• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

research

  1. dEEpEst

    OpenAI research on the potential of the new GPT-4 version and how they need to limit its potential for malicious purposes.

    OpenAI recently launched an investigation of the potential of its new version GPT-4. In the study you can see its potential for malicious purposes. OpenAI worked to restrict all those responses. For example: As you can see GPT-4 becomes macabre without the restrictions of OpenAI. You can...
  2. itsMe

    Hetty v0.6 - HTTP toolkit for security research

    Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features     Man-in-the-middle (MITM) HTTP/1.1 proxy with logs    ...
  3. itsMe

    Hetty v0.5.1 - HTTP toolkit for security research

    Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features     Man-in-the-middle (MITM) HTTP/1.1 proxy with logs    ...
  4. itsMe

    Hetty - An HTTP Toolkit For Security Research

    Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features     Man-in-the-middle (MITM) HTTP/1.1 proxy with logs    ...
  5. itsMe

    Hetty v0.2.1 - HTTP toolkit for security research

    Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features/to do      HTTP man-in-the-middle (MITM) proxy and GraphQL...
  6. E

    Stealer Stealth Screenshot Saver + Uploader (RESEARCH)

    This archive is the research for a trojan that takes screenshots from the system and upload to server. All hidden/stealth from the user. Features: 1) Custom server login (IP/Domain, Username, Password) 2) Custom number of screenshots to take 3) Upload to the server by FTP Download...
Back
Top