BidenCash Shop
Rescator cvv and dump shop
adv ex on 30 October 2024
Patrick Stash
banner expire at 13 August 2024
Kfc Club
Yale lodge shop
UniCvv
Carding.pw carding forum
swipe store
casino

stealer

  1. B

    ReconT - Reconnaisance / Footprinting / Information Disclosure by verified carding forum

    Recon-Tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from. Features Information Security Headers WAF Detector Banner Grabbing Phone Number Credit Card Number Email US Social Security Number Url Crawl Dom Paramter Url Internal...
  2. B

    iCULeak - Tool To Find And Extract Credentials

    Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager). When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...
  3. B

    PAnalizer - Pornography Analizer And Face Searching

    PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also, you can search a specific person in the image set, is necessary give to the application a few pictures of the person of interest. Download PAnalizer
  4. B

    FinalRecon - OSINT Tool For All-In-One

    FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as: Header Information WHOIS SSL Certificate Details Found Flag in SSL Certificate -...
  5. B

    Sn1per v7.0 - Automated Pentest Framework

    Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to...
  6. B

    Findomain - A Cross-Platform Tool

    A cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. How it works? It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it...
  7. B

    WAFW00F v1.0.0 by carding forum

    WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. How does it work: To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of...
  8. B

    PasteShr 1.6 SQL Injection

    PasteShr version 1.6 suffers from multiple remote SQL injection vulnerabilities. MD5 | 7a51baa5eca6c04a0eb42f1e84db549c Download
  9. B

    Miteru - An Experimental Phishing Kit Detection Tool

    Miteru is an experimental phishing kit detection tool. How it works It collects phishy URLs from the following feeds: CertStream-Suspicious feed via urlscan.io OpenPhish feed via urlscan.io PhishTank feed via urlscan.io Ayashige feed It checks each phishy URL whether it enables directory...
  10. B

    Trigmap - A Wrapper For Nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  11. B

    Brutemap - Tool That Automates Testing Accounts

    Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? only to find parameter forms, because...
  12. B

    Bandit - Tool Designed To Find Common Security by top carding forum

    Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
  13. B

    Scavenger - Crawler Searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  14. B

    Flashsploit - Exploitation Framework

    Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible (.ino) Scripts based on User Input and then Starts a Listener in Metasploit-Framework if Required by the Script, in Summary ...
  15. B

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  16. B

    XSSCon - Simple XSS Scanner Tool

    Powerfull Simple XSS Scanner made with python 3.7 Installing Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: Usage Basic usage: Advanced usage see help: Roadmap v0.3B: Added custom options ( Such --proxy, --user-agent etc... ) First...
  17. B

    SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

    sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the...
  18. B

    HiddenWall - Linux Kernel Module Generator

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
  19. B

    VulnX - CMS And Vulnerabilites Detector

    Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more... Instead of injecting shell and checking it works like all the...
  20. B

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    Functions Of CMSeek: Basic CMS Detection of over 170 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration Plugins Enumeration Theme Enumeration Detects Users (3 Detection Methods) Looks for Version Vulnerabilities and much more! Advanced Joomla Scans Version...
Top