-
Posts
1481 -
Joined
-
Last visited
-
Days Won
20
Everything posted by Maximus
-
@nSnoopy : DOAMNEEE asta e ultima ! Nu am mai vazut asa ceva sa moara viata mea
-
nSnoopy stie ce zice, eu am pierdut 100 de sclavi cu ei (de mai multe ori). Nici de CyberGate nu ma pot plange ...
-
am rulat programul, am testat dar nu inteleg ce imi da.... adica am pus IP-ul si imi da
-
Run as Administrator(cred;nu am testat)
-
pune prima parte pe net inca odata te rog.ms
-
ai dat 127.0.0.1 si ai ramas fara net nu ?
-
zice ceva de ssleay32.dll. am luat dll-ul din curl si tot nu merge. dc ?
-
Sondaj pentru verificarea utilizatorilor vechi activi
Maximus replied to a topic in Anunturi importante
Activ si eu. -
spam = carding spam = spread spam = publicitate etc etc etc
-
l-am descarcat de cand a facut release,primisem pe facebook. dar nu inteleg cum fac server ..plm
-
este 2012 crypter de pe HF sau o versiune de a ta ?
-
Asta chiar nu este bun. FEE si Mail Crawler erau candva cele mai bune
-
la fiecare stealer vad :Multi-Spreader: - RAR,P2P,USB,MSN,YAHOO etc Am conceput un sistem de raspandire in RAR si pentru USB-uri. Pentru MSN si Yahoo spre ex. ai nevoie de un LINK + JavaDriveBy pe cand in stealer nu te pune sa completeze asa ceva. Intrebare mea este : Cum face spread pe CHAT (Yahoo MSN ICQ etc..) ? PLM, nu inteleg.
-
ProdKey.vbs ' ############################################################## ' # # ' # VBScript to find the DigitalProductID for your # ' # Microsoft windows Installation and decode it to # ' # retrieve your windows Product Key # ' # # ' # ----------------------------------------------- # ' # # ' # Created by: Parabellum # ' # # ' ############################################################## ' ' <--------------- Open Registry Key and populate binary data into an array --------------------------> ' const HKEY_LOCAL_MACHINE = &H80000002 strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion" strValueName = "DigitalProductId" strComputer = "." dim iValues() Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _ strComputer & "\root\default:StdRegProv") oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,iValues Dim arrDPID arrDPID = Array() For i = 52 to 66 ReDim Preserve arrDPID( UBound(arrDPID) + 1 ) arrDPID( UBound(arrDPID) ) = iValues(i) Next ' <--------------- Create an array to hold the valid characters for a microsoft Product Key --------------------------> Dim arrChars arrChars = Array("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9") ' <--------------- The clever bit !!! (Decrypt the base24 encoded binary data)--------------------------> For i = 24 To 0 Step -1 k = 0 For j = 14 To 0 Step -1 k = k * 256 Xor arrDPID(j) arrDPID(j) = Int(k / 24) k = k Mod 24 Next strProductKey = arrChars(k) & strProductKey ' <------- add the "-" between the groups of 5 Char --------> If i Mod 5 = 0 And i <> 0 Then strProductKey = "-" & strProductKey Next strFinalKey = strProductKey ' ' <---------- This part of the script displays operating system Information and the license Key ---------> ' strComputer = "." Set objWMIService = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2") Set colOperatingSystems = objWMIService.ExecQuery _ ("Select * from Win32_OperatingSystem") For Each objOperatingSystem in colOperatingSystems strOS = objOperatingSystem.Caption strBuild = objOperatingSystem.BuildNumber strSerial = objOperatingSystem.SerialNumber strRegistered = objOperatingSystem.RegisteredUser Next Set wshShell=CreateObject("wscript.shell") strPopupMsg = strOS & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Build Number: " & strBuild & vbNewLine strPopupMsg = strPopupMsg & "PID: " & strSerial & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Registered to: " & strRegistered & vbNewLine & vbNewLine & vbNewLine strPopupMsg = strPopupMsg & "Your Windows Product Key is:" & vbNewLine & vbNewLine & strFinalKey strPopupTitle = "Microsoft Windows License Information" wshShell.Popup strPopupMsg,,strPopupTitle,vbCancelOnly+vbinformation WScript.Quit
-
Cu ceva timp in urma am cerut ajutor pentru refacerea scriptului carcabot ( https://rstcenter.com/forum/49377-ajutor-php.rst ) , fara succes. Aseara am incercat sa-l refac si uite ce mi-a iesit : <?php $id = "Un_ID"; $password = "O_Parola"; $victimid = "O_Victima"; $mesaj = "Un_Mesaj"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://mlogin.yahoo.com/w/login/logout%3B_ylt=A2KL8zKv4FJQe0cAaA0c8tw4?_done=%2F%3F_cache%3D1347608751&_httpHost=m.yahoo.com&c=Y83.FJ.zUcd&.intl=en&.lang=en'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_exec($ch); curl_close ($ch); $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://m.yahoo.com/w/bp-messenger/messenger/?.intl=en-us&.lang=en-us&c=Y83.FJ.zUcd'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); $data = curl_exec($ch); $_done = substr($data, strpos($data, "_done") + 14); $_done = substr($_done, 0, strpos($_done, "\"")); $_crumb = substr($data, strpos($data, "_crumb") +15); $pieces = explode('"', $_crumb); $_crumb = $pieces[0]; $_ts = substr($data, strpos($data, "_ts") +12); $pcc = explode('"', $_ts); $_ts = $pcc[0]; $action = substr($data, strpos($data, "action=") + 8); $acc = explode('"', $action); $action = $acc[0]; curl_close ($ch); $ch = curl_init(); curl_setopt($ch,CURLOPT_URL, urldecode($action)); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS ,"_authurl=auth&_done=" . $_done . "&_sig=&_src=&_ts=" . $_ts . "&_crumb=" . $_crumb . "&_pc=&_send_userhash=0&_appdata=&_partner_ts=&_is_ysid=0&_page=secure&_next=nonssl&id=" . $id . "&password=" . $password . "&__submit=Sign+In"); $data2 = curl_exec($ch); curl_close ($ch); $s = substr($data2, strpos($data2, "<a href=\"/w/bp-messenger/sendmessage?c")); $ccc = explode('"', $s); $s = $ccc[1] ; $s = "http://m.yahoo.com$s"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $s); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); $data = curl_exec($ch); $s = substr($data, strpos($data, "<form action=\"/w/bp-messenger/chat/sendIm?")); $ccc2 = explode('"', $s); $s = $ccc2[1] ; $s = "http://m.yahoo.com$s"; curl_close ($ch); $ch = curl_init(); curl_setopt($ch,CURLOPT_URL, $s); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS ,"fr=sm&id=".$victimid."&message=".$mesaj."&_submit=Send"); $data2 = curl_exec($ch); curl_close ($ch); if (strpos($data2, $mesaj) !== false) { echo "$victimid --> <font color=\"green\"> Sent </font>"; } else { echo "$victimid --> <font color=\"red\"> Failed </font>"; } $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://mlogin.yahoo.com/w/login/logout%3B_ylt=A2KL8zKv4FJQe0cAaA0c8tw4?_done=%2F%3F_cache%3D1347608751&_httpHost=m.yahoo.com&c=Y83.FJ.zUcd&.intl=en&.lang=en'); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIEJAR, "/cookie.txt"); curl_setopt($ch, CURLOPT_COOKIEFILE, "/cookie.txt"); curl_exec($ch); curl_close ($ch); ?> Nu este prea profesional dar merge. Sper sa va fie de folos si sa apreciati efortul.
-
pai nu merge ca voi puneti "mata.gif" in loc sa puneti "http://site.com/folder/mata.gif"
-
Website : http://www.ipgrabb.com/ Despre ce este vb ? E un site care genereaza o pagina fiecarui vizitator. Cu pagina generata (un folder defapt care se termina in .gif) poti afla ip`ul clientilor Yahoo! Messenger. Pagina generata expira in 1 ora. Cum se foloseste ? Accesezi site-ul de mai sus ; selectezi tab-ul Picture Link in care introduci un link catre o poza (.jpg/.png/.gif/.jpeg) link-ul NU trebuie sa contina caractere speciale precum "~!@#$%^&*()+,/\}{|"{:"?>'<" , se accepta doar "a-z A-Z 0-9 _-". Dupa ce ai apasat butonul Change din tabul Picture Link te duci in Main si copiezi linkul din cazuta. Trimiti link-ul lui "nea marin", astepti 2 3 secunde sa apara poza dupa care te duci in Logs si apesi Refresh Logs. Cam asta e. L-am facut pt ca mi-a placut ideea, este o pierdere de timp dar imi place ca functioneaza Nu injurati, nu sunt copil, doar am vrut sa vad daca merge. Scriptul PHP folosit l-am postat, e pe aici pe undeva pe forum da nu-l mai gasesc . Am postat ceva asemanator : header("Content-Type: image/png"); $mesajul = "Image sent to : $yid"; $im = @imagecreate(350, 50) or die("Shit"); $background_color = imagecolorallocate($im, 0, 0, 0); $text_color = imagecolorallocate($im, rand(14, 50), rand(50, 100), rand(100, 200)); imagestring($im, 2, 5, 5, "Mata-i grasa", $text_color); imagestring($im, 3, 5, 28, "Tu cum esti ?", $text_color); imagepng($im); imagedestroy($im); dar cum viata bate filmul, si "practica bate logica" ; am ajuns sa folosesc : $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $imagelink); curl_setopt($ch, CURLOPT_HEADER, 0); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $picture = curl_exec($ch); curl_close($ch); header("Content-Type: image/png"); echo $picture; Sesiunea se face pe baza ce cookie. Toate ip-urile sunt stocate in baza de date timp de 1 ora. Cand iti expira sesiunea se sterg si logurile si pagina. Spune-ti parerea te rog. P.S. Template-ul nu este facut de mine... l-am "imprumutat".
-
@sandabot : Bifeaza Export as email address E deja acolo optiunea
-
@caramea : Dc sa te loghezi in Yahoo! Mail sau sa intri pe Messenger cant poti o faci mai simplu. Scapi de clickuri si de coduri Captcha. Asta e ideea. @Sim Master : Nu prea am incredere in asemenea site-uri / Nu ar trebui sa ai nici o suspiciune cu sursa in fata . Mai suspecta e propunerea ta @endemic : Ok, maine am sa incerc sa-l fac si pe baza de cookie
-
Cu acest tool poti export lista de messenger a unei victime. Download : Yahoo! Contacts Hijacker.zip Cerinte : .Net Framework 4.0 VT : https://www.virustotal.com/file/8b5e2fefb8e40488af3af604c215bce2dac1e2f8e97a225e2b3da4bf9a60ad4f/analysis/1347127999/ // Am pus si sursa.
-
Mail extractor from document text / word in VB.NET and source code
Maximus replied to bc-vnt's topic in Programe hacking
nu e mai simplu sa folosesti FEE sau email extractor ? @user567 : Nu este util chiar deloc. Un notepad de 2MB cu email-uri este procesat de nX mai repede de catre Email Extractor (http://www.maxprog.com/site/software/internet-marketing/email-extractor_sheet_us.php) decat de programelul tau ! Nu vb degeaba si nu ma bag aiurea in seama. Vrei sa fie util ? Include si niste Thread-uri sau Multithreading. -
Virus Total : SHA256: 9255565b53c0e4ffcc32b17cec5e2a623afa2661ce6e194949480018aacf7014 SHA1: 787c08b22071d3a664bad679576b9b74bfe98476 MD5: fc0e3485260e7d8c54676e7c08cdcc18 File size: 2.1 MB ( 2153547 bytes ) File name: Real-Debrid Downloader.zip File type: ZIP Detection ratio: 1 / 42 Analysis date: 2012-09-05 19:02:10 UTC ( 0 minutes ago ) 00 More details Antivirus Result Update AhnLab-V3 - 20120905 AntiVir - 20120905 Antiy-AVL - 20120905 Avast - 20120905 AVG - 20120905 BitDefender - 20120905 ByteHero - 20120831 CAT-QuickHeal - 20120905 ClamAV - 20120905 Commtouch - 20120905 Comodo - 20120905 DrWeb - 20120905 Emsisoft - 20120905 eSafe - 20120904 ESET-NOD32 - 20120905 F-Prot - 20120905 F-Secure - 20120905 Fortinet - 20120830 GData - 20120905 Ikarus - 20120905 Jiangmin TrojanDropper.Genome.ax 20120905 K7AntiVirus - 20120905 Kaspersky - 20120905 McAfee - 20120905 McAfee-GW-Edition - 20120905 Microsoft - 20120905 Norman - None nProtect - 20120905 Panda - 20120905 PCTools - 20120905 Rising - 20120905 Sophos - 20120905 SUPERAntiSpyware - 20120905 Symantec - 20120905 TheHacker - 20120905 TotalDefense - 20120905 TrendMicro - 20120905 TrendMicro-HouseCall - 20120905 VBA32 - 20120905 VIPRE - 20120905 ViRobot - 20120905 VirusBuster - 20120905 https://www.virustotal.com/file/9255565b53c0e4ffcc32b17cec5e2a623afa2661ce6e194949480018aacf7014/analysis/1346871730/ TrojanDropper.Genome.ax probabil din cauza : Dim temp As String = System.IO.Path.GetTempPath & "GT3.skf" If System.IO.File.Exists(temp) Then System.IO.File.Delete(temp) My.Computer.FileSystem.WriteAllBytes(temp, My.Resources.GT3, False) Else My.Computer.FileSystem.WriteAllBytes(temp, My.Resources.GT3, False) End If SkinCrafter1.LoadSkinFromFile(temp) SkinCrafter1.ApplySkin() NoVirusThanks: [i]File Info[/i] Report date: 2012-09-05 21:04:38 (GMT 1) File name: [b]real-debrid-downloader-zip[/b] File size: 2153547 bytes MD5 Hash: fc0e3485260e7d8c54676e7c08cdcc18 SHA1 Hash: 787c08b22071d3a664bad679576b9b74bfe98476 Detection rate: 0 on 14 (0%) Status: [color=green]CLEAN[/color] [i]Detections[/i] Asquared - [color=red][/color] Avast - [color=red][/color] AVG - [color=red][/color] Avira - [color=red][/color] BitDefender - [color=red][/color] ClamAV - [color=red][/color] Comodo - [color=red][/color] DrWeb - [color=red][/color] Fprot - [color=red][/color] IkarusT3 - [color=red][/color] Panda - [color=red][/color] STOPZilla - [color=red][/color] TrendMicro - [color=red][/color] VBA32 - [color=red][/color] [i]Scan report generated by [url=http://novirusthanks.org]NoVirusThanks.org[/url][/i] Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Download : http://www.sendspace.com/file/tlotuz http://www.mediafire.com/?0gwc0nx22jzf7yz Am folosit un cont premium care mai are 178 zile @robyyxx : Ei spun ca da, dar sincer eu nu am incercat
-
Super tare inventia ! Felicitarile mele membrilor implicati ! P.S. Imi puteti da si mie acces ? Multumesc anticipat.
-
Nu stiam ce parola sa pun , ce importanta are parola ? E o simpla parola .. nu-s patriot Daca as fi pus Fuck you Romania ar fi fost mai bine mai bine ?