Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 22 February 2024
Kfc Club

Patrick Stash
banner expire at 13 August 2024
BidenCash Shop
banner Expire 10 May 2025
Money Club cc shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Search results

  1. Neon Ghost

    Panalizer - pornography analizer and face searching

    PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also, you can search a specific person in the image set, is necessary give to the application a few pictures of the person of interest.
  2. Neon Ghost

    Iculeak - tool to find and extract credentials

    Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager). When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...
  3. Neon Ghost

    Let Bots Make Your Living While You Sleep | Earn $300 Every Day {LEGIT WAY}

    This method here will make you able to make $3,000-$6,000 (all depends on the work you put in) a month with no issues. Automated Crypto Trading Bot is a method in which a cloud cryptocurrency trading software lets you take advantage of crypt market fluctuations. Connecting Bots to your exchange...
  4. Neon Ghost

    Translating Virtual to Physical Address on Windows: Physical Addresses

    Translating Virtual to Physical Address on Windows: Physical Addresses Dejan Lukan March 22, 2013 Getting the Physical Address Manually So far we’ve figured that the virtual address is the same as linear address, so in the next part of the article we can use virtual addresses because they...
  5. Neon Ghost

    [Tutorial] DNS Spoofing ( Man in the middle attack ) [/Tutorial]

    What Is DNS Spoofing? DNS spoofing is an attack that can categorize under Man-In-The-Middle-Attack, beside DNS Spoofing MIMA contain: -ARP poisoning -Sessions hijacking -SSL hijacking -DNS Spoofing Ill only be showing u DNS Spoofing , For now .. ! How does it work ? Man in the middle attack...
  6. Neon Ghost

    IRC Services, HOWTO register and use

    New IRC Services Hey guys, we have some new services available on IRC so I'm writing this tutorial to help get people up to speed on how to register with nickserv so that A. you can prevent people from hijacking your username and B. you can be assigned a status within each channel that will be...
  7. Neon Ghost

    HOW TO GET ALMOST ALL SOFTWARE SERIAL KEYS

    1.) Open GoogleChrome and access https://youserials.com/ 3.) Click one of many seach results if there are more than one result (oftenly the newest) In this case i chose the newest. "Visual Studio 2012" Then it will appear like this What the hell? There is a survey? The survey must be...
  8. Neon Ghost

    Probux Bot And Method [NOT THE USUAL METHOD]

    1) Go to https://www.probux.com/?rh=64616E6D616B6176656C69 and create an account. 2) Remember to enter real information. 3) Open the bot and click 'view ads', then when that's finished, click 'ProGrid', do this daily until you have 60 cents. 4) When you earn 60 cents, you can buy referals to...
  9. Neon Ghost

    Boot Block Recovery For Free

    AWARD Bootblock recovery: That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch). The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the...
  10. Neon Ghost

    YouPHPTube 7.7 SQL Injection Vulnerability

    YouPHPTube <= 7.7 (getChat.json.php) SQL Injection Vulnerability ---------------------------------------------------------------- [-] Software Link: https://www.youphptube.com [-] Affected Versions: Version 7.7 and prior versions. [-] Vulnerability Description: User input passed through the...
  11. Neon Ghost

    VERIFIED CARDER SELLING WU,BANK,PAYPAL,CASHAPP,SKRILL TRANSFER BANK LOGS,DUMPS+PIN,CLONED CARDS

    Hello, I specialist in carding and transferring funds from hacked / stolen worldwide bank accounts & credit card data to you and placing order on western union, money gram website. I can also transfer to any bank account worldwide. Please note this is ILLEGAL and FRAUD. It is your responsibility...
  12. Neon Ghost

    How to Hack Facebook Multi Product Ads

    Creating great content is the first half of success in content marketing. Getting quality content read by, and amplified to, a relevant audience is the oft overlooked second half of success. Facebook can be a content marketer's best friend for this challenge. For reach, relevance and...
  13. Neon Ghost

    Flerken - obfuscated command detection too

    Command line obfuscation has been proved to be a non-negligible factor in fileless malware or malicious actors that are "living off the land". To bypass signature-based detection, dedicated obfuscation techniques are shown to be used by red-team penetrations and even APT activities. Meanwhile...
  14. Neon Ghost

    How Much Damage Hackers Can Do With a Million Fingerprints

    The Office of Personnel Management announced last week that the personal data for 21.5 million people had been stolen. But for national security professionals and cybersecurity experts, the more troubling issue is the theft of 1.1 million fingerprints. Much of their concern rests with the...
  15. Neon Ghost

    Prometei: A Cryptomining Botnet that Attacks Microsoft's Vulnerabilities

    An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco Talos, these SMB vulnerabilities help in mining cryptocurrency. The botnet has affected around a thousand devices. It came in March; however, according...
  16. Neon Ghost

    Scanning Webservers with Nikto for vulnerabilities

    Nikto is a very popular and easy to use webserver assessment tool to find potential problems and vulnerabilities very quickly. This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto comes standard as a tool with Kali Linux and should be your first...
  17. Neon Ghost

    Metasploitable 2 vulnerability assessment

    As mentioned before there are many ways to perform vulnerability analysis, from manually searching through exploit database to fully automatic testing with tools like Open-Vas and Nessus vulnerability scanner. Vulnerability scanning with automated tools is a very aggressive way of vulnerability...
  18. Neon Ghost

    Credmap – the credential mapper

    Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these. It is not uncommon for people who...
  19. Neon Ghost

    Basic Malware Analysis Tools

    In the upcoming 6 hacking tutorials we will be talking about basic malware analysis and we will start with discussing the many different Basic Malware Analysis Tools which are available. A Malware Analyst is someone highly skilled in reverse engineering malware to get a deep understanding about...
  20. Neon Ghost

    Advance and undetectable facebook & instagram hacking course

    This course is originally uploaded by DedSec and It explains 5 different techniques through which you can hack Facebook and Instagram Account … It Includes:- –Advance Phishing Pages –Hacking Facebook On Local Networks –Facebook Latest Bruteforce –Hacking Instagram Using Fake Page –Hacking...
Top Bottom