Jump to content

Mecanik2

Members
  • Posts

    11
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Mecanik2's Achievements

Newbie

Newbie (1/14)

20

Reputation

  1. Am sa folosesc vpn-ul meu... Sa vedem cat rezista xD
  2. Salutare,am facut si eu un "mic" challenge pentru voi! De aici vom vedea,cine (sau cati) de pe acest forum sunt adevarati HACKERI! Spargeti acest EXE si aflati "username" si "password". Gasiti datele corecte,si vi se va deschide un Exploit nou nout de la HaDes [yahoo] Nu faceti smecherii de genul FAKE. Postati screenshotul reusitei aici. Linkul : GirlShare - Download CrackMe.EXE L.E: Daca doriti un hint ceva,strigati pe aici........
  3. Bah VIRUSATILOR! VOI NU VEDETI CA VOI SUNTETI AIA VIRUSATI? Uite dovada clara in ochii aia mari ai vostrii,pentru asta iau eu ban: File name: Yahoo IFrame Exploit.exe Submission date: 2011-12-15 20:38:15 (UTC) Current status: finished Antivirus Version Last Update Result AhnLab-V3 2011.12.15.00 2011.12.15 - AntiVir 7.11.19.132 2011.12.15 - Antiy-AVL 2.0.3.7 2011.12.15 - Avast 6.0.1289.0 2011.12.15 - AVG 10.0.0.1190 2011.12.15 - BitDefender 7.2 2011.12.15 - ByteHero 1.0.0.1 2011.12.07 - CAT-QuickHeal 12.00 2011.12.14 - ClamAV 0.97.3.0 2011.12.15 - Commtouch 5.3.2.6 2011.12.15 - Comodo 15967 2011.12.15 - DrWeb 5.0.2.03300 2011.12.15 - Emsisoft 5.1.0.11 2011.12.15 - eSafe 7.0.17.0 2011.12.15 - eTrust-Vet 37.0.9626 2011.12.15 - F-Prot 4.6.5.141 2011.12.14 - F-Secure 9.0.16440.0 2011.12.15 - Fortinet 4.3.388.0 2011.12.15 - GData 22.308/22.579 2011.12.15 - Ikarus T3.1.1.109.0 2011.12.15 - Jiangmin 13.0.900 2011.12.15 - K7AntiVirus 9.119.5696 2011.12.15 - Kaspersky 9.0.0.837 2011.12.15 - McAfee 5.400.0.1158 2011.12.15 - McAfee-GW-Edition 2010.1E 2011.12.15 - Microsoft 1.7903 2011.12.15 - NOD32 6715 2011.12.15 - Norman 6.07.13 2011.12.15 - nProtect 2011-12-15.02 2011.12.15 - Panda 10.0.3.5 2011.12.15 - PCTools 8.0.0.5 2011.12.15 - Prevx 3.0 2011.12.15 - Rising 23.88.03.01 2011.12.15 - Sophos 4.72.0 2011.12.15 - SUPERAntiSpyware 4.40.0.1006 2011.12.15 - Symantec 20111.2.0.82 2011.12.15 - TheHacker 6.7.0.1.359 2011.12.15 - TrendMicro 9.500.0.1008 2011.12.15 - TrendMicro-HouseCall 9.500.0.1008 2011.12.15 - VBA32 3.12.16.4 2011.12.14 - VIPRE 11259 2011.12.15 - ViRobot 2011.12.15.4827 2011.12.15 - VirusBuster 14.1.118.0 2011.12.15 - Additional information MD5 : 7d6e8d06305308d511184ec8f32f3ddf SHA1 : aae1f1b4ad532b688ded57bf4f50ae45309c91d6 SHA256: 01e55049a4547c1e46aea011bfccfb9c5ee93c69ad73b96adaab061f7257d0e5 ssdeep: 768:D3itz2Hr0OvDlWcI5Y/mquJb2XPz05qvfavJUjO:DStqHr0WDlhnu12fKJV File size : 48128 bytes First seen: 2011-09-11 20:44:17 Last seen : 2011-12-15 20:38:15 TrID: Generic CIL Executable (.NET, Mono, etc.) (72.5%) Windows Screen Saver (12.9%) Win32 Executable Generic (8.4%) Win16/32 Executable Delphi generic (2.0%) Generic Win/DOS Executable (1.9%) sigcheck: publisher....: n/a copyright....: Copyright © 2011 product......: Yahoo IFrame Exploit description..: Yahoo IFrame Exploit original name: Yahoo IFrame Exploit.exe internal name: Yahoo IFrame Exploit.exe file version.: 1.0.0.0 comments.....: n/a signers......: - signing date.: - verified.....: Unsigned ----------------------------------------- Da`van...
  4. Intelegeti. Vam dat sursa destul de clar. Daca GAMELOFT sau uitat peste loguri (peste sunt loguri),si au vazut ca se trimit mesaje in prostie,este si normal ca ori au scos linku,ori au restrictionat accesul; Asadar,programul trimite comanda,si raspunde "succes". Programul nu are setari care sa arate daca linkul mai exista sau nu! Deci pana la urma tot la PHP ajungem,asa ca am sa fac eu script pt toti membrii RST mocca! P.S Mecanik = gm_dizzy Banat pentru o prostie!
  5. Ia lasa vrajeala,l-am decriptat este facut in AutoIT3 AVETI AICI SURSA PROGRAMULUI MOCCA! #NoTrayIcon #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_icon=ico\delete.ico #AutoIt3Wrapper_Compression=4 #AutoIt3Wrapper_Res_Comment=Powered B.y Cyber | www.mortal-team.net #AutoIt3Wrapper_Res_Description=Powered B.y Cyber | www.mortal-team.net #AutoIt3Wrapper_Res_Fileversion=0.0.0.3 #AutoIt3Wrapper_Res_Fileversion_AutoIncrement=p #AutoIt3Wrapper_Res_LegalCopyright=Powered B.y Cyber | www.mortal-team.net #AutoIt3Wrapper_Res_SaveSource=y #AutoIt3Wrapper_Res_Field=Powered B.y Cyber|www.mortal-team.net #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #include <ButtonConstants.au3> #include <EditConstants.au3> #include <GUIConstantsEx.au3> #include <StaticConstants.au3> #include <WindowsConstants.au3> #include <IE.au3> Global $nr_tel $Form1 = GUICreate("Spammer sms turbo * 3 By Cyber!", 305, 78, -1, -1, -1, BitOR($WS_EX_TOOLWINDOW,$WS_EX_TOPMOST,$WS_EX_WINDOWEDGE)) GUISetBkColor(0x000000) $Group1 = GUICtrlCreateGroup("Settings", 4, 2, 297, 73) $Label1 = GUICtrlCreateLabel("Phone number:", 12, 18, 89, 17) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlSetColor(-1, 0xFF0000) $Input1 = GUICtrlCreateInput("07", 104, 16, 185, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE)) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlSetBkColor(-1, 0xFF0000) $Label2 = GUICtrlCreateLabel("Sent:", 12, 48, 34, 17) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlSetColor(-1, 0xFF0000) $Input2 = GUICtrlCreateInput("5", 50, 42, 81, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE)) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlSetBkColor(-1, 0xFF0000) $Button1 = GUICtrlCreateButton("Start!", 136, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlSetCursor (-1, 0) $Button2 = GUICtrlCreateButton("Stop!", 207, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE) GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif") GUICtrlCreateGroup("", -99, -99, 1, 1) GUISetState(@SW_SHOW) While 1 $nMsg = GUIGetMsg() Switch $nMsg Case $GUI_EVENT_CLOSE Exit Case $Button1 gomsg() Case $Button2 Exit EndSwitch WEnd Func gomsg() For $i = 1 To GUICtrlRead($Input2) Step 1 $nr_tel = GUICtrlRead($Input1) $oIE = _IECreate ("http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329", 0,0,1) _IEQuit($oIE) Next MsgBox(64,"Info","Finish!") EndFunc Din cate se vede face apel la http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329" Iar functia e: Func gomsg() For $i = 1 To GUICtrlRead($Input2) Step 1 $nr_tel = GUICtrlRead($Input1) $oIE = _IECreate Logic ca aia au loguri,si au scos linkul Have a nice day
  6. Da asa este,dar se pare ca o gramada mare de copii care se cred "hackeri" nu stie sa faca diferenta dintre un virus si un program scris in VB care nu ruleaza daca nu are NTF4. Fratilor,eu in daca eram staff aici faceam in asa fel sa nu se poata inregistra orice copil BUT care nici macar nu stie cu ce se mananca Hackingul. P.S Multumesk de ban pentru un program CLEAN.
×
×
  • Create New...