Jump to content

Search the Community

Showing results for tags 'perl'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 10 results

  1. RooT Flood 100% Free Linux https://www.youtube.com/watch?v=AFmPVdAB4kY
  2. https://rapidshare.cc/getfile/code/86df737db1b384806061de21b243acaf How This Book Is Structured Each chapter in this book addresses a different system administration domain and ends with a list of the Perl modules used in that chapter and references to facilitate deeper exploration of the information presented. The chapters are as follows: Chapter 1, Introduction This introductory chapter describes the material covered in the book in more detail, explaining how it will serve you and what you need to get the most from it. The material in this book is powerful and is meant to be used by powerful
  3. Bun? ziua , a? dori ?i eu dac? se poate un script scris în perl care s?'mi acorde acces root la un website , adic? s? am acces la tot ce de?ine firma de la care detin webhostul pe respectivul dedicat , vps etc... Am auzit c? exist? un shell scris în perl ce'?i permite acest lucru , l'am avut mai demult dar printre timp l'am pierdut...Folosesc un shell php prin care am doar acces limitat(am acces root dar e doar la userul meu)
  4. Am nevoie de cineva care stie perl si ma poate ajuta cu un mic script in schimbul sumei de 50$. Plata pe Paypal dupa ce verific scriptul. Detalii: pana acum, scriptul citeste niste URL-uri (toate sunt link-uri catre poze) dintr-un fisier. va exista o variabila @images si voi folosi foreach(@images){} pentru a parcurge fiecare imagine din array. Explicatie: Pentru fiecare imagine vreau sa verific: daca exista text in ea sau nu sa aflu daca textul contine doar numere / simboluri sa verific cu un regex daca un string se afla in textul respectiv CONDITII: daca exista text in poza -> retu
  5. RooT Flood + PERL 1. vps Ukrainian data center. VPS Hosting. 2. 10 minute 10 Minute Mail 2. perl esl.pl http://andreyesl.16mb.com/esl.pl Like and subscribe ! THANKS!!! https://www.youtube.com/watch?v=AFmPVdAB4kY
  6. Configuring libcurl 7.41.0 with OpenSSL for Visual Studio 2013 In this tutorial I will go over configuring Visual Studio for seamless usage with the libcurl 7.41.0 and OpenSSL libraries. I have included references to articles found related to the compilation and common issues. What is curl? curl is a command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, Gopher, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMB, SMTP, SMTPS, Telnet and TFTP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP
  7. ssh2ftpcrack is a simple FTP and SSH dictionary brute force cracking tool written in Perl. Author: GhOsT-PR #puerto.ghost.rico@gmail.com README: Steps: 1) Install libssh2( http://www.libssh2.org/ ) before installing Net::SSH2 2) Before installing Net::SSH2, install YAML 3) Type at the konsole as root: cpan YAML && cpan Net::SSH2 Now you are ready to use ssh2ftpcrack Usage: ssh2ftpcrack.pl [ftp or ssh] [user] [host] [wordlist] Download SSH2FTPCrack FTP / SSH Brute Forcer 0.2 ? Packet Storm
  8. wvw

    Perl books

    Advanced Perl Programming, 2nd Edition [2005] Extending and Embedding Perl [2003] Extreme Perl [2004] Higher-Order Perl: Transforming Programs with Programs [2005] Mastering Algorithms with Perl [1999] Mastering Perl [2007] Perl Debugged [2001] Perl Testing: A Developer's Notebook [2005] Practical mod_perl [2003] Pro Perl Debugging: From Professional to Expert [2005] Writing Perl Modules for CPAN [2002] Perl Medic: Transforming Legacy Code [2004] Perl Best Practices [2005] Effective Perl Programming: Ways to Write Better, More Idiomatic Perl (2nd Edition) [2010] request download ticket | Perl
  9. Description: Script to create one sorted and unique wordlist from multiple wordlists. It takes as input N raw text files, a directory of them, or both. It parses the input and filters by string length on min and max specified. It will then sort all the data and make it unique for final output. L33t Speak is an option, see usage statement in prog. Features: L33t Speak Supports mix of standard text with L33t Speak Support for individual files, directory of files or both Filters output to size mandated by user Ensures uni
  10. Author(s) Joe Stewart Latest Version 0.1 Description Foregone is a forensic file recovery tool written in Perl. It was inspired by the Air Force Office of Special Investigations' forensic tool known as "Foremost", which uses defined headers and footers of certain file types to search a raw disk image and extract files with those characteristics. Foregone is a Perl implementation of the same technique with some added features: Only searches for headers starting on a block boundary, for a speed increase Uses compression to reject interleaved blocks of dissimilar files Foregone should not be co
×
×
  • Create New...