• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

hidden

  1. dEEpEst

    Hide Malicious Files in Images

    Understanding Steganography: How Attackers Hide Malicious Files in Images and How to Protect Yourself Introduction Steganography is the art of hiding data or files within seemingly harmless content, such as images, audio, or videos. Cybercriminals often use steganography to conceal malware or...
  2. dEEpEst

    Thedevilseye - Public An osint tool that uses Ahmia.fi to get hidden services and descriptions that match with the users query

    An osint tool that uses Ahmia.fi to get Tor hidden services and descriptions that match with the users query. Hidden content
  3. itsMe

    IPS IPS Plugin (k4) Hidden Content 2.3.0

    Plugin for hiding content from prying eyes. Works in applications:     Forums.     Downloads.     Blogs.     Clubs.     Gallery.     Pages. Settings on the screenshot. Customize it at your discretion or leave it as it is.     Select the necessary groups for which you want to hide...
  4. S

    Hidden CPLApplet Builder V2.0 Bin

    ✅ injection in explorer.exe ✅ Hidden schtasks ✅ WDExcluion ✅ Anti Analysis ✅ Offline - Online ✅ Change Path ✅ Super Hidden ❇ X64/X86 Bit Hidden content Hidden content Enjoy 
  5. dEEpEst

    C/C++ Pandora hVNC Hidden Browser C# & C++ Hvnc

    Pandora hVNC Hidden Browser C# & C++ Hvnc Info WebGL Support - Hidden Desktop - Copy/Paste internal - Encrypted Connection - File Manager Internal - C#/C+ + (Native) Crypter Compatibility - IPV4/ DNS Support - WD Exclusion No Popups - Quality Support - Browser Profile Cloner -...
  6. itsMe

    Hidden Miner Builder v1.4.4

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart...
  7. itsMe

    Tornado - Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Portforwarding

    What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward...
  8. itsMe

    Phyton Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks

    Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also...
  9. itsMe

    Tornado: Anonymously Reverse shell over Tor Network using Hidden Services without portfortwarding

    Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have...
  10. itsMe

    CloudFail v1.0.4 - find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Disclaimer This tool is a...
  11. A

    RAT PANDORAHVNC | $ 1199 / LIFETIME | 2FA BYPASS | CLONE PROFILE | HIDDEN DESKTOP

    PandoraHVNC Cracked with offline builder builder + source Use only in VM / VPS / RDP Hidden content Ps. password is mCFL8uUyZPD2h2qp
  12. itsMe

    Phyton Poiana - Reverse shell over TOR network using hidden services

    Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws will be added, so url becomes available outside tor network -> Generate batch .rc file for msfconsole Hidden content
  13. itsMe

    CloudFail v1.0.3 - find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.     Misconfigured DNS scan...
  14. itsMe

    Cracking How To ByPass Hidden / Invisible H-Captcha in Openbullet

    Hidden content
  15. itsMe

    Hidden Miner Builder v1.4.2

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart...
  16. itsMe

    Hidden Miner Builder v1.4.1

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart...
  17. itsMe

    Cyrobo Hidden Disk Pro 5.02 Multilingual

    Cyrobo Hidden Disk Pro – There are many ways to store your data securely on your PC, and numerous applications designed to aid you in this endeavor. However, complex tools tend not to be very user-friendly, and using them on a daily basis may reduce your productivity.Hidden Disk, on the other...
  18. itsMe

    Hidden Miner Builder v1.4.0

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart...
  19. dEEpEst

    How To Detect A Hidden Camera In A Room.

    HOW TO DETECT A HIDDEN CAMERA IN A ROOM. When you stay in a hotel, how do you know there is no room secret pinhole camera? When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be...
  20. itsMe

    Hidden Miner Builder v1.3.9

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart...
Back
Top