use cases: Sub-domain enumeration Exploit scripts Automate scanning BASH Bash scripting is essential for automating tasks and...
Top Bottom