-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi everyone again,
As I said to various people I would release an updated version that
works lacking the bugs. The leaked version being fairly bad and was
never intended to be released.
http://pastebin.com/j6uVQ3yF
- - William Welna
-BEGIN
I am at a lack of words for this, why pay $4.99 when you can just do
some simple googling? You can even search pastebin and get a mass
collection of password lists from dbases. Add a dash of awk and maybe
a pinch of sed and viola!
If you are like me I always download and store the various dbase
Why did you rewrite metasploit?
On Tue, Nov 29, 2011 at 9:09 PM, nore...@exploitpack.com wrote:
Exploit Pack is an open source security tool that will help you test
the security of your computer or servers. It combines the benefits of a
Java GUI, Python as engine and the latest exploits on
I've been watching this chat for a while and I have to say a lot of
views here does not impress me and in fact why I will never report a
vulnerability if I found one. Why would I want to even risk getting
arrested and/or FBI trouble from observing a security flaw? My policy
on finding them is to
On Sat, Jan 14, 2012 at 12:11 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote:
--On January 14, 2012 8:33:13 AM -0700 Sanguinarious Rose
sanguiner...@occultusterra.com wrote:
I've been watching this chat for a while and I have to say a lot of
views here does not impress me and in fact why I
On Sat, Jan 14, 2012 at 12:32 PM, Ferenc Kovacs tyr...@gmail.com wrote:
On Sat, Jan 14, 2012 at 4:33 PM, Sanguinarious Rose
sanguiner...@occultusterra.com wrote:
I've been watching this chat for a while
you didn't watched properly.
nobody said that you shouldn't report vulnerabilities
This guy is full of win, it's like watching the special Olympics in HD.
On Wed, Jan 25, 2012 at 12:51 PM, Henry M henr...@gmail.com wrote:
Reporting three day old news to Full-Disclosure.
Awesome.
On Wed, Jan 25, 2012 at 1:51 AM, karma cyberintel
karmacyberint...@gmail.com wrote:
I have found the perfect image to describe my thoughts on this current
clash of intellectuals.
http://www.threadbombing.com/data/media/27/arguing.jpg
On Wed, Jan 25, 2012 at 4:26 PM, xD 0x41 sec...@gmail.com wrote:
You are not anonymous, you are reachable anywhere in the world.
hahah yes
Um Can I get a translation in English please? K thnx.
On Fri, Feb 3, 2012 at 2:06 PM, doo...@gmail.com doo...@gmail.com wrote:
Your the idiot here.. Boone,will give u guys crap ya cuntzzz and I hope
yur havin great time tryin to figure out how badly this list got owned,off
yad
, Sanguinarious Rose
sanguiner...@occultusterra.com wrote:
Um Can I get a translation in English please? K thnx.
On Fri, Feb 3, 2012 at 2:06 PM, doo...@gmail.com doo...@gmail.com wrote:
Your the idiot here.. Boone,will give u guys crap ya cuntzzz
Ever see Jay and Silent Bob Strike Back
His story seemed rather odd and BS to begin with so thanks for
cleaning that up for much entertainment and ownage.
Excellent day to you good sir.
On Mon, Feb 6, 2012 at 5:55 PM, resea...@vulnerability-lab.com
resea...@vulnerability-lab.com wrote:
i recomment your desinformation with 2 short
On Sat, Feb 11, 2012 at 2:23 PM, farthva...@hush.ai wrote:
_
Use Tomato-USB OS on them.
_
Besides you void warranty...
list of DD-WRT Supported
Ah what a wonderful gem of pure and real research into todays upcoming
threats. Today is the day we learn to phear sites like xroxy.com
because God forbid some of those silly kids using their 9001 proxies
from their 56k dial-ups will over-run google, youtube, facebook, and
the world! Dear God what
I do not understand why you are wasting time on an obvious troll to
downright, and I don't normally call people names but he well deserves
it, a retard. I think I ironically illustrated the fundamental flaw in
that you can't possibly generate more bandwidth by using proxies for
the python code
Now, I had to do it. I took a look at his other projects (I know, I
know..., it has begun)
https://github.com/lfamorim/IntensiveDoS
If you thought the python code was bad... It doesn't even do anything
remotely effective. Now, pthreads has a cap of around 200 max threads
(depends on compile
On Wed, Feb 15, 2012 at 7:53 AM, Lucas Fernando Amorim
lf.amo...@yahoo.com.br wrote:
How do I subscribe only to the short list have to keep answering this
bizarre way, so I apologize. If someone has an alternative way, please tell
me.
Change your settings where you subscribed.
I do not know
On Mon, Feb 20, 2012 at 2:28 PM, Jeffrey Walton noloa...@gmail.com wrote:
Hi Mitja,
On Fri, Feb 17, 2012 at 11:32 AM, ACROS Security Lists li...@acros.si wrote:
This blog post reveals a bit of our research and provides an advance
notification of
a largely unknown remote exploit technique
That is a rather broad request considering how many flavors of
botnets, various software, and purposes of of them. I would have to
ask what possible purpose could want them for considering such
broadness?
However I would watch this
https://twitter.com/#!/pastebin/status/172625863970529280
This isn't anything new
On Sun, Feb 26, 2012 at 11:58 PM, Laurelai laure...@oneechan.org wrote:
http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf
___
Full-Disclosure - We believe in it.
Charter:
Super Proxy Botnets!
https://github.com/lfamorim/barrelroll
On Tue, Feb 28, 2012 at 7:44 AM, PsychoBilly zpamh...@gmail.com wrote:
hping3 --flood
[[ Manuel Moreno ]] @ [[ 27/02/2012 04:35
]]--
Hi List!!
I made some research about
On Tue, Mar 6, 2012 at 4:35 PM, Laurelai laure...@oneechan.org wrote:
On 3/6/2012 5:32 PM, Sanguinarious Rose wrote:
I raise you this: http://pastebin.com/R3AL0im6
On Tue, Mar 6, 2012 at 3:51 PM, Laurelai laure...@oneechan.org wrote:
On 3/6/2012 2:24 PM, Ferenc Kovacs wrote:
2011/7/25 Laurelai
Yea, I have been thinking on ideas for that as well, I see no one has
thought outside the box yet.
I would look into OO'ed C (www.planetpdf.com/codecuts/pdfs/ooc.pdf) as
being a possibility. Long before in the time when the mighty C++ was
young, it was translated to C code for compilation. I have
[ ]
umad?
On Sat, Mar 10, 2012 at 3:23 AM, Laurelai laure...@oneechan.org wrote:
On 3/10/2012 4:13 AM, Sanguinarious Rose wrote:
Yea, I have been thinking on ideas for that as well, I see no one has
thought outside the box yet.
I would look into OO'ed C (www.planetpdf.com/codecuts/pdfs/ooc.pdf
Trying to cover up you being told, that's Cute 3
On Sat, Mar 10, 2012 at 3:34 AM, Laurelai laure...@oneechan.org wrote:
On 3/10/2012 4:31 AM, Sanguinarious Rose wrote:
Not really, it looks like speculation same as I just admitted my idea
was. There is no proof as of yet besides for just
Do you have any suggestions as to what C++ compiler could generate
such code in such a case and how one could generate similar code that
matches the decompiled parts? Granted their theory of a new language
is moonbatty but I think they have the knowledge to recognize a common
compiler.
As for
There is a lot of issues that don't make sense and problems with his
write up. I asked him about it and he couldn't say much about it
besides a single admission of one of my points I outlined about usage
of netcat. My talk with him regarding the issues I noticed in his blog
post here
https://www.securelist.com/en/blog/677/The_mystery_of_Duqu_Framework_solved
The code was written using a custom OO C framework, based on macros
or custom preprocessor directives. This was suggested by your
comments, because it is the most common way to combine object-oriented
programming with C.
Was there a memo I missed or is Full Disclosure the new reviews list
for malware shopping?
On a side note you seem to be rather mad, perhaps a life of crime is
just not for you. I would suggest getting a hair cut, perhaps showing
and at the very least some deodorant, and finding a Real Job.
On
So:
1. Any login page is a Brute Force Vulnerability or accepting user
input for that matter is probably a Brute Force Vulnerability
2. There is no way to protect against it that can not be overcome (but
apparently there is some magickal way when implemented corrected?) so
its still a Brute Force
I found this to be of high informational value, I do agree completely
with the statement thus given.
Please, tell us more about how to came to these conclusions, how this
impacts this community, and the social dynamics of our society as a
whole.
Best Regards
On Thu, Nov 15, 2012 at 7:02 AM,
I rather like my honorable mention https://www.soldierx.com/hdb/th3j35t3r
I approve
On Mon, Jan 7, 2013 at 10:36 AM, scryptz0 SOLDIERX
scryp...@soldierx.com wrote:
Infosec Institute made a write up on the largest public hacker database on
the net that is rumored to be rivaled by the FBI. Check
.
Lame.
But if the Jester approves, that's something.
On 1/8/13 4:19 AM, Sanguinarious Rose wrote:
I rather like my honorable mention
https://www.soldierx.com/hdb/th3j35t3r
I approve
On Mon, Jan 7, 2013 at 10:36 AM, scryptz0 SOLDIERX
scryp...@soldierx.com wrote:
Infosec Institute
And that is the reason why no one wants to report anything they find,
it's because of people like you and your kind of thinking.
Did they public post all the private information?
No
Did they try to use it for malious or illicit purposes?
No
Did they report it when they found it?
Yes
A horrible
That is a rather interesting question...
Carry On!
On Sat, Mar 2, 2013 at 8:47 PM, Jerry dePriest jerr...@mc.net wrote:
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
I got a new laptop a few days ago, I wouldn't worry too much because you'll
just get a new laptop too!
Sabu got a new laptop, i'm sure it had decent specs because mine does!
In time, his handlers allowed him to work from the home from which he
previously wrought destruction, using a PC laptop
You have my Axe!
https://www.youtube.com/watch?v=pxPGzj2L3n0
On Tue, Feb 25, 2014 at 9:33 AM, Pete Herzog li...@isecom.org wrote:
How to teach hacking in school and open up education:
https://opensource.com/education/14/2/teach-hacking-schools-open-education
Sincerely,
-pete.
--
Pete
36 matches
Mail list logo