Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 22 February 2024
BidenCash Shop
adv exp at 10 October
banner expire at 13 August 2024
Money Club cc shop
Kfc Club
Ad End 4 April 2026
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Patrick Stash
DarkHIve
adv ex on 22 February 2024
Savastan0
banner Expire 10 May 2025
Just Kill
Yale lodge shop
UniCvv

Search results

  1. Neon Ghost

    Cyber-bully Supermodel Dropped by 3 Stores

    Supermodel turned cook and TV personality Chrissy Teigen has lost contracts with three major American retailers over previous cyber-bullying. A decade ago, Teigen bullied non-binary teenage reality TV star Courtney Stodden over their marriage to the then 51-year-old actor Doug Hutchinson. In...
  2. Neon Ghost

    Nigeria Suspends Official Charged with Defrauding US

    A Nigerian governor's aide has been suspended after being arrested in the United States in connection with a multi-million-dollar unemployment benefits scam. Abidemi Rufai, aka Sandy Tang, was arrested on Friday at JFK Airport in New York. The 42-year-old resident of Lekki, Nigeria, has been...
  3. Neon Ghost

    Hacker’s Mom Puts End to 10-Month Cyber-bullying Campaign

    A cyber-bullying campaign waged against a sixth grader from North Carolina for nearly a year appears to have been curtailed following its discovery by the abuser's mom. For ten months, 12-year-old Wilson resident Jaylen White was on the receiving end of abuse so severe that he changed schools...
  4. Neon Ghost

    ACCESSING THE BINDERY FILES DIRECTLY

    Accessing the bindery files directly Alastair Grant, Cambridge University 1. Introduction This document describes a command for accessing the NetWare 3.x bindery files directly, bypassing the NetWare network API calls. It can be used for fast bindery access, bulk user management, bypassing...
  5. Neon Ghost

    A SIMPLE TCP SPOOFING ATTACK

    Over the past few years TCP sequence number prediction attacks have become a real threat against unprotected networks, taking advantage of the inherent trust relationships present in many network installations. TCP sequence number prediction attacks have most commonly been implemented by opening...
  6. Neon Ghost

    [TUTORIAL] HACK WIFI PASSWORD USING MITM Method 👍👍

    Follow These Steps For Hack WiFi Password Using MITM Method:- 1- Goto: https://github.com/wi-fi-analyzer/fluxion 2- After Downloading fluxion. Goto Downloads and extract Fluxion 3- Goto extracted directory where fluxion.sh is located and Run ./fluxion.sh Note- If all required files are updated...
  7. Neon Ghost

    FBI warned COVID-19 researchers about threat from Chinese hackers

    Intelligence agencies urged organizations to provide a high level of intellectual property protection. The Federal Bureau of Investigation, together with the Cybersecurity and Infrastructure Security Agency (CISA), has warned U.S. research organizations of Chinese cybercriminals who are...
  8. Neon Ghost

    FIDO Announces New Security Standard for IoT Devices

    A new security standard for Internet of Things (IoT) devices has been developed by the FIDO Alliance. The open industry association said the move will help address the security, cost and complexity challenges involved in deploying IoT devices at scale, thereby unlocking the potential of IoT...
  9. Neon Ghost

    Hacking with Netcat [Part 1]

    In part 1 of the Hacking with Netcat tutorials we have learned the very basics of Netcat. Now it is time to dive deeper into the most popular and common usage of Netcat: Setting up bind shells and reverse shells. In this tutorial we will be learning about the difference between a bind shell and...
  10. Neon Ghost

    Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting

    The ultimate WinRM shell for hacking/pentesting. Description & Purpose This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows hardware and operating...
  11. Neon Ghost

    Google hack tricks you'v never saww before 1

    Ok today i will show google hack demostration you'v never seen before. You will never find these fucking google hack codes on internet. just watch and learn what i have discovered!!! I'm not a hacker but i know what i'm doing!!! Ok it's time to show the secrets. and this is the best google...
  12. Neon Ghost

    How to Steal Steam accounts Bypass Guard + Video tutorial

    This Tutorial is if you have a victim on your RAT and you want to know how to steal there steam account. NO DOWNLOAD included! Hey guys just done abit of research about this steam guard stuff that stops most users from signing in with other peoples logins, this will only work if you have access...
  13. Neon Ghost

    Zelos - A Comprehensive Binary Emulation Platform

    Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess the dynamic behavior of binaries via command-line or python scripts. All syscalls are emulated to isolate the target binary. Linux x86_64 (32- and 64-bit)...
  14. Neon Ghost

    XSS TUTORIAL FOR NEWBIES

    XSS can be used in 2 conditions. Sometimes there are forums that have particular fields that allow HTML posts.. Or a vulnerability in the search field. A vulnerable search field that allows html searches and uses $_GET function instead of $_POST Okay so.. lets talk about the Search field first...
  15. Neon Ghost

    VIRUS SPREADING - GOOD WAYS TO SPREAD AND GET MORE VICTIMS

    Virus Spread Tutorial Hey all. This is my new tutorial about some of ways to spread your virus and get more logs from stealer,Botnet(s),RAT connections and much more. Tutorial is by me so if you post on some other websites,blogs,forums etc. please put credit on me, Om3n. (1.) First of all...
  16. Neon Ghost

    SLIV" Video course

    Description: It includes not one, but as many as 4 global areas of knowledge: hacking, hacking programs, reversing and programming. There are more than 400 video tutorials in one course and this is a record! This means that by selecting any of the four main themes, you will in any case get a...
  17. Neon Ghost

    VulnX v1.7 - An Intelligent Bot Auto Shell Injector

    Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection, information gathering and vulnerability Scanning of the target like subdomains, IP addresses, country, org, timezone, region, and and more ... Instead of injecting each and...
  18. Neon Ghost

    RedGhost - Linux Post Exploitation Framework Designed To Gain Persistence And Reconnaissance And Leave No Trace

    Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace. Payloads Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl Crontab Function to create cron job that downloads and runs payload...
  19. Neon Ghost

    Sliver - Implant Framework

    Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary. The server, client, and...
  20. Neon Ghost

    Simplify - Generic Android Deobfuscator

    Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used. Before and...
Top Bottom