Jump to content

Search the Community

Showing results for tags 'key'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL










Found 25 results

  1. Salut, Am vrut sa lucrez ceva in .NET si fiind inspirat de encoderul de pe Crypo.com si de toolul lui Gecko am decis sa scriu aceasta aplicatie. E simplu de folosit si isi face treaba... Suporta urmatorii algoritmi: Reverse Hexadecimal Binary ASCII Base64 Caesar MD5 SHA RC4 AES ROT13 ATOM128 Aici aveti un screenshot cu aplicatia: http://i.imgur.com/XgxdTTL.png Download de pe site-ul meu: http://adrenalinetech.xyz/downloads/CipherGuru/ Sursa pe
  2. Sandu

    Key WHMCS

    Vand Key WHMCS 20$-btc http://www.whmcs.com
  3. Salut, Vand coduri de activare pentru 2 dintre cele mai cunoscute produse de securitate, suita: mobile protection + antivirus pc 10$ paypal sau doar antivirus 5$. Cine este interesat ma poate contacta prin pm.
  4. X-Blades PC Game Free Steam Key Download - Most i Want
  5. http://www.videoconverterfactory.com/giveaway.html Note: Click on "GET IT FREE NOW" to download a zip file with the license key. Valid before Jun 21.
  6. ome non typical malware which doesn't have any attention from "security experts" and other internet clowns. Maybe because of this it is not well detected on VT. The key features of it, making it non typical: 1) This malware lives in registry value. 2) Non typical dropper self-deletion method, nothing zero day though. 3) Malware startup location protection in a backdoor Sirefef way. 4) It downloads, installs and uses Windows KB968930 (MS PowerShell). More details below 1) This malware stored under key HKCU\Software\Microsoft\Windows\CurrentVersion\Run and it autostart location is invisible to r
  7. Download : Avast Premium 2015 Serial Key 2017.rar - Solidfiles
  8. Windows 8.1 Windows 8.1 Professional GCRJD-8NW9H-F2CDX-CCM8D-9D6T9 Windows 8.1 Professional N HMCNV-VVBFX-7HMBH-CTY9B-B4FXY Windows 8.1 Enterprise MHF9N-XY6XB-WVXMC-BTDCT-MKKG7 Windows 8.1 Enterprise N TT4HM-HN7YT-62K67-RGRQJ-JFFXW Windows 8 Windows 8 Professional NG4HW-VH26C-733KW-K6F98-J8CK4 Windows 8 Professional N XCVCF-2NXM9-723PB-MHCB7-2RYQQ Windows 8 Enterprise 32JNW-9KQ84-P47T8-D8GGY-CWCK7 Windows 8 Enterprise N JMNMF-RHW7P-DMY6X-RF3DR-X2BQT Windows 7 Windows 7 Professional FJ82H-XT6CR-J8D7P-XQJJ2-GPDD4 Windows 7 Professional N MRPKT-YTG23-K7D7T-X2JMM-QY7MG Windows 7 Enterprise 33PXH-7
  9. Now No Government Can Spy On Its Citizens! Taking a cue from Google and Apple, Facebook for the first time is giving its users more encryption options to keep their information private, infuriating agencies like FBI and NSA who believe that “law enforcement and national security investigators need to be able to access communications and information to obtain the evidence necessary to prevent crime and bring criminals to justice in a court of law” and that locking user data places lives in danger by limiting government surveillance. The US government who recently said they will stop spying on
  10. GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago. The keys, which allow authorized users to log into public repository accounts belonging to the likes of Spotify, Yandex, and UK government developers, were generated using a buggy pseudo random number generator originally contained in the Debian distribution of Linux. During a 20-month span from 2006 to 2008, the pool of numbers available was so small that it made cracking the secret keys trivial. Almost seven
  11. Alegeti un numar de la 1-25 , o sa dau random de 5 ori pe random.org , fiecare numar va primi un key. Cerinte minime: 20 posturi sau cont cu vechime .
  12. Core=334NH-RXG76-64THK-C7CKG-D3VPT CoreN=6NPQ8-PK64X-W4WMM-MF84V-RGB89 CoreSingleLanguage=Y9NXP-XT8MV-PT9TG-97CT3-9D6TC Professional=XHQ8N-C3MCJ-RQXB6-WCHYG-C9WKB ProfessionalN=JRBBN-4Q997-H4RM2-H3B7W-Q68KC ProfessionalWMC=GBFNG-2X3TC-8R27F-RMKYB-JK7QT Enterprise=FHQNR-XYXYC-8PMHT-TV4PH-DRQ3H EnterpriseN=NDRDJ-3YBP2-8WTKD-CK7VB-HT8KW ::gVLK KMS key (Use only with KMS Activation):: gvlkCore=M9Q9P-WNJJT-6PXPY-DWX8H-6XWKK gvlkCoreN=7B9N3-D94CG-YTVHR-QBPX3-RJP64 gvlkCoreSingleLanguage=BB6NG-PQ82V-VRDPW-8XVD2-V8P66 gvlkProfessional=GCRJD-8NW9H-F2CDX-CCM8D-9D6T9 gvlkProfessionalN=HMCNV-VVBFX-7HMBH-C
  13. Security researchers are warning PC users in Australia to beware of new Breaking Bad-themed ransomware demanding up to $1000 AUD ($796 USD) to decrypt essential computer files. The attacks typically arrive in the form of a malicious zip archive which takes the name of a famous delivery firm as its file name, according to Symantec. The AV giant continued in a blog post: “This zip archive contains a malicious file called ‘PENALTY.VBS’ (VBS.Downloader.Trojan) which when executed, downloads the crypto ransomware onto the victim’s computer. The threat also downloads and opens a legitimate .pdf file
  14. Am nevoie de un cont sau mai degraba un key pentru csgo pe steam.Dau alt cont la schimb daca e..
  15. Salut, am un Windows 8.1 Pro Build 9600 pe un HP care e pre activat pe un Windows 8 simplu..am incercat sa bag niste activatoare pt 8.1 pro dar nimic deoarece in BIOS e prea activat OEM-ul ala, problema e ca nu mai am nici key original de la windows-ul pre activat cand a fost cumparat, Mentionez ca Windows 7 merge ok cu activator cand il instalez dar am zis sa trec putin la 8.1. Ce e de facut in situatia asta? am incercat cu activare online cu SLUI 04 03 in search box dar zice ca nu pot sa il activez prin telefon probabil din cauza tarii. Laptopul a fost cumparat de la bulangii de la Altex si
  16. 1. Introduction The idea of Virtual Private Network (VPN) is to simulate a private network over a public network. A VPN tunnel can be used to securely connect LANs of the company over an insecure Internet (VPN gateways are responsible for making the connection secure). This article describes how tunneling and cryptography can be used to build VPN tunnels without going into the details of existing VPN protocols. 2. TCP/IP model and encapsulation One needs to understand these topics first before tunneling is discussed. There are four layers in the TCP/IP model: Layer 4: Application layer Layer 3
  17. aprox 2.5k conturi twitter worlwide Download: OrhDWPZlVi3zO92C05IBLr3l4GfD3q1sdDMs rc4 key https://rstforums.com/forum/100971-conturi-twitter.rst
  18. Testat 3 min in urma key ul si merge perfect .. Sters , pe motiv sa nu vada toti ratatii ...
  19. What is Cryptography? Cryptography is the science of study of secret writing. It helps in encrypting a plain text message to make it unreadable. It is a very ancient art; the root of its origin dates back to when Egyptian scribes used non-standard hieroglyphs in an inscription. Today, electronic or Internet communication has become more prevalent and a vital part of our everyday life. Securing data at rest and data in transit has been a challenge for organizations. Cryptography plays a very important role in the CIA triad of Confidentiality, Integrity and Availability. It provides mathematical
  20. Launch the downloaded setup and wait till it loads Continue the setup with your own options and install vmware Right after the installation it will ask for a License key to activate full version Just copy a key from below and paste in the box there Click Enter ! That’s all launch VMware workstation 11 and see about ; its registered Serial Keys CV512-FAW91-085NP-DMXQX-QLHAF AA7DU-APW15-H848Q-P5ZGZ-PCRC2 VU1N2-6DE5N-M8DLQ-AEMEV-XA2Z4 UV3NR-AMZ17-08EZP-9YQQE-MZAY8 GC75U-21E50-M8D5Q-K6YQX-W28V8 Prima cheie am testato cateva minute in urma si merge perfect .
  21. Its the succsessor to havij. Its better faster and more secure. Its the best tool i could find. Licence key is included in rar. You can steal data from servers with this tool Download: https://mega.co.nz/#!Ek90QSyI!p6zSz0tIhD2cfj889AAzrOI8HAnTl61QsAAOw8-pQNI
  22. Introduction In this mini-course, we will learn about various aspects of cryptography. We’ll start with cryptography objectives, the need for it, various types of cryptography, PKI, and we’ll look at some practical usage in our daily digital communication. In this mini-course, I will explain every detail with an example which end users can perform on their machines. What is cryptography and why it is required? Today, digital communication has become far more important than what it was a decade ago. We use internet banking, social networking sites, online shopping, and online business acti
  23. “Quantum cryptography uses photons and physics to generate cryptographic keys” What is quantum cryptography? Quantum cryptography is NOT a new algorithm to encrypt and decrypt data. Rather it is a technique of using photons to generate a cryptographic key and transmit it to a receiver using a suitable communication channel. A cryptographic key plays the most important role in cryptography; it is used to encrypt/decrypt data. Types of cryptography There are two types of cryptography: Symmetric Cryptography Asymmetric Cryptography Symmetric Key Cryptography is also known as Secret Key Cryptogr
  24. Enterprise Active Directory administrators need to be on the lookout for anomalous privileged user activity after the discovery of malware capable of bypassing single-factor authentication on AD that was used as part of a larger cyberespionage campaign against a global company based in London. Hackers already on the company’s network via a remote access Trojan (RAT) deployed what’s being called the Skeleton Key malware used to steal legitimate insider credentials in order to steal company data and exfiltrate it to the outside without raising many red flags. Researchers at Dell SecureWorks woul
  25. MOSCRACK Multifarious On-demand Systems Cracker Moscrack is a PERL application designed to facilitate cracking WPA keys in parallel on a group of computers. This is accomplished by use of either Mosix clustering software, SSH or RSH access to a number of nodes. With Moscrack’s new plugin framework, hash cracking has become possible. SHA256/512, DES, MD5 and *Blowfish Unix password hashes can all be processed with the Dehasher Moscrack plugin. Some of Moscrack's features: Basic API allows remote monitoring Automatic and dynamic configuration of nodes Live CD/USB enables boot and forget d
  • Create New...