by admin
Thursday, November 15th, 2012 at 4:50 pm
VMInjector is a tool designed to bypass OS login authentication screens of major operating systems running on VMware Workstation/Player, by using direct memory manipulation it can be used if the password of a virtual host is forgotten and requires reset. VMInjector can currently bypass locked Windows, Ubuntu and Mac OS X operation systems (x32 & x64).
You can grab a copy ::HERE::

by admin
Thursday, November 8th, 2012 at 3:45 pm
Sorry for the downtime, had some noobs trying to own the site, finding that they couldn’t do shit but ddos the site. So we switched to a better server and fixed a few things. Better luck next time clowns.
by admin
Sunday, September 9th, 2012 at 1:26 pm
Explains how you can from a SQL injection gain access to the administration console, where you can then run commands on the system. From fingerprinting to injection, to cracking the md5 passwords, to writing a phpshell, where you can easily run commands.
src: pentesterlab.com
by admin
Sunday, August 26th, 2012 at 11:15 pm
@ponez released his POC code for the MS12-042 flaw on his website

You can snag the POC source and exe ::HERE::
by admin
Wednesday, March 21st, 2012 at 12:55 pm
Just a little tool that will BSOD a machine vulnerable to MS12-020. Tested on XP sp3 & Win2k3 Sp2. Download ::HERE::
by admin
Sunday, March 18th, 2012 at 11:21 am
perl script can be used to unlock apache tomcat servers
remotely by using the collected login combinations.
Tt will retrieve either a ROOT or SYSTEM reverse shell depending on the operating system. More info
by admin
Sunday, March 18th, 2012 at 11:19 am
Dumps login cleartext passwords stored by Windows Digest Auth pkg. Download it ::HERE::
by admin
Wednesday, February 8th, 2012 at 10:47 am
This is a program illwill made in assembly that does a reverse Caller ID lookup. Just type or paste the number in the box and press ‘lookup’, if it finds any data it’ll display it on the screen above. Works with some cell phone numbers too. 
Download it ::HERE::
by admin
Tuesday, January 24th, 2012 at 11:09 am
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is using WPS then your router may be spit back your password in plain-text to the attacker in less than 10 hrs. 
by admin
Sunday, October 16th, 2011 at 6:42 pm
Added a program I made a few years ago that simulates phone box tones
(DTMF, Blue, red,orange,silver,etc…)
Download it our ::files section::
