• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

can

  1. O

    what hosts do you recommend on which you can put a warrior

    what hosts do you recommend on which you can put a warrior
  2. itsMe

    Phyton Pycrypt - Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products

    How To Use:     Find Any Python Based Backdoor/RAT on github.     Crypt its payload with pycrypt     Now Convert crypted payload to exe using pyinstaller     Enjoy Note:     Don't Upload Any Payloads To VirusTotal.com Bcz This tool will not work with Time.     Virustotal Share Signatures...
  3. S

    can i actually learn hack here?

    title says question... can learn hacking here?
  4. dEEpEst

    I am new or I have a lower rank, how can I react?

    To be able to react to the Post and thus be able to download the content, You must post 5 quality messages. Replying to the Post of others does not count as a message. When you have 5 quality Post your rank will be uploaded and you will be able to react and download.  The process will be...
  5. itsMe

    Phyton pycrypt - Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products

    Important:     Make Sure your payload file have all the libraries import and it will be a valid payload file How To Use:     Find Any Python Based Backdoor/RAT on github.     Crypt its payload with pycrypt     Now Convert crypted payload to exe using pyinstaller     Enjoy Note:     Don't...
  6. dEEpEst

    What can be done with an IP address?

    What can be done with an IP address? a simple question but the answer is not so simple. Some of you may already be known about IP addresses. An IP address is like your internet address, every device which is connected to an internet or computer network has a unique IP address, such as your...
  7. dEEpEst

    Can We Do Cracking On Our Laptop Or Computer? 

    CAN WE DO CRACKING ON OUR LAPTOP OR COMPUTER?  - I always say don't use your own PC for cracking and stuff like this! why?! cause cracking need HQ speed Internet and traffic - your IP address will be ban by google - Virus , Malware or backdoor can come into your computer. Your privacy...
  8. itsMe

    Reverse Engineering VulFi v1.0 - Plugin To IDA Pro Which Can Be Used To Assist During Bug Hunting In Binaries

    Introduction The VulFi (Vulnerability Finder) tool is a plugin to IDA Pro which can be used to assist during bug hunting in binaries. Its main objective is to provide a single view with all cross-references to the most interesting functions (such as strcpy, sprintf, system, etc.). For cases...
  9. dEEpEst

    What can be done with an IP address?

    What can be done with an IP address? What can be done with an IP address? a simple question but the answer is not so simple. Some of you may already be known about IP addresses. An IP address is like your internet address, every device which is connected to an internet or computer network has...
  10. itsMe

    Phyton Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients

    Jarbou3 is rat tool with coded in python with C&C which can accept multiple connections from clients Features     C&C server which can accept multiple clients     builder     Undetectable     Steal chrome passwords     Steal Discord Token     Persistence     download + upload files    ...
  11. itsMe

    Ipsourcebypass - This Python Script Can Be Used To Bypass IP Source Restrictions Using HTTP Headers

    Features     17 HTTP headers.     Multithreading.     JSON export with --json outputfile.json.     Auto-detecting most successfull bypasses. Hidden content
  12. dEEpEst

    How can you prevent a cyber attack ?

    How can you prevent a cyber attack ? - There is no guaranteed way for any organization to prevent a cyber attack, but there are numerous cybersecurity best practices that organizations can follow to reduce the risk. - Reducing the risk of a cyber attack relies on using a combination of skilled...
  13. W

    Where we can scan samples without share it ?

    Hi, I want to take advantage of my inactivity to ask, what services are currently left where samples can be scanned without being shared with AV companies?
  14. itsMe

    Bug's Feed - local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities.

    Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities... It's implemented as a PWA application so you can get rid of the explorer and use it as a desktop application. Navigate through different tabs and take a look to the latest bugs or...
  15. itsMe

    C/C++ SiteStealer - You can steal unencrypted sites(http://)

    If you are using linux machine use "SiteStealer_Linux". if you are using windows machine use "SiteStealer_Windows". Hidden content
  16. itsMe

    C/C++ BackDoorAccess - You can make reverse shells [C]

    You can make reverse shells ^-^ TCPPortFlooder is simple TCP flooder. If you want to flood target and you have linux machine use "TCPPortFlooder_Linux" If you want to flood target and you have windows machine use "TCPPortFlooder_Windows" Hidden content
  17. dEEpEst

    What can be done with an IP address?

    What can be done with an IP address? What can be done with an IP address? a simple question but the answer is not so simple. Some of  you  may already known about IP addresses. An IP address are like your internet address, every device which is connected to internet or computer network have a...
  18. dEEpEst

    Things You Can Do Using Metaspolit Framework 

     THINGS YOU CAN DO USING METASPOLIT FRAMEWORK  1. Pre-engagement interactions: This step defines all the pre-engagement activities and scope definitions, basically everything you need to discuss with the client before the testing starts. 2. Intelligence gathering: This phase is all about...
  19. B

    Can my ISP tracking me

    hi all  1- Can my service provider track me even i use VPN like Nord VPN ?? 2- can they track My activities what i am I do like site i Visiting or what i downloading ?? 3- is they have some soft or hard ware to decrypt my track and decrypt my connection ?? 4- i am using nord vpn...
  20. dEEpEst

    You can change your friends profile picture into your WhatsApp on your mobile only but not Globally

    Hidden content
Back
Top