1. rayssen

    How To Use & Perfome SMS Spoofing Attack:

    Do you want to learn how to spoof SMS messages or send SMS messages with any sender’s name? In this thread, we’ll explore SMS spoofing, its uses, and how easy it is to perform. SMS spoofing is a highly effective technique that can be employed in a wide range of scenarios. It involves sending an...
  2. tronny

    MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations

    MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations, by AMR Thabet *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. tronny

    EC-Council - Cybersecurity Attack and Defense Fundamentals Specialization

    EC-Council - Cybersecurity Attack and Defense Fundamentals Specialization *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. f3d0m43ver

    Malware Data Science Attack Detection and Attribution - PDF

    Malware Data Science Attack Detection and Attribution (Joshua Saxe, Hillary Sanders) - PDF Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of...
  5. yohilax951

    Python script to deauthentication attack

    from scapy.all import * from threading import Thread import os import time interface = "wlan0" networks = [] clients = [] def sniff_wifi(packet): if packet.haslayer(Dot11Beacon): if packet[Dot11Elt].info.decode() not in networks...
  6. yohilax951

    python script for dos attack on local host

    import socket # Replace 'localhost' with the target host target_host = 'localhost' target_port = 9999 # Create a socket object client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) # Connect the client client.connect((target_host, target_port)) # Send some data client.send('GET /...
  7. carxproveteran

    Attacking And Defending Active Directory: AD Pentesting

    Attacking And Defending Active Directory: AD Pentesting Explore Active Directory Pentesting: Attack, Defend, and Secure. Master Active Directory Pentesting What you'll learn Concepts Of Active Directory Pentesting Powershell Basics File Transfer Basics Post-Exploitation Activities Mitigation...
  8. matrixuniverse

    Pixie Dust Attack WPS in Kali Linux with Reaver

    Pixie Dust Attack WPS with Reaver In this tutorial we are going to do a pixie dust attack using Reaver 1.5.2, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When...
  9. DMX_Dz

    DDos ATTACK VOL7 50k Zombie

    DDos script have more 4.5K Zombies : Leaked Download link : https://www.mediafire.com/file/uvhvncmu913icgt/DDosAttacVol7.txt/file After downloading, change the file format to ddos.py and run it : python2 DDos.py
  10. Hisoka@

    Logs Stealer : Best Tool for Stealing Logs

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. tronny

    Udemy - DDOS Attack Course 11-2023, by Adam Jorn

    Udemy - DDOS Attack Course 11-2023, by Adam Jorn *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. genbogo

    UDPFLOOD DDOSS ATTACK PREMIUM TOOLS LIFETIME FULL CLEAN VERSION

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. genbogo

    SNAKE BITE DDOSS ATTACK PREMIUM TOOL FULL CLEAN VERSION LIFETIME

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. genbogo

    LF SHELL BOOTER DDOSS ATTACK PREMIUM TOOL FULL CLEAN 2023

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. xrahitel

    Microsoft Office XSS attack

    Office XSS attack
  16. xrahitel

    Zip Slip Attack on Archivers

    evilarc
  17. killua97

    PC Desktop Pet Project

    Title: Desktop Pet Project Genre: Casual, Indie, RPG, Simulation, Sports Developer: Alterran Rumble Publisher: Alterran Rumble Release Date: 26 Oct, 2023 About This Game Elevate your PC experience with charming desktop pets. Inspired by such a wonderful invention as Shimeji...
  18. Slaver

    Ethical Hacking: Network Security & Network Layer Attack

    Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack What you’ll learn Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system. Becoming an...
  19. carxproveteran

    The Cyber Security Bootcamp

    The Cyber Security Bootcamp Start as a complete beginner and go all the way to launch your own cyber attack. What you'll learn Gain knowledge of the core Cyber Security Gain the skills to launch your own hacking attacks Have the skills and understanding of Hacking to confidently apply for jobs...
  20. qawankawan

    Ethical Hacking: Network Security & Network Layer Attack

    Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack What you’ll learn Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system. Becoming an...
  21. fabloay

    UDEMY / Ethical Hacking - SQL Injection Attack

    https://www.udemy.com/course/sql-injection-ethical-hacking/
  22. jackjakc

    large xss attack sheet sheet

    https://gist.githubusercontent.com/kurobeats/9a613c9ab68914312cbb415134795b45/raw/c24dd91dd91c324ae5c28b124aa4d379dbcb8e59/xss_vectors.txt
  23. nullsec

    An Attack Surface Detector Form Source Code

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. franzzen

    🎣Phishing Attack with AdvPhishing

    📝In this guide, we will see how to do a phishing attack with AdvPhishing 🔗https://en.hacks.gr/2023/09/18/phishing-attack-me-advphishing/
  25. killua97

    Udemy - Hacking Wifi 100% works Evil Twin Attack

    We will use a non coding method to get WIFI passwords What you'll learn Hacking wifi using Kali Linux Requirements Anyone can learn it Description In this course, we will learn to hack wifi passwords with no real coding, just by following a few simple steps. You need to have a computer and...
  26. doctor_420

    top Ddos attack tools💥

    Tested by doctor_420 ✅ Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. s3curity.csc

    Source Code Source Code 🔥DDoS Attack Script With 56 Methods🔥

    Features And Methods Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH RHEX | Random HEX STOMP | Bypass chk_captcha STRESS | Send HTTP Packet With High Byte DYN | A New Method With Random SubDomain DOWNLOADER | A New Method of Reading data slowly SLOW | Slowloris Old Method...
  28. drakesay333

    Shwetabh Gangwar : ATTACK MODE HOW TO BE GREAT

    ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar The course: https://app.gangstaphilosophy.com/services/attackmode/ free for you guys : https://mega.nz/folder/R2E1GQhB#n7k4a_NrBIBCx2-w5cWv_Q
  29. Lambda00000000000000

    Brute Source github. Dictionary attack

    Link:https://github.com/Sanix-Darker/Brute-Force-Login/tree/master
  30. hcourse20939

    ✅DOS Attack by using Termux method

    ✅DOS Attack by using Termux ✅ Down Website 💀 Tool name → HULK✝️✝️ Installation 👇 ......................... apt update && apt upgrade pkg install git pkg install python2 pkg install python3 git clone https://github.com/grafov/hulk.git ls cd hulk chmod +x * python2 hulk.py...
  31. Lambda00000000000000

    Brute Bruteforce Attack Framework -github

    link: https://github.com/samsesh/SocialBox-Termux
  32. xleak

    Attack surface mapping and asset discovery

    Technique Data Sources APIs 360PassiveDNS, Ahrefs, AnubisDB, BeVigil, BinaryEdge, BufferOver, BuiltWith, C99, Chaos, CIRCL, DNSDB, DNSRepo, Deepinfo, Detectify, FOFA, FullHunt, GitHub, GitLab, GrepApp, Greynoise, HackerTarget, Hunter, IntelX, LeakIX, Maltiverse, Mnemonic, Netlas, Pastebin...
  33. DoiXer

    SS7 Attack Paid Tutorial

    🔥 SS7 Attack Paid Tutorial ⭐️ 👁 Language : English 🌈 Hijacking Network Elements Over SS7 - A New Type of Attack 🌈 What is Signaling SS7 in GSM & Cellular wireless Networks 🌈 Software & Hardware Need for SS7 🌈 SS7 attack Part - 2 Kali Linux SS7 - Part - 3 Cell Phone Signal Jammer Kali...
  34. Artisthacker

    Slowloris | Dos attack on Website Using Mobile

    Slowloris Slowloris is low bandwidth Dos hacking app. The tool was programmed using Python programming language. It performs an HTTP Denial of Service attack that slows down or makes the small servers crash. You can also use this tool to perform a Dos attack on the website. The tool creates a...
  35. 8o89

    ✅ Hulk v3 Bot | DDoS Attack ✅

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. Rontribbiani

    DDoS Attack Script With 56 Methods

    Features And Methods Layer7 get GET | GET Flood post POST | POST Flood ovh OVH | Bypass OVH ovh RHEX | Random HEX ovh STOMP | Bypass chk_captcha stress STRESS | Send HTTP Packet With High Byte dyn DYN | A New Method With Random SubDomain downloader DOWNLOADER | A New Method of Reading data...
  37. anadolu3434

    Login:Pass Whatsapp and SMS Bomber Attack

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. belhaj

    Course For Free to Download from mega.nz : ATTACK MODE Shwetabh Gangwar

    https://mega.nz/folder/R2E1GQhB#n7k4a_NrBIBCx2-w5cWv_Q
  39. L4Y

    ATTACK MODE By Shwetabh Gangwar

    Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar https://app.gangstaphilosophy.com/services/attackmode/ notion links...
  40. achrafazmi

    ATTACK MODE By Shwetabh Gangwar

    Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. Lumin4ry

    ATTACK MODE By Shwetabh Gangwar

    🌟TO BUY : CREDIT/DEBIT CARDS - BINS - ANY COURSE - GIFT CARDS - LOGS - METHODS - KEYS . CONTACT ME HERE : https://t.me/lumin4ry1 our modern group https://t.me/gainsy365 and do not forget the like :) 👍 Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A...
  42. shahid9028

    Mail Brute SocialBox is a Bruteforce Attack

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. KyriakosOG

    Brute Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ]

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. Vizirov

    Login:Pass What is the purpose of Man in The Middle Attack

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. r3vm4y

    Combo Tools SN1PER Attack Surface Management

    The ultimate pentesting toolkit. Integrate with the leading commercial and open source security scanners to check for the latest CVEs and vulnerabilities in your environment. Automate the most powerful tools. Security tools are expensive and time-consuming, but with Sn1per, you can save...
  46. User3Name

    Everything You Need To Know About A DDoS Attack

    DDos A DDoS (Distributed Denial of Service) is a kind of Denial of Service (DoS) attack. As the name implies, a DoS simply tries to prevent a service from working. In a DDoS, the attacker uses a large number of machines from all over the Internet to send enormous amounts of traffic towards the...
  47. zed3

    Brute HULK v3 Ddos Attack python

    Hulk is a Distributed Denial of Service tool that can put heavy load on HTTPS servers, in order to bring them to their knees, by exhausting the resource pool. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. Colin4280

    How to attack an IP-Address ‍

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. logtemp10

    Login:Pass Attack Open Server Full Course

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. Babu19695

    SS7 Attack Paid Tutorial

    📢 Language : English Hijacking Network Elements Over SS7 - A New Type of Attack What is Signaling SS7 in GSM & Cellular wireless Networks Software & Hardware Need for SS7 SS7 attack Part - 2 Kali Linux SS7 - Part - 3 Cell Phone Signal Jammer Kali Linux SS7 GSM Sniffing Wireshark 100 %...
Top Bottom