BidenCash Shop
Rescator cvv and dump shop
adv ex on 30 October 2024
Patrick Stash
banner expire at 13 August 2024
Kfc Club
Yale lodge shop
UniCvv
Carding.pw carding forum
swipe store
casino

hackers forum

  1. B

    Trigmap - A Wrapper For Nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  2. B

    Brutemap - Tool That Automates Testing Accounts

    Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? only to find parameter forms, because...
  3. B

    Bandit - Tool Designed To Find Common Security by top carding forum

    Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
  4. B

    Scavenger - Crawler Searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  5. B

    Flashsploit - Exploitation Framework

    Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible (.ino) Scripts based on User Input and then Starts a Listener in Metasploit-Framework if Required by the Script, in Summary ...
  6. B

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  7. B

    XSSCon - Simple XSS Scanner Tool

    Powerfull Simple XSS Scanner made with python 3.7 Installing Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: Usage Basic usage: Advanced usage see help: Roadmap v0.3B: Added custom options ( Such --proxy, --user-agent etc... ) First...
  8. B

    SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

    sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the...
  9. B

    HiddenWall - Linux Kernel Module Generator

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
  10. B

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  11. B

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version...
  12. B

    H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

    A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Features Fast and portable - install hyper and run. Multiconnection scanning. Multithreaded connections. Scalable: scans can be as docile or aggressive as you configure them to be. h2 and h2c...
  13. B

    Kubolt - Utility For Scanning Public Kubernetes Clusters

    Kubolt is a simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Why? Sometimes, the kubelet port 10250 is open to unauthorized access and makes it possible to run commands inside the containersusing getrun function from kubelet: How? Okay...
  14. B

    Brutality - A Fuzzer For Any GET Entries

    A fuzzer for any GET entries. Features Multi-threading on demand Fuzzing, bruteforcing GET params Find admin panels Colored output Hide results by return code, word numbers Proxy support Big wordlist Colored Usages Install Download Brutality
  15. B

    Wpbullet - A Static Code Analysis

    #1 A static code analysis for WordPress Plugins/Themes (and PHP) Installation Simply clone the repository, install requirements and run the script Usage Available options: Creating modules Creating a module is flexible and allows for override of the BaseClass methods for each module as...
  16. B

    PhoneSploit - Using Open Adb Ports We Can Exploit A Devive

    Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” I will soon make a tutorial on how to use PhoneSploit Install Download PhoneSploit
  17. B

    Vulners Scanner for Android - Passive Vulnerability Scanning

    Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases. It implements technology of passive vulnerability scanning based on software version fingerprint. The application does not perform any malicious requests, fuzzing or any...
  18. B

    ReverseTCPShell - PowerShell ReverseTCP Shell, Client & Server

    Reverse Encrypted (AES 256-bit) Shell over TCP - using PowerShellSecureString. Attacker (C2-Server Listener): Analyze Encrypted Traffic: Download ReverseTCPShell
  19. B

    Indian Live!

    CCnum:: 4591650000389493 Cvv: 686 Expm: 10 Expy: 25 Fname: Christy Lname: John Parappallil Address: No.252nd Street Rukmani Nagar Maduravoyal City: CHENNAI State: Zip: 600095 Country: INDIA Phone: 9962053495 Email:
  20. B

    2 High Balance France Live by top carder forum

    4978744071613775|09|2024|800|FRANCE|Guyader Caroline|23 rue de la Bucaille|Aincourt||95510||[email protected]| 4978742367127823|09|2024|802|FRANCE|Regnier|31 impasse du clos Dubois - Appart. 3.4.|Villars les dombes||01330||[email protected]|
Top