Jump to content

Maximus

Active Members
  • Posts

    1481
  • Joined

  • Last visited

  • Days Won

    20

Everything posted by Maximus

  1. @nSnoopy : DOAMNEEE asta e ultima ! Nu am mai vazut asa ceva sa moara viata mea
  2. nSnoopy stie ce zice, eu am pierdut 100 de sclavi cu ei (de mai multe ori). Nici de CyberGate nu ma pot plange ...
  3. am rulat programul, am testat dar nu inteleg ce imi da.... adica am pus IP-ul si imi da
  4. Run as Administrator(cred;nu am testat)
  5. pune prima parte pe net inca odata te rog.ms
  6. ai dat 127.0.0.1 si ai ramas fara net nu ?
  7. zice ceva de ssleay32.dll. am luat dll-ul din curl si tot nu merge. dc ?
  8. spam = carding spam = spread spam = publicitate etc etc etc
  9. l-am descarcat de cand a facut release,primisem pe facebook. dar nu inteleg cum fac server ..plm
  10. este 2012 crypter de pe HF sau o versiune de a ta ?
  11. Asta chiar nu este bun. FEE si Mail Crawler erau candva cele mai bune
  12. la fiecare stealer vad :Multi-Spreader: - RAR,P2P,USB,MSN,YAHOO etc Am conceput un sistem de raspandire in RAR si pentru USB-uri. Pentru MSN si Yahoo spre ex. ai nevoie de un LINK + JavaDriveBy pe cand in stealer nu te pune sa completeze asa ceva. Intrebare mea este : Cum face spread pe CHAT (Yahoo MSN ICQ etc..) ? PLM, nu inteleg.
  13. ProdKey.vbs ' ############################################################## ' # # ' # VBScript to find the DigitalProductID for your # ' # Microsoft windows Installation and decode it to # ' # retrieve your windows Product Key # ' # # ' # ----------------------------------------------- # ' # # ' # Created by: Parabellum # ' # # ' ############################################################## ' ' <--------------- Open Registry Key and populate binary data into an array --------------------------> ' const HKEY_LOCAL_MACHINE = &H80000002 strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion" strValueName = "DigitalProductId" strComputer = "." dim iValues() Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _ strComputer & "\root\default:StdRegProv") oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,iValues Dim arrDPID arrDPID = Array() For i = 52 to 66 ReDim Preserve arrDPID( UBound(arrDPID) + 1 ) arrDPID( UBound(arrDPID) ) = iValues(i) Next ' <--------------- Create an array to hold the valid characters for a microsoft Product Key --------------------------> Dim arrChars arrChars = Array("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9") ' <--------------- The clever bit !!! (Decrypt the base24 encoded binary data)--------------------------> For i = 24 To 0 Step -1 k = 0 For j = 14 To 0 Step -1 k = k * 256 Xor arrDPID(j) arrDPID(j) = Int(k / 24) k = k Mod 24 Next strProductKey = arrChars(k) & strProductKey ' <------- add the "-" between the groups of 5 Char --------> If i Mod 5 = 0 And i <> 0 Then strProductKey = "-" & strProductKey Next strFinalKey = strProductKey ' ' <---------- This part of the script displays operating system Information and the license Key ---------> ' strComputer = "." Set objWMIService = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2") Set colOperatingSystems = objWMIService.ExecQuery _ ("Select * from Win32_OperatingSystem") For Each objOperatingSystem in colOperatingSystems strOS = objOperatingSystem.Caption strBuild = objOperatingSystem.BuildNumber strSerial = objOperatingSystem.SerialNumber strRegistered = objOperatingSystem.RegisteredUser Next Set wshShell=CreateObject("wscript.shell") strPopupMsg = strOS & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Build Number: " & strBuild & vbNewLine strPopupMsg = strPopupMsg & "PID: " & strSerial & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Registered to: " & strRegistered & vbNewLine & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Your Windows Product Key is:" & vbNewLine & vbNewLine & strFinalKey strPopupTitle = "Microsoft Windows License Information" wshShell.Popup strPopupMsg,,strPopupTitle,vbCancelOnly+vbinformation WScript.Quit
  14. Cu ceva timp in urma am cerut ajutor pentru refacerea scriptului carcabot ( https://rstcenter.com/forum/49377-ajutor-php.rst ) , fara succes. Aseara am incercat sa-l refac si uite ce mi-a iesit : <?php $id = "Un_ID"; $password = "O_Parola"; $victimid = "O_Victima"; $mesaj = "Un_Mesaj"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://mlogin.yahoo.com/w/login/logout%3B_ylt=A2KL8zKv4FJQe0cAaA0c8tw4?_done=%2F%3F_cache%3D1347608751&_httpHost=m.yahoo.com&c=Y83.FJ.zUcd&.intl=en&.lang=en'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_exec($ch); curl_close ($ch); $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://m.yahoo.com/w/bp-messenger/messenger/?.intl=en-us&.lang=en-us&c=Y83.FJ.zUcd'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); $data = curl_exec($ch); $_done = substr($data, strpos($data, "_done") + 14); $_done = substr($_done, 0, strpos($_done, "\"")); $_crumb = substr($data, strpos($data, "_crumb") +15); $pieces = explode('"', $_crumb); $_crumb = $pieces[0]; $_ts = substr($data, strpos($data, "_ts") +12); $pcc = explode('"', $_ts); $_ts = $pcc[0]; $action = substr($data, strpos($data, "action=") + 8); $acc = explode('"', $action); $action = $acc[0]; curl_close ($ch); $ch = curl_init(); curl_setopt($ch,CURLOPT_URL, urldecode($action)); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS ,"_authurl=auth&_done=" . $_done . "&_sig=&_src=&_ts=" . $_ts . "&_crumb=" . $_crumb . "&_pc=&_send_userhash=0&_appdata=&_partner_ts=&_is_ysid=0&_page=secure&_next=nonssl&id=" . $id . "&password=" . $password . "&__submit=Sign+In"); $data2 = curl_exec($ch); curl_close ($ch); $s = substr($data2, strpos($data2, "<a href=\"/w/bp-messenger/sendmessage?c")); $ccc = explode('"', $s); $s = $ccc[1] ; $s = "http://m.yahoo.com$s"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $s); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); $data = curl_exec($ch); $s = substr($data, strpos($data, "<form action=\"/w/bp-messenger/chat/sendIm?")); $ccc2 = explode('"', $s); $s = $ccc2[1] ; $s = "http://m.yahoo.com$s"; curl_close ($ch); $ch = curl_init(); curl_setopt($ch,CURLOPT_URL, $s); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS ,"fr=sm&id=".$victimid."&message=".$mesaj."&_submit=Send"); $data2 = curl_exec($ch); curl_close ($ch); if (strpos($data2, $mesaj) !== false) { echo "$victimid --> <font color=\"green\"> Sent </font>"; } else { echo "$victimid --> <font color=\"red\"> Failed </font>"; } $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://mlogin.yahoo.com/w/login/logout%3B_ylt=A2KL8zKv4FJQe0cAaA0c8tw4?_done=%2F%3F_cache%3D1347608751&_httpHost=m.yahoo.com&c=Y83.FJ.zUcd&.intl=en&.lang=en'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_exec($ch); curl_close ($ch); ?> Nu este prea profesional dar merge. Sper sa va fie de folos si sa apreciati efortul.
  15. pai nu merge ca voi puneti "mata.gif" in loc sa puneti "http://site.com/folder/mata.gif"
  16. Website : http://www.ipgrabb.com/ Despre ce este vb ? E un site care genereaza o pagina fiecarui vizitator. Cu pagina generata (un folder defapt care se termina in .gif) poti afla ip`ul clientilor Yahoo! Messenger. Pagina generata expira in 1 ora. Cum se foloseste ? Accesezi site-ul de mai sus ; selectezi tab-ul Picture Link in care introduci un link catre o poza (.jpg/.png/.gif/.jpeg) link-ul NU trebuie sa contina caractere speciale precum "~!@#$%^&*()+,/\}{|"{:"?>'<" , se accepta doar "a-z A-Z 0-9 _-". Dupa ce ai apasat butonul Change din tabul Picture Link te duci in Main si copiezi linkul din cazuta. Trimiti link-ul lui "nea marin", astepti 2 3 secunde sa apara poza dupa care te duci in Logs si apesi Refresh Logs. Cam asta e. L-am facut pt ca mi-a placut ideea, este o pierdere de timp dar imi place ca functioneaza Nu injurati, nu sunt copil, doar am vrut sa vad daca merge. Scriptul PHP folosit l-am postat, e pe aici pe undeva pe forum da nu-l mai gasesc . Am postat ceva asemanator : header("Content-Type: image/png"); $mesajul = "Image sent to : $yid"; $im = @imagecreate(350, 50) or die("Shit"); $background_color = imagecolorallocate($im, 0, 0, 0); $text_color = imagecolorallocate($im, rand(14, 50), rand(50, 100), rand(100, 200)); imagestring($im, 2, 5, 5, "Mata-i grasa", $text_color); imagestring($im, 3, 5, 28, "Tu cum esti ?", $text_color); imagepng($im); imagedestroy($im); dar cum viata bate filmul, si "practica bate logica" ; am ajuns sa folosesc : $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $imagelink); curl_setopt($ch, CURLOPT_HEADER, 0); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $picture = curl_exec($ch); curl_close($ch); header("Content-Type: image/png"); echo $picture; Sesiunea se face pe baza ce cookie. Toate ip-urile sunt stocate in baza de date timp de 1 ora. Cand iti expira sesiunea se sterg si logurile si pagina. Spune-ti parerea te rog. P.S. Template-ul nu este facut de mine... l-am "imprumutat".
  17. @sandabot : Bifeaza Export as email address E deja acolo optiunea
  18. Good Joke
  19. @caramea : Dc sa te loghezi in Yahoo! Mail sau sa intri pe Messenger cant poti o faci mai simplu. Scapi de clickuri si de coduri Captcha. Asta e ideea. @Sim Master : Nu prea am incredere in asemenea site-uri / Nu ar trebui sa ai nici o suspiciune cu sursa in fata . Mai suspecta e propunerea ta @endemic : Ok, maine am sa incerc sa-l fac si pe baza de cookie
  20. Cu acest tool poti export lista de messenger a unei victime. Download : Yahoo! Contacts Hijacker.zip Cerinte : .Net Framework 4.0 VT : https://www.virustotal.com/file/8b5e2fefb8e40488af3af604c215bce2dac1e2f8e97a225e2b3da4bf9a60ad4f/analysis/1347127999/ // Am pus si sursa.
  21. nu e mai simplu sa folosesti FEE sau email extractor ? @user567 : Nu este util chiar deloc. Un notepad de 2MB cu email-uri este procesat de nX mai repede de catre Email Extractor (http://www.maxprog.com/site/software/internet-marketing/email-extractor_sheet_us.php) decat de programelul tau ! Nu vb degeaba si nu ma bag aiurea in seama. Vrei sa fie util ? Include si niste Thread-uri sau Multithreading.
  22. Virus Total : SHA256: 9255565b53c0e4ffcc32b17cec5e2a623afa2661ce6e194949480018aacf7014 SHA1: 787c08b22071d3a664bad679576b9b74bfe98476 MD5: fc0e3485260e7d8c54676e7c08cdcc18 File size: 2.1 MB ( 2153547 bytes ) File name: Real-Debrid Downloader.zip File type: ZIP Detection ratio: 1 / 42 Analysis date: 2012-09-05 19:02:10 UTC ( 0 minutes ago ) 00 More details Antivirus Result Update AhnLab-V3 - 20120905 AntiVir - 20120905 Antiy-AVL - 20120905 Avast - 20120905 AVG - 20120905 BitDefender - 20120905 ByteHero - 20120831 CAT-QuickHeal - 20120905 ClamAV - 20120905 Commtouch - 20120905 Comodo - 20120905 DrWeb - 20120905 Emsisoft - 20120905 eSafe - 20120904 ESET-NOD32 - 20120905 F-Prot - 20120905 F-Secure - 20120905 Fortinet - 20120830 GData - 20120905 Ikarus - 20120905 Jiangmin TrojanDropper.Genome.ax 20120905 K7AntiVirus - 20120905 Kaspersky - 20120905 McAfee - 20120905 McAfee-GW-Edition - 20120905 Microsoft - 20120905 Norman - None nProtect - 20120905 Panda - 20120905 PCTools - 20120905 Rising - 20120905 Sophos - 20120905 SUPERAntiSpyware - 20120905 Symantec - 20120905 TheHacker - 20120905 TotalDefense - 20120905 TrendMicro - 20120905 TrendMicro-HouseCall - 20120905 VBA32 - 20120905 VIPRE - 20120905 ViRobot - 20120905 VirusBuster - 20120905 https://www.virustotal.com/file/9255565b53c0e4ffcc32b17cec5e2a623afa2661ce6e194949480018aacf7014/analysis/1346871730/ TrojanDropper.Genome.ax probabil din cauza : Dim temp As String = System.IO.Path.GetTempPath & "GT3.skf" If System.IO.File.Exists(temp) Then System.IO.File.Delete(temp) My.Computer.FileSystem.WriteAllBytes(temp, My.Resources.GT3, False) Else My.Computer.FileSystem.WriteAllBytes(temp, My.Resources.GT3, False) End If SkinCrafter1.LoadSkinFromFile(temp) SkinCrafter1.ApplySkin() NoVirusThanks: [i]File Info[/i] Report date: 2012-09-05 21:04:38 (GMT 1) File name: [b]real-debrid-downloader-zip[/b] File size: 2153547 bytes MD5 Hash: fc0e3485260e7d8c54676e7c08cdcc18 SHA1 Hash: 787c08b22071d3a664bad679576b9b74bfe98476 Detection rate: 0 on 14 (0%) Status: [color=green]CLEAN[/color] [i]Detections[/i] Asquared - [color=red][/color] Avast - [color=red][/color] AVG - [color=red][/color] Avira - [color=red][/color] BitDefender - [color=red][/color] ClamAV - [color=red][/color] Comodo - [color=red][/color] DrWeb - [color=red][/color] Fprot - [color=red][/color] IkarusT3 - [color=red][/color] Panda - [color=red][/color] STOPZilla - [color=red][/color] TrendMicro - [color=red][/color] VBA32 - [color=red][/color] [i]Scan report generated by [url=http://novirusthanks.org]NoVirusThanks.org[/url][/i] Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Download : http://www.sendspace.com/file/tlotuz http://www.mediafire.com/?0gwc0nx22jzf7yz Am folosit un cont premium care mai are 178 zile @robyyxx : Ei spun ca da, dar sincer eu nu am incercat
  23. Super tare inventia ! Felicitarile mele membrilor implicati ! P.S. Imi puteti da si mie acces ? Multumesc anticipat.
  24. Nu stiam ce parola sa pun , ce importanta are parola ? E o simpla parola .. nu-s patriot Daca as fi pus Fuck you Romania ar fi fost mai bine mai bine ?
×
×
  • Create New...