Jump to content

blackdeep

Member
  • Content Count

    10
  • Points

  • Joined

  • Last visited

Community Likes

2 Neutral

About blackdeep

  • Usertitle
    Lurker

Recent Profile Visitors

224 profile views
  1. AutoLOG Keylogger| UAC Exploit | Immortal Persistence | Password Recovery ========== https://www.youtube.com/watch?v=UgCc7UiPxFw Welcome to the sales thread for AutoLOG, one of the best keyloggers ever seen. We ensure that this will work effectively as well as it will have more functions than any other keylogger on HackForums. The new features that have been implemented in AutoLOG include a multi-platform password stealer, a screenshot logger, a snapshot logger, automatic stub update mechanisms as well as a working USB spreader. AutoLOG features very strong persistence that will prevent termination of the process. AutoLOG has a UAC exploit that will grant you admin rights without the UAC prompt. AutoLOGhas been coded in AutoIT & Python and has no dependencies. We currently have a 100% FUD stub so you wouldn't require a crypter for the time being. ICQ:653580170 jabber: [email protected] AutoLOG Keylogger,AutoLOG Keylogger cracked,AutoLOG cracked,AutoLOG Keylogger password recovery,free download AutoLOG Keylogger,
  2. VanillaRat 1.7+Source VanillaRat is an advanced remote administration tool coded in C#. VanillaRat uses the Telepathy TCP networking library, dnlib module reading and writing library, and Costura.Fody dll embedding library. Features: ========== https://www.youtube.com/watch?v=8OwZbLrakVg&feature=youtu.be Remote Desktop Viewer (With remote click) File Browser (Including downloading, drag and drop uploading, and file opening) Process Manager Computer Information Hardware Usage Information (CPU usage, disk usage, available ram) Message Box Sender Text To Speech Screen Locker Live Keylogger (Also shows current window) Website Opener Application Permission Raiser (Normal -> Admin) Clipboard Text (Copied text) Chat (Does not allow for client to close form) Audio Recorder (Microphone) Process Killer (Task manager, etc.) Remote Shell Startup Security Blacklist (Drag client into list if you don't want connection. Press del. key on client to remove from list) VanillaRat 1.7,VanillaRat,VanillaRat open,VanillaRat source,VanillaRat open source,VanillaRat free,VanillaRat free download,download VanillaRat,
  3. Learning Tor and the Dark Web MP4 | Video: AVC 1280x720 | Audio: AAC 48 kHz 2ch | Duration: 1 Hour | 132.3 MB Genre: eLearning | Language: English ========== https://www.youtube.com/watch?v=2wdwdh1SlGU The dark web-a bastion of encrypted websites that can be visited and hosted anonymously-is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. He then goes over the basics of encryption and shines a light on the technical aspects of the Tor network, as well as how to use it to browse the standard Internet anonymously. Plus, get briefed on the potential vulnerabilities that users of anonymized networks should watch out for. ICQ:653580170 jabber: [email protected]
  4. blackdeep

    vProxy v1.4

    vProxy v1.4 Simple and clean Proxy Suite that offers you everything you need for getting fresh proxies. It’s written in .NET 4.5 and is meant to be as simple as can be. ========== https://www.youtube.com/watch?v=Qjv2HK258Ms&feature=youtu.be Features: Scanner & Scraper Built-in library system Fast and accurate Very easy to use GUI Multi-threaded HTTP Filter (Transparent/Anonymous/Elite) Latency report Built upon the .NET 4.5 Framework Comes with 500+ proxy scraping sources ICQ:653580170 jabber: [email protected] proxy grabber,proxy scanner,proxy scraper,proxy checker,socks checker,online proxy checker,scraper tool,ip proxy checker,working proxy list,private proxy,vpn proxy,test proxy server,
  5. Fake SMS Bomber|SMS Blaster|Fake SMS Sender ========== https://www.youtube.com/watch?v=DRwJrsczW3U&feature=youtu.be This Software Can Send 12 Thousand Messages For 10 Minutes Size: 7MB This Program Requires Python. Without Python, The Program Will Not Spam To The Number Of Your Friend Or Enemy. In The Program, The Maximum Value Of The Stream Is From 1 To 100 This program Will Flood Your Friend In 10 Minutes With More Than 12 Thousand Messages. ICQ:653580170 jabber: [email protected]
  6. Asacube Android banking Botnet+Tutorial Asacube Android banking Botnet is php based android botnet for all kind of hacking android hacking ========== https://www.youtube.com/watch?v=0n6cWc9AlLo SMS Intercept Builder in Panel Bank Balance Grabbing Crypto Currencies balance Grabbing work on All android Phone from 4.4 kitkat to 9.0 Pie Contact Manager Sms Reading and forwarding Apps Access File Manager Credit Card Grabbing Injections Stats Auto Commands Logs Back Connect Builder In Panel PHP Builder ICON support application support ICQ:653580170 jabber: [email protected] android,android hack,android botnet,how to hack android phone,android botnet,android hacking tips,android hacking
  7. Red Proxy Checker red proxy checker simple software for sorting porxy and socks ========== https://www.youtube.com/watch?v=CpliUYKE-wc&feature=youtu.be Sort HTTP proxies Sort Socks Multi Threaded Very Very Fast Result https://www.virustotal.com/#/file/55ca8cd5563025bbd83ebf918a4846d5f4cd9a40260f469e379ef582eeb89a03/detection ICQ:653580170 jabber: [email protected] socks checker,proxy checker,Red Proxy Checker,Red Socks Checker,premium proxy checker,high speed proxy checker,best proxy server checker
  8. CEH V10 Certified Ethical Hacker v10 Lab Tools ========== Lab Tools for CEH v10: how to download https://www.youtube.com/watch?v=qfonNUApPKE&feature=youtu.be CEHv10 – Lab Prerequisites CEHv10 Module – Footprinting and Reconnaissance CEHv10 Module – Scanning Networks CEHv10 Module – Enumeration CEHv10 Module – Vulnerability Analysis CEHv10 Module – System Hacking CEHv10 Module – Malware Threats CEHv10 Module – Sniffing CEHv10 Module – Social Engineering CEHv10 Module – Denial-of-Service CEHv10 Module – Session Hijacking CEHv10 Module – Evading IDS, Firewalls, and Honeypots CEHv10 Module – Hacking Web Servers CEHv10 Module – Hacking Web Applications CEHv10 Module – SQL Injection CEHv10 Module – Hacking Wireless Networks CEHv10 Module – Hacking Mobile Platforms CEHv10 Module – Cloud Computing CEHv10 Module – Cryptography ICQ:653580170 jabber: [email protected] ceh v10,ethical hacking certification,ceh,ethical hacking course,ceh certification,ceh training,ceh exam,hacking course,ec council,ethical hacking training,certified ethical hacker training,ceh certification cost,certified ethical hacker exam
  9. Certified Ethical Hacker v10 PDFs Books CEH v10 – Certified Ethical Hacker v10 full PDF is Available for Download now. The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information ========== https://www.youtube.com/watch?v=SAuxe3AhueM&feature=youtu.be security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. What is New in CEH v10 ?compared to CEH v9 NOTE : Strictly for Educational Purpose only. Advised to obtain certification from EC-Council. Download CEH v10 CEH v10 Module 00: Introduction and Table of Contents CEH v10 Module 01: Introduction to Ethical Hacking CEH v10 Module 02: Footprinting and Reconnaissance CEH v10 Module 03: Scanning Networks CEH v10 Module 04: Enumeration CEH v10 Module 05: Vulnerability Analysis new CEH v10 Module 06: System Hacking CEH v10 Module 07: Malware Threats CEH v10 Module 08: Sniffing CEH v10 Module 09: Social Engineering CEH v10 Module 10: Denial-of-Service CEH v10 Module 11: Session Hijacking CEH v10 Module 12: Evading IDS, Firewalls, and Honeypots CEH v10 Module 13: Hacking Web Servers CEH v10 Module 14: Hacking Web Applications CEH v10 Module 15: SQL Injection CEH v10 Module 16: Hacking Wireless Networks CEH v10 Module 17: Hacking Mobile Platforms CEH v10 Module 18: IoT Hacking new CEH v10 Module 19: Cloud Computing CEH v10 Module 20: Cryptography CEH v10 Module 21: References ICQ:653580170 jabber: [email protected] certified ethical hacker book,ethical hacking certification,ceh v10,ceh v9,ethical hacking course,ceh certification,ethical hacking training,certified ethical hacker training,certified ethical hacker exam,ethical hacking book,learn ethical hacking,ceh course,ethical hacking course fees
  10. μProxy Tool v1.81 proxy grabber and checker very simple software for proxy grabbing and checking ========== https://www.youtube.com/watch?v=TB-zK_5hQ0k&feature=youtu.be https://www.virustotal.com/#/file/cc71e88c711f4c9af31bd1fd08fb38cfb6962968caf8ae296bbc04722dfb24ab/detection ICQ:653580170 jabber: [email protected] uProxy Tool v1.81 proxy grabber and checker,uProxy Tool v1.81,uProxy Tool v1.81 proxy grabber ,uProxy Tool v1.81 proxy checker,uProxy Tool proxy grabber

About us

3rdWorld.cc is a cracking forum community that suits the purpose of everyone. We offer paid program for free, cracking tools, combolists, marketplace and many more. You can also expand on knowledge and participate in active discussions.

×