Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

  1. Karma05

    Udemy - 2022 Professional MS EXCEL Course with Real Applications

    2022 Professional MS EXCEL Course with Real Applications 2.19GB https://www.udemy.com/course/professional-ms-excel-course-with-real-applications/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. mayoufi

    Debugging JavaScript Applications

    Released 10/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Beginner | Genre: eLearning | Language: English + vtt | Duration: 1h 35m | Size: Debugging is an art, and mastering this art is a huge advantage. This course will teach you the basic concepts of debugging. Then...
  3. oiun098

    Infiltrating the Shadows: Exploiting Weaknesses in Web Applications

    "SQL Injection: Breaking Data Barriers" Learn the art of injecting malicious SQL commands to exploit security flaws in web applications. Discover how to manipulate databases and gain access to sensitive information. "Cross-Site Scripting (XSS): Controlling the Browser's Mind" Explore the wicked...
  4. madara11

    Building of Web3 Token Balance Applications

    https://www.udemy.com/course/building-of-web3-token-balance-application/?couponCode=CC18A811BEB6A5B468A0
  5. carxproveteran

    Building of Web3 Token Balance Applications

    Building of Web3 Token Balance Applications Web3/Blockchain Course by MTF Institute and QuickNode What you'll learn Building of a token balance app where you enter a wallet address and get all the tokens in the wallet and all the token balances In addition to balances, fetch a detailed history...
  6. omarosama

    Git for MATLAB Users

    Practical course on Git and MATLAB What you'll learn Why use Git How to use Git with MATLAB MATLAB Projects Resolving Git Conflicts First tests with MATLAB Testing Setting up GitHub Actions with MATLAB Requirements Basic MATLAB knowledge torrent link ...
  7. omarosama

    Go for Real World Applications

    Writing, testing, Dockerizing, and deploying Go apps What you'll learn Scaffolding a go project and writing a main go file as well as additional packages Dockerizing a Go application Writing basic tests in Go Orchestrating a CI/CD pipeline that first runs tests the deploys the Dockerize go...
  8. 2uaqn3hk

    Epic Web - Ship Modern Full-Stack Web Applications

    Epic Web - Ship Modern Full-Stack Web Applications *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. carxproveteran

    Web Applications Step by Step Guide Part 4

    Web Applications Step by Step Guide Part 4 What you should know about Online Transactions What you'll learn 1. What is the meaning of online transactions? 2. What are the various features of online transactions? 3. What are the benefits and limitations of online transactions? 4. What are the...
  10. carxproveteran

    Web Applications Step by Step Guide Part - 3

    Web Applications Step by Step Guide Part - 3 Web Applications What you'll learn What is meant by Web Server? What is the meaning of Web Browser? What is meant by URL? What is the difference between Blog and Website? *** Hidden text: You do not have sufficient rights to view the hidden text...
  11. carxproveteran

    Web Applications Step by Step Guide Part-2

    Web Applications Step by Step Guide Part-2 Web Applications What you'll learn 1. How data travels over net? 2. What is the difference between HTTP and HTTPS? 3. What is the difference between POP3 and IMAP? 4. What is the difference between File Transfer Protocol and Secure File Transfer...
  12. nicolas133729

    Adobe Applications - Photoshop, Illustrator, and more / course

    *Adobe Applications - Photoshop, Illustrator, and more:* https://mega.nz/folder/lBwGDQYa#WcSNTnwGi2Pq1UUltvmErw/aff=gavOAc1jA1U
  13. Gordan37

    EBook/Course  Deep Learning and its Applications using Python

    English | 2023 | ISBN: 978-1394166466 | 256 Pages | PDF, EPUB | 21 MB Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. janki

    PACKT - Building Professional Android Applications Training Video Course

    PACKT - Building Professional Android Applications Training Video Course https://drive.google.com/drive/folders/159XwqMS1DMgg9-A4kk8OcR8sXaKbJUAF
  15. carxproveteran

    Lean Six Sigma Applications in IT Industry

    Lean Six Sigma Applications in IT Industry You get to learn Six Sigma foundation and principles, concepts, and its application in IT Industry What you'll learn The goal of the course to bring best practices in the development process and improve the business processes by providing defect-free...
  16. tronny

    SANS - SEC522 - Defending Web Applications Security Essentials

    SANS - SEC522 - Defending Web Applications Security Essentials *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. carxproveteran

    Master Android by Building 3 Applications in Kotlin Language

    Master Android by Building 3 Applications in Kotlin Language Master the Art of Android App Development with Java by Building Real-World Applications What you'll learn Develop Android applications from scratch using Kotlin, the modern and expressive programming language for Android. Understand...
  18. carxproveteran

    Android Course Build 3 Applications from Scratch with Java

    Android Course Build 3 Applications from Scratch with Java Master the Art of Android App Development with Java by Building Real-World Applications What you'll learn Android app development from scratch, starting with the basics and progressing to advanced concepts. Building three complete...
  19. tronny

    Udemy - Pentesting and Securing Web Applications (Ethical Hacking)

    Udemy - Pentesting and Securing Web Applications (Ethical Hacking), by Daniel Slater *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. tronny

    Modernizing Legacy Applications to Microsoft Azure

    Modernizing Legacy Applications to Microsoft Azure EPUB *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** PDF *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. tronny

    Building AI Applications with ChatGPT APIs

    Building AI Applications with ChatGPT APIs EPUB *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** PDF *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. Wuhrvolty

    Recent Trends in AI Machine Learning and Network Security

    Advanced Computer Science Applications: Recent Trends in AI, Machine Learning, and Network Security PDF: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. ifxwej@pretreer

    Ethical Hacking: Pentesting And Securing Web Applications

    šŸ”°Ethical Hacking: Pentesting And Securing Web ApplicationsšŸ”° 1. Injection 2. Core Knowledge 3. Security Mindset 4. Client Side and Server Side 5. Authentication and Access Control 6. Cryptography 7. Cross Site Request Forgery 8. Deployment 9. External Packages 10. Monitoring and Response 11...
  24. egosdark

    The Python Mega Course Build 10 Real World Applications

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. addy12

    Awesome AI Finder | Access New AI Applications And ChatGPT Tools | 2023

    These websites will help you to find the AI you need to accomplish any task! No matter what, copywriting, brainstorming, coding, content writing, whatever you want, it will find something to help you out! AI Finder 261: https://ai-finder.net/ AI Finder acts as a search engine specifically...
  26. tronny

    LiveLessons - Hacking Web Applications - The Art of Hacking Series

    LiveLessons - Hacking Web Applications - The Art of Hacking Series Security Penetration Testing *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Use terabox app in ur android mobile. Then open welfare center, then select daily benefits and...
  27. tronny

    Attacking and Exploiting Modern Web Applications

    Attacking and Exploiting Modern Web Applications EPUB https://teraboxapp.com/s/1H9djUwAkQhVkgjA6rnGtbQ PDF https://teraboxapp.com/s/14AYNYaLYnFolY-eNbCPEaQ
  28. saqib2619

    Login:Pass  **Top free AI tools that make Android applications without programming**

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. dilblouch99

    Mobile Hacking, Reversing Android Applications

    https://lnkd.in/dsMJFWZm
  30. B

    Blockchain and Its Transformative Business Applications

    Blockchain technology has rapidly emerged as a game-changer in various industries, offering a decentralized and secure way to manage data and transactions. In this thread, let's dive into the fascinating world of blockchain and explore its transformative applications in the business landscape...
  31. x.MBM

    Webscript Applications

    Form Validation: Validate inputs like email, phone number, required fields Display error messages Disable submit on errors Example using regular expressions UI Enhancements: Create dropdown menus Toggle dark/light mode Build sliders, calendars, widgets Add drag and drop functionality APIs...
  32. groutless

    Login:Pass  Hacking Android Applications for Bug Bounty and Pentesting

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. cr4cr4cr4

    Udemy - Reverse Engineering Win32 Applications (9h + 5-6 resources)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. carxproveteran

    Lean Six Sigma Applications in IT Industry

    Lean Six Sigma Applications in IT Industry You get to learn Six Sigma foundation and principles, concepts, and its application in IT Industry What you'll learn The goal of the course to bring best practices in the development process and improve the business processes by providing defect-free...
  35. carxproveteran

    Writing Grants Applications For Nonprofit Organizations

    Writing Grants Applications For Nonprofit Organizations Learn How To Write Grant Applications For Nonprofit Organizations What you'll learn How to apply for Grants with higher success rate What to avoid when applying for funds How Grant Funding organizations work The reasons applications fail...
  36. Bl4ckc0d3

    Hacking Android Applications for Bug Bounty and Pentesting

    Download Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. P

    Building GUI Applications with Fyne and Go (Golang) course free download

    Requirements Familiarity with the Go programming language Mac or Windows computer and an Internet connection Description Many developers are intimidated by the idea of writing a desktop application, and this is probably because of the rise of web based applications. In fact, some university...
  38. borisbritva483

    Method/Tut  Bypass the selfie check in applications.

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. borisbritva483

    Method/Tut  Getting rid of the red screen of Google Safebrowsing.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  40. auxgreptz

    Login:Pass  Network in my daily activities like ghost

    A network refers to a group of interconnected nodes or objects. Networks can be found in various contexts, such as computer networks, social networks, transportation networks, and biological networks. In this post, we will explore some key concepts related to networks. Types of Networks: There...
  41. William N Nguyen

    Leaked-šŸ§Ø Hacking Web Applications - Hacking Exposed ("E-BOOKS") šŸ§Ø

    BOOK-LINK:https://mega.nz/file/LCYWWRYI#QQ8O9k6lp7vmYWzrbxbs8ItSVbYpSluYfktCxWURZGs Happy Hacking ;)
  42. mshefa

    Others  Best Virus Making Tool To Make Virus Apps and SMS For Whatsapp & Chats Apps

    Best Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. 0

    [DETAILED] Being Web Hacker

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. xenzyg

    best tools for hacking 2022-2023 pt.3

    Cain & Abel is an Operating System password recovery tool provided by Microsoft. It is used to recover the MS Access passwords It can be used in Sniffing networks The password field can be uncovered. It Cracks encrypted passwords with the help of dictionary attacks, brute-force, and...
  45. doek22

    Multi/Others  MICROSOFT OFFICE 2013 SP1 PRO 15.0.5423.1000 MULTI AUGUST 2022 (X86/X64)

    MICROSOFT OFFICE 2013 SP1 PRO PLUS VL 15.0.5423.1000 MULTILINGUAL AUGUST 2022 (X86/X64) Microsoft Office 2013 SP1 Pro Plus VL 15.0.5423.1000 Multilingual August 2022 (x86/x64) Windows x86/x64 | Languages: English, German, French, Spanish, Italian, Portuguese | File Size: 3 GB / 3.2 GB A new...
  46. doek22

    Multi/Others  R-WIPE & CLEAN 20.0.2365

    R-WIPE & CLEAN 20.0.2365 R-Wipe and Clean is a complete R-Tools solution to remove useless files, free up your disk space, and clean various privacy-compromising information on your online and offline activity. This includes internet history and cookies, lists of downloaded files and opened...
  47. Hackertribune

    Course/Tutorial  Most Requested Hacking Books ( Hacking Web Applications )

    Most Requested Hacking Books by #HackerTribune [ GIVING FREE FOR YOU ] *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Download before its DELETED ~dnt forget to like and comment :)
  48. wonderland

    Lucifer V.1.2 HTTP Botnet || Stealer & Grabber

    Lucifer v.1.2 HTTP Botnet || Stealer & Grabber recover stored web login passwords from following browsers Firefox Google Chrome Microsoft Edge Internet Explorer UC Browser Torch Browser Chrome Canary/SXS CoolNovo Browser Opera Browser Apple Safari Flock Browser SeaMonkey Browser...
  49. peebeekay

    Brute Multi/Others  Macro Office Exploit Builder - Spread Your Files EZ

    MacroPack Community is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. It also handles various shortcuts formats. This tool can be used for red teaming, pentests, demos, and social engineering assessments. MacroPack will...
  50. R

    Mail Brute Brute SQLi/Dork Proxy Combo Tools Hash Multi/Others  ALL CODING ACTIVITY

    Any Script , Bot AutoSignup BOT AutoSignIn BOT AutoDonation BOT Special BOT AutoCheckout BOT AutoShop BOT AutoAccount Creator BOT AutoApply BOT (Unployemenet)(SBA)(PUA)(Navy)(SCHOOL(EDUMAIL)) LEVEL Checker , Brute Send Result Via Telegram Bruteforce Tools Dictionary Attack Tools...
Top Bottom