• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. bananasplit

    200+ websites invulnerable for XSS attacks

    Here are som vulnerable websites. I'm not using them, so maybe you can!
  2. logtemp10

    Login:Pass All about Dados attacks...

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. bananasplit

    Random websites vulnerable for XSS attacks | Freebies | crax.pro

    And here are some more XSS sites from different countries. Hope you like it!
  4. 3uker

    Password Attacks and Safety Guide

    Password Attacks and Safety Guide *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. muchuan

    Login:Pass Tor and Dynamic Proxy - Enter Credential Stuffing Attacks

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. Gamerpro

    Potential Targets of Hackers Attacks

    Greetings, esteemed forum members! Today, let's delve into the vast array of potential targets that hackers may pursue in their quest to exploit vulnerabilities. By recognizing the scope of vulnerability, we can heighten our awareness and take proactive steps to protect ourselves and our...
  7. Junmagic

    Download WiFu (Wireless Attacks) course

    : Mastery of network TCP/IP knowledge Adequate command of Linux and Windows WiFu Syllabus [OSWP]: IEEE 802.11 Wireless Networks Packets and Network Interaction Linux Wireless Stack and Drivers Aircrack-ng Essentials Cracking WEP with Connected Clients Cracking WEP via a Client Cracking...
  8. pktcash111

    Password lists with top passwords to optimize bruteforce attacks

    Password lists with top passwords to optimize bruteforce attacks https://github.com/scipag/password-list
  9. William N Nguyen

    Leaked-🧨XSS Attacks Cross Site Scripting Exploits and Defense ("E-BOOKS ")🧨

    BOOK-LINK:https://mega.nz/file/3XJCyD5C#qAda14pWUjd5u4wjOYmzCI52UMa1rUFulh7V0kBGZk8 Happy Hacking ;)
  10. D

    Different types of cyber attacks

    There are many types of computer attacks, and the most common attack can vary depending on the context and the target. Here are some of the most common types of computer attacks: Phishing: This is a type of attack where an attacker sends an email or message to a user, pretending to be a...
  11. asdip

    Logs Malwarebytes. Endpoint Protection autoblocked

    Malwarebytes. paul.standley@=AT0HhUdmcnImgMr3CYcrEq8FDeXWS10cAf2__U7T8mNUEsoiu1Itn_14qEtezqDD_c4w3IQLDXSGo6Ad0soNyGQW0JIamm5RrqZvPfBB7VfwM7gougXn76RYTIu1HPake2nzOWIouRadzCjxzu4mH8p7xoVrXMC0QiUc-CQ']jbssa.com:Devinlee#7 | full_name = Paul Standley | memberships status = activated |...
  12. devrekli

    Social engineering attacks/defenses - PDF

    Hi guys, A little reading for you. It's about social engineering attacks/defenses. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. learner

    Hack Attacks Revealed - A Comp - Neznamy

    Download Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. kio182

    What attacks a hacker?

    Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
  15. isjoe

    The Most Notorious Hacking Attacks of All Time

    The world of technology is ever-evolving and hackers are always trying to find ways to take advantage of this. In recent years, some of the most devastating and widely-publicized cyber-attacks in history have occurred, resulting in billions of dollars in damages. In this article, I will take a...
  16. blackdarksy

    [PDF]Stealthy SS7 Attacks

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. кнαη

    Hacking Attacks And Examples Test

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. кнαη

    Computer Viruses, Hacking And Malware Attacks For Dummies

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. кнαη

    Dangerours Google Hacking Database And Attacks

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. A

    EBook/Course Udemy

    1- THE COMPLETE ETHICAL HACKING COURSE https://mega.nz/#!NsYg0IRY!phC4VLCR_qe8oRcb3Ul79dtPUYn9nxDjneczOZycAJs 2-Udemy – Python Scrapy – Scrape Web Data Using Python http://jheberg.net/download/udemy-python-scrapy-scrape-web-data-using-python-2/...
  21. TDSf0x_X

    🛡 XML attacks {detailed XMind MAP}

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** ♤ LEAVE A LIKE ♤ ENJOY :hackerman:
Top Bottom