Bru
Members-
Content Count
37 -
Last visited
Content Type
Profiles
Forums
Calendar
Gallery
Blogs
Store
Articles
Downloads
Classifieds
Everything posted by Bru
-
Thanks bro, love u
-
thanks yo, nice work
-
email pass [USA] 209,838 GOLDEN GAE COMBO GOOD SHTS MIXED HITS
Bru replied to mesvak's topic in Combolists
thanks bro, nice work -
thanks, nice post bro, nice job
-
Thanks, nice sharing bro. nice work.
-
thanks bro, nice work, loveu
-
i'am interest in the teme
-
[supreme] Huge Cracking Tools/Configs/Combos Pack | Leaked by @TheFlash
Bru replied to Flash's topic in Cracking Tools
Nice work bro, love u. -
Top Powerfull DDOs attack tools
Bru replied to blackhatrussia0x0's topic in Hacking Tools and Programs
Nice job bro, have nice day -
Thanks bro, nice job ..
-
[hide] https://ghostbin.com/paste/peabb :fiesta: [/hide]
-
Omg, rly. nice work men
-
Thanks, nice job bro
-
[1Milion] 1000.000 x Discord nitro codes (unchecked)
Bru replied to Exploitables's topic in Accounts
Lol, nice post, love u men, nice work -
leak VAPE 2.49 GHOST CLIENT||64BIT+32BIT||1.7.10+1.89||CLEAN||
Bru replied to N0P's topic in Other leaks
Lol, nice post, love u <3 -
Thanks, nice work, i like this
-
Welcome to The Antivirus Hacker’s Handbook. With this book, you can increase your knowledge about antivirus products and reverse-engineering in general; while the reverse-engineering techniques and tools discussed in this book are applied to antivirus software, they can also be used with any other software products. Security researchers, penetration testers, and other information security professionals can benefi t from this book. Antivirus developers will benefi t as well because they will learn more about how antivirus products are analyzed, how they can be broken into parts, and how to prevent it from being broken or make it harder to break. I want to stress that although this book is, naturally, focused on antivirus products, it also contains practical examples that show how to apply reverse-engineering, vulnerability discovery, and exploitation techniques to real-world applications Link: https://repo.zenk-security.com/Magazine%20E-book/Antivirus%20hackers%20handbook.pdf [/hide]
-
[hide] The Hacker Highschool Project is a learning tool and as with any learning tool, there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on the possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However, ISECOM cannot accept responsibility for how any information herein is abused. link: https://mega.nz/#!W3xjmA6S!8GL5JxUpPyb-Er4KfFw28965M16GHzqh_LzuWMj3R5s [/hide]
-
[hide] [align=center] Professional DJ software From the unknown to the greatest, Serato DJ Pro is the most popular DJ software globally. When you’re talking about Hip-Hop, Dance, and everything in between, you’re looking at the standard. link: https://mega.nz/#!8goBHawa!eg2-K8HJJd9d9CLEOIxrguV6zf65jfulNmYTx5MoL4w [/align] [/hide]
-
[hide] [align=center] The first book I would like to recommend is a hacking book that has helped many people to make their first steps into ethical hacking and penetration testing. Penetration Testing: A Hands-On Introduction to Hacking is written by Georgia Weidman and is a good book for anyone new to the subjects as it generally focuses on beginners. The author of this book covers many different subjects such as setting up a lab to enumeration, exploitation, mobile hacking and a lot more. What I personally like about this book is that the author explains every step in the process in detail and also relates it to her wide experience in the field as a penetration tester. So if you’re new to penetration testing without prior experience, this book is a great place to start an exciting journey! Link: https://repo.zenk-security.com/Magazine%20E-book/Penetration%20Testing%20-%20A%20hands-on%20introduction%20to%20Hacking.pdf[/align] [/hide]
-
[hide] You can download the program from your official website: https://www.kali.org/ The tool that is used is called GoldenEye, this program is very easy to use although it has different ways to make a DDOS attack, this one can also be useful for you. But let's go with the procedure ... Now we go to the terminal. and we wrote: git clone https://github.com/jseidl/GoldenEye.git By having the folder in your system we will command the terminal: ./goldeneye.py To pull any website you must put the following in your Kali Linux terminal: ./goldeneye.py Warning: I am not responsible for possible problems due to the use of this tool in an inappropriate way, each one is free to use this tool to their liking but without guilt towards me. [/hide]
-
If I know, it's old but functional, in general I use kali linux GoldenEye, something more complete and complex when making attacks, but I'll show it later. Thanks for comment.
-
[hide] This book introduces you to everything that is about hacking, enjoy it https://ghostbin.com/paste/w2ngx This ebook is in spanish, use translate, sorry. [/hide]
-
[hide] https://ghostbin.com/paste/aur9n [/hide]