Search results

  1. K

    Hash Cracking Service [via ESCROW] [SATIS SECURITY]

    Hash cracking service is part of Satis Security List of most common hash types: MD4 MD5 SHA1 vBulletin - md5(md5($pass).$salt) myBB - md5(md5($salt).$md5($pass)) Any others accepted, just ask! Types: Standart: 1-8 Characters, lowercase, numbers. Standart2(salted): 1-8 Character, lowercase...
  2. K

    Dumps search script (bash) v.0.1

    This is a very very basic program to organize dumps. If you are bulk seller of dumps, this program can serve you very well. Now you can sell individual bins as well. Note: The only drawback of the program is that it doesn't delete the track2 it has found from the original source so when another...
  3. K

    0-day exploit and vulnerability shop [always 0day,custom exploits for shops etc...] [via ESCROW]

    0-day exploit and vulnerability shop Note: This is not duplicate thread. The other one isn't working and support didn't do anything about it so here is the same thread again. Please support remove the first one. Currently selling: Step-by-step usage tutorial/full support(48hrs) of any of the...
  4. K

    Rootkits/backdoors 101

    Title:Rootkits/backdoors 101 Author:KNS I. What is a rootkit? A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications(backdoor). - WIkipedia...
  5. K

    XSS 101

    Title:XSS 101 Author:KNS I. What is XSS? Cross-site scripting (XSS), it should have been CSS but that name is already taken by Cascade-Style Sheets so it became XSS, is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side...
  6. K

    Pwning SpyEye 1.2.X and 1.3.X

    Hacking SpyEye 1.2.X and 1.3.X Tittle:Hacking SpyEye 1.2.X and 1.3.X Author:KNS I. Introduction “Pwning SpyEye” – I wrote this paper after the release of 1.2.X on underground forums but i have seen it under other names. That's why the scene is so fag - because there is plagiarism and it's...
  7. K

    Advertisment in signature

    Can you advertise in your own signature? I think there is nothing bad about that. Please let me know if this is allowed. ~KNS
  8. K

    [FREE]Website access via php shells[FREE]

    DO NOT BE A DOUCHEBAG AND REMOVE SHELL LET OTHERS USE TOO! Currently available: http://www.optivax.com.sg/admin/product/show_images.php http://www.brisskbazaar.com/admin/show_images.php http://www.nichetechsolutions.com/demo/wordpress/wp-content/uploads/2011/show_images.php...
  9. K

    0-day exploit and vulnerability shop [2x4.ru exploit, whmcs exploit...] [via ESCROW]

    0-day exploit and vulnerability shop [whmcs 0day exploit etc.] [via ESCROW] NEW THREAD HERE http://carder.market/showthread.php?p=260486 PLEASE REMOVE THIS ONE ITS BUGGY REDIRECTS 2 INDEX!
  10. K

    Security & Hacking services [via ESCROW]

    Before proceeding 2 read, please bear in mind that this is for _serious_ people only. Is your business (cc/dumps shop,forum,website...) secure? About the service We decided to come up with a "brand" name - Satis Security - your partner in cyber security.As some of our vouched clients named...
  11. K

    Hacking 101 or the script-kiddies attack

    Title:Hacking 101 or the script-kiddies attack Author:KNS I. What are script-kiddies and how do they hack(deface)? A script kiddie or skiddie, occasionally skid, script bunny, script kitty, script-running juvenile (SRJ) or similar, is a derogatory term used to describe those who use scripts...
Top