Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  1. Alexa09

    KiteRunner – Hacker Tools: Next-level API hacking

    When facing API endpoints, older tools for directory busting tend to be very ineffective. The days where a webserver is just a directory tree are behind us. The more modern ‘routes’ have taken over and wildly bruteforcing filenames isn’t effective anymore. We need to be smarter and scan based on...
  2. Alexa09

    Chinese Hacker 'Flea' Targets American Ministries with Graphican Backdoor

    Jun 21, 2023 Foreign affairs ministries in the Americas have been targeted by a Chinese state-sponsored actor named Flea as part of a recent campaign that spanned from late 2022 to early 2023. The cyber attacks, per Broadcom's Symantec, involved a new backdoor codenamed Graphican. Some of...
  3. lopez76

    The Authority Hacker Site System Basic in Hindi

    https://mega.nz/folder/LpkTnAqR#G1kLzu6Yj73M1HRfXCQAsA
  4. zazalover4000

    Many Tools In One Windows Executable

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. mmh

    Method/Tut  PRO HACKER STARTER KIT

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. aFaruki_

    course for kali basics and ethic hacker

    https://www.udemy.com/course/sfrdan-ileri-duzey-etik-hacker-kursu-uygulamal/ ethic hacker course and kali basics
  7. Gamerpro

    Potential Targets of Hackers Attacks

    Greetings, esteemed forum members! Today, let's delve into the vast array of potential targets that hackers may pursue in their quest to exploit vulnerabilities. By recognizing the scope of vulnerability, we can heighten our awareness and take proactive steps to protect ourselves and our...
  8. LulzToor

    EBook/Course  The Hacker Mindset [2023]

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. shadowcracker

    From Skid to APT Hacker The #1 Roadmap

    If you follow this roadmap, I fucking guarantee it'll turn you into a goddamn hacking genius. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. elmagnifico

    A Collection Of Hacking eBooks | Become Hacker

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Hacker_2333

    Dorks Method/Tut EBook/Course Others  Reconnaissance and Footprinting Ethical Hacker

    Link:https://mega.nz/folder/R3xmlJoL#sAsqy9CWvJ9JvyB2Hy01sg *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. DeepTow

    Networking for Hacker udemy

    https://www.udemy.com/course/networking-for-ethical-hacker-and-penetration-tester/
  13. Junmagic

    Download CEH (Certified Ethical Hacker) course

    CEH course topics: Introduction to Ethical Hacking Foot Printing and Recognition Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service Session Hijacking Evading IDS, Firewalls, and Honeypots Hacking Web Servers Hacking...
  14. maikinhofoda

    Scama/Letter  HABBO HACKER NEW ACTUALIZADO

    https://www.bing.com/videos/riverview/relatedvideo?q=hackear+habbo&mid=3C5E072B9751F03F59E63C5E072B9751F03F59E6
  15. pktcash111

    pydictor - A powerful and useful hacker dictionary

    A powerful and useful hacker dictionary builder for a brute-force attack https://github.com/LandGrey/pydictor
  16. b1n0

    OSINT Tool- Ghunt

    Open Source Intelligence Requirementes python >= 3.10 $ pip3 install pipx $ pipx ensurepath $ pipx install ghunt 1º install the Ghunt web companion extension: https://addons.mozilla.org/en-US/firefox/addon/ghunt-companion/ >...
  17. winxikefb

    how to become a hacker

    To become a real hacker, you need to reach the level where you can learn a programming language in a few days, you can combine the information in the documentation with the knowledge you already have, and you can quickly learn a programming language. This means you need to learn several skills...
  18. Kaio096

    MY NEW FACEBOOK HACKER :)

    Link: https://mega.nz/file/IUkURLLJ#njI8JCT09EMijm7YOH3RxPJyM7yff8WBBI-9Ia2zXYU *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. marcosnight

    EBook/Course  ETHICAL HACKER VIDEOS

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. barrylp

    how to become a hacker

    To become a real hacker, you need to reach the level where you can learn a programming language in a few days, you can combine the information in the documentation with the knowledge you already have, and you can quickly learn a programming language. This means you need to learn several skills...
  21. Dex90

    5 Google Dorks Every Hacker Should Know.

    Start with “site:<domain>”. Then, exclude boring pages with “-www” or other terms until you get to the juicy stuff: site:tesla.com -www -shop -share -ir -mfa Pastebin Leaks. Check out sites like pastebin, jsfiddle, and codebeautify for code left over from developers: site:pastebin.com...
  22. Spartax

    TOP 10 WEBSITE THAT EVERY PROFESSIONAL HACKER USE

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. cofeee

    Course/Tutorial  Hacker course for free

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** P.w :- thespammingbotsbysajawalhacker
  24. anassssx

    Config  Hacker bb. 1ans

    Link: https://controlc.com Udud34t Anretpb88
  25. ademfalleh

    Linux basics for hackers

    Linux Basics For Hackers download pdf
  26. Ankaal26

    Combo Tools  El libro negro del hacker v2

    Download: Creditos Axe un compa *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. jfjffkfkk

    Become A Hacker | A Complete Bible | Get Started

    Getting started So, The patience has gone, many of you probably seeking to have something like this or something like that, let me put it straight, this is not this or that, it’s actually everything that you ever wonder to know to get started, Become a hacker my OneHacker I’m sure you will...
  28. killady85

    Certified Ethical Hacker v11 Slides

    Certified Ethical Hacker v11 Slides Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. killady85

    Toolset - Session Highjacking - Certified Ethical Hacker v12

    Toolset - Session Highjacking - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. killady85

    Toolset - DOS - Certified Ethical Hacker v12

    Toolset - DOS - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. killady85

    Toolset - Social Engieering - Certified Ethical Hacker v12

    Toolset - Social Engieering - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. killady85

    Toolset - Sniffing - Certified Ethical Hacker v12

    Toolset - Sniffing - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. killady85

    Toolset - Malware Threats - Certified Ethical Hacker v12

    Toolset - Malware Threats - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. killady85

    Toolset - System hacking - Certified Ethical Hacker v12

    Toolset - System hacking - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. killady85

    Toolset - Vulnerable - Certified Ethical Hacker v12

    Toolset - Vulnerable - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. killady85

    Toolset - Enumeration - Certified Ethical Hacker v12

    Toolset - Enumeration - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. killady85

    Toolset - Scanning Network - Certified Ethical Hacker v12

    Toolset - Scanning Network - Certified Ethical Hacker v12 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. killady85

    Toolset - Footprinting & Recon - Certified Ethical Hacker v12

    Toolset - Footprinting & Recon - Certified Ethical Hacker v12 Link: https://mega.nz/file/I2pyWSZC#gBHbUGCA46FLj15hSd_qNgu3D-F65ut5-bQrIT3hbNE [/REPLY]
  39. Trimpiece

    VPN  Hello From The Hacker Side

    EXPRESS VPN ACCOUNTS [email protected]:Sept0922# [email protected]:Constantin99 [email protected]:is221923 [email protected]:Marcus29 [email protected]:cpe1704tks [email protected]:0w1i0l5c9o2 [email protected]:Hellopakistan_786...
  40. rosaf64547

    Car Hacking Course By Sajawal Hacker

    Link: https://mega.nz/folder/Su43Vb4A#E79BXexhOD1YjzOqw0HQCg *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. seyzo312

    ✅CERTIFIED ETHICAL HACKER CEH V10✅

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. seyzo312

    ✅CERTIFIED ETHICAL HACKER CEH V11✅

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. SnakeHead

    Purple Hat Hacker

    Purple Hat Hacker is a Hacker who tests himself/herself on their own PCs. They can buy a PC or they can use an old PC to hack thier another PC to see that how they are good at cyber security and hacking. This is really a very good cyber security practice for anyone.
  44. nikzart

    Become A Hacker | How To Hack Like A Star

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. nikzart

    Become A Hacker | A Complete Bible | Get Started 100

    Getting started So, The patience has gone, many of you probably seeking to have something like this or something like that, let me put it straight, this is not this or that, it’s actually everything that you ever wonder to know to get started, Become a hacker my OneHacker I’m sure you will...
  46. D

    What's a hacker?

    A hacker is someone who uses their technical skills to gain unauthorized access to computer systems or networks. However, the term "hacker" is often used to refer to different groups of people, and it can have different meanings depending on the context. In the media, the term "hacker" is often...
  47. HenryGX

    TRYHACKME - HACKER LEARNING PLATFORM

    One of the best platforms for hacker learning is tryhackme, that's where I started my first pentest tests on websites. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. kitty hacker.jpeg

    kitty hacker.jpeg

    forget RAT i just installed a KAT
  49. iron.chad

    THE HACKER ARMORY: A BLUEPRINT BY MADERAS

    This simple text file contains thousands of resources and tools for hacking, OSINT and threat intelligence. It has forums and links to other lists as well. Compiled by @hackermaderas on twitter. USE WISELY!! IT IS AN ARSENAL, ARMORY AND A LIBRARY for hacking ANYTHING and EVERYTHING YOU CAN...
  50. Naruto Uzamaki

    Ethical hacking

    https://mega.nz/folder/BzwF0bjB#B1jGfyh8U7xImtHW2uYnbg course If anyone is interested, they can access this course on ethical hacking by clicking the link above. [/REPLY]
Top Bottom