Jump to content

Usr6

Active Members
  • Posts

    1337
  • Joined

  • Last visited

  • Days Won

    89

Everything posted by Usr6

  1. care l-ati probat... schimbati-va repede parolele... bindat cu istealer:) l3o4nn.l3.ohost.de
  2. e bindat cu un "evillllllllllllllll.exe"
  3. TiGa's Video Tutorial Series on IDA Pro Visual Debugging with IDA - The Interactive DisassemblerRemote Debugging with IDA ProDebugging a faulty application with IDA ProHow to Solve Crackmes for Dummies in Videox64 Disassembling Primer and fixing obfuscated APIsTLS-CallBacks and preventing debugger detection with IDA ProUnwrapping a Flash Video Executable (exe2swf)Stop fishing and start keygenning!Alien Autopsy rev. 2008Unpacking deroko's x64 UnpackMeSolving pnluck's x64 CrackMe TiGa's Video Tutorial Site torrent: http://torrents.thepiratebay.org/6117249/IDA_Pro_Tutorials_(SWF).6117249.TPB.torrent pass: tigaisthebest TiGa's Video Tutorial Series on IDA Pro Unpacking MPRESS 1.07 (x64)Unpacking PESpin x64 Pre-Alpha Unpacking
  4. este un "manglitor" de parole (chrome, dial-up, filezilla, ie, opera, remote-desktop) intrucat e 8 martie... un cadou Expeditor: c210cC5nb29nbGUuY29t user: aS5jLmMwc3R5ODhAZ21haWwuY29t pass: eHRyZW1sdXY= Destinatar: Yy5zb3VsQHJvY2tldG1haWwuY29t
  5. antivirusi folositi /ultimul update: A-Squared - 7/3/11 1:00 Avast - 7/3/11 1:00 Avg - 7/3/11 1:00 Avira -7/3/11 1:08 BitDefender - 7/3/11 1:03 DrWeb - 7/3/11 1:03 Kapersky - 7/3/11 1:07 Ikarus - 7/3/11 0:02 McAfee 7/3/11 1:10 Nod32 - 7/3/11 1:06 Panda - 7/3/11 1:11 Vba32 - 7/3/11 1:07 Este un serviciu gratuit,privat, in stadiu Beta. Nu distribuie fisierele scanate. "Bajo ninguna circunstancia los archivos subidos a Malware Online Scanner serán distribuidos ni a particulares, ni a empresas. Lo privado se mantiene privado con Malware Online Scanner." Malware Online Detections
  6. Cod nou "quale157" 12 luni 10GB/luna trafic 2GB Datasafe
  7. FRAGMENT DIN TEXTUL PIESEI DE TEATRU "Decalogul dup? Hess" Autor: ALINA NELEGA Regizor: GAVRIL CADARIU Interpret: NICU MIHOC Teatrul Ariel Underground, Tîrgu-Mure? Data premierei: 08 iunie? 2003 Locul filmarii: Ungheni-Mures 9 martie 2004 . Motiv : Barfe intre barbati. Este o piesa de teatru si este scrisa de o femeie,nimic mai mult.
  8. odix87.hi2.ro cine are un stealer db spammer si se plictiseste:-"
  9. sistemul este in continua schimbare indiferent daca ai virusi sau nu, cand faci un update se schimba, nu te ajuta cu nimic daca ai un snapshoot de acu 1-2 luni. //in cazul in care gasesti fisiere modificate, le cauti pe google si iei identic cu originalu Dar acuma depinde de tipul de malware cu care esti infectat, un stealer de ex nu lasa urme la nivelul fisierelor practic daca vrei sa fi protejat trebuie sa testezi fiecare aplicatie noua inainte de a o instala pe sistem, intrucat mai nou orice malware are anti vm/sandbox etc(daca e bindat cu fisierul original a.i. in vm sa ruleze numa fisieru original iti iei o tzeapa de nu stii cum te cheama la instalarea pe sistemul normal) ai nev de un pc dedicat special pt teste altfel... esti la mila lu allah antivirul ar fi bun doar in cazul in care poti obtine azi updateurile de anu viitor, altfel e doar un fel de anti-(noob)-virus ID Install Watch este asemeni cu systrace-ul + restore (daca ii gasesti un serial/crack ...lasa si mie pe pm pls)
  10. @nedo: systracer face ceea ce vrei tu SysTracer - Track file and registry changes in your computer te ajuta si ESET SysInspector
  11. inca un crypter online Perception Imagination OnlineCrypter exista si surse (Php+Cpp)
  12. HluSoe is a free Rapidshare/Megaupload/Megavideo/Hotfile/Fileserve/Filesonic premium link generator which allow you to download files from such file hosting sites with premium features. Rapidshare- You are a "VIP" Megaupload-You are a "VIP" Megavideo- You are a "VIP" Hotfile- 1 files per 15 minutes Fileserve- 2 files per 15 minutes Filesonic- 2 files per 15 minutes HluSoe - Free Rapidshare/Megaupload/Megavideo/Hotfile/Fileserve/Filesonic Premium Link Generator *are captcha*
  13. Usr6

    Dork Tools

    daca ti-a furat ceva... gasesti aici: Login
  14. [OFFTOPIC] fara nici o leg cu 4/2 + 2/8 exista un site de localizare [beta testing-gratuit momentan] cu o precizie destul de buna Mobile phone tracking daca v-a localizat +1 rep [/]
  15. Here is a list of the recipes: Anonymizing Your Activities Anonymous Web Browsing with Tor Wrapping Wget and Network Clients with Torsocks Multi-platform Tor-enabled Downloader in Python Forwarding Traffic Through Open Proxies Using SSH Tunnels to Proxy Connections Privacy-enhanced Web Browsing with Privoxy Anonymous Surfing with Anonymous.org Internet Access Through Cellular Networks Using VPNs with Anonymizer Universal Honeypots Collecting Malware Samples with Nepenthes Real-time Attack Monitoring with IRC Logging Accepting Nepenthes Submissions over HTTP in Python Collecting Malware Samples with Dionaea Accepting Dionaea Submissions over HTTP in Python Real-time Event Notification and Binary Sharing with XMPP Analyzing and Replaying Attacks Logged by Dionaea Passive Identification of Remote Systems with p0f Graphing Dionaea Attack Patterns with SQLite3 and Gnuplot Malware Classification Examining Existing ClamAV Signatures Creating a Custom ClamAV Database Converting ClamAV Signatures to YARA Identifying Packers with YARA and PEiD Detecting Malware Capabilities with YARA File Type Identification and Hashing in Python Writing a Multiple-AV Scanner in Python Detecting Malicious PE Files in Python Finding Similar Malware with ssdeep Detecting Self-modifying Code with ssdeep Comparing Binaries with IDA and BinDiff Sandboxes and Multi-AV Scanners Scanning Files with VirusTotal Scanning Files with Jotti Scanning Files with NoVirusThanks Database-enabled Multi-AV Uploader in Python Analyzing Malware with ThreatExpert Analyzing Malware with CWSandbox Analyzing malware with Anubis Writing AutoIT Scripts for Joebox Defeating Path-dependent Malware with Joebox Defeating Process-dependent DLLs with Joebox Setting an Active HTTP Proxy with Joebox Scanning for Artifacts with Sandbox Results Domains and IP Addresses Researching Domains with WHOIS Resolving DNS Hostnames Obtaining IP WHOIS Records Querying Passive DNS with BFK Checking DNS Records with Robtex Performing a Reverse IP Search with DomainTools Initiating Zone Transfers with dig Brute-forcing Subdomains with dnsmap Mapping IP Addresses to ASNs via Shadowserver Checking IP Reputation with RBLs Detecting Fast Flux with Passive DNS and TTLs Tracking Fast Flux Domains with Tracker Static Maps with Maxmind, Matplotlib and pygoeip Interactive Maps with Google Charts API Malicious Documents and URLs Analyzing JavaScript with Spidermonkey Automatically Decoding JavaScript with Jsunpack Optimizing Jsunpack-n Decodings for Speed and Completeness Triggering Exploits by Emulating Browser DOM Elements Extracting JavaScript from PDF Files with pdf.py Triggering Exploits by Faking PDF Software Versions Leveraging Didier Stevens's PDF Tools Determining which Vulnerabilities a PDF File Exploits Disassembling Shellcode with DiStorm Emulating Shellcode with Libemu Analyzing Microsoft Office Files with OfficeMalScanner Debugging Office Shellcode with DisView and MalHost-Setup Extracting HTTP Files from Packet Captures with Jsunpack Graphing URL Relationships with Jsunpack Malware Labs Routing TCP/IP Connections in Your Lab Capturing and Analyzing Network Traffic Simulating the Internet with INetSim Manipulating HTTP/HTTPS with Burp Proxy Using Joe Stewart's Truman Preserving Physical Systems with Deep Freeze Cloning and Imaging Disks with FOG Automating FOG Tasks with the MySQL Database Automation Automated Malware Analysis with VirtualBox Working with VirtualBox Disk and Memory Images Automated Malware Analysis with VMware Capturing Packets with TShark via Python Collecting Network Logs with INetSim via Python Analyzing Memory Files with Volatility Putting All the Sandbox Pieces Together Automated Analysis with Zero Wine and QEMU Automated Analysis with Sandboxie and Buster Dynamic Analysis Logging API Calls with Process Monitor Change Detection with Regshot Receiving File System Change Notifications Receiving Registry Change Notifications Handle Table Diffing Exploring Code Injection with HandleDiff Watching Bankpatch.C Disable Windows File Protection Building an API Monitor with Microsoft Detours Following Child Processes with your API Monitor Capturing Process, Thread, and Image Load Events Preventing Processes from Terminating Preventing Malware from Deleting Files Preventing Drivers from Loading Using the Data Preservation Module Creating a Custom Command Shell with ReactOS Malware Forensics Discovering Alternate Data Streams with TSK Detecting Hidden Files and Directories with TSK Finding Hidden Registry Data with Microsoft's Offline API Bypassing Poison Ivy's Locked Files Bypassing Conficker's File System ACL Restrictions Scanning for Rootkits with GMER Detecting HTML Injection by Inspecting IE's DOM Registry Forensics with RegRipper Plug-ins Detecting Rogue Installed PKI Certificates Examining Malware that Leaks Data into the Registry Debugging Malware Opening and Attaching to Processes Configuring a JIT Debugger for Shellcode Analysis Getting Familiar with the Debugger GUI Exploring Process Memory and Resources Controlling Program Execution Setting and Catching Breakpoints Using Conditional Log Breakpoints Debugging with Python Scripts and PyCommands Detecting Shellcode in Binary Files Investigating Silentbanker's API Hooks Manipulating Process Memory with WinAppDbg Tools Designing a Python API Monitor with WinAppDbg De-Obfuscation Reversing XOR Algorithms in Python Detecting XOR Encoded Data with yaratize Decoding Base64 with Special Alphabets Isolating Encrypted Data in Packet Captures Finding Crypto with SnD Reverser Tool, FindCrypt, and Kanal Porting OpenSSL Symbols with Zynamics BinDiff Decrypting Data in Python with PyCrypto Finding OEP in Packed Malware Dumping Process Memory with LordPE Rebuilding Import Tables with ImpREC Cracking Domain Generation Algorithms Decoding Strings with x86emu and Python Working with DLLs Enumerating DLL Exports Executing DLLs with rundll3exe Bypassing Host Process Restrictions Calling DLL Exports Remotely with rundll32ex Debugging DLLs with LOADDLL.EXE Catching Breakpoints on DLL Entry Points Executing DLLs as a Windows Service Converting DLLs to Standalone Executables Kernel Debugging Local Debugging with LiveKd Enabling the Kernel's Debug Boot Switch Debug a VMware Workstation Guest (on Windows) Debug a Parallels Guests (on Mac OS X) Introduction to WinDbg Commands and Controls Exploring Processes and Process Contexts Exploring Kernel Memory Catching Breakpoints on Driver Load Unpacking Drivers to OEP Dumping and Rebuilding Kernel Drivers Detecting Rootkits with WinDbg Scripts Kernel Debugging with IDA Pro Memory Forensics with Volatility Dumping Memory with MoonSols Windows Memory Toolkit Remote, Read-only Memory Acquisition with F-Response Accessing Virtual Machine Memory Files Volatility in a Nutshell Investigating Processes in Memory Dumps Detecting DKOM Attacks with psscan Exploring csrss.exe's Alternate Process Listings Recognizing Process Context Tricks Memory Forensics: Code Injection & Extraction Hunting Suspicious Loaded DLLs Detecting Unlinked DLLs with ldr_modules Exploring Virtual Address Descriptors (VAD) Translating Page Protections Finding Artifacts in Process Memory Identifying Injected Code with Malfind and YARA Rebuilding Executable Images from Memory Scanning for Imported Functions with impscan Dumping Suspicious Kernel Modules Memory Forensics: Rootkits Detecting IAT hooks Detecting EAT hooks Detecting Inline API hooks Detecting Interrupt Descriptor Table (IDT) Hooks Detecting Driver IRP Hooks Detecting SSDT Hooks Automating Damn Near Everything with ssdt_ex Finding Rootkits with Detached Kernel Threads Identifying System-wide Notification Routines Locating Rogue Service Processes with svcscan Scanning for Mutex Objects with mutantscan Memory Forensics: Network and Registry Exploring Socket and Connection Objects Analyzing the Network Artifacts Left by Zeus Detecting Attempts to Hide TCP/IP Activity Detecting Raw Sockets and Promiscuous NICs Analyzing Registry Artifacts with Memory Registry Tools Sorting Keys by Last Written Timestamp Using Volatility with RegRipper Hotfile.com: One click file hosting: Mal-Analist.rar
  16. alexsoftpro.zapto.org :1337 setup.exe DELTAB~1.EXE C:\WINDOWS\system32\install\winupdate.exe +ceva interesant... multe [MULTE] adrese de genu h4ck3rs.eu.pn/ddos.php intr-unul din executabile
  17. are cp custom ... trebuie apreciat pt cine are chef de spam... jocker-xxx.hi2.ro
  18. Author: [ Fakedo0r ] Features Log-Organizer random-search Open Url directly selected Copy the Login and Pass Delete (null) logs Export data MEGAUPLOAD - The leading online storage and file delivery service Download iStealer Perfect Organizer v2.0.rar from Sendspace.com - send big files the easy way *// e util cand iti salvezi logurile culese intr-un txt e curat
  19. Multiupload.com - upload your files to multiple file hosting sites! * cu placere:)
  20. Significant Announcement 3 February – Watch it live! Welcome to live coverage of this event, where the Number Resource Organization (NRO), along with the Internet Corporation for Assigned Names and Numbers, the Internet Society (ISOC) and the Internet Architecture Board (IAB) will be holding a ceremony and press conference to make a significant announcement and to discuss the global transition to the next generation of Internet addresses. Much has been written in the international media over the last few weeks about the dwindling pool of Internet addresses using the original Internet protocol, called IPv4 (Internet Protocol version 4), and this topic will be addressed at the event. https://www.arin.net/icann_nro.html GoodBYE IPV4
  21. incerca sa se conecteze la "tests.us.to" pe diferite porturi random (cred) 1468 1567 1604 1572 1593 etc, la fiecare rulare alte porturi.
  22. up7ink.no-ip.info dar nu prea face nimic, da niste erori si cam atat
  23. Era luna ianuarie a anului 1986. Fratii Amjad si Basit Alvi, din Pakistan, conduceau un magazin de calculatoare, specializat in repararea PC-urilor si comercializarea de software. Se pare ca unul dintre cei doi frati, Amid, a creat intamplator virusul, in timp ce facea copii piratate ale programelor de software. Virusul infecta calculatoarele utilizatorilor, le intrerupea operatiunile si ii obliga sa contacteze service-ul celor doi frati, prin urmatoarul mesaj care aparea pe ecran: Welcome to the Dungeon © 1986 Basit * Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE: 430791,443248,280530. Beware of this VIRUS…. Contact us for vaccination… Si asa a luat nastere primul virus. Intr-o declaratie facuta in presa la acea vreme, Amjad si Basit au afirmat ca au creat programul pentru a-si proteja proriul software si nu pentru a infecta alte calculatoare. < 3 surse independente : Primul virus de calculator a implinit 25 de ani | Hit.ro Happy Birthday, Jerk: First PC Virus Born 25 Years Ago - Techland - TIME.com Computer virus - Wikipedia, the free encyclopedia http://rstcenter.com/forum/7285-virus-vs-antivirus.rst
  24. poate ".ro" siteul presedentiei: Pre?edintele României " Ca sa validezi o informatie ea trebuie sa parvina din cel putin 3 surse diferite, fara nici o legatura intre ele." ca sa stii asta nu-i nev sa lucrezi in domeniul securitatii, daca ai 2 clase mai mult ca trenu cred ca e suficient
×
×
  • Create New...