arian0m.blogspot.com
KILL-9 CREW: WINDOWS AUTOPWN (WINAUTOPWN)
http://arian0m.blogspot.com/2010/12/windows-autopwn-winautopwn.html
Jumat, 24 Desember 2010 by ./arianom. Autohack your targets with least possible interaction. Features :- Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits. No need to debug, script or compile the source codes. Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to the list of discovered open ports (OpenPorts.TXT). Doesn't require any Database at the back-end like others. TnX and CrediT: AuthoR.
arian0m.blogspot.com
KILL-9 CREW: Medusa
http://arian0m.blogspot.com/2010/12/medusa.html
Jumat, 24 Desember 2010 by ./arianom. Medusa Parallel Network Login Auditor. Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:. Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Langganan: Poskan Komentar (Atom). 183; Log in.
arian0m.blogspot.com
KILL-9 CREW: Decrypting GSM phone calls
http://arian0m.blogspot.com/2010/12/decrypting-gsm-phone-calls.html
Decrypting GSM phone calls. Jumat, 24 Desember 2010 by ./arianom. Tools The following tools are used to analyze voice calls:. GnuRadio is included in recent Linux distributions. Recording data requires a programmable radio receiver such as the USRP. Airprobe is available through: git clone git:/ git.gnumonks.org/airprobe.git. Please follow this tutorial to decode GSM traffic with Airprobe. Kraken is available through: git clone git:/ git.srlabs.de/kraken.git. Langganan: Poskan Komentar (Atom). Acunetix 7...
arian0m.blogspot.com
KILL-9 CREW: 2010-02-21
http://arian0m.blogspot.com/2010_02_21_archive.html
Sabtu, 27 Februari 2010 by ./arianom. 183; 0 comments. Adalah majalah komputer, internet, hacking dan security bahasa Indonesia dengan media murni PDF. Seluruh materi X-Code Magazine dapat didownload, dibaca, dimodifikasi serta disebarluaskan secara bebas untuk tujuan bukan komersial, dengan syarat tidak menghapus atau mengubah atribut penulis. Tujuan E- code Magazine adalah menyebarkan ilmu-ilmu komputer, internet dan hacking untuk tujuan positif. Instalasi Oracle10g di Linux RHELAS3. Instalasi webs...
arian0m.blogspot.com
KILL-9 CREW: 2010-11-21
http://arian0m.blogspot.com/2010_11_21_archive.html
Nessus App for iPhone. Rabu, 24 November 2010 by ./arianom. 183; 0 comments. Tenable is pleased to announce the official release of the Nessus App for iPhone! The application can be downloaded for free on the App Store and contains the following features:. Connect to a Nessus server (4.2 or later). Launch existing scan templates on a server. Start, stop or pause running scans. Create and execute new scans and scan templates. View and filter reports. 183; 0 comments. Http:/ h4cker.co.nr. 183; Log in.
arian0m.blogspot.com
KILL-9 CREW: Armitage
http://arian0m.blogspot.com/2010/12/armitage.html
Kamis, 23 Desember 2010 by ./arianom. Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. To use Armitage, you need the following:. Metasploit Framework 3.5. 183; Log in.
arian0m.blogspot.com
KILL-9 CREW: Ravan
http://arian0m.blogspot.com/2010/12/ravan.html
Jumat, 24 Desember 2010 by ./arianom. Ravan is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. It makes use of HTML5 WebWorkers to start background JavaScript threads in the browsers of the workers, each worker computes a part of the hash cracking activity. Salted and plain versions of the following hashing algorithms are currently supported:MD5 ,SHA1 ,SHA256,SHA512. Langganan: Poskan Komentar (Atom).
arian0m.blogspot.com
KILL-9 CREW: MioStar
http://arian0m.blogspot.com/2010/12/miostar.html
Jumat, 24 Desember 2010 by ./arianom. Instead of extracting sensitive data you can also manipulate the function arguments and replace the passed values by your own. As an example the function GetAddrInfoEx normally resolves hostnames and gives back the according IP address. Instead of resolving www.google.com replace this parameter by www.megapanzer.com. All traffic for google gets then redirected to Megapanzer. Langganan: Poskan Komentar (Atom). Http:/ h4cker.co.nr. Http:/ jatimcom.uni.cc. 183; Log in.
arian0m.blogspot.com
KILL-9 CREW: 2010-12-19
http://arian0m.blogspot.com/2010_12_19_archive.html
Acunetix 7 Enterprise - Portable. Jumat, 24 Desember 2010 by ./arianom. 183; 0 comments. On first startup will ask for web license,but don't worry. All you have to do is to click Next, then again Next, and Next and finish. Can not register for each machine, their licensing system improved a bit. In Acunetix folder will be auto-created folder necessary for program to work, if you erase folder you will have to "register" again, plus all other settings made during previous scanning will be erased. Instead o...