Jump to content

DingleBerries

Dedicated Members
  • Posts

    1,291
  • Joined

  • Last visited

Posts posted by DingleBerries

  1. I enjoy all of this as much as the next person, but there are some flaws to this. After I enter my login creds is it going to connect to to Live and allow me to chat with others using the same gui as the original? If not is there a way to take those chars and open real like to log me in? Just like the Y! webcam code that made all buttons accept, cant find the sauce atm, you can place a window in front to the real app and just capture that.

    I came off a bit rude in my first post but if all it does is displays a gui and prints chars to a file then any one can do that.

  2. I have been playing with a few proxies here and there, and have found some that used to work but now do not. I have to put this project on the backburner for now but if any one decides to pick it up let me know and I will help any way i know how. Until then VM+Windows+ZigZagJoes application is the best.

  3. Can you also make a gui in vb to track my IP? Seems like you have a bad reputation in other forums as well

    http://www.blackhat-forums.com/index.php?showtopic=8720

    Im not saying what you do is a bad thing, but this just isnt the place for this kind of tool. There are already 100000 skiddies here and this is just adding to them. If anything I would try hackforums or advertise better on youtube, and then again you can always torrent it.

  4. Also I would imagine that even if you encrypted some files and had a way to open them, the iphone takes screen shots all the time. All some one would have to do is find the screen shot and there would be no need in cracking a file. Until apple says, here ya go guys do what you will, you should just keep your phone in sight at all times. Plus sensitive information shouldnt be kept on a phone in the first place.

  5. The second link is just a bandwidth shaping tool and I cannot give reviews on any of that, since i havent used it. I can try the third one, which imo is the easiest solution. Just give him the exe and a bat file. Have that bat file create 2 new bat files then add a cron job... is it cron in windows?

  6. I have coded a bat file to kill most popular anti viruses kills firewall and updates and other goodies it undetectable but totally not stealth and is in still beta i think that it would be a perfect addition to Ape. Comments, problems and i hope it will get patched into Ape :lol:

    I call it AVKILLA

    Unless your name is Codine and you are from the hakforums and you wrote that in 2007 then you didnt code that.

    PROOF

    Forum topic

    Posted by wohawsnng 01-14-08

    Please give credit where credit is due.

  7. Not very mush by the looks of them, all they can do is travel in a straight line. Get a cheap rc car, lower the voltage, hot glue the front so it travels in a straight line, 10$ tween bot... then you hope no one steals it.

  8. Thank you ZigZagJoe and Xqtftqx. I think your way is alot easier Xqtftqx, so I will be doing that instead of a portable firefox. So now the plan is to copy songs from /tmp, grab xml data, use python xml phaser to add the meta data... wow that was made things 10x easier.

    So this is what I have so far.

    (Ubuntu 8.10)

    1. Clear /tmp files

    2. Copy /tmp files to ~/Desktop/PandoraRipper/Music

    #!/bin/bash
    while [ 1 ]
    do
       cp -p -b /tmp/Flash* ~/Desktop/PandoraRipper/Music
    done

    3. Put this script in the Music directory

    #!/bin/bash
    rm Flash*~
    for f in Flash*; do mv $f `basename $f `.m4a; done;

    This is just for now, until I can find away of not using a proxy with ff. Next step will be automating Picard(DIRECT DOWNLOAD) to tag the m4a files and using something like Prism to launch pandora.

  9. Not a problem. I didn't want to get to malicious with it, but there are alot of things that can be added; spreading, irc/icq commands, p2p, knocking out firefalls ect. It really is the base of a python bot net :P, but thats not my cup o' tea.

  10. I enjoy plausible deniability! Thats why I use WEP! Also if some one wants to steal wireless I know that they will find a way so my key is 1234567890.

    But in all seriousness the wireless connections are compartmentalized from the rest of the network.

    Plausible deniability will not work if the court can prove that you had the know how, but neglected to take the proper actions to secure you access point. Also they will probably find this post in your history/log, or at least link you to this account, and say, "fuck off, you dled that child porno". Trust me, people use that excuse all the time.

×
×
  • Create New...