Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
adv exp at 30 July 2025
banner Expire 25 October 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    Crosslinked - LinkedIn Enumeration Tool

    CrossLinked simplifies the processes of searching LinkedIn to collect valid employee names when performing password spraying or another security testing against an organization. Using similar search engine scraping capabilities found in tools like subscraper and pymeta, CrossLinked will find...
  2. File_closed07

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  3. File_closed07

    HiddenWall - Linux Kernel Module Generator

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
  4. File_closed07

    SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

    sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the...
  5. File_closed07

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version...
  6. File_closed07

    H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

    A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Features Fast and portable - install hyper and run. Multiconnection scanning. Multithreaded connections. Scalable: scans can be as docile or aggressive as you configure them to be. h2 and...
  7. File_closed07

    Kubolt - Utility For Scanning Public Kubernetes Clusters

    Kubolt is a simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Why? Sometimes, the kubelet port 10250 is open to unauthorized access and makes it possible to run commands inside the containersusing getrun function from kubelet: How? Okay...
  8. File_closed07

    Brutality - A Fuzzer For Any GET Entries

    A fuzzer for any GET entries. Features Multi-threading on demand Fuzzing, bruteforcing GET params Find admin panels Colored output Hide results by return code, word numbers Proxy support Big wordlist Colored Usages Install Download Brutality
  9. File_closed07

    New Way To Relive Some Zinio File

    New Way To Relive Some Zinio File In order to be able to read the mags, you have to be connected to the internet when you open them for the first time. It creates an .xml file in a folder called "ContentGuard", located in "C:\Documents and Settings\User\Application Data\ContentGuard". (User is...
  10. File_closed07

    Wpbullet - A Static Code Analysis

    A static code analysis for WordPress Plugins/Themes (and PHP) Installation Simply clone the repository, install requirements and run the script Usage Available options: Creating modules Creating a module is flexible and allows for override of the BaseClass methods for each module as well as...
  11. File_closed07

    PhoneSploit - Using Open Adb Ports We Can Exploit A Devive

    Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” I will soon make a tutorial on how to use PhoneSploit Install
  12. File_closed07

    Amass - In-depth DNS Enumeration And Network Mapping

    The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the...
  13. File_closed07

    Userrecon-Py - Find Usernames In Social Networks

    Find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): Install with pip3: Building from Source Clone this repository, and: Update To update this tool to the latest version, run: Usage Start by printing the available actions by running userrecon-py --help...
  14. File_closed07

    Amass - In-depth DNS Enumeration And Network Mapping

    The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the...
  15. File_closed07

    Facebash - Facebook Brute Forcer In Shellscript Using TOR

    Facebook Brute Forcer in shellscript using TOR WARNING: Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h. Features Save/Resume sessions Anonymous attack through TOR Default Password List (+39k) Usage: Install requirements (Curl, Tor):
  16. File_closed07

    Python-Iocextract - Advanced Indicator Of Compromise (IOC) Extractor

    Advanced Indicator of Compromise (IOC) extractor. Overview This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It includes some encoded and "defanged" IOCs in the output, and optionally decodes/refangs them. The Problem It is common...
  17. File_closed07

    ANDRAX v3 - The First And Unique Penetration Testing Platform For Android

    ANDRAX The first and unique Penetration Testing platform for Android smartphones. Thanks to Jessica Helena she made ANDRAX v3 possible. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it...
  18. File_closed07

    Vulners Scanner for Android - Passive Vulnerability Scanning

    Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.It implements technology of passive vulnerability scanning based on software version fingerprint.The application does not perform any malicious requests, fuzzing or any other...
  19. File_closed07

    EASY HACKING WIFI ( TOOL AND TUTORIAL)

    Dumpper and Jumpstart are the two tools that can used to hack wifi networks. To hack using these tools you should have wireless adapter or laptop.if you have laptop you don't need wireless adapter. You also need a good wifi signal and the wifi shouldn't have mac. So first of all you need to...
  20. File_closed07

    How to make track1 with track2

    Short tutorial, on how to make track one with track 2. Take example of last dump Track2 (this is a dump): Example dump info: 4888603170607238=15051011203191805191 PATACSIL/DAVID Bank of America, N.A. (USA) CREDIT PLATINUM United States of America 4888603170607238=15051011203191805191...
Ad End 1 November 2024
Top