Jump to content

Search the Community

Showing results for tags 'tools'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 23 results

  1. Virustotal: https://www.virustotal.com/gui/file/d177c6de17fe9ee456edddaf814aac4107a239fced43994364b57678c751cfc5/detection Download: // Removed Password RAR: 1 http://blackhat.forumotion.asia https://blackhat8.blogspot.com
  2. Un mic tool ce genereaza ascunde payload-uri Metasploit sau PowerShell ce sunt ascunse in fisierele folosite de MSBuild.exe (.csproj/.xml/etc). Articol de prezentare: https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/ GitHub repo: https://github.com/trustedsec/nps_payload (recomand sa cititi si articolul, README.md e cam chel)
  3. O mica jucarie pentru cei ce se ocupa cu Reverse Engineering. Momentan doar pentru Windows, arhitecturi x86 si x86_64. Articol: http://blog.talosintelligence.com/2017/07/pyrebox.html Repo: https://github.com/Cisco-Talos/pyrebox
  4. o Sensepost Footprint Tools o Big Brother o BiLE Suite o Alchemy Network Tool o Advanced Administrative Tool o My IP Suite o Wikto Footprinting Tool o Whois Lookup o Whois o SmartWhois o ActiveWhois o LanWhois o CountryWhois o WhereIsIP o Ip2country o CallerIP o Web Data Extractor Tool o Online Whois Tools o What is MyIP o DNS Enumerator o SpiderFoot o Nslookup o Extract DNS Information • Types of DNS Records • Necrosoft Advanced DIG o Expired Domains o DomainKing o Domain Name Analyzer
  5. Hello After Collecting Best Of Denial Of Service Attack Tools, I decided To Share Them With You So, I Already Scanned All Tools And Removed Backdored one This Is A list Of Tools : - Anonymous Doser - Hoic - Hulk - Loic - SlowLoris - Unknow Doser - XOIC This is A picture : Now For The Download Link:* ddos attack tools
  6. The hacker says this demonstrates that when organizations make hacking tools, those techniques will eventually find their way to the public. In January, Motherboard reported that a hacker had stolen 900GB of data from mobile phone forensics company Cellebrite. The data suggested that Cellebrite had sold its phone cracking technology to oppressive regimes such as Turkey, the United Arab Emirates, and Russia. Now the hacker responsible has publicly released a cache of files allegedly stolen from Cellebrite relating to Android and BlackBerry devices, and older iPhones, so
  7. Download Private tools 1337w0rm.php
  8. Scan..: https://www.virustotal.com/en/file/c5af6a67789d4e7d54262a119ff10162257cb653b848c827fc86fb201dcaa62f/analysis/ Link: https://www.sendspace.com/file/rh30ko
  9. Top 10 Free Wireless Network hacking tools for ethical hackers and businesses
  10. FITA is a most preferred Ethical Hacking Course.This Ethical Hacking Course acts as the foundation stone in your career to be a Penetration Tester and providing security to networks and websites. With all the latest tools and real-time hacking techniques, this Ethical Hacking Course gives you practical approach and simulated environment to test the attacks and assess the vulnerabilities.
  11. Aerosol

    kcsoftwares

    Windows free useful tools. Check it: KC Softwares
  12. Google Earth Pro is a 3D interactive globe that can be used to aid planning, analysis and decision making. Businesses, governments and professional users from around the world use Google Earth Pro data visualization, site planning and information sharing tools. Google Earth Pro includes the same easy-to-use features and imagery of Google Earth, but with additional professional tools designed specifically for people who need it for more than entertainment purposes. Link: Free Google Earth Pro (100% discount)
  13. Product Description Ashampoo Snap 7 is the smartest way to capture screenshots, add notes and annotations and share them with your friends. With Ashampoo Snap 7 … … you capture images and videos right from your screen in seconds Capture rectangular regions Use free form capture for maximum flexibility Use timers for interval capturing … you have the tools to express yourself visually Get your message across with texts, hints and notes Command attention with arrows, shapes and stamps Use the pencil tool to draw freely … sharing becomes a breeze Save your screenshots to common image format
  14. Recomanda cineva un site de unde pot lua un VPS cu Windows pentru GSA si tools like that? De-asemenea caut si niste proxie-uri private, bune. Multumesc.
  15. Internet is now the basic need of our daily life. With the increasing use of smartphones, most of the things are now online. Every time we have to do something, we just use our smartphone or desktop. This is the reason wi-fi hotspots can be found everywhere. People also use wireless in their home network to connect all devices. Every person can see the neighborhood wi-fi networks in the system, and they want to use it for free. But most these networks are secured with a password key. You need to know this security key to access the network. When your own network is down, you will desperately w
  16. Contents Author BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 What is Pen-Testing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Pen-Testing vs. Vulnerability Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 How Vulnerabilities Are Identified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Why Perform Pen-Testing? . . . . . . . . . . . . . . . . . .
  17. daca am preluat un site de la cineva, si respectivul avea cont pe webmaster tools si analytics, si eu i cer sa scoata site-ul respectiv din contul lui, si il voi trece la mine, indexarea respectiv page rankul vor ramane la fel??
  18. Due to the lack of literature about DOM Based XSS identification tools awareness, we decided to write a paper that took the actual tools that are stated to be able to identify DOM Based XSS and test their capabilities when dealing with a real world DOM XSS issue. Minded Security has been the first company to launch a commercial tool aimed to identify DOM Based XSS with a runtime approach: DOMinatorPro. In 2012, as a result of our research on DOM XSS, we released the tainting engine on github.com as an open source project and created a commercial version that let users easily identify sev
  19. ebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with web application planning and exploitation. Suite currently contains a spectrum of efficient, fast and stable web tools (Crawler, Bruteforcer, Fuzzer, Proxy, Editor) and some extra functionality tools (Scripting Filters, List Generator, External Proxy). Download: Sunrise Technologies
  20. Aerosol

    iRET

    The iOS Reverse Engineering Toolkit is a toolkit designed to automate many of the common tasks associated with iOS penetration testing. It automates a many common tasks including: binary analysis using otool keychain analysis using keychain_dumper reading database content using sqlite reading log and plist files binary decryption using dumpdecrypted dumping binary headers using class_dump_z creating, editing, installing theos tweaks Installation: You can download the files and build the debian package yourself or you can simply install the iRET.deb package onto any jailbroken device using dp
  21. Avid Pro Tools HD v10.3.2 Incl Patch (WIN) 2013 Avid Pro Tools HD v10.3.2 Incl Patch (WIN) 2013 Avid Pro Tools HD v10.3.2 Incl Patch (WIN) 2013 | 1.82GB Avid Pro Tools HD 10 - Record, edit, and mix with the world's most advanced audio production platform. For projects that demand the utmost in sound quality and performance, Pro Tools HD software enables you to compose, record, edit, and mix big productions quickly and easily. The software comes with Pro Tools|HDX and Pro Tools|HD Native systems only. What's more, you get all of the same benefits of Pro Tools software 10 along with several
  22. -Pare destul de interesant, in unele cazuri aveti nevoie de tweepy pentru python daca primiti o posibila eroare de module 5. -Se pot afla chestii interesante despre geolocalizarea userilor dupa tweet's, followers, mentioned users, etc.. -O idee este de a putea vedea locurile frecventate, importand toate datele generate in google earth.. dupa coordonate pentru o posibila vizualizare mai buna. -Aveti nevoie de un cont de twitter normal a putea folosi API. //daca vreti ceva mai simplu si cu gui --> http://ilektrojohn.github.io/creepy/ (windows & linux) tinfoleak is a simple Python script t
  23. An Intro to CSS: Finding CSS Selectors by Zandy Ring on July 25, 2013 Last month, we introduced a series on CSS (Cascading Stylesheets) and talked a bit about how you can use CSS to make your site look just the way you want. Today, let’s dive back in! WHAT’S A SELECTOR, AND WHY DO I NEED IT? After reading the last Intro to CSS post, you may have been left wondering how to find CSS selectors to target on your site. A selector is the code a site uses to make changes to how things display. In this post, we’ll look at how to find these selectors in any theme. To quickly recap the last post, we loo
×
×
  • Create New...