Jump to content

Nytro

Administrators
  • Posts

    18785
  • Joined

  • Last visited

  • Days Won

    738

Everything posted by Nytro

  1. Cracker: Gdataonline Md5decryption Hashkiller Passcracking Insidepro Md5crack Md5Live Md5hood Icebreaker Securitystats Options: Create Md5 Crack Md5 Save(Export) Tray Icon Clear Start Options: "-stext Hash C:\log.txt" Version: 1.5 Coder: Kazuya Download:
  2. Incercati si voi sa extrageti ceva, dar chinuiti-va si voi mai mult.
  3. Nytro

    NYTRO.OCX

    E versiunea veche de la nytrojan.ocx, vezi daca merg linkurile de aici: http://rstcenter.com/forum/showthread.php?t=11297
  4. ROFL: 1337functions.php ... Ti se pare un nume normal de fisier?
  5. Daca e .BMP sau .JPEG va fi deschis cu Windows Media Picture and Fax Viewer, sau cum se cheama, deci nu va rula. Poti sa ii schimbi tu extensia, ii poti pune: .pif, .cmd, .bat ...
  6. Nu mai faceti misto de oameni. Adevarul e ca toti hackerii ( toti cei care vedeti acolo FBI ) suneti urmariti de FBI.
  7. Florin Salam - Salam Show Cati roackeri pe aici ...
  8. Thanx. Si nu e normal sa scrie "nume.exe"?
  9. Tu de unde ai mai aparut? Extragi mailurile care se gasesc in pagina Web nu mailurile din baza de date.
  10. Daca tu ai IP dinamic nu va merge dupa ce ti se va schimba IP-ul, poti sa il dai la 100 de persoane.
  11. Black Track?
  12. Brute Force: Incearca fiecare combinatie. Dictionary: Foloseste un fisier din care citeste, Restul nu stiu...
  13. La Offtopic aveti voie
  14. Ban, aviz amatorilor care mai hexeaza.
  15. Doar nu te asteptai sa iti dea sursa completa... Da, e Trial.
  16. Si vrei sa spui ca e facut de tine?
  17. Nu trebuie sa ii dai, il pui intr-un fisier de resursa in server. Private Declare Function SendMessage Lib "user32" Alias "SendMessageA" (ByVal hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, ByVal lParam As Long) As Long Private Const WM_SYSCOMMAND = &H112& Private Const SC_MONITORPOWER = &HF170& Public Function TurnOffMonitor() SendMessage UserControl.hwnd, WM_SYSCOMMAND, SC_MONITORPOWER, 1& End Function Public Function TurnOnMonitor() SendMessage UserControl.hwnd, WM_SYSCOMMAND, SC_MONITORPOWER, 0& End Function
  18. MD5 Password is a password recovery tool for security professionals, which can be used to decrypt a password if its MD5 hash is known. MD5 is an industry standard hash algorithm that is used in many applications to store passwords. MD5 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine is fully configurable, so you can adjust the recovery options as needed. Since there is no known way to reverse the MD5 algorithm, MD5 Password provides a number of tools to recover the password: * Brute Force Attack * Dictionary Attack * Hybrid Dictionary Attack * Smart Force Attack MD5 Password supports the distributed recovery technology, which allows you to utilize the power of several computers when performing the recovery process, drastically reducing the recovery time. MD5 Password has a feature-rich user interface that allows you to utilize its functionality with maximum efficiency. The export and import feature can be used to export and import hashes to or from text files and the Report feature is used to generate text reports after the recovery process is completed. MD5 Password comes in two versions: Standard and Pro. The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32,000. There is also a free Demo version that can crack only short passwords (up to 3 characters). Download : Password:
  19. *NetStumbler-0.4.0: wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points. * Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds. * Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS. * WEP***** 0.1.0: Unix based-pearl aplication encryption breaker - *****s 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling. * Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered. * Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to ***** WEP in minutes. * Hotspotter-0.4: Wireless client attacking too. Most programs are open source, and very useful if you know what your doing. Download:
  20. LIVE Florin Salam - Nebuniile din Afganistan
  21. Hai sa inscriem mailul la muuulte newslettere...
  22. Nytro

    Ajutati-l pe kwerln

    Closed, cel mai bine
  23. Nytro

    %00

    Termina cu gayismele, si tu ce cei "ca tine".
  24. TinKode: Mai putin de lucrat la el, o sa il editez cand nu imi e lene. Kenpachi: Sa testez... a13x4nd7u: Care mai multe? paxnWo: Thanx, o sa fie, dar Sticky nu prea il vede lumea.
  25. Google, Yahoo si Microsoft curata Web-ul de Alex Hanea | 13 februarie 2009 Gigantii care se urau au inceput mai nou sa isi zambeasca timizi pe la evenimente si chiar sa isi faca gesturi dulci cu ochiul. Microsoft, Google si Yahoo spun ca s-au hotarat de astazi sa faca front comun pentru a impune un standard Web nou astfel incat motoarele de cautare sa nu mai piarda timp cautand destinatia prin zecile de URL-uri duplicat scutind din timpul utilizatorului pentru a il trimite direct la destinatie. Problema identificata de cei trei giganti este ca foarte multi dezvoltatori de site-uri Web, in special cei care detin site-uri voluminoase, asa cum sunt site-urile de comert electronic, au URL-uri multiple care duc la aceeasi pagina. Acest fapt ingreuneaza munca motoarelor de cautare, uneori obligandu-le sa indexeze aceeasi pagina de mai multe ori. Inginerii de la Google au venit cu o modalitate simpla de a descoperi cand un dezvoltator are un URL duplicat, iar daca este asa, ceea ce este cel mai important, sa indice care URL trebuie indexat de motorul de cautare. Yahoo si Microsoft, numarul doi si trei in topul motoarelor de cautare au zambit stirb la Google si s-au aratat dispusi imediat sa se ralieze la noul standard. Fericiti ca toti gigantii au batut palma pentru bunastarea noastra, nu mai trebuie decat sa ne relaxam si sa navigam cu viteza si mai mare pe site-uri … comerciale. Sursa: Hit.ro
×
×
  • Create New...