/* we all know that you are a stupid backd00r spreader str0ke ;)) */
I always come thru the fr0ntd00r :P
On another note anyone have access to dikline.com's sine? I want to read
[frsirtg0.txt] 07-21-05 [ 33067] [/home/frsirt/www] [june] [fucking
gotcha!]
/str0ke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
we all know that you are a stupid backd00r spreader str0ke ;))
At 08:10 27/07/05, [EMAIL PROTECTED] wrote:
/*
Hmm, I'm noticing a pattern.
Warning: don't download exploits from any sites that have an 'o'
replaced with a '0'! The 0 obviously makes
/*
Hmm, I'm noticing a pattern.
Warning: don't download exploits from any sites that have an 'o'
replaced with a '0'! The 0 obviously makes them less secure, or
something.
*/
Oh crap let me go register milworm.com so I can be a little more
secure in the eyes of a battle.net bot developer.
lmfao
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hmm, I'm noticing a pattern.
Warning: don't download exploits from any sites that have an 'o'
replaced with a '0'! The 0 obviously makes them less secure, or
something.
[EMAIL PROTECTED] wrote:
> Hackers may be at risk!
>
> It has come to our att
Yep, many exploits/shellcodes are "fake" on the wild , but does
anyone have a tools to verify the shellcodes "public or 0days" online
or sources codes? something like "reverse shellcode" i belive to see
something online where u put the shellcode and them u see the "action"
that u shellcode have.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hackers may be at risk!
It has come to our attention that a large amount of public
security exploits/software have been modified and re-posted
to legitimate trusted information sites for public downloads.
We have recently came across 5 exploits that