
rukov
Active Members-
Posts
1123 -
Joined
-
Last visited
-
Days Won
16
Everything posted by rukov
-
http://recordit.co/FC78rNf8Ki nu gratis
- 18 replies
-
- email scraper
-
(and 1 more)
Tagged with:
-
O licenta la ce vrea el e 995$ ti-am mai spus sa nu iti prinzi urechile il ala ca au incercat si alti mai experimentati si nu au reusit la versiunea recenta.
-
Your keylogger try to see what i am typing https://malwr.com/analysis/NDQwMTc5NWQ2YTg3NGE1MThlNjg5ZGRhNWQxNWIxNzI/
-
@zeroabsolut imi pare rau dar nu cred ca ne cunoastem.
-
@Che e autoit nu VB.net
-
Sa fi sanatos eu nu lucrez prin team.
-
No adf.ly links or you get a nice ban.
- 4 replies
-
- proxy
- traffic bot
-
(and 2 more)
Tagged with:
-
Da un pm cu programu si cu detaliile ce vrei sa modifici.
-
How to install Copy all the files into a new directory in $WP_ROOT/wp-content/plugins/ Activate the plugin via the WordPress administration panel. (/wp-admin/plugins.php) Navigate to the settings panel under Settings > HonnyPotter Here you can alternatively change the log name. We autogenerate a random name on plugin installation. All failed login attempts will be logged to the log file. Download https://github.com/MartinIngesen/HonnyPotter
-
Published on Apr 6, 2014 It's new
- 4 replies
-
- steaua
- steaua hacked
-
(and 1 more)
Tagged with:
-
Quick Android Review Kit - This tool is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs. The tool is also capable of creating "Proof-of-Concept" deployable APKs and/or ADB commands, capable of exploiting many of the vulnerabilities it finds. There is no need to root the test device, as this tool focuses on vulnerabilities that can be exploited under otherwise secure conditions. Requirements python 2.7.6 JRE 1.6+ (preferably 1.7+) OSX or Ubuntu Linux (Others may work, but not fully tested) Documentation QARK is an easy to use tool capable of finding common security vulnerabilities in Android applications. Unlike commercial products, it is 100% free to use. QARK features educational information allowing security reviewers to locate precise, in-depth explanations of the vulnerabilities. QARK automates the use of multiple decompilers, leveraging their combined outputs, to produce superior results, when decompiling APKs. Finally, the major advantage QARK has over traditional tools, that just point you to possible vulnerabilities, is that it can produce ADB commands, or even fully functional APKs, that turn hypothetical vulnerabilities into working "POC" exploits. Included in the types of security vulnerabilities this tool attempts to find are: Inadvertently exported components Improperly protected exported components Intents which are vulnerable to interception or eavesdropping Improper x.509 certificate validation Creation of world-readable or world-writeable files Activities which may leak data The use of Sticky Intents Insecurely created Pending Intents Sending of insecure Broadcast Intents Private keys embedded in the source Weak or improper cryptography use Potentially exploitable WebView configurations Exported Preference Activities Tapjacking Apps which enable backups Apps which are debuggable Apps supporting outdated API versions, with known vulnerabilities Download https://github.com/linkedin/qark
-
Tool to crack encrypted PEM files This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to recover the password for encrypted PEM files while utilizing all the CPU cores. It still uses high level OpenSSL calls in order to guess the password. As an optimization, instead of continually checking against the PEM on disk, it is loaded into memory in each thread. bwall@ragnarok:~$ ./pemcracker pemcracker 0.1.0 pemcracker <path to pem> <word file> Download https://github.com/bwall/pemcracker
-
Download WeTransfer
-
Ai nevoie de ochelari? $ ./phpmalwarefinder -h Usage phpmalwarefinder [-cfhw] <file|folder> ...
-
Analyze linux malwares on x86, x86-64, ARM, MIPS and MIPSEL cpu architecture.
-
echo -----BEGIN CERTIFICATE----- > encoded.txt echo Just Base64 encode your binary data echo TVoAAA== >> encoded.txt echo -----END CERTIFICATE----- >> encoded.txt certutil -decode encoded.txt decoded.bin Source https://gist.github.com/mattifestation/47f9e8a431f96a266522
-
rWfbtg2TNNsTrP4OJgfSVgferwsO1TfQqAyL reversing un atom
-
Talos has developed a Python script for customers to scan their own network to identify routers that may have been compromised by this specific malware. The script works by scanning networks, looking for devices answering to the SYNful Knock malware. This tool can only detect hosts responding to the malware "knock" as it is known at a particular point in time. It can be used to help detect and triage known compromises of infrastructure. Upon successful detection of the “knock” on your network, the Synful Knock Scanner will provide further instructions so that we may assist you. Download https://s3.amazonaws.com/talos-dashboard-site/production/document_files/files/000/000/038/original/synknockscan-1.0.1.tgz
-
Asta a fost ultimul release.Am vazut ca pe unele site-uri vand programe pe care eu le-am facut publice.Eu le postez in mod demonstrativ fara a cere bani pe ele sau a avea eu vre-un castig.O zi buna va doresc.
-
This tool will help you analyze forums and determine which allow signatures. It also provides information whether the signatures allow clickable URLs, are dofollow, only allow plain text or don’t allow signature space. System requirements: Windows Vista, 7, 8, 10 or Windows Server 2008 or higher. Windows Framework 4.5 (or higher). Download https://healzer.com/forumanalyzer/ForumAnalyzerPro.zip
-
Description The executable file format on the Windows platform is PE COFF. The peinjector provides different ways to infect these files with custom payloads without changing the original functionality. It creates patches, which are then applied seamlessly during file transfer. It is very performant, lightweight, modular and can be operated on embedded hardware. Features Full x86 and x64 PE file support. Open Source Fully working on Windows and Linux, including automated installation scripts. Can be operated on embedded hardware, tested on a Rasperberry Pi 2. On Linux, all servers will be automatically integrated as service, no manual configuration required. Plain C, no external libraries required (peinjector). MITM integration is available in C, Python and Java. A sample Python MITM implementation is included. Foolproof, mobile-ready web interface. Anyone who can configure a home router can configure the injector server. Easy to use integrated shellcode factory, including reverse shells, meterpreter, ... or own shellcode. Everything is available in 32 and 64 bit with optional automated encryption. Custom shellcode can be injected directly or as a new thread. An awesome about page and much more, check it out. peinjector Provides PE file patching as a service. Just send the raw header of your PE file and you’ll receive a custom-made patch for it. Can be remotely controlled via a command protocol. peinjector-control Web interface to configure and control a peinjector server. A small shellcode factory with some basic shellcodes, automatic encryptoin/obfuscation and thread generation is provided - alternatively, custom shellcode can be injected. peinjector-interceptor Sample MITM integration. Based on Python and libmproxy, supports SSL interception, can act as transparent Proxy, HTTP Proxy, ... . Provides seamless PE patching capabilities. Download https://github.com/JonDoNym/peinjector
-
https://github.com/ithurricane/SampleCode/blob/master/hidereg_r0r3.c
-
DbgKit is the first GUI extension for Debugging Tools for Windows (WinDbg, KD, CDB, NTSD). It will show you hierarchical view of processes and detailed information about each process including its full image path, command line, start time, memory statistics, vads, handles, threads, security attributes, modules, environment variables and more. Download http://www.andreybazhan.com/download/DbgKit.zip