• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. tronny

    Udemy - Ethical Hacking Network Security & Network Layer Attack

    Udemy - Ethical Hacking Network Security & Network Layer Attack 10-2023, by Oak Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. cavalo_alado

    E-Books SS7 (Signaling System 7) Attack

    Describe attack: SS7, short for Signaling System 7, is a protocol telecom companies use to communicate with each other. As an internetworking protocol between big companies, it contains a high degree of trust. That is, if you're allowed to speak SS7 to a server at all, you're allowed to say...
  3. ro7nikmok

    Attack Surface Management Platform Sn1per

    Link: https://github.com/1N3/Sn1per https://sn1persecurity.com/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. Scala666

    OpenBullet Attack Config - other side of the story

    There’s an OpenBullet Attack Config for Your Site – What Should You Do?
  5. Kingmaker69

    Course/Tutorial Swetabh gangwar attack mode

    https://mega.nz/folder/R2E1GQhB#n7k4a_NrBIBCx2-w5cWv_Qh [/REPLY]
  6. rayssen

    How To Use & Perfome SMS Spoofing Attack:

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. rayssen

    How To Use & Perfome SMS Spoofing Attack:

    Do you want to learn how to spoof SMS messages or send SMS messages with any sender’s name? In this thread, we’ll explore SMS spoofing, its uses, and how easy it is to perform. SMS spoofing is a highly effective technique that can be employed in a wide range of scenarios. It involves sending an...
  8. tronny

    MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations

    MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations, by AMR Thabet *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. tronny

    EC-Council - Cybersecurity Attack and Defense Fundamentals Specialization

    EC-Council - Cybersecurity Attack and Defense Fundamentals Specialization *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. f3d0m43ver

    Malware Data Science Attack Detection and Attribution - PDF

    Malware Data Science Attack Detection and Attribution (Joshua Saxe, Hillary Sanders) - PDF Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of...
  11. yohilax951

    Python script to deauthentication attack

    from scapy.all import * from threading import Thread import os import time interface = "wlan0" networks = [] clients = [] def sniff_wifi(packet): if packet.haslayer(Dot11Beacon): if packet[Dot11Elt].info.decode() not in networks...
  12. yohilax951

    python script for dos attack on local host

    import socket # Replace 'localhost' with the target host target_host = 'localhost' target_port = 9999 # Create a socket object client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) # Connect the client client.connect((target_host, target_port)) # Send some data client.send('GET /...
  13. carxproveteran

    Attacking And Defending Active Directory: AD Pentesting

    Attacking And Defending Active Directory: AD Pentesting Explore Active Directory Pentesting: Attack, Defend, and Secure. Master Active Directory Pentesting What you'll learn Concepts Of Active Directory Pentesting Powershell Basics File Transfer Basics Post-Exploitation Activities Mitigation...
  14. matrixuniverse

    Pixie Dust Attack WPS in Kali Linux with Reaver

    Pixie Dust Attack WPS with Reaver In this tutorial we are going to do a pixie dust attack using Reaver 1.5.2, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When...
  15. DMX_Dz

    DDos ATTACK VOL7 50k Zombie

    DDos script have more 4.5K Zombies : Leaked Download link : https://www.mediafire.com/file/uvhvncmu913icgt/DDosAttacVol7.txt/file After downloading, change the file format to ddos.py and run it : python2 DDos.py
  16. Hisoka@

    Logs Stealer : Best Tool for Stealing Logs

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. tronny

    Udemy - DDOS Attack Course 11-2023, by Adam Jorn

    Udemy - DDOS Attack Course 11-2023, by Adam Jorn *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. genbogo

    UDPFLOOD DDOSS ATTACK PREMIUM TOOLS LIFETIME FULL CLEAN VERSION

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. genbogo

    SNAKE BITE DDOSS ATTACK PREMIUM TOOL FULL CLEAN VERSION LIFETIME

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. genbogo

    LF SHELL BOOTER DDOSS ATTACK PREMIUM TOOL FULL CLEAN 2023

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. xrahitel

    Microsoft Office XSS attack

    Office XSS attack
  22. xrahitel

    Zip Slip Attack on Archivers

    evilarc
  23. killua97

    PC Desktop Pet Project

    Title: Desktop Pet Project Genre: Casual, Indie, RPG, Simulation, Sports Developer: Alterran Rumble Publisher: Alterran Rumble Release Date: 26 Oct, 2023 About This Game Elevate your PC experience with charming desktop pets. Inspired by such a wonderful invention as Shimeji...
  24. Slaver

    Ethical Hacking: Network Security & Network Layer Attack

    Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack What you’ll learn Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system. Becoming an...
  25. carxproveteran

    The Cyber Security Bootcamp

    The Cyber Security Bootcamp Start as a complete beginner and go all the way to launch your own cyber attack. What you'll learn Gain knowledge of the core Cyber Security Gain the skills to launch your own hacking attacks Have the skills and understanding of Hacking to confidently apply for jobs...
  26. qawankawan

    Ethical Hacking: Network Security & Network Layer Attack

    Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack What you’ll learn Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system. Becoming an...
  27. fabloay

    UDEMY / Ethical Hacking - SQL Injection Attack

    https://www.udemy.com/course/sql-injection-ethical-hacking/
  28. jackjakc

    large xss attack sheet sheet

    https://gist.githubusercontent.com/kurobeats/9a613c9ab68914312cbb415134795b45/raw/c24dd91dd91c324ae5c28b124aa4d379dbcb8e59/xss_vectors.txt
  29. nullsec

    An Attack Surface Detector Form Source Code

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. franzzen

    🎣Phishing Attack with AdvPhishing

    📝In this guide, we will see how to do a phishing attack with AdvPhishing 🔗https://en.hacks.gr/2023/09/18/phishing-attack-me-advphishing/
  31. killua97

    Udemy - Hacking Wifi 100% works Evil Twin Attack

    We will use a non coding method to get WIFI passwords What you'll learn Hacking wifi using Kali Linux Requirements Anyone can learn it Description In this course, we will learn to hack wifi passwords with no real coding, just by following a few simple steps. You need to have a computer and...
  32. doctor_420

    top Ddos attack tools💥

    Tested by doctor_420 ✅ Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. s3curity.csc

    Source Code Source Code 🔥DDoS Attack Script With 56 Methods🔥

    Features And Methods Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH RHEX | Random HEX STOMP | Bypass chk_captcha STRESS | Send HTTP Packet With High Byte DYN | A New Method With Random SubDomain DOWNLOADER | A New Method of Reading data slowly SLOW | Slowloris Old Method...
  34. drakesay333

    Shwetabh Gangwar : ATTACK MODE HOW TO BE GREAT

    ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar The course: https://app.gangstaphilosophy.com/services/attackmode/ free for you guys : https://mega.nz/folder/R2E1GQhB#n7k4a_NrBIBCx2-w5cWv_Q
  35. Lambda00000000000000

    Brute Source github. Dictionary attack

    Link:https://github.com/Sanix-Darker/Brute-Force-Login/tree/master
  36. hcourse20939

    ✅DOS Attack by using Termux method

    ✅DOS Attack by using Termux ✅ Down Website 💀 Tool name → HULK✝️✝️ Installation 👇 ......................... apt update && apt upgrade pkg install git pkg install python2 pkg install python3 git clone https://github.com/grafov/hulk.git ls cd hulk chmod +x * python2 hulk.py...
  37. Lambda00000000000000

    Brute Bruteforce Attack Framework -github

    link: https://github.com/samsesh/SocialBox-Termux
  38. xleak

    Attack surface mapping and asset discovery

    Technique Data Sources APIs 360PassiveDNS, Ahrefs, AnubisDB, BeVigil, BinaryEdge, BufferOver, BuiltWith, C99, Chaos, CIRCL, DNSDB, DNSRepo, Deepinfo, Detectify, FOFA, FullHunt, GitHub, GitLab, GrepApp, Greynoise, HackerTarget, Hunter, IntelX, LeakIX, Maltiverse, Mnemonic, Netlas, Pastebin...
  39. DoiXer

    SS7 Attack Paid Tutorial

    🔥 SS7 Attack Paid Tutorial ⭐️ 👁 Language : English 🌈 Hijacking Network Elements Over SS7 - A New Type of Attack 🌈 What is Signaling SS7 in GSM & Cellular wireless Networks 🌈 Software & Hardware Need for SS7 🌈 SS7 attack Part - 2 Kali Linux SS7 - Part - 3 Cell Phone Signal Jammer Kali...
  40. Artisthacker

    Slowloris | Dos attack on Website Using Mobile

    Slowloris Slowloris is low bandwidth Dos hacking app. The tool was programmed using Python programming language. It performs an HTTP Denial of Service attack that slows down or makes the small servers crash. You can also use this tool to perform a Dos attack on the website. The tool creates a...
  41. 8o89

    ✅ Hulk v3 Bot | DDoS Attack ✅

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. Rontribbiani

    DDoS Attack Script With 56 Methods

    Features And Methods Layer7 get GET | GET Flood post POST | POST Flood ovh OVH | Bypass OVH ovh RHEX | Random HEX ovh STOMP | Bypass chk_captcha stress STRESS | Send HTTP Packet With High Byte dyn DYN | A New Method With Random SubDomain downloader DOWNLOADER | A New Method of Reading data...
  43. anadolu3434

    Login:Pass Whatsapp and SMS Bomber Attack

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. belhaj

    Course For Free to Download from mega.nz : ATTACK MODE Shwetabh Gangwar

    https://mega.nz/folder/R2E1GQhB#n7k4a_NrBIBCx2-w5cWv_Q
  45. L4Y

    ATTACK MODE By Shwetabh Gangwar

    Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar https://app.gangstaphilosophy.com/services/attackmode/ notion links...
  46. achrafazmi

    ATTACK MODE By Shwetabh Gangwar

    Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A Complete Guide to Destroying any Goal from Start to Finish By Shwetabh Gangwar *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. Lumin4ry

    ATTACK MODE By Shwetabh Gangwar

    🌟TO BUY : CREDIT/DEBIT CARDS - BINS - ANY COURSE - GIFT CARDS - LOGS - METHODS - KEYS . CONTACT ME HERE : https://t.me/lumin4ry1 our modern group https://t.me/gainsy365 and do not forget the like :) 👍 Download ATTACK MODE Shwetabh Gangwar Course For Free ATTACK MODE HOW TO BE GREAT A...
  48. shahid9028

    Mail Brute SocialBox is a Bruteforce Attack

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. KyriakosOG

    Brute Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ]

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. Vizirov

    Login:Pass What is the purpose of Man in The Middle Attack

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom