Jump to content

Search the Community

Showing results for tags 'private'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 17 results

  1. Criptez si compilezi shellcoduri pentru windows FUD Formatele acceptate sunt urmatoarele: unsigned char buf[] = "\xeb\x16\x5b\x31\xc0\x50\x53\xbb\xb5\x15\x86\x7c\xff\xd3..." "...." sau ={0xEB,0x16,0x31,0xC0....}; Caracteristici: - Metoda privata - Anti-debugger - Fiecare criptare este unica (algoritmul difera logica este aceeasi) - Runtime crypter (In-Memory execution) - Decryption key brutforce Features: - Private Method - Anti-debugger - Every job is unique (same algorithm logic differs) - Runtime crypt
  2. Cumpar Socks 4/5 scanner (private made) sa fie facut in python, sa scaneze pe ip range sau ip class , exclus port 1080, 80 .. Astept oferte pe privat. Copiii/new user sa se abtina, nu fac nici un deal decat cu useri cu reputatie. Multumesc
  3. Dupa cum spune si titlul am nevoie de putin ajutor.As dori sa stiu cum sta treaba cu pensiile private. 1.Trebuie sa am carte de munca cu loc de munca stabil. 2.Care este criteriu de caclul la pensii private. 3.Cat timp trebuie cotizat la acest tip de pensii(Trebuie sa cotizez pe luna/an, sau se poate plati pe 5 ani inainte de exemplu). 4.Ce dezavantaje exista in cazul pensiilor private.(Fara faze, "Da,daca mori,nu platesti,da banca faliment,etc" stiu si eu asta, ma refer depinde de bursa,economia banci etc) Cine are si este in tema as dori putin ajutor.Si daca se poate ce banca imi recomandati
  4. Now No Government Can Spy On Its Citizens! Taking a cue from Google and Apple, Facebook for the first time is giving its users more encryption options to keep their information private, infuriating agencies like FBI and NSA who believe that “law enforcement and national security investigators need to be able to access communications and information to obtain the evidence necessary to prevent crime and bring criminals to justice in a court of law” and that locking user data places lives in danger by limiting government surveillance. The US government who recently said they will stop spying on
  5. Download Private tools 1337w0rm.php
  6. Erroare: An unhandled exception of type 'System.IO.FileNotFoundException' occurred in System.Windows.Forms.dll Additional information: Could not load file or assembly 'TCtrl Connection, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. The system cannot find the file specified. Source: Imports Admin_Tool_4s Public Class Form2 Dim TCTRLCon As Connection Private Sub Button8_Click(sender As Object, e As EventArgs) Handles Button8.Click TCTRLCon.Kick(TextBox1.Text) End Sub Private Sub Form2_Load(sender As Object, e As EventArgs) Handles
  7. Solve the captcha to continue | Binbox
  8. Offers on private, pls.
  9. Tot ce vreau eu este sa construiesc un browser in visual basic in care sa se vada si java script de pe site Codul Visual basic Public Class Form1 Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click WebBrowser1.Navigate("http://freebetco.in/") End Sub Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load End Sub Private Sub WebBrowser1_DocumentCompleted(ByVal sender As System.Object, ByVal e As System.Windows.Forms.WebBrowserDocumentCompletedEventArgs) Handles Web
  10. Sql user_pass private combo https://mega.co.nz/#!29RV1CDS!jLiG5G7SFAb9yjXaOglRa3IYPLfV8fosRP6UWsfWwc8
  11. A New York City-based private investigator has pled guilty to one charge of conspiracy to commit computer hacking, which carries a maximum sentence of five years. Eric Saldarriaga allegedly hired hackers to access the email accounts of various victims, a Federal Bureau of Investigation (FBI) press release states. Saldarriaga allegedly had the hackers hand over login credentials, so he could access victims' accounts and review their communications. Manhattan U.S. Attorney Preet Bharara said in the release: “Eric Saldarriaga crossed the line as a private investigator by hiring hackers to unlawfu
  12. As the past has show us, cybercriminals are not the most trustworthy people when it come to holding valuable sources, and it looks like we're about to get another reminder of that, this time with an exploit pack leak. RIG is a popular exploit kit which has been around for about a year and sold on various "underground" forums. On February 3rd 2015 a user claiming to be the "Official HF Sales Rep" posted a sales thread on hackforums (HF), which is unusual as most serious sellers avoid this forum completely. It's likely the decision to allow resellers on this specific board was due to a large amo
  13. Table of Contents I. Introduction: .......................................................................................................................... 1 II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2 A. Most common threats to devices connected to open Wi-Fi hotspots....................................3 1. Types and description of threats................................................................................... 3 2. Basic security measures:.................................................................................
  14. Snowden: NSA employees routinely pass around intercepted nude photos "These are seen as the fringe benefits of surveillance positions," Snowden says. Edward Snowden has revealed that he witnessed “numerous instances” of National Security Agency (NSA) employees passing around nude photos that were intercepted “in the course of their daily work.” In a 17-minute interview with The Guardian filmed at a Moscow hotel and published on Thursday, the NSA whistleblower addressed numerous points, noting that he could “live with” being sent to the US prison facility at Guantanamo Bay, Cuba. He also again
  15. Salut, am 2 functii si vreau sa le fac detour: private void WriteTempRezults(string iD, string test, string points, string time, string memory, string msg) private void InsertListView(string testNumber, string points, string time, string memory, string msg) Problema este ca nu pot sa gasesc adresele la care se afla functiile. Orice indicatie ar bine primita. Aplicatie: Evaluator Virustotal: https://www.virustotal.com/sv/file/8848b.../analysis/
  16. Mai întâi de toate vom folosi func?ia symlink pentru a face o comand? rapid? pentru orice fi?ier sau folder vrem de aceea aceast? func?ie v? va fi foarte util? pentru citirea oric?rui folder sau fi?ier (Pentru mai multe detalii Utiliza?i Google). Aici am folosit Shell Named "C99" pentru a executa micul cod php (Eval Code) pe serverul de shared hosting. Exploit-ul este folosit pentru a desc?rca baza de date a victimei dac? ?i numai dac? victima este într-un host comun Desc?rca?i Shell-ul "C99 Shell" ?i urma?i pa?i. Ob?ine?i Oricare Shell C99 /Pasul 1 $ Incarc? php i.e Shell_R-H.php Shell root p
  17. Edited. Download Link: shell.txt Puteti schimba parola aici:--> @ $auth_pass = "DE65C26EE56EC4B20A6E86A1D7BB2BC5"; Parola este criptata in md5. Default pass: pgems.in Sursa: HackForums
×
×
  • Create New...