Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

  1. tronny

    BlackHat - Android UserLand Fuzzing and Exploitation

    BlackHat - Android UserLand Fuzzing and Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. tronny

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. tronny

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. tronny

    AntisyphonTraining - Modern WebApp PenTesting w Brian King

    AntisyphonTraining - Modern WebApp PenTesting w Brian King *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. tronny

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. gornovskyi

    Windows & Active Directory Exploitation Cheat Sheet and Command Reference

    Hello everyone, here is Windows & Active Directory Exploitation Cheat Sheet and Command Reference by Cas van Cooten. I hope you enjoy it. Link: [https://www.zippyshare.day/4aixLojqe7YM8E7/preview]
  7. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  8. manocat

    Ethical Hacking: Network Exploitation Basics-Udemy Coupon

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  9. Chiloge

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. amieyellow

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    WEB-300 OSWE Lessons + Videos https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ
  11. K

    Course/Tutorial  🌴Drone Hacking- Exploitation and Vulnerabilities🌴

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. SeaOnTop

    ⭐EVILSLN✨| NEW EXPLOIT VISUAL STUDIO PROJECT .SLN 🚀| SILENT + FUD✅

    ⭐EVILSLN✨| NEW EXPLOIT VISUAL STUDIO PROJECT .SLN 🚀| SILENT + FUD✅ (Tested with calc.exe | Version: 17.7.5 (VS2022 update at 2023.10).) *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. clique

    WEB-300: Advanced Web Attacks and Exploitation Book

    LINK Advanced Web Attacks and exploitation (WEB-300) is an advanced web application security course that teaches the skills needed to conduct white box web app penetration tests. Learners who complete the course and pass the exam earn the OffSec Web Expert (OSWE) certification and will...
  14. tronny

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box 1-2024, by Muhammad Sada *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. tronny

    INE - Host & Network Penetration Testing Exploitation 8-2023

    INE - Host & Network Penetration Testing Exploitation 8-2023, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. tronny

    BHIS - Windows Post Exploitation BootCamp

    BHIS - Windows Post Exploitation BootCamp *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. jain

    Bitten Tech Exploitation Course

    https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 PASSWORD : exploitationcourse
  18. shccrew

    Multi/Others  Exploit Collection (2023)

    Exploit Collection (2023) Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. manocat

    Exploitation Cyber Security Course-Udemy Coupon

    Exploitation Cyber Security Course Learn and understand Exploitation In Cyber Security from scratch. A complete beginner's guide. What you'll learn Overcoming Filters Introduction to Solaris Exploitation Advanced Solaris Exploitation OSX Shellcode Fault Injection *** Hidden text: You do not...
  20. carxproveteran

    Exploitation Cyber Security Course

    Exploitation Cyber Security Course Learn and understand Exploitation In Cyber Security from scratch. A complete beginner's guide. What you'll learn Overcoming Filters Introduction to Solaris Exploitation Advanced Solaris Exploitation OSX Shellcode Fault Injection *** Hidden text: You do not...
  21. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  22. myarena

    Free CISCO Ethical Hacker course

    You can access CISCO's free ethical hacker course at https://skillsforall.com/course/ethical-hacker?courseLang=en-US. You will need to sign up for a free skillsforall account to access the course. This 70-hour intermediate-level course with 34-lab exercises contains the following modules -...
  23. nukemurai turing

    Offensive-Security - AWE - Advanced Windows Exploitation 2.0

    https://teraboxapp.com/s/1qdQywmNUDoUIXtIKKg2baA
  24. davidsnufle

    Others  Offensive Internet of Things (IoT) Exploitation

    Link: https://go.linuxia.ir/link/oiote.txt *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. anonymous283

    Bitten Tech's : Tech Hacker Exploitation Course Part #2

    Download Link : https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 Password : exploitationcourse
  26. sisu13

    PLURALSIGHT - Exploitation with PowerShell

    mega.nz/folder/5fdDxYjC#IKApRuA8HDU6BPL4nP3pEw
  27. franzzen

    List of useful resources for pentesters and hackers

    List of useful resources for pentesters and hackers I present to your attention a list of useful resources, thanks to which you can significantly improve your skill in various aspects of penetration testing and information security: Hacking manuals: ▪️http: //www.ehacking.net/ ▪️http...
  28. carxproveteran

    Ethical Hacking: nmap in depth

    Ethical Hacking: nmap in depth network discovery and exploitation What you'll learn Network sweeping with nmap Enumerate network services Use NSE with nmap Attack network with NSE *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. tronny

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation, by Skylar Simmons *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. lidl58

    A Guide to Kernel Exploitation Attacking the Core

    A Guide to Kernel Exploitation Attacking the Core *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. millonetis

    Kali Exploitation Guide Full Course - 7 days to download

    A really interesting exploitation guide for Kali. https://easyupload.io/jy8sz9
  32. tronny

    Chiron - Computer Network Exploitation

    Chiron - Computer Network Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Use terabox app in ur android mobile. Then open welfare center, then select daily benefits and watch video. after watching video u will get premium day...
  33. whiteshadow989

    TechHacker Exploitation Course.zip

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. tronny

    Udemy - Linux Heap Exploitation

    Udemy - Linux Heap Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. gptchat

    Hacking - The Art of Exploitation

    https://ia800807.us.archive.org/29/items/hacking-the-art-of-exploitation/hacking-the-art-of-exploitation.pdf
  36. DoiXer

    Autopwning: Automated Exploitation for Ethical Hackers

    https://mega.nz/folder/wZhQEZZB#qnl-jbyhAk4Ln9JKb2lNBA
  37. kawbdfawfhj

    Binary/Linux Exploitation Free GitHub Course

    Probably the best I've found on the Internet: https://github.com/nnamon/linux-exploitation-course
  38. kawbdfawfhj

    Python Pickle Module Exploitation

    That's how I exploited a website that was using python pickle and pickletools modules. I wrote this writeup a long time ago and I am now sharing it with you. The website provides 4 store items which can be visited from address/view/product where product is a number from 1 to 4. These 4 items...
  39. tronny

    Windows Post Exploitation, by Kyle Avery

    Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  40. tronny

    INE - Penetration Testing Exploitation and Post-Exploitation Tactics

    INE - Penetration Testing Exploitation and Post-Exploitation Tactics Bootcamp, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. Selfesteem

    Advance Exploitation Course + Tools

    Features of This Course - ▪️Make Your Serve FUD - 12 Topics ▪️Convert your Server to mp3,mp4,image ▪️Convert your Server to TXT ▪️Macro Word Exploit ▪️Email spoofing Advance Techniques ▪️Make Your Server Anti Kill ▪️Make Your Own Crypter FUD ▪️Update Your Crypter Stub ▪️FUD Rumpe Generator -...
  42. User3Name

    HACKING: THE ART OF EXPLOITATION

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. It contains the following topics:: PROGRAMMING NETWORKING SHELLCODE COUNTERMEASURES CRYPTOLOG LINK...
  43. cyberston

    Course/Tutorial  linux heap exploitation

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. Yawa123

    SQLi/Dork  Dork/ Exploitation Scanner

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. cuthniki

    Others  RouterSploit - Exploitation Framework for Embedded Devices

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  46. ojihyz288

    PDF: Complete Drone Hacking Guide

    Name: Drone Hacking- Exploitation and Vulnerabilities Pages: 166 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. F0rS3c

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)

    WHAT ARE JSON WEB TOKENs AND WHY WE NEED THEM? As we all know, websites uses cookies and sessions to control and maintiain access control and authorization. JWT is also a type of cookies which is used to track the infromation about users. But then you will ask me why we need JWT when we already...
  48. donhoenix

    Browser Exploitation using possible LFI on Safari

    so recently, I was doing some testing and noticed an odd behaviour on safari. while executing arbitrary javascript from a local html file, I was able to open a new finder window, note that this was not an upload window, the same directory containing the executed file was opened (see gif...
  49. c0c41nm4n

    Hacking The Art of Exploitation

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. zoti2rich

    Combo Tools  Synapse X cracked (ROBLOX EXPLPOIT)

    DOWNLOAD: REPLY TO THIS THREAD TO UNLOCK! :hackerman: ALSO MAKE SURE TO LIKE *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom