Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About Broti

  • Rank
    :(){ :|:& };:
  • Birthday 10/30/1986

Profile Information

  • Gender
  • Location
  • Interests
    8 Bit, IT-Security, Music, Coding, Reverse Engineering, Cryptography

Recent Profile Visitors

2,305 profile views
  1. Not exactly a bank, but still interesting: https://www.youtube.com/watch?v=pL9q2lOZ1Fw
  2. Sometimes I can understand why we still use pen and paper instead of insecure voting machines :D
  3. The encoder (online & offline) has an option to compile the payload for a specific keyboard layout.
  4. You mean the "Disc Label" of the ISO? There's no need for that, if you're writing the file to USB.
  5. I read an article about this project on Hackaday this morning. Always fun to see those DIY projects emerge ?
  6. I have a similar setup here - just vice versa: German OS, UK keyboard. And the Ducky works fine. Is there a certain part that won't work or the whole script? Maybe post it here so we can check it
  7. What exactly do you mean? Are the installed Operating systems in English? Was genau meinst du? Sind die Betriebssysteme auf englisch?
  8. And there's always the possibility the cryptor itself gets flagged by AV
  9. Have you checked the logs for anything suspicious? Is the system reachable from somewhere outside its LAN? By the way, which OS exactly?
  10. It generates the text-file android_brute-force_0000-9999.txt which you have to encode. The script you posted has to be executed in a shell
  11. I know It's only for the android-based access code option.
  12. This method won't work on my Android phone. It's set to use the Sim-pin, so 3 wrong tries and you'll need the PUK (aka. SuperPIN) But I have it saved locally in case I get the chance to use it.
  13. I guess that's why @Darren Kitchen added sleep 5 right after NETMODE NAT
  14. Broti

    Blizzard games

    Starcraft + Broodwar Diablo 2 + Lord of Destruction
  • Create New...