0xploit.com

Search results

  1. 0xOmar

    United States Department of Defense - Pentagon Top Secret Papers Leaked

    A set of highly classified Pentagon documents that leaked that reveal American intelligence gathering on its key partners, adversaries and competitors -- including China. Many of the documents pertain to the battlefield in Ukraine and the Russian war effort, with some showing the degree to...
  2. 0xOmar

    PHONELEAKPACK 4 Girls

    Hidden content
  3. 0xOmar

    How to get complete anonymity with Tor, Whonix, and PIA VPN?

    Hidden content
  4. 0xOmar

    Anonymity Tool Anti-detect browser based on Firefox (Source Code)

    Antidetect browser based on Firefox /// Firefox-based Antidetect browser Source code:- Hidden content
  5. 0xOmar

    OPSEC / Anonymity How to put a password on GRand Unified Bootloader (Rough)

    Without a password for the bootloader, any user can enter the kernel editing mode and make their own settings in the bootloader, in order to exclude the possibility of changing the bootloader configuration outside the booted system, we need to put our own password on it. Of course, this will...
  6. 0xOmar

    OPSEC / Anonymity Your TrueCrypt is spying on you

    In this material, we once again want to remind you of the need to install software only from trusted sources. TrueCrypt is no exception here. Since it is no longer possible to download a safe version of the program from the official site, we recommend downloading it from a reliable source ...
  7. 0xOmar

    OPSEC / Anonymity MAC address spoofing

    Hidden content
  8. 0xOmar

    Proxying the system through Tor

    All the best, dear Cyber Souls! Tolley's paranoia is over the top, toli's paranoia is just*oopshow it's going off scale :smile46: I've already beaten the competition, but happiness is not in money. I decided to type a lot of letters on the subject of Tor'a, I scooped as much as I can here , but...
  9. 0xOmar

    OSINT / Dox / Forensic How SS7 identifies a person. The left SIM card and phone will not save you.

    When investigating a criminal offense (murder / kidnapping / missing person, etc.), one of the first things that is checked is the last contacts of a person, incl. and mobile communications. So, if the fact of the call of the criminal to the victim from the phone is established, then if the law...
  10. 0xOmar

    Hardware / Physical Hacking Evil Library

    Hi all! Today I would like to share with you a method of obtaining a starting point in the network of an enterprise. Let's get started! What are we dealing with? Have you ever heard of PyPI, NPM or NuGet? I think that at least someone knows at least one of these. So, all these are...
  11. 0xOmar

    OPSEC / Anonymity Anonymous Chromium - Ungoogled-Chromium

    Why it is better not to use Google Chrome Earlier we wrote about why google is not a corporation of goodness, from the word at all. What about their chrome browser? It's no secret that it leaks literally everything you do to google servers, and some of its parts are generally proprietary. Of...
  12. 0xOmar

    [PDF] Tor and the Dark Art of Anonymity

    Hidden content
Top