Description
TL;DR
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes unmodified ELF executables as input and exports a modified ELF contianing an embedded user-supplied payload that executes at runtime.
Slightly more...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).
Legal Disclaimer:
Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...
There is Donation UK Site:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
You Can Check Gen CreditCard From 1£ To 1.000.000£
Good news: You Don't Need socks5 or proxys.
carding method carding tools checking cc checking credit card...
Using PatchChecker to check vulnerabilities:
To use the patchchecker, you can either go to the publicly hosted website here at patchchecker.com or you can git clone this repo, install the required libraries, makes sure patches.db is in the same directory as app.py and then start the application...
Greetings to all.
In this article, I would like to tell you how to protect your computer from intrusion.
To Close access to the startup folder. (Win + R and enter shell:startup)
Close access to the registry. (Win + R and enter gpedit.msc > Administrative templates > Deny access to registry...
Browser Blocker for Windows blocks common browsers from accessing the internet on Windows.
To block just run the batch as admin (Right click > Run as administrator) and select the browser.
Download:
Download Browser Blocker for Windows rar
Download Browser Blocker for Windows rar
Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools ...
Today I will teach you 911Proxy basic setup guidelines for first-time users. Most of into carding line must have had experience with 911Proxy software. This VPN is not just like any other VPN that you will install at connect right away.
There are series of steps you need to perform for the...
As you know, the photo contains not only the image, but also metadata.
Metadata - information about the data itself. Any document (not only a photo) created with a mobile device or a computer has some hidden information underneath it.
To read or delete metadata, I suggest you use mat
Download...
This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.
Below are a couple of different images showing examples of multiple file transfer and single verbose file transfer:
Support for multiple files
Gzip compression supported
Now...
This tutorial in the category WordPress hacking will teach you how to scan WordPress websites for vulnerabilities, enumerate WordPress users accounts and brute force passwords. Enumerating WordPress hackers is the first step in a brute force attack in order to gain access to a WordPress account...