Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

  1. tronny

    AntisyphonTraining - Modern WebApp PenTesting w Brian King

    AntisyphonTraining - Modern WebApp PenTesting w Brian King *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. tronny

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. tronny

    DarkVortex - Malware on Steriods, by Chetan Nayak

    DarkVortex - Malware on Steriods, by Chetan Nayak *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. кнαη

    Android Malware Analysis

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. Ethxn35

    VenomRAT working version

    Link: Here is one of the best VenomRAT version without any bugs If you don't know it, search by yourself i'm not a teacher. NOTE IMPORTANT: - Disable av or defender cause of bad signature and "malware toolkit" to avoid deleting - Put x64 for cpu compatibility because .NET issue would not let...
  6. tronny

    OALABS - Malware Reverse Engineering Training

    OALABS - Malware Reverse Engineering Training *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. tronny

    Zero2Automated - Malware Reverse Engineering & Threat Intelligence

    Zero2Automated - Malware Reverse Engineering & Threat Intelligence *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. Garnit

    Scam Page  Full of malware

    A website for leaked accounts
  9. player852

    Malware Analysis & Reverse Engineering Fundamentals Course

    Malware analysis and reverse engineering fundamentals course by HackerSploit Academy https://hackersploit-academy.thinkific.com/courses/malware-analysis-reverse-engineering-fundamentals-course Price ~ $35 Gdrive link: https://drive.google.com/drive/folders/15xXmcd61ZuMuGgrgz1HMTHuoFn3BXF7J
  10. GautamKumar

    Combo Tools  COLLECTION OF TOOLS (50+) RAT/STEALERS/MALWARE/PHISHING/CRACKING

    This collection contains tools for cracking, phishing, also huge malware and passlist packs. I do not take any credits for these tools. Everything belongs to repository owners. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Adom2.0

    [UPDATED] Vortex Malware Clipper v2.2

    [UPDATED] Vortex Malware Clipper v2.2 🔳Features Added & Updated: ☑️ Now, when infected, the build silently adds itself to Windows Defender exceptions without disabling it. ☑️ Added TON substitution! ☑️ Icons Folder added Link: *** Hidden text: You do not have sufficient rights to view...
  12. tronny

    MaldevAcademy - Malware Development

    MaldevAcademy - Malware Development *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. tronny

    Null-Char - The Art of Malware Analysis, by Ahmed Kasmani

    Null-Char - The Art of Malware Analysis, by Ahmed Kasmani *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. ktron001

    IObit Malware Fighter Pro 11.1.0.1322 with Crack

    IObit Malware Fighter Pro is an advanced malware & spyware removal utility that detects, and removes the deepest infections and protects your PC from various potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. Userscloud
  15. ktron001

    Glarysoft Malware Hunter Pro 1.180.0.800 with Crack

    Glarysoft Malware Hunter Pro detects malicious files on your computer and erases dangerous content, allowing you to run on-demand scans of important system areas or specific files. As suggested by its name, Malware Hunter is designed to search and eliminate potentially dangerous files and...
  16. кнαη

    Android Malware Analysis

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. synestia

    Practical Malware Analysis & Triage

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. tronny

    Udemy - Malware Forensics Mastery v3 AI Advanced Predict & Analysis

    Udemy - Malware Forensics Mastery v3 AI Advanced Predict & Analysis 1-2024, by Dharmanandana Reddy Pothula *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. manocat

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+-Udemy Coupon💛🧡💥

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+ Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C! What you'll learn Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
  20. Lyn

    Logs Key/Code  7x Iobit Malware Fighter 10 License keys

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Leave a like if you want more. :hyperwow:
  21. zer007

    [Giveaway] IObit Malware Fighter Pro | License Key Free

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. tronny

    0x12darkdev - Introduction Windows Malware Development, by S12offsec

    0x12darkdev - Introduction Windows Malware Development, by S12offsec *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. vtk20231031

    The fundamentals of reversing engineering (RE) Windows malware

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. Khaled Ibn Al-Walid

    EBook/Course  ZERO TO HERO MALWARE ENGINEERING

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. MulaBhai

    ⭕ SPREAD YOUR MALWARE ⭕ BUILD YOUR OWN BOTNET ⭕ SUPER HIGH QUALITY GUIDE

    JOIN MY CHANNEL - TELEGRAM MY CRACKING COURSE - CLICK HERE Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. mayoufi

    Kaspersky - Targeted Malware Reverse Engineering

    MP4 | Video: H264 1920x1080 | Audio: AAC 48000Hz 2 Ch Language: English | Duration: 60+ min | Size: 7.52 GB he online format of Kaspersky’s training helps more engineers upgrade their reversing skills and become confident users of our software disassembly product, IDA Pro Overview & objectives...
  27. SeaOnTop

    [ ⭐EXCLUSIVE 🔥 ] EXE SIGNER | Sign Your Malware To Be UD

    [ ⭐EXCLUSIVE 🔥 ] EXE SIGNER | Sign Your Malware To Be UD *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. SeaOnTop

    🔥0DAY PDF EXPLOIT🔥| 🚀SPREAD YOUR MALWARE FASTEST & FUD 🚀

    🔥0DAY PDF EXPLOIT🔥| 🚀SPREAD YOUR MALWARE FASTEST & FUD 🚀 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. tronny

    Udemy - YARA Malware Analysis and Threat Detection 1-2024

    Udemy - YARA Malware Analysis and Threat Detection 1-2024, by Pack Of Coders *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. ro7nikmok

    Login:Pass  ConF-Malware powerfull windows Malware

    Download: https://github.com/ConfusedCharacter/ConF-Malware *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** To run Edit Line 484 in C#...
  31. WalleXer

    Source Code  UHQ+ |❄️ .LNK EXPLOIT ❄️ SPREAD YOUR MALWARE ❄️ EASY

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. hhsuvo

    Key/Code  IObit Malware Fighter PRO 11

    IObit Malware Fighter PRO 11 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. andrew19630

    Method/Tut  UEFI Bootkit malware bypasses Windows 11 Secure Boot

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. tronny

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. highzum

    Stealing Offline Crypto Wallets with Malware — Top 6 Popular + Source-Codes

    Cryptocurrencies are becoming increasingly popular, with a rising number of people storing their digital assets in physical crypto wallets. These wallets, however, are excellent targets for attackers looking to steal bitcoin or other coins. In this lesson, we’ll demonstrate how to add...
  36. tronny

    TCMSecurity - Practical Malware Analysis & Triage

    TCMSecurity - Practical Malware Analysis & Triage *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. tronny

    Kaspersky - Advanced Malware Analysis Techniques

    Kaspersky - Advanced Malware Analysis Techniques *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. f3d0m43ver

    Kaspersky - Advanced malware analysis techniques

    https://xtraining.kaspersky.com/courses/advanced-malware-analysis-techniques/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. tronny

    Volexity - Malware & Memory Forensics Training with Volatility 2023

    Volexity - Malware & Memory Forensics Training with Volatility 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  40. tronny

    CodeMachine - Windows Malware Techniques

    CodeMachine - Windows Malware Techniques *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. manocat

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+-Udemy Coupon

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+ Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C! What you'll learn Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
  42. manocat

    Malware Analysis & Incident Response for IT Technicians-Udemy Coupon

    Malware Analysis & Incident Response for IT Technicians Learn the best incident response for IT security incidents such as malware and ransomware on your organisation's network What you'll learn An explanation of the key differences between malware analysis and incident response Overview of...
  43. zeroroz

    [100% Off] Mastering Reverse Engineering &Amp; Malware Analysis | Remasm+

    What you’ll learn The theory behind disassembly and its role in reverse engineering. The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking. The compilation process breakdown and the purpose of each phase. Working with symbolic information in stripped and not...
  44. f3d0m43ver

    Rootkits and Bootkits Reversing Modern Malware - PDF

    Rootkits and Bootkits Reversing Modern Malware and Next Generation Threats (Alex Matrosov, Eugene Rodionov, Sergey Bratus) - PDF Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the...
  45. f3d0m43ver

    Mastering Malware Analysis - EPUB

    Mastering Malware Analysis - Alexey Kleymenov, Amr Thabet - EPUB Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-related incidents from occurring in the future Learn core concepts of static and...
  46. f3d0m43ver

    Malware forensics field guide for Windows systems - PDF

    Malware forensics field guide for Windows systems Digital forensics field guides by Cameron H. Malin, Eoghan Casey, James M. Aquilina - PDF Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at...
  47. f3d0m43ver

    Malware Data Science Attack Detection and Attribution - PDF

    Malware Data Science Attack Detection and Attribution (Joshua Saxe, Hillary Sanders) - PDF Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of...
  48. f3d0m43ver

    Malware Analysts Cookbook - PDF

    Malware Analysts Cookbook - PDF A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by...
  49. salchipapa2023

    Key/Code  keys malwarebytes premium

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. matrixuniverse

    Dynamic Malware Analysis Tools

    Dynamics Malware Analysis Risks Please be aware of the fact that Dynamic Malware Analysis can put your system and network at risk, you will be executing real malware to analyse it’s behaviour. We advise you to only execute malware on virtual machines or dedicated systems in isolated networks...
Top Bottom