Posts

Showing posts from August, 2016

Bruteforce The SSH / Checker - The SSH Bruteforce / Checker - Private

Image
SSH Bruteforce / Checker [+] Multithread [+] Brute accept ranges 1.0.0.0/8, 1.0.0.0-2.0.0.0 and IP list [+] Check in blacklists [+] Check Geo IP [+] Easily view the log with the ability to immediately start local SOCKS server [+] Autosave additional log to Excel file [+] Support all Windows 32/64 from XP [+] If there is demand I can build for Linux [+] English interface Payment: 50$ WMZ/BTC/QIWI Jabber Contact: Finsoft@jabber.ccc.de Seller Exploit.in Forum Profile - Click Here For More Info

ExPinc - Private Shop For Private Users

Image
Cheap Shop Everything is Cheap :) WINDOWS RDP ADMINISTRATOR UNLIMITED IP SMTPS UNLIMITED DOMAIN SMTPS NORMAL SMTPS UNLIMITED FIXED SENDER SMTPS UNLIMITED INBOX PHP MAILERS UNLIMITED WEBMAILS CPANELS SHELLS SSH (Bitvise Tunnelier) LEADS SMS MARKETING CLICK HERE FOR VISIT <<=== Shop Link REGISTER HERE <<=== Register Here

IDICT - A Brute Force Tool For User Passwords iCloud

Image
a small project on Github with a php tool for dictionary attacks against Apple iCloud IDs, evading restrictions and account lockout secondary authentication on any account. To use it simply download and unzip the htdocs folder on the Web server (tested on XAMP) and install CURL on your OS. Do not forget to enable the CURL extension uncommenting the following line in your php.ini file: ; Extension = php_curl.dll Then go to http://127.0.0.1/iDict/ in your web browser (preferably Firefox, Chrome or Safari). Wordlist.txt is iBrute and meets the requirements iCloud password Its author and of course we are not responsible for their use are given (check the restrictions in your country). Update: iDictPy published, one (! Ironic lol) python version DOWNLOAD LINK :  https://github.com/Pilfer/iDictPy

Sherlocked - Transforms any Script into an Executable ELF Protected, Encrypted with Anti-debugging

Image
This tool or "script universal packer" has a couple of years and is still quite useful ... Sherlocked is a protector of scripts of any kind (python, perl, shell etc.) using a simple XOR with password. Unless the -r option is used, the key is stored encrypted within the binary and run without having to set manually. Sherlocked basically takes the script, encrypts and saves it as an executable file x86_64 ELF with anti-debugging code (initially stripea of the symbol table and compressed with UPX). In runtime executable that temporarily decrypts the script and writes it to a random file in / tmp. Then pass the script and command line arguments to the interpreter is released and finally deletes the script. The only "but" if you use a password file (-r option) is that it does not support arguments cmdline, but could be implemented. And as we are, to improve you could also use a real encryption stream as SALSA20 rather simple XOR and for AV annoying, modify the stub with

Hack 2 World Message For Readers

Image
Hello My Sweet Users :) I made this blog in 2009 and now 2016, i am very thanksfull to you all who loves my blog and visit everyday :) in future i post more good tools methods videos for you all, and i dont hate my enemies this is internet world we all have same life on internet we all need money, but i just want to say i dont do carding and banking like i never sale banking and carding shit stuff some peoples make my fake profiles and make fake blogs and websites of hack2wwworld name, but i dont take tension because they all are kids and n00bs, i am happy my work is 1000% good and peoples respect me and visit my blog since 2009 :) thank you all thanks users readers visitors :) My Jabber ID :- Hack2wwworld@exploit.im My Skype ID :- Internet.zero My ICQ :- 691768633

Collection of Python Tools For Pentesters

Image
If you are involved in vulnerability research, reverse engineering or penetration testing, surely you've already used Python because it  has a rich set of libraries and tools for these purposes.  On the  page of Dirk Loss  we can find a great compilation  tools written in Python for penetration testers  , some of them only links to existing C libraries, ie, tools that make them easily usable from Python programs libraries.  However, the fuzzy legal situation in Germany did not include some of the tools aggressive (frameworks PenTest, smashers bluetooth, scanners web application vulnerabilities, war-dialers, etc.).  Therefore , and to have a more complete list,  we will be adding all the tools that we will find.  Do not hesitate to  comment on this entry if you know any more  and want that we add to this list: Network Dirtbags py-pcap  : Read PCAP files without libpcap DHCPig  : Python script that makes an attack of exhaustion DHCP (DHCP Starvation). dpkt  : quick and simple package

How to Hack Mechanism Android Backup Copy

Image
In   the last article   we examined the exemplary implementation of  a backup  copy  of data on the example of Apple iOS devices. And  how  things are on other platforms? Today, we will study the main antagonist iOS - Google Android platform and find out  how to  save the data with as root and without,  like  them a way to restore data from a backup, and  how  to pick open a local or a foreign cloud backup.  How  to hack  mechanism  backup  copy  Android. Just define some terminology. In this article we will write exclusively about the kind of Android that comes with Google. Third-party firmware, we are not particularly interested in: the number of users is minimal, thus create and restore backups of your data at the next firmware "kastomov" These people are good at. No, today we'll talk about the other 99% of users who want to open the box, enter the username and password of an account and get something workable. The article is based on a study in which we used about ten