CyberArsenal

Welcome to the forum. We focus on computer and network security as well as reverse engineering - you should sign up to see content and better yet participate. There is no payment, credits system, reply-to-reveal, or any of that here. We want quality over quantity. This is an experiment and the idea is to build a good natured and mature/professional community. Please be kind and share! Thanks.

  • ⚠️ Even if sourced from us, never blindly trust cracked software. Always utilize isolated environments (like Docker or VMs) without internet access and deny local network access. Thoroughly review scripts before execution to protect not only yourself but also your friends, family, and colleagues. Stay secure! ⚠️
  • For your information, we no longer host files on “ponies.cloud” but on “pwn3rzs.co”.
    So, be careful and do not trust the links on “ponies.cloud” if it should come back (since the registrar has set it "inactive" due to false information from the .cloud top level domain and we consider it gone.) The hosting is not a problem this was just domain registrar nonsense.

Exploitation

Sections related to exploitation of systems and networks

Exploitation software

Commercial software with exploitation as it's main purpose.
Threads
12
Messages
357
Threads
12
Messages
357

Exploitation techniques

Research related to exploitation techniques, protocol fuzzing, etc.
Threads
11
Messages
35
Threads
11
Messages
35

Antivirus Evasion

Evasion of EDR or antivirus defense technologies
Threads
7
Messages
30
Threads
7
Messages
30
Top