Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/26/15 in all areas

  1. http://www.bangbros.com 71wager:97guilt pursue6:9acronym blessed65:alleged7 gendel11:whitecrow11 http://www.ma.digitalplayground.com/access/login trevor.Fine@gmail.com:Asaca11983 tootalltimothy@yahoo.com:3richard jesse_brezina@yahoo.com:cruiser michael.timothy.brown@gmail.com:mike3737 http://www.amberathome.com/ ryandonahue13:Cleopatria1 Speedy91:Speedy92 Hoff12395:Han123 Adun111:Landrover1 http://www.lesbea.com/members/ tyethies1066:husky38 marcilee3:junior88 http://www.lsgmodels.com guest76:ramp67 campana8:tkm0901 http://www.atkpetites.com/login bigdadcool12:ChevyHHR atklover:atk2014 h
    1 point
  2. Bravo Aerosol, de la posturi+ la reward-uri pentru XSS-uri. Va fi Aerosol urmatorul TinKode ? Ramane de vazut ..
    1 point
  3. hahahahahhahahha, super smecher
    1 point
  4. Romanian citizen Mircea-Ilie Ispasoiu made his first appearance in a New Jersey federal court after being extradited to the U.S. for allegedly orchestrating an international hacking scheme. The cyber attack targeted medical offices, retailers, security companies and United States residences, according to a Department of Justice release. Between 2011 and 2014, Ispasoiu worked as a computer systems administrator at a large Romanian financial institution. There he allegedly hacked into multiple private and business networks, including a company that ran background checks. He was able to access
    1 point
  5. English | Size: 7.58 GB (8,139,833,560 bytes) As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are "white-hat" hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you'll benefit greatly from completing Penetration Testing and Ethical Hacking training here on Cybr
    1 point
  6. Source: https://github.com/SecurityObscurity/cve-2015-0313 PoC: http://www.exploit-db.com/sploits/36491.zip Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit Reference: Trend Micro Discovers New Adobe Flash Zero-Day Exploit Used in Malvertisements Malware don't need Coffee: CVE-2015-0313 (Flash up to 16.0.0.296) and Exploit Kits https://helpx.adobe.com/security/products/flash-player/apsa15-02.html Source: http://www.exploit-db.com/exploits/36491/
    1 point
  7. Rapidgator.net Premium Account Procedez asa cum am mai facut-o, deschid thread iar cei ce sunt interesati si doresc contul, rog sa imi trimita PM ca sa evitam leech si schimbare de parola.
    1 point
  8. Multi gandit facut miner la Bitcoin,uitat aici si minunat.China si Rusia frumos dezvoltat,sistem conducere nu dat faliment: In October of last year Motherboard gained access to a massive, secretive Bitcoin mine housed within a repurposed factory in the Liaoning Province in rural northeast China. This is the infrastructure that keeps the digital currency’s decentralized network up and running, and its operators are profiting big time. The mine we visited is just one of six sites owned by a secretive group of four people, part of a colossal mining operation that, as of our visit, cumulatively
    1 point
  9. Pentru a putea recupera datele sterse de pe facebook trebuie sa urmam urmatoarele etape: 1. Mai intai ne logam in contul facebook 2. Accesam setarile contului 3. Dam click pe "Download a copy of your Facebook data" 4. Pe urma click pe " Start my Archive " si introduceti parola daca va cere. 5. Vom primi un email ce contine un link pentru a downloada arhiva contului in format html.
    -1 points
×
×
  • Create New...