Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 07/12/19 in Posts

  1. 5 points
    Daca ti-ai cumparat si camera buna te poti apuca de videochat.
  2. 5 points
    Scuze frate, de abea am venit de pe baltă. Ca sa compensez pentru intarziere, al doilea cod e din partea casei.
  3. 4 points
    Cam liniste pe aici
  4. 3 points
    Omu vrea un cod, nu-i da nimeni?
  5. 3 points
    Poti spune si aici despre ce e vorba. Cand postezi ceva, asigura-te ca lasi detalii pentru toti utilizatorii, de aceea s-a facut categoria locuri de munca. Nu exista proiecte private, doar tepari. De fiecare data apare unul pe aici care face pe programatorul si unul care cauta. Lasati aici sa vedem si noi despre ce e vorba.
  6. 3 points
    VULNERABILITY DETAILS It's possible to use the NTLM reflection attack to escape a browser sandbox in the case where the sandboxed process is allowed to create TCP sockets. In particular, I was able to combine the issues mentioned below with a bug in Chromium to escape its sandbox. Link : https://www.exploit-db.com/exploits/47115
  7. 3 points
    Updates: - Adaugata o tema albicioasa; - Adaugat suport de mapat starile cipherelor in URL. https://multiencoder.com/#Oi, this be great!|1,1,1,1,1:1,1,1,1,1,1,1,1,1,1
  8. 3 points
    Git All the Payloads! A collection of web attack payloads. payloads Git All the Payloads! A collection of web attack payloads. Pull requests are welcome! Usage run ./get.sh to download external payloads and unzip any payload files that are compressed. Payload Credits fuzzdb - https://github.com/fuzzdb-project/fuzzdb SecLists - https://github.com/danielmiessler/SecLists xsuperbug - https://github.com/xsuperbug/payloads NickSanzotta - https://github.com/NickSanzotta/BurpIntruder 7ioSecurity - https://github.com/7ioSecurity/XSS-Payloads shadsidd - https://github.com/shadsidd shikari1337 - https://www.shikari1337.com/list-of-xss-payloads-for-cross-site-scripting/ xmendez - https://github.com/xmendez/wfuzz minimaxir - https://github.com/minimaxir/big-list-of-naughty-strings xsscx - https://github.com/xsscx/Commodity-Injection-Signatures TheRook - https://github.com/TheRook/subbrute danielmiessler - https://github.com/danielmiessler/RobotsDisallowed FireFart - https://github.com/FireFart/HashCollision-DOS-POC HybrisDisaster - https://github.com/HybrisDisaster/aspHashDoS swisskyrepo - https://github.com/swisskyrepo/PayloadsAllTheThings 1N3 - https://github.com/1N3/IntruderPayloads cujanovic - https://github.com/cujanovic/Open-Redirect-Payloads cujanovic - https://github.com/cujanovic/Content-Bruteforcing-Wordlist cujanovic - https://github.com/cujanovic/subdomain-bruteforce-list cujanovic - https://github.com/cujanovic/CRLF-Injection-Payloads cujanovic - https://github.com/cujanovic/Virtual-host-wordlist cujanovic - https://github.com/cujanovic/dirsearch-wordlist lavalamp- - https://github.com/lavalamp-/password-lists arnaudsoullie - https://github.com/arnaudsoullie/ics-default-passwords scadastrangelove - https://github.com/scadastrangelove/SCADAPASS jeanphorn - https://github.com/jeanphorn/wordlist j3ers3 - https://github.com/j3ers3/PassList nyxxxie - https://github.com/nyxxxie/awesome-default-passwords foospidy - https://github.com/foospidy/web-cve-tests OWASP dirbuster - https://www.owasp.org/index.php/DirBuster fuzzing_code_database - https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database JBroFuzz - https://www.owasp.org/index.php/JBroFuzz Other xss/ismailtasdelen.txt - https://github.com/ismailtasdelen/xss-payload-list xss/jsf__k.txt - http://www.jsfuck.com/ xss/kirankarnad.txt - https://www.linkedin.com/pulse/20140812222156-79939846-xss-vectors-you-may-need-as-a-pen-tester xss/packetstorm.txt - https://packetstormsecurity.com/files/112152/Cross-Site-Scripting-Payloads.html xss/smeegessec.com.txt - http://www.smeegesec.com/2012/06/collection-of-cross-site-scripting-xss.html xss/d3adend.org.txt - http://d3adend.org/xss/ghettoBypass xss/soaj1664ashar.txt - http://pastebin.com/u6FY1xDA xss/billsempf.txt - https://www.sempf.net/post/Six-hundred-and-sixty-six-XSS-vectors-suitable-for-attacking-an-API.aspx (http://pastebin.com/48WdZR6L) xss/787373.txt - https://84692bb0df6f30fc0687-25dde2f20b8e8c1bda75aeb96f737eae.ssl.cf1.rackcdn.com/--xss.html xss/bhandarkar.txt - http://hackingforsecurity.blogspot.com/2013/11/xss-cheat-sheet-huge-list.html xss/xssdb.txt - http://xssdb.net/xssdb.txt xss/0xsobky.txt - https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot xss/secgeek.txt - https://www.secgeek.net/solutions-for-xss-waf-challenge/ xss/reddit_xss_get.txt - All XSS GET requests from https://www.reddit.com/r/xss (as of 3/30/2016) xss/rafaybaloch.txt - http://www.rafayhackingarticles.net/2016/09/breaking-great-wall-of-web-xss-waf.html xss/alternume0.txt - https://www.openbugbounty.org/reports/722726/ xss/XssPayloads - https://twitter.com/XssPayloads sqli/camoufl4g3.txt - https://github.com/camoufl4g3/SQLi-payload-Fuzz3R/blob/master/payloads.txt sqli/c0rni3sm.txt - http://c0rni3sm.blogspot.in/2016/02/a-quite-rare-mssql-injection.html sqli/sqlifuzzer.txt - https://github.com/ContactLeft/sqlifuzzer/tree/master/payloads sqli/harisec.txt - https://hackerone.com/reports/297478 sqli/jstnkndy.txt - https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/ sqli/d0znpp.txt - https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0f sqli/libinjection-bypasses.txt - https://gist.github.com/migolovanov/432fe28c8c7e9fa675ab3903c5eda77f traversal/dotdotpwn.txt - https://github.com/wireghoul/dotdotpwn codeinjection/fede.txt - https://techblog.mediaservice.net/2016/10/exploiting-ognl-injection/ commandinjection/ismailtasdelen-unix.txt - https://github.com/ismailtasdelen/command-injection-payload-list commandinjection/ismailtasdelen-windows.txt - https://github.com/ismailtasdelen/command-injection-payload-list ctf Requests extracted from either packet captures or log files of capture the flag (ctf) events. Mostly raw data so not all requests are actual payloads, however requests should be deduplicated. maccdc2010.txt - Mid-Atlantic CCDC (http://maccdc.org/), source: http://www.netresec.com/?page=MACCDC maccdc2011.txt - Mid-Atlantic CCDC (http://maccdc.org/), source: http://www.netresec.com/?page=MACCDC maccdc2012.txt - Mid-Atlantic CCDC (http://maccdc.org/), source: http://www.netresec.com/?page=MACCDC ists12_2015.txt - Information Security Talent Search (http://ists.sparsa.org/), source: http://www.netresec.com/?page=ISTS defcon20.txt - DEFCON Capture the Flag (https://www.defcon.org/html/links/dc-ctf.html), source: http://www.netresec.com/?page=PcapFiles Miscellaneous XSS references that may overlap with sources already included above: https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet http://htmlpurifier.org/live/smoketests/xssAttacks.php Download Link : https://github.com/foospidy/payloads?fbclid=IwAR3jUysqvmVlpUCiAPY13mqJ1tCOc87omdE3x_81ReH0TC_myN6754EJmRw
  9. 3 points
    Scanner pentru tumilsugi ai?
  10. 2 points
    Astia de filelist sunt mai rari. Sper sa-ti faci treaba cu el.
  11. 2 points
    Link to PDF : https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-rdp-exposed-the-threats-thats-already-at-your-door-wp.pdf?fbclid=IwAR1Gj_oOa-2uuqEjqQCsO2l5nug2_LMPicIk-k3OQ1CDshpMThzQSmJTt18
  12. 2 points
    Nytro said: Inainte de a posta: - verifica data ultimului post, nu redeschide un topic fara un motiv serios - daca e cazul vezi mai intai ce zice prietenul Google - gandeste-te daca postul tau e util sau postezi doar ca sa te afli in treaba - asigura-te ca nu incalci regulile - fii atent la limbajul folosit, vorbeste frumos si cat mai corect gramatical - pentru orice problema legata de forum, contacteaza-ma
  13. 2 points
    Plin de frilensari. Sa moara jana bine-am ras. Bwahahahahahahaahahah
  14. 2 points
    Te invităm în perioada 06 iulie și 15 octombrie la Romexpo, la cea mai mare aventură spațială a vieții tale în cadrul expoziției Space Adventure, care a cucerit cinci țări deja. Expoziția vine în România cu multe jocuri interactive si simulatoare. Bucură-te de istoria uluitoare a călătoriilor spațiale și de experiența sentimentului de a fi un astronaut! Link : https://www.expozitiespatiala.ro/?utm_source=ads&utm_medium=page&utm_campaign=0045&fbclid=IwAR25GuUCkipvD262ZBP-znuZu6AuLsdfUoGYA0MjTA7chEMFdwF5OF8RSIE
  15. 2 points
  16. 2 points
    Am facut un mic update la MultiEncoder.com (fostul Krypton). Interfata e schimbata si a fost rescris cu Vue in loc de jQuery. Ar trebui sa performeze mai bine la string-uri mari. Codul sursa se poate gasi pe GitHub, aici. https://multiencoder.com/#rst+powa Anuntati-ma daca gasiti bug-uri sau sugestii.
  17. 2 points
    Sunteti cei mai distrusi oameni in viata daca inca va chinuiti cu asa ceva dupa 7 ani.
  18. 2 points
    Daca pui un fisier necriptat ti-l cripteaza din nou? Trebuie sa faci cumva sa ai posibilitatea de a putea urmari cand ti le recripteaza. Daca ti le mai recripteaza cu aceeasi cheie si tu il prinzi in fapt cu pantalonii in vine exista posibilitatea sa tragi cheia din rami. Daca reinstalezi sistemul adio fisiere.
  19. 2 points
    Formulat si mai corect: Hello, am si eu o intrebare idioata: Se pot adauga mai multe proxy-uri intr-un program? Peace
  20. 2 points
    Stan Alexandru Cosmin din Giurgiu (@Kfollow aici), tu dai de ani de zile tepe cu munca pe rst, esti handicapat (si chiar ai un handicap fizic. nu o sa pun poze cu tine aici, acum). Veziti in pula mea de saracia ta si de boala ta, ai dat tepe la n useri. Te duci in cap daca se pun toti userii pe care i ai ars sa iti faca reclamatii la Politie. sau daca intra peste ma-ta in casa. Tu realizeaza ca mai sunt si oameni puternici aici, nu toti sunt cocosati cu ecuson la gat si cu par crescut pe gat care lucreaza la corporatie. Eu nu inteleg cum ai tupeu sa dai tepe cu numele tau real, asta e cam cea mai proasta combinatie pe care o puteai face. Sau te da cineva in judecata pentru o teapa de-aia de 200 de lei de-a ta si te face kebab la tribunal. Sau te bate de față cu politia cum ii bate si pe parcangii, ca si tu esti ca si aia.
  21. 1 point
    O sa ajungi la viteze de genul numai daca descarci pe SSD sa stii, pe HDD nici pomeneala.
  22. 1 point
    La vetize de peste 100 MB/s, nu este posibil Cu stimă: Gheorghe de la coada vacìi /si doo
  23. 1 point
    Since 2007, hackers have provided virtual services to criminals. July 16, 2019 | 17:15 0 123 The SBU operatives with partners from the United States stopped the activities of a powerful hacker group. This was reported by the. Head of the Security Service of Ukraine Ivan Bakanov. Since 2007, hackers have provided virtual services to criminals, creating conditions for them to freely carry out illegal activities. The attackers used Dark Net - a part of the Internet that was hidden from ordinary users, where it is possible to anonymously purchase weapons, drugs and the like. Law enforcement officers could not identify the participants, because hosting did not respond to requests. Intelligence officers have established that the organizer of the group is a citizen of Ukraine, who received his first hacker experience in Moscow in the mid-2000s. Already in 2007, he began to provide his services to hackers around the world through Ukrainian networks, carefully concealing the actual location of his equipment from law enforcement officers and special services of any country. The equipment was periodically found by Ukrainian, Russian, and American law enforcement officers, confiscated it, temporarily ceased operations, but the hacker group continued to operate. The group has about ten main participants and dozens of accomplices in several countries, as well as thousands of customers. They are concerned that hundreds of terabytes of data are in the hands of the special services, which can be evidence in hundreds of criminal cases around the world. According to our estimates, we can talk about 40% of the Russian-language segment of Dark Net, ”said the acting minister. head of the SBU. In the United States alone, an average of fifty years in prison was brought against the organizer. He is accused of fraud, unauthorized interference, theft of personal data and a number of other crimes under US criminal law. In Ukraine, the organizer and another member of the group declared suspicion of committing criminal offenses under Part 2 of Art. 361 and Part 3 of Art. 301 of the Criminal Code. They are under house arrest. During the authorized investigative actions on the territory of a private house near Odessa, we found a real data center with a backup autonomous power source, security, powerful Internet access channels, which was carefully hidden. A preliminary study of network equipment and an assessment of the ranges of IP addresses used by the grouping indicates at least three autonomous systems reserved for enterprises of the Russian Federation. Given the counter-intelligence regime that exists in the Russian Federation, as well as the technological features of the organization and construction of SORM-3, possession and control of this numbering resource by the group could not take place without control and cover of Russian special services. This information allows the SBU to get a clearer picture of the cyber attacks on Ukrainian critical infrastructure facilities, and the role of the Russian special services in cyber attacks on other countries. Partea cu liftul.. chiar interesanta . Source : https://368.media/2019/07/16/sbu-razoblachila-krupnuyu-hakerskuyu-set-v-odesse/
  24. 1 point
  25. 1 point
    Ai dreptate. Este vorba despre un autoposting. pentru o aplicatie care ruleaza doar pe ios/android . Am deja unul . doar ca nu mai ruleaza cum trebuie. si vreau sa fie facut altcumva .
  26. 1 point
  27. 1 point
  28. 1 point
    Google are androidul.
  29. 1 point
    Cybercrime group Sea Turtle attacked the organization ICS-Forth, which controls the Greek top-level domains .gr and .el. Cisco Talos was first talked about Sea Turtle grouping in April this year. The attackers use a very unusual technique of hacking - instead of attacking the victim directly, they gain access to domain registrar accounts and managed DNS providers and change the company's DNS settings. By modifying the DNS records of internal servers, attackers redirect traffic destined for legitimate applications and the company's mail servers to the servers they control, carry out a man-in-the-middle attack and intercept the credentials. The above attacks are short-lived (lasting from several hours to several days) and invisible (most companies do not check the DNS settings for changes). According to FireEye, the group acts in the interests of the Iranian government. In order to get to the victim, Sea Turtle does not stop hacking into the provider's network entirely. As reportedin the first Cisco Talos report, the group hacked into the Swedish organization NetNod, which manages the traffic exchange point. The attack allowed attackers to manipulate the DNS records for sa1 [.] Dnsnode [.] Net and gain access to the credentials of the top-level domain administrator of Saudi Arabia (.sa) In a new report, Cisco Talos reports a similar attack on the Greek organization ICS-Forth. At the moment, researchers find it difficult to say what the attackers did in the ICS-Forth networks after hacking. It is also unknown for which domains the attackers changed the DNS settings. After the organization notified the public about the hacking, Sea Turtle remained in its networks for another five days. Source: https://www.securitylab.ru/news/499907.php
  30. 1 point
    In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. https://www.exploit-db.com/exploits/47129
  31. 1 point
    Offensive Security Current Job Openings Content Development Project Editor Remote InfraDev Cyber Security & Policy Engineer Remote Operations Student Admin Student Tech Admin Remote TEK TEK Online Training Administrator Remote Sales Sales Account Manager New Jersey https://www.offensive-security.com/about-us/careers/?utm_campaign=Internal Careers&utm_content=95807817&utm_medium=social&utm_source=linkedin&hss_channel=lcp-5384047
  32. 1 point
    M-am regăsit cu đocumentele în recycle bin :))))))))), am uitat că eu ștergeam des ce scriam ca să se salveze în recycle și uite că virusul nu a ajuns până acolo.
  33. 1 point
  34. 1 point
    Face si decode daca dai paste intr-un cipher.
  35. 1 point
    Bravo coite! Pacat ca e doar encoder. Ar trebui sa separi inputul de output, gen sa fie undeva centrat, singur pe linie si in jos sa vina restu.
  36. 1 point
    Va lingeti gaurile 69 WTF 😄😄😄😄
  37. 1 point
    Mi-ai luat vorba din gură, Schimba hdd, bateria de pe placa de bază şi aşteaptă /restart -> safe mode, ai incercat? //incercati cu ceva linux live, qveti acces la fisiere, mai mult ca sigur, iar dupa ii futeti in gura
  38. 1 point
    Presupun ca back-up uri nu ai....ai dat restart la pc?ai sters vreun fisier?de obicei poti gasi cheia daca nu dai restart,shutdown sau delete la fisierul initial...cel putin asa era la wcry...dar gasesti sigur pe net vreun decrypter...daca nu...fa-ti o clona si asteapta sa apara...si cand va aparea...u get the picture
  39. 1 point
    Daca e pe bune, ce mancai cand erai mic?
  40. 1 point
    Deci pana la urma cine e prostu? Tu ca nu te informezi sau noi ca ne bateam pula de tine pe buna dreptate?
  41. 1 point
    Salutare all, In curand lansam acesta conferinta in Bucuresti, 17-18 Octombrie. HTZ pune accent foarte mare pe Ethical Hacking, iar dupa cum stim din ce in ce mai des apar incidente majore in industrie (data breaches or damage). Noi ne deosebim fata de alte conferinte prin challenge-urile de pen-testing, facute in totalitate de staff-ul nostru. Prin aceste challenge-uri va punem la incercare creativitatea si totodata skill-urile voastre de: pen-testing, scripting, social engineering, crypto si multe altele. Scopul nostru este va aruncam in mijlocul actiunii, sa ne indepartam putin de platformele online, sa interactionam mai mult face to face, sa ne cunoastem si altfel ... nu doar dupa NickName :). Challenge-urile incep in data de 11-12 Octombrie si o sa fie nevoie de deplasare prin Bucuresti, in diferite Geo Locations pentru a finaliza challenge-urile. Fiecare challenge te va ghida catre alt challenge! Evident, exista niste reguli pentru aceste challenge-uri, aceste reguli se regasesc pe website-ul nostru https://www.hackthezone.com/tickets/rules-and-tactics . La finalul acestor challenge-uri, ne vedem cu totii la conferinta din data de 17-18 Octombrie, in Crystal Palace Ballrooms, Calea Rahovei 198A, Sector 5. Da, o sa fim si noi pe scena sa va prezentam fiecare challenge cum trebuia rezolvat (walkthrough scenarios) si decernarea premiului. Premiul este luat de o singura persoana, the best of the best! Poti sa participi si cu echipa. Nu este nici o problema, dar tot cel mai bun timp facut de o persoana o sa fie premiat :D la final ... va impartiti voi premiul. La conferinta o sa avem mai speakers de top ce vor ilustra diferinte puncte de vedere despre IT Security, cum evolueaza atacatorii, cum am putea sa ne aparam mai bine si nu numai. Biletele pot fi achizitionate de aici : https://www.iabilet.ro/bilete-hackthezone-conference-challenges-43985 Website-ul nostru o sa fie in permanentat actualizat, iar mici detalii pot fie modificate sau imbunatatite. Pentru intrebari sau nelamuriri, puteti sa ne gasiti si pe canalul nostru de Slack la : https://www.hackthezone.com/slack . Have fun! AlexHTZ
  42. 1 point
    Sa primiti muie amandoi, este ceea ce meritati. Veniti cu texte din astea "iti voi da refund", pai ba baiatule, daca erai putin serios faceai asta fara atata circ pe aici, si cel ce a cerut la fel. Daca si voi sunteti profesionisti eu sunt Steve Jobs. Trebuia sa stabiliti o data cand aplicatia trebuia finalizata 100% dar voi o ardeti ca ciorile pe aici cu cacaturi ieftine. M U I E
  43. 1 point
    tiganul e tigan si in ziua de paste. Cel mai corect tigan e ala cu toporul in cap. Mai are un user, asta - https://rstforums.com/forum/profile/212769-c3m3d3/
  44. 1 point
    Du-te ba in mortii ma-tii de obosit cu anonimosu pizdii, futu-te-n gaoaza sa te fut de parlit ce esti tu.
  45. 1 point
    In anul 2019 si voi tot dupa nologine si root-uri.
  46. 1 point
    Am scris cu un an in urma un tutorial despre trimiterea sms-urilor din linia de comanda si vazand ca a mai cerut cineva pe aici informatii diverse despre gateway-uri sms, m-am gandit sa pun tutorialul si aici. Ideea este simpla, daca aveti un abonament sau cartela reincarcabila cu "oarece" optiuni pentru a trimite multe sms-uri, va puteti face propriul sms gateway. Testul de mai jos l-am facut utilizand un modem huawei (am sa dau edit la post sa va spun modelul exact), iar intentia a fost de a face un sistem de monitorizare servere/servicii prin SMS+mail. Am conectat modemul intr-un server local folosit pentru teste si monitorizare, apoi m-am conectat la el utilizand ‘cu‘. Am trimis un sms in acest fel, sa-mi aduc aminte de vremurile apuse cand foloseam modem-uri. Rezultatul se poate vedea in aceasta imagine. Metoda a fost oarecum primitiva, asa ca am instalat ‘smstools’ din ‘/usr/ports/comms/smstools’. hp ~ # make install clean -C /usr/ports/comms/smstools hp ~ # echo 'smsd_enable="YES"' >> /etc/rc.conf hp ~ # cat >> /usr/local/etc/smsd.conf << EOF # file '/usr/local/etc/smsd.conf' devices = GSM1 logfile = /var/log/smsd.log loglevel = 7 [GSM1] device = /dev/cuaU0.0 incoming = no pin = 2653 rtscts = no EOF hp ~ # /usr/local/etc/rc.d/smsd start hp ~ # ./smssend +4915223008abc 'read the fucking manual' hp ~ # tail -f /var/log/smsd.log 2011-04-19 01:48:17,6, GSM1: Modem handler 0 has started. 2011-04-19 01:48:17,6, smsd: outgoing file checker has started. 2011-04-19 01:49:09,6, smsd: Moved file /var/spool/sms/outgoing/send_qoWmwT to /var/spool/sms/checked 2011-04-19 01:49:19,6, smsd: I have to send 1 short message for /var/spool/sms/checked/send_qoWmwT 2011-04-19 01:49:19,6, GSM1: Sending SMS from to 4915223008abc ......................................... 2011-04-19 01:49:34,5, GSM1: SMS sent, To: 4915223008abc 2011-04-19 01:49:34,6, smsd: Deleted file /var/spool/sms/checked/send_qoWmwT Scriptul cu care am trimis sms-ul: (il puteti pune in ‘/usr/local/bin‘): #!/bin/sh # This script send a text sms at the command line by creating # a sms file in the outgoing queue. # I use it for testing. # $1 is the destination phone number # $2 is the message text # if you leave $2 or both empty, the script will ask you DEST=$1 TEXT=$2 if [ -z "$DEST" ]; then printf "Destination: " read DEST fi if [ -z "$TEXT" ]; then printf "Text: " read TEXT fi FILE=`mktemp /var/spool/sms/outgoing/send_XXXXXX` chmod g+wr $FILE echo "To: $DEST" >> $FILE echo "" >> $FILE echo -n "$TEXT" >> $FILE Note: - Daca aveti totul la indemana, in cateva ore va puteti face propriul gateway de sms-uri. - Scriptul bash utilizat pentru trimiterea sms-urilor nu este facut de mine. - Nu uitati sa schimbati pin-ul in smsd.conf. - In cazul in care imprumutati acest tutorial pentru alte site-uri, va rog sa specificati sursa: https://rstcenter.com/forum/54068-sms-gateway.rst
  47. 0 points
    Writing shellcodes for Windows x64 On 30 June 2019 By nytrosecurity Long time ago I wrote three detailed blog posts about how to write shellcodes for Windows (x86 – 32 bits). The articles are beginner friendly and contain a lot of details. First part explains what is a shellcode and which are its limitations, second part explains PEB (Process Environment Block), PE (Portable Executable) file format and the basics of ASM (Assembler) and the third part shows how a Windows shellcode can be actually implemented. This blog post is the port of the previous articles on Windows 64 bits (x64) and it will not cover all the details explained in the previous blog posts, so who is not familiar with all the concepts of shellcode development on Windows must see them before going further. Of course, the differences between x86 and x64 shellcode development on Windows, including ASM, will be covered here. However, since I already write some details about Windows 64 bits on the Stack Based Buffer Overflows on x64 (Windows) blog post, I will just copy and paste them here. As in the previous blog posts, we will create a simple shellcode that swaps the mouse buttons using SwapMouseButton function exported by user32.dll and grecefully close the proccess using ExitProcess function exported by kernel32.dll. Articol complet: https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/
  48. -1 points
    wget de la arhiva gasiti pe website-ul meu oficial: https://rpgfrankfurdro.000webhostapp.com/ Nu cred ca este nevoie de un video sau poza pentru asa ceva!
  49. -1 points
  50. -1 points
    Mi-am cumparat un calculator la sfarsit de aprilie, si am ramas fara bani de jocuri, are cineva un cod pentru cont de filelist? 😬
×
×
  • Create New...