• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

hidden

  1. itsMe

    Hidden Miner Builder v1.3.8

    [+] Run from under the user without admin rights. [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart...
  2. itsMe

    Hidden Malware Builder V1.0

    Requirements: Net Framework 4 Features: 1- Hide server from Process 2- Hide server from startup 3- Hide server from scheduled tasks 4- Hide the server from the hard drive 5- Run as administrator permanently 6- Anti Virtual Machine 7- Kill Botnet Before Run 8- Change Assembly 9- Change Icon 10-...
  3. itsMe

    SubDomainizer v2.0 - find subdomains hidden in inline and external Javascript files of page

    SubDomainizer SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascript present in the given URL. This tool also finds S3 buckets, cloudfront URL’s and more from those JS files which could be interesting like S3 bucket is...
  4. itsMe

    lorsrf: Bruteforcing on Hidden parameters to find SSRF vulnerability

    lorsrf Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods. Hidden content
  5. itsMe

    URLCADIZ - A Simple Script To Generate A Hidden Url For Social Engineering

    A simple script to generate a hidden url for social engineering. Legal disclaimer: Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are...
  6. dEEpEst

    Windows Access the hidden start menu of Windows 10

    Hidden content
  7. itsMe

    Hidden Eye: Modern Phishing Tool with Advanced Functionality

    Introduction Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc. Hidden Eye Logo Disclaimer...
  8. dEEpEst

    [DEEP WEB LINKS] Hidden Service lists and search engines

    Hidden content
  9. itsMe

    CloudFail: find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.     Misconfigured DNS scan...
  10. dEEpEst

    Stealer Hidden miner builder

    [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart...
  11. dEEpEst

    Crypter HiDDen PerSOn Crypter Green FUD Free 2019

    Scan: https://spyralscanner.net/result.php?id=mxUFv1GHbf   Download: Hidden content Passwoord: level23hacktools.com
  12. dEEpEst

    Crypter HiDDen PerSOn Crypter

    Scan: https://spyralscanner.net/result.php?id=JVFjmpvmTb   Download: Hidden content Password: level23hacktools.com
  13. dEEpEst

    Hidden TeamViewer

    It can do everything that he can complete teamviewer , only secretly. Based on version 4. Digital signatures are in place. Prescribed in autostart. ID comes in the mail. Mail and change the password to connect to TeamViewer.ini (email / tvpass) Download: Hidden content Password...
Back
Top