[Nulled] » Programming » Hacking

Yandex private repositories merged into the network🤣

Anonymous hackers have published an archive on the BreachForums forum, including the contents of internal Git repositories of Yandex Corporation.

​​Hackers stole the source codes of League of Legends and Teamfight Tactics🤷🏼♀️

The developer and publisher of video games Riot Games reported that during a recent cyberattack, hackers stole the source codes of League of Legends, Teamfight Tactics and tools for developing an old version of anti-cheat. 

The CryptoAPI vulnerability has been given a second life and most Windows-based data center systems and applications still remain vulnerable.

GoTo has published an update on the incident, warning customers that attackers who hacked its development environment in November 2022 stole encrypted backups containing information about the client and the encryption key for part of this data.

Riot Games confirmed that hackers leaked the sources for League of Legends and Teamfight Tactics, and also received a ransom letter in which the attackers threatened to publish the source code online if the developer did not pay.

Technical details have been published about the vulnerability of the Arm Mali GPU, which leads to RCE in the kernel and the rooting of Pixel 6 devices using a malicious application installed on the target device.

Chromeloader virus analysis: what, how and with what to eat or what is dangerous piracy

VMware has released fixes to address vRealize Log Insight vulnerabilities that could allow attackers to get remote code execution on uncorrected devices.

vRealize Log Insight (VMware Aria Operations for Logs) is a tool for analyzing and managing infrastructure and application logs in VMware environments.

Rapid7 announces the start of operation of the recently fixed critical CVE-2022-47966 in Zoho ManageEngine even before Horizon3.ai released its own PoC exploit.

The problem, considered critical, was discovered in November 2022, when Zoho announced the release of fixes for more than 20 affected local products.

Let's assume that there is nothing besides the victim's login.

Here is the algorithm for hacking an Instagram account that I use:

Automatic captcha completion: I'm not a robot!

We think many of you have come across this annoying captcha, which is available on a variety of web resources. 

How to crack an Android password using a brute force attack? 

Unlock your phone (or device) Android by selecting the PIN code on the locked screen. 

We put passwords on any browsers!

All of us, one way or another, when using browsers, store a bunch of different personal information in them, it can be bookmarks, histories, passwords, logins, and so on. Of course, you can put a password on the computer itself, but such protection is quite easy to do. 

​​🕵🏻‍♂️A selection of services for searching for information on a face photo.

In this post we will talk about finding the information we are interested in by face photo. And at the very end there will be the sweetest thing — an algorithm for searching / highlighting faces so that you can make your service!

Kali Linux Utilities in Thermex - Tools

In this post, we will consider an interesting utility from GitHub, it contains quite a lot of utilities that can be found in Kali Linux.

Nmap, Hydra, SQLMap, Metasploit, ngrok, Kali Nethunter, angryFuzzer, RedHawk, Weeman, IP GeoLocation, Cup, routersploit and so on. All this can be found in this utility.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +23 Total articles 6747
  • +12 Comments 4077
  • +25 Users : 5840