• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

extract

  1. dEEpEst

    Hacking Instagram - Using DevTools to extract data

  2. itsMe

    Cracking Capture Remover - Remove Capture From Combos - Extract Combos

    Hidden content
  3. itsMe

    Cracking Extract Domains From a Combo

    Hidden content
  4. itsMe

    Phyton Learn how to extract data from webpages using Python

    You can automatically extract and scrape data from websites using the Python script. What you’ll learn     To begin with, create a Python environment.     Make a virtual environment and activate it.     Create a Python script.     A Python Script Prototype     Using a Python script, extract...
  5. itsMe

    Reverse Engineering XLM Macro Deobfuscator v0.2.6 - Extract and Deobfuscate XLM macros

    XLM Macro Deobfuscator XLM Macro Deobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code. It supports both xls, xlsm, and xlsb formats. It uses xlrd2, pyxlsb2...
  6. itsMe

    RDWA recon: extract information from a Microsoft Remote Desktop Web Access application

    This python script allows to extract of various information from a Microsoft Remote Desktop Web Access (RDWA) application, such as the FQDN of the remote server, the internal AD domain name (from the FQDN), and the remote Windows Server version. Hidden content
  7. itsMe

    Learn to get proxies from sites and extract them and filter healthy proxies

    Learn to get proxies from sites and extract them and filter healthy proxies Hidden content
  8. itsMe

    Reverse Engineering XLM Macro Deobfuscator v0.2.3 - Extract and Deobfuscate XLM macros

    XLM Macro Deobfuscator XLM Macro Deobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code. It supports both xls, xlsm, and xlsb formats. It uses xlrd2, pyxlsb2...
  9. itsMe

    Reverse Engineering XLM Macro Deobfuscator v0.2 - Extract and Deobfuscate XLM macros

    XLM Macro Deobfuscator XLM Macro Deobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code. It supports both xls, xlsm, and xlsb formats. It uses xlrd2, pyxlsb2...
  10. itsMe

    Phyton Toutatis: extract information from instagrams accounts such as e-mails, phone numbers

    Toutatis is a tool that allows you to extract information from Instagrams accounts such as e-mails, phone numbers, and more. Example Informations about     : xxxusernamexxx Full Name              : xxxusernamesxx | userID : 123456789 Verified               : False | Is buisness Account ...
  11. itsMe

    Reverse Engineering XLMMacroDeobfuscator - Extract And Deobfuscate XLM Macros

    XLMMacroDeobfuscator - Extract And Deobfuscate XLM Macros (A.K.A Excel 4.0 Macros) XLMMacroDeobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code. It supports...
  12. itsMe

    ADCollector v2.0 - extract valuable information from the Active Directory environment

    ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point. Notes: ADCollector is not an alternative to the powerful...
  13. itsMe

    Reverse Engineering Lst2X64Dbg - Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database

    This script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels. The LST file can be generated in IDA from the File menu: Produce file -> Create LST file... Hidden...
  14. itsMe

    Seth - Perform A MitM Attack And Extract Clear Text Credentials From RDP Connections

    Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests...
Back
Top