🔥 Network and Web Hacking 🔥 | Hacking Tools | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

🔥 Network and Web Hacking 🔥

🔥 Network and Web Hacking 🔥

LV
1
 

doctor_420

Member
Joined
Oct 5, 2023
Threads
27
Likes
33
Awards
4
Credits
3,856©
Cash
0$
Download
♾ Pentesting Routers

♾ Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack

♾ SNMP attacks

♾ Bypassing Firewalls

♾ Payloads and Shells

♾ HTTP/HTTPS tunneling

♾ Port Forwaring, Pivoting, Reverse Connects

♾ Privilege Escalation and UAC bypass

♾ Hash Dumping and Mimikatz

♾ Windows Sessions, Stations and Desktops

♾ Impersonation attacks

♾ WMIC post exploitation

♾ Hidden bind shells

♾ Bitsadmin

♾ Browser Password Recovery

♾ PAC Attacks

♾ DNS Poisoning

♾ Veil Framework and AV Evasion

♾ Metasploit Loader 32/64-bit

♾ DLL Hijacking basics

♾ DLL Hijacking and Meterpreter

♾ Privilege Escalation via DLL Hijacking

♾ DLL Injection using Appinit_DLLs

♾ Stripping Manifest Files for DLL Hijacking

♾ Attacking with DLL Forwarding

♾ Anti-Forensics techniques

♾ Memory Dumping and Analysis

♾ SSL/TLS misconfigurations

♾ Username harvesting

♾ Command Injection

♾ SQL Injection

♾ Cross-Site Scripting (XSS)

♾ Insecure Deserialization

♾ XML External Entities (XXE)

♾ Local and Remote File Inclusion (LFI / RFI)

♾ Cross-Site Request Forgery (CSRF)

♾ And other interesting topics
Link:
 
LV
1
 

floogy18

Member
Joined
Sep 18, 2023
Threads
18
Likes
11
Awards
4
Credits
10,693©
Cash
0$
♾ Pentesting Routers

♾ Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack

♾ SNMP attacks

♾ Bypassing Firewalls

♾ Payloads and Shells

♾ HTTP/HTTPS tunneling

♾ Port Forwaring, Pivoting, Reverse Connects

♾ Privilege Escalation and UAC bypass

♾ Hash Dumping and Mimikatz

♾ Windows Sessions, Stations and Desktops

♾ Impersonation attacks

♾ WMIC post exploitation

♾ Hidden bind shells

♾ Bitsadmin

♾ Browser Password Recovery

♾ PAC Attacks

♾ DNS Poisoning

♾ Veil Framework and AV Evasion

♾ Metasploit Loader 32/64-bit

♾ DLL Hijacking basics

♾ DLL Hijacking and Meterpreter

♾ Privilege Escalation via DLL Hijacking

♾ DLL Injection using Appinit_DLLs

♾ Stripping Manifest Files for DLL Hijacking

♾ Attacking with DLL Forwarding

♾ Anti-Forensics techniques

♾ Memory Dumping and Analysis

♾ SSL/TLS misconfigurations

♾ Username harvesting

♾ Command Injection

♾ SQL Injection

♾ Cross-Site Scripting (XSS)

♾ Insecure Deserialization

♾ XML External Entities (XXE)

♾ Local and Remote File Inclusion (LFI / RFI)

♾ Cross-Site Request Forgery (CSRF)

♾ And other interesting topics
Link:
*** Hidden text: cannot be quoted. ***
uffffffffffffff
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom