<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-4949655047717502415</id><updated>2024-11-01T12:03:37.976+01:00</updated><category term="Tools"/><category term="Exploit"/><category term="SQL Injections"/><category term="Tutorials"/><category term="Source"/><category term="Cracking"/><category term="News"/><category term="Scanner"/><category term="local exploits"/><category term="BruteForce"/><category term="Discutions"/><category term="XSS"/><category term="Droks"/><category term="Rooting"/><category term="Show Off"/><category term="Accounts"/><category term="FlashcRew"/><category term="Tricks"/><category term="google vulenrability"/><category term="vulenrability"/><category term="DoS"/><category term="LOL"/><category term="Google"/><category term="PHP"/><category term="Service"/><category term="b0f"/><category term="Exposed"/><category term="LFI"/><category term="Malware"/><category term="PHP Injection Exploit"/><category term="Pilot"/><category term="Programming"/><category term="Remote exploit"/><category term="shell"/><category term="DLL Hijacking"/><category term="Dorks"/><category term="MsSQL Injection"/><category term="MySQL Dumper"/><category term="MySQL Injection"/><category term="Phreaking"/><category term="Python"/><category term="RFI"/><category term="Server Bypass"/><category term="Symlink"/><category term="Vbulletin Hack"/><category term="Vbulletin Sql Injection"/><category term="Vulnerable sites"/><category term="rdp"/><category term="remote root"/><category term="social engineering"/><category term="Blind Injection"/><category term="BotNet"/><category term="Crypter"/><category term="Cve-2012-1823"/><category term="CyberCrime"/><category term="Facebook"/><category term="File Crypt"/><category term="Music"/><category term="Oracle Injection"/><category term="PHP CGI Exploit"/><category term="ProFTPD exploit"/><category term="ProFTPD remote"/><category term="Relax"/><category term="SQL Scanner"/><category term="SQLi Dumper v 5"/><category term="antimalware"/><category term="arp"/><category term="arpspoof"/><category term="bypass"/><category term="mitm"/><category term="network"/><category term="networking"/><category term="open_basedir bypass"/><category term="perl"/><category term="sniffer"/><category term="spy"/><category term="ssl"/><category term="sslsniff"/><category term="vBulletin 4.* Exploit"/><title type="text">FlashcRew - Ineternet And Computer Security Blog</title><subtitle type="html">FlashcRew is a Pentester Group and this blog is all about Pentesting and inner peace,This site mainly concentrates on Ethical hacking and Programming languages ,Exploits , VAPT, Vulnerability,Black Box, White box Testing and Malware analysis.</subtitle><link href="http://theflashcrew.blogspot.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>101</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-491743817015643642</id><published>2015-02-21T13:18:00.002+01:00</published><updated>2015-02-21T13:18:11.776+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="arp"/><category scheme="http://www.blogger.com/atom/ns#" term="arpspoof"/><category scheme="http://www.blogger.com/atom/ns#" term="bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="mitm"/><category scheme="http://www.blogger.com/atom/ns#" term="network"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="perl"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="sniffer"/><category scheme="http://www.blogger.com/atom/ns#" term="spy"/><category scheme="http://www.blogger.com/atom/ns#" term="ssl"/><category scheme="http://www.blogger.com/atom/ns#" term="sslsniff"/><category scheme="http://www.blogger.com/atom/ns#" term="vulenrability"/><title type="text">Juli - Perl MiTM Attack Script</title><summary type="text">

















A simple automated perl script for MiTM ( man-in-the-middle ) attacks.
Works on linux as a root user , combinied with sslstrip and arpspoof.
Idea of the script it's simply to spy traffic over your network connected devices.

The can be found on github&amp;nbsp; Juli
And this is the offical blog post of Juli Script</summary><link href="http://theflashcrew.blogspot.com/feeds/491743817015643642/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2015/02/juli-perl-mitm-attack-script.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/491743817015643642" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/491743817015643642" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2015/02/juli-perl-mitm-attack-script.html" rel="alternate" title="Juli - Perl MiTM Attack Script" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-8714676670885728026</id><published>2012-10-28T18:58:00.001+01:00</published><updated>2013-02-26T17:03:00.592+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="shell"/><title type="text">Alb0zZ Team Shell ░▒▓█►PRIV8 TILL NOW◄█▓▒░ ~ [Unique Features] [FREE] </title><summary type="text">By a frend, 0x0
-=-=-=-=-=-=-=-=

Some skids leaked download link so why dont i share myself

Author: 0x0


I would like to give credits to:
DevilzCode (perl symlink script)
Syrian Shell (ddos &amp;amp; zone-h)
x-h4ck (Cloudflare ip finder)

Features


3 login attemps
ready commands
execute command
create file
chmod file
file manager
view file
download
rename
delete
upload (choose dir)
turn off </summary><link href="http://theflashcrew.blogspot.com/feeds/8714676670885728026/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/10/alb0zz-team-shell-priv8-till-now-unique_28.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8714676670885728026" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8714676670885728026" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/10/alb0zz-team-shell-priv8-till-now-unique_28.html" rel="alternate" title="Alb0zZ Team Shell ░▒▓█►PRIV8 TILL NOW◄█▓▒░ ~ [Unique Features] [FREE] " type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-5490453276003642675</id><published>2012-10-02T03:14:00.000+02:00</published><updated>2012-10-02T04:00:36.916+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blind Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="BruteForce"/><category scheme="http://www.blogger.com/atom/ns#" term="Dorks"/><category scheme="http://www.blogger.com/atom/ns#" term="MsSQL Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="MySQL Dumper"/><category scheme="http://www.blogger.com/atom/ns#" term="MySQL Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Oracle Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="SQLi Dumper v 5"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerable sites"/><title type="text">SQLi Dumper v.5.0</title><summary type="text">SQLi Dumper - Advanced SQL Injection\Scanner Tool

Designed to be automated to find and exploit
&amp;nbsp;web security vulnerabilities in mass.It is robust,
&amp;nbsp;works in the background threads and is super faster.
Uses an advanced search engine with seven
&amp;nbsp;different online search services
(Google, Yandex, Bing, Yahoo, Sapo, Altavista and Terravista).






SQLi Dumper Features:
 -Suports Multi</summary><link href="http://theflashcrew.blogspot.com/feeds/5490453276003642675/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/10/sqli-dumper-v50.html#comment-form" rel="replies" title="6 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5490453276003642675" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5490453276003642675" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/10/sqli-dumper-v50.html" rel="alternate" title="SQLi Dumper v.5.0" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-5706073580113467277</id><published>2012-08-13T23:59:00.000+02:00</published><updated>2012-08-22T09:44:41.497+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BruteForce"/><category scheme="http://www.blogger.com/atom/ns#" term="Dorks"/><category scheme="http://www.blogger.com/atom/ns#" term="Droks"/><category scheme="http://www.blogger.com/atom/ns#" term="google vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="MySQL Dumper"/><category scheme="http://www.blogger.com/atom/ns#" term="MySQL Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Symlink"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerable sites"/><title type="text">MySQLi Dumper | SQLi Injection Tool</title><summary type="text">MySQLi Dumper is an advanced automated SQL Injection tool dedicated to SQL injection attacks on MySQL and MS SQL.
It is designed to be automated to find and exploit web security vulnerabilities in mass.
It Is robust, works in the background threads and is super faster.



The power of MySQLi Dumper that makes it different from similar tools:

-Suports Multi. Online search engine (to find the </summary><link href="http://theflashcrew.blogspot.com/feeds/5706073580113467277/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/08/mysqli-dumper-sqli-injection-tool.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5706073580113467277" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5706073580113467277" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/08/mysqli-dumper-sqli-injection-tool.html" rel="alternate" title="MySQLi Dumper | SQLi Injection Tool" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-2959872406265762575</id><published>2012-05-22T14:46:00.000+02:00</published><updated>2012-05-22T14:46:16.753+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="google vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Server Bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="Service"/><category scheme="http://www.blogger.com/atom/ns#" term="shell"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type="text">Server Bypass via Symlink - Jumping in server Part 2</title><summary type="text">Let's go with next method of symlink server bypassing , like u see and into before post now i will explain a new trick with an other tool. 
http://www.flashcrew.in/2012/05/server-bypass-via-symlink-jumping-in.html

-------------------------
Here we will talk about an other tool who use python permission to read other folders/ files in same server.
Tool called xplor.py and here it's the source


&amp;</summary><link href="http://theflashcrew.blogspot.com/feeds/2959872406265762575/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/server-bypass-via-symlink-jumping-in_22.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2959872406265762575" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2959872406265762575" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/server-bypass-via-symlink-jumping-in_22.html" rel="alternate" title="Server Bypass via Symlink - Jumping in server Part 2" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i39.tinypic.com/246mhci_th.jpg" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-196707452134366284</id><published>2012-05-22T14:25:00.000+02:00</published><updated>2012-05-22T14:32:15.659+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="google vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="open_basedir bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Server Bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="shell"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Symlink"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type="text">Server Bypass via Symlink - Jumping in server Part 1</title><summary type="text">As we all know, symlinking it's on of greates methods for bypassing server security, mean to read files of other site in same shared host.
For getting success with this tutorial are required the following things:

Python Installed on Server
b374k.php shell
And some scripts u will see below.

This idea have start from devilzc0de geeks and let me explain how it work. 


here we are in folder /var/</summary><link href="http://theflashcrew.blogspot.com/feeds/196707452134366284/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/server-bypass-via-symlink-jumping-in.html#comment-form" rel="replies" title="4 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/196707452134366284" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/196707452134366284" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/server-bypass-via-symlink-jumping-in.html" rel="alternate" title="Server Bypass via Symlink - Jumping in server Part 1" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i44.tinypic.com/fk1eyo_th.jpg" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-9030927728244606422</id><published>2012-05-21T15:00:00.002+02:00</published><updated>2012-05-21T15:01:07.833+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Music"/><category scheme="http://www.blogger.com/atom/ns#" term="Relax"/><title type="text">Time for relax, Armin van Buuren presents Gaia - J'ai Envie De Toi</title><summary type="text">Tell me who like trance music? Songs like this one can be used in replacment of drugs :p


Enjoy it with listening with MAX Volume</summary><link href="http://theflashcrew.blogspot.com/feeds/9030927728244606422/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/time-for-relax-armin-van-buuren.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/9030927728244606422" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/9030927728244606422" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/time-for-relax-armin-van-buuren.html" rel="alternate" title="Time for relax, Armin van Buuren presents Gaia - J'ai Envie De Toi" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-7708264873678321083</id><published>2012-05-21T14:33:00.000+02:00</published><updated>2012-05-21T14:33:22.434+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Crypter"/><category scheme="http://www.blogger.com/atom/ns#" term="File Crypt"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP Injection Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Pilot"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">Carbylamine - A PHP Script Encoder to 'Obfuscate/Encode' PHP Files</title><summary type="text">Carbylamine PHP Encoder is a PHP Encoder to 'Obfuscate/Encode' PHP File, Faster way to encode your malwares offline.



How to use:

carbylamine.php  
Download carbylamine 

Home project it's here

&amp;nbsp; </summary><link href="http://theflashcrew.blogspot.com/feeds/7708264873678321083/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/carbylamine-php-script-encoder-to.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7708264873678321083" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7708264873678321083" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/carbylamine-php-script-encoder-to.html" rel="alternate" title="Carbylamine - A PHP Script Encoder to 'Obfuscate/Encode' PHP Files" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhInarDAKhjvGHAU3OeNivRWuqG3PnUoPLrNw6rt9lYD49xt8eUT7JdRs96CIOu9A5xK3PJhesOlw3tHeU3ySlBhFMwxzcXKovEdzfJzTShUOkzMIazNxpPbF75RR5AMmkOyZmsmeLWciU/s72-c/box.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-2965251473231104184</id><published>2012-05-20T14:00:00.000+02:00</published><updated>2012-05-20T14:09:28.077+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Droks"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP Injection Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Pilot"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="vulenrability"/><title type="text">sqliChecker.py v.0.1</title><summary type="text">sqliChecker it's a mass list sqli vulnerabilty checker who detect vuln sites from a text file in multiple database types like Mysql, Mssql, Msaccess, Oracle. Automaticly remove duplicated sites.
Simple script and easy to use.
python sqliChecker.py vulnlistfile.txt



&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; 

#!/usr/bin/python
# This was written for educational purpose and pentest only. Use it at your own risk</summary><link href="http://theflashcrew.blogspot.com/feeds/2965251473231104184/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/sqlicheckerpy-v01.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2965251473231104184" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2965251473231104184" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/sqlicheckerpy-v01.html" rel="alternate" title="sqliChecker.py v.0.1" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglyxLYCWFxj1VT3Sfg06_WyPu0t0CUhFVhECVHMCMhFKskAUmYSLfjdd4S8FGgwQg565X_yJUlik0LcT6AcRJsFT3v-pcSRl3paNZuJ1WHlaDoKszfbEETXWF83ad9lxvCIPee_so_rJ0/s72-c/sqlichecker.JPG" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-936647400879936619</id><published>2012-05-08T06:01:00.000+02:00</published><updated>2012-05-08T06:01:37.073+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cve-2012-1823"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP CGI Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP Injection Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="remote root"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooting"/><title type="text">PHP CGI Argument Remote Exploit</title><summary type="text">This is a detailed discussion of the generic PHP-CGI remote code execution bug we found while playing Nullcon CTF. We found that giving
 the query string ‘?-s’ somehow resulted in the “-s” command line 
argument being passed to php, resulting in source code disclosure. We 
explored this bug further and managed to improve our exploit to remote 
code execution, and trace the bug to a PHP commit in </summary><link href="http://theflashcrew.blogspot.com/feeds/936647400879936619/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/php-cgi-argument-remote-exploit.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/936647400879936619" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/936647400879936619" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/05/php-cgi-argument-remote-exploit.html" rel="alternate" title="PHP CGI Argument Remote Exploit" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-3233899786533988882</id><published>2012-04-25T23:52:00.000+02:00</published><updated>2012-04-25T23:52:03.649+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="DLL Hijacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="rdp"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooting"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="vulenrability"/><title type="text">Using Metasploit Templates to Bypass AV</title><summary type="text">


&amp;nbsp;

&amp;nbsp;

Metasploit Templates
Metasploit creates executable files by encoding a payload and then 
inserting the payload into a template executable file. The templates are
 in the data/templates folder. Metasploit includes templates for 
Windows, Mac, and Linux, templates for x86, x86_64, and ARM, and a 
template for Windows services. If you look in the data/templates/src 
folder you </summary><link href="http://theflashcrew.blogspot.com/feeds/3233899786533988882/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/using-metasploit-templates-to-bypass-av.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/3233899786533988882" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/3233899786533988882" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/using-metasploit-templates-to-bypass-av.html" rel="alternate" title="Using Metasploit Templates to Bypass AV" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6pvtjaUtn95SSD4ooIyrleaXATyDn1oN6TVJ9c3Solj_crjBNmKOWq5eIbaZ88nEmklyUiQwIsfcD-0cprBjXGIpGNqvrG0XKoqR3kzgsBOqh_4Lm_gJIQuZzBwu99pGKpZ9nMBUrTHc/s72-c/metasploit-logo.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-5460122598515159490</id><published>2012-04-25T15:42:00.002+02:00</published><updated>2012-04-25T15:42:41.949+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberCrime"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Service"/><title type="text">Russian cybercrime market doubles in size</title><summary type="text">Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics lab and its CERT-GIB unit on the Russian cybercrime market in 2011.

The report outlines the main risks associated with various types of 
hacker activities, analyzes the main trends in the development of the 
Russian </summary><link href="http://theflashcrew.blogspot.com/feeds/5460122598515159490/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/russian-cybercrime-market-doubles-in.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5460122598515159490" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5460122598515159490" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/russian-cybercrime-market-doubles-in.html" rel="alternate" title="Russian cybercrime market doubles in size" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-6812505507533493807</id><published>2012-04-20T14:40:00.002+02:00</published><updated>2012-04-20T14:46:17.302+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Accounts"/><category scheme="http://www.blogger.com/atom/ns#" term="BruteForce"/><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Discutions"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="vulenrability"/><title type="text">Abusing Password Resets</title><summary type="text">This posts focuses on analyzing entropy and inline password resets, two 
major problems with forgot/reset password functionality. To do this, we 
have to automate both requesting a forgot password hundreds of times and
 parsing thru all of the e-mails we receive. Thanks to the recently 
added macro support now available in Burp (thanks PortSwigger), less 
effort is required on our part when an </summary><link href="http://theflashcrew.blogspot.com/feeds/6812505507533493807/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/abusing-password-resets.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/6812505507533493807" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/6812505507533493807" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/abusing-password-resets.html" rel="alternate" title="Abusing Password Resets" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJpmidJkcwfO5ZaBuSvPISxs-KJPuWO58oJFUFkC1D_v5Fs9WMiKCtnTCd1AlRGcJH2loUXTZYumGEuzWPW7M8FQIU3dR-METEl3FIV0MsEP2Y65Ywg6zcMKinX0yqZaIiPT7oazNyignp/s72-c/password_email.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-8745841803722934558</id><published>2012-04-16T15:37:00.003+02:00</published><updated>2012-04-16T15:41:53.108+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">Offset x Offset Undetector - A Virus/Malware/Spyware/Trojan Undetector Tool</title><summary type="text">



The aim of this tool is to find viral signature for your legal programs
like other programs that do this job you have to scan produced file and find the smallest range
features:
start/end offset (hex/decimal) : Header/Sections+EOF/ALL/User values
Random and Not filling
Unknown size method (beta) : (sign begin/sign end/ud byte)
scan with a command line AV
show undetected range(s) (double click</summary><link href="http://theflashcrew.blogspot.com/feeds/8745841803722934558/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/offset-x-offset-undetector.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8745841803722934558" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8745841803722934558" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/offset-x-offset-undetector.html" rel="alternate" title="Offset x Offset Undetector - A Virus/Malware/Spyware/Trojan Undetector Tool" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy4PzbseahOCU54pL2kXk082rduF7LUL1Q2eHhSDqBPMXFiJEIhHO5NnBzGG-79vkJzLl4LONOu5oz2VykIFSrBEyj9l3Yr5dX3LXJkKhU_eEpGI36HTn_ZtFPWJ1XuoKe7KuHkuxujJQ/s72-c/1.png" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-1687632036111183854</id><published>2012-04-13T00:20:00.001+02:00</published><updated>2012-04-13T00:27:32.055+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Accounts"/><category scheme="http://www.blogger.com/atom/ns#" term="BruteForce"/><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><title type="text">rdpScan Network Checker</title><summary type="text">This is a simple script that leverages nmap to scan for RDP-Server.


#!/bin/bash
#
# rdpScan - scan a network segment for RDP-Server          
# author: silverstoneblue@gmx.net 
# requires:  fgrep awk nmap

scriptname="rdpScan"
version="1.0"
rdpips="/tmp/tmprdp.$$"

declare -i rdpfound=0

function is_installed {
  which $1 &amp;gt; /dev/null 2&amp;gt;&amp;amp;1
  if [ $? -ne 0 ]
  then
    printf "\nERROR: </summary><link href="http://theflashcrew.blogspot.com/feeds/1687632036111183854/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/rdpscan-network-checker.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/1687632036111183854" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/1687632036111183854" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/rdpscan-network-checker.html" rel="alternate" title="rdpScan Network Checker" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-2141936014157535273</id><published>2012-04-13T00:09:00.000+02:00</published><updated>2012-04-13T00:12:59.870+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Droks"/><category scheme="http://www.blogger.com/atom/ns#" term="Exposed"/><category scheme="http://www.blogger.com/atom/ns#" term="google vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="local exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Dark D0rk3r 0.7</title><summary type="text">Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.





#!/usr/bin/python
# This was written for educational purpose and pentest only. Use it at your own risk.
# Author will be not responsible for any damage!
# !!! Special greetz for my friend sinner_01 !!!
# Toolname        : darkd0rk3r.py
# Coder           : baltazar a.k.a</summary><link href="http://theflashcrew.blogspot.com/feeds/2141936014157535273/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/dark-d0rk3r-07.html#comment-form" rel="replies" title="7 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2141936014157535273" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2141936014157535273" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/dark-d0rk3r-07.html" rel="alternate" title="Dark D0rk3r 0.7" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk8J8yKq3fbCzEx7L6jjlbXWSs2GHUWTU-56Hla1BgahCHMJ0OkK-Uk7q-LeVN_Xnlzkor9nUW80BKv6QIQL-axsVrVMg9An8JWcIP_FbSRlnc_TBAxKPKAXXhDD3IUHmP4AHQTb44TXw/s72-c/google_hack1.jpg" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-5765321371069658502</id><published>2012-04-02T19:29:00.000+02:00</published><updated>2012-04-02T19:29:16.714+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Droks"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="google vulenrability"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">GooDork – Google Dorking Tool</title><summary type="text">GooDork is a simple python script designed to allow you to leverage the power of Google Dorking straight from the comfort of your command line.&amp;nbsp;



GooDork offers powerful use of Google’s search directives, by analyzing results from searches using regular expressions that you supply. So basically the purpose of GooDork is to combined Dorking with Regular Expressions.





GooDork allows you </summary><link href="http://theflashcrew.blogspot.com/feeds/5765321371069658502/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/goodork-google-dorking-tool.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5765321371069658502" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/5765321371069658502" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/04/goodork-google-dorking-tool.html" rel="alternate" title="GooDork – Google Dorking Tool" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJEHXQFzKgK36UNQkiCksTFwx4yJ6BLPJnPSYb-RFidCf-pItPQ9fD62rrNaoQZz7IJLiAlThWMIQIlUeROYnA5aNkKg9MlwPuC_QaT_o2AnX-XeS_HMrZH-Hlc0LICcQEqQzZUCA6P-4/s72-c/242607_dork2.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-7508959963358917346</id><published>2012-03-16T18:34:00.003+01:00</published><updated>2012-03-17T00:35:36.282+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type="text">Shutdown PC from cell phone ( thunderbird email )</title><summary type="text">Here u will learn a nice tric to shutdown your Windows PC with a text message.
With an add-on and a few tweaks, it is possible configure this, with a portable copy of Mozilla Thunderbird.  
This should take &amp;lt; 10 minutes to set up and configure.



Step 1 - Get thunderbird portable

Download a copy of portable thunderbird:
http://portableapps.com/apps/internet/thunderbird_portable
and extract </summary><link href="http://theflashcrew.blogspot.com/feeds/7508959963358917346/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/03/shutdown-windows-with-text-message.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7508959963358917346" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7508959963358917346" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/03/shutdown-windows-with-text-message.html" rel="alternate" title="Shutdown PC from cell phone ( thunderbird email )" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAF2pLF8WT0IO2-v8IvzqfydTZyrKSdVh2wvmd305EYrqSwHQ8F2WPfoecCq0ixPBFuP-exHHZ9ahxrrWWlfqPrLSz5HYmuKaGPY0CIXqwlThV2sEwGEkF6TL6Fzp46oQ1w9jBdzoRcUE/s72-c/thunderbird.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-6975191133017049335</id><published>2012-03-09T19:47:00.000+01:00</published><updated>2012-05-26T21:23:53.154+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injections"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">Havij 1.52 Pro ~ SQL Injection Tool</title><summary type="text">








Here it's the last cracked app from Exidous, Havij 1.52 Pro . Now will work with more and more sites ..
Register it on name: Cracked@By.Exidous

Links Updatet, Now Work 100% :)
Download
http://www.sendspace.com/file/m4hqia
Lic file
http://www.sendspace.com/file/r5ifpoOCX Files
http://www.sendspace.com/file/gwl2cd

Thanks to Exidous :)</summary><link href="http://theflashcrew.blogspot.com/feeds/6975191133017049335/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/03/havij-152-pro-fucked-up-by-exidous.html#comment-form" rel="replies" title="16 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/6975191133017049335" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/6975191133017049335" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/03/havij-152-pro-fucked-up-by-exidous.html" rel="alternate" title="Havij 1.52 Pro ~ SQL Injection Tool" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>16</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-8583461416194355263</id><published>2012-02-16T20:27:00.000+01:00</published><updated>2012-02-16T20:27:51.760+01:00</updated><title type="text">mywisdom blog: bypass disable php function, disable cgi python, c...</title><summary type="text">mywisdom blog: bypass disable php function, disable cgi python, c...: bypass disable function, disable cgi python, cgi perl di target dg cgi bin   by: ev1lut10n   yup kali ini akan kita mainkan salah satu dari ...</summary><link href="http://theflashcrew.blogspot.com/feeds/8583461416194355263/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/02/mywisdom-blog-bypass-disable-php.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8583461416194355263" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8583461416194355263" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/02/mywisdom-blog-bypass-disable-php.html" rel="alternate" title="mywisdom blog: bypass disable php function, disable cgi python, c..." type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-2046299182097922477</id><published>2012-02-16T20:25:00.000+01:00</published><updated>2012-02-16T20:25:46.611+01:00</updated><title type="text">Armin Van Buuren - Mirage</title><summary type="text">
Armin Van Buuren - Mirage</summary><link href="http://theflashcrew.blogspot.com/feeds/2046299182097922477/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/02/armin-van-buuren-mirage.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2046299182097922477" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/2046299182097922477" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2012/02/armin-van-buuren-mirage.html" rel="alternate" title="Armin Van Buuren - Mirage" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-7311901339084493677</id><published>2011-12-22T15:34:00.001+01:00</published><updated>2011-12-25T03:46:16.163+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Discutions"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="FlashcRew"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><title type="text">Follow FlashcRew</title><summary type="text">Com and get easy our news in the biggiest social communtys

Follow us on Facebook and Google+
http://www.facebook.com/TheFlashcRew

https://plus.google.com/b/115907849457010508518/</summary><link href="http://theflashcrew.blogspot.com/feeds/7311901339084493677/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/followe-flashcrew.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7311901339084493677" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7311901339084493677" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/followe-flashcrew.html" rel="alternate" title="Follow FlashcRew" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-7285391915280900273</id><published>2011-12-21T18:40:00.003+01:00</published><updated>2011-12-21T18:49:45.434+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Discutions"/><category scheme="http://www.blogger.com/atom/ns#" term="Phreaking"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><title type="text">Social Engineering via Phone to get Admin.</title><summary type="text">Phone Verify / Social Engineering via Phone to get Admin.
----------------------------------------------

Ok.. Simple tutorial..its hardly a tutorial.

This is just to people that don't understand what a Phone Verify is.

When you card a shop they sometimes call to verify the order and ask some details about the order and maybe some card details.


How do we do this..

Well there are 2 ways..1 </summary><link href="http://theflashcrew.blogspot.com/feeds/7285391915280900273/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/social-engineering-via-phone-to-get.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7285391915280900273" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/7285391915280900273" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/social-engineering-via-phone-to-get.html" rel="alternate" title="Social Engineering via Phone to get Admin." type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-8491799643129112771</id><published>2011-12-21T18:39:00.001+01:00</published><updated>2011-12-21T18:50:03.397+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Discutions"/><category scheme="http://www.blogger.com/atom/ns#" term="Phreaking"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type="text">Spoofing Caller ID</title><summary type="text">What Is Spoofing Caller ID?

Caller ID spoofing is the practice of causing the phone network to display a number on the recipient's caller ID display/phone display which is not that of the actual originating station.

Just like email spoofing you can set a spoofed email that will be sent to a victim ; example: billgates@microsoft.com. But instead of email this is the Phone Network caller ID </summary><link href="http://theflashcrew.blogspot.com/feeds/8491799643129112771/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/spoofing-caller-id.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8491799643129112771" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8491799643129112771" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/spoofing-caller-id.html" rel="alternate" title="Spoofing Caller ID" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4949655047717502415.post-8420531861682391795</id><published>2011-12-20T22:19:00.000+01:00</published><updated>2011-12-20T22:19:57.650+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Accounts"/><category scheme="http://www.blogger.com/atom/ns#" term="BruteForce"/><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="rdp"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">RDP Scanning &amp; Cracking</title><summary type="text">

DISCLAIMER
All information provided are for educational purposes only. It is not an  endorsement to undertake hacking activity in any form (unless such  activity is authorized). Tools and techniques demonstrated may be  potential damaging if used inappropriately. All characters and data  written on this post are fictitious.
The Remote Desktop Protocol is often  underestimated as a possible way </summary><link href="http://theflashcrew.blogspot.com/feeds/8420531861682391795/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/rdp-scanning-cracking.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8420531861682391795" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4949655047717502415/posts/default/8420531861682391795" rel="self" type="application/atom+xml"/><link href="http://theflashcrew.blogspot.com/2011/12/rdp-scanning-cracking.html" rel="alternate" title="RDP Scanning &amp; Cracking" type="text/html"/><author><name>FlashcRew</name><uri>http://www.blogger.com/profile/04773187724752257936</uri><email>noreply@blogger.com</email><gd:image height="24" rel="http://schemas.google.com/g/2005#thumbnail" src="//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyqX2hZQ2m6H7uEEhvH8SwsudfgcOe5wDSLeMcqLLrW0Jknf1Jjm1CGoz23XQNQUImcKmng4ecvFAIKs68Ku3MZBU4oj0mw3JFOvkcUFGEKpmS0cX6C0MxUQcIZy8TP1c/s220/images.jpeg" width="32"/></author><thr:total>0</thr:total></entry></feed>