exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Raven

Email addressraven at tgs-security.com
First Active1999-10-25
Last Active2005-03-03
HRG009.txt
Posted Mar 3, 2005
Authored by Raven | Site Hackerlounge.com

A flaw in PBLang 4.63 allows logged in users to delete another user's PM.

tags | exploit
SHA-256 | 5e3cc7c61d07865ddffc43e6b349a3f23d299a4419ae5e573404fb52b77c58d5
HRG008.txt
Posted Mar 3, 2005
Authored by Raven | Site Hackerlounge.com

sendpm.php in PBLang 4.63 allows logged in users to view password hashes of other users.

tags | exploit, php
SHA-256 | ebc77ac7b1bdabadb4c6d15fc2692a10091e6e66b2dc34a73e59a490349604cc
HRG007.txt
Posted Mar 3, 2005
Authored by Raven | Site Hackerlounge.com

The profile.php script in 427BB is susceptible to cross site scripting and remote command execution flaws.

tags | exploit, remote, php, xss
SHA-256 | 609a0dcb3fac72bf68ee3de64dc308e763c54ad82f66729d53d627c903561439
HRG006.txt
Posted Mar 3, 2005
Authored by Raven | Site Hackerlounge.com

The profile.php script in 427BB is susceptible to cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 4e9b2a108ce0209eee52a787a7d44753ccb13dd0893f2c24c26f69b5cac98cce
HRG005.txt
Posted Mar 3, 2005
Authored by Raven | Site Hackerlounge.com

The search.php script in Forumwa is susceptible to cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 6911e2b42224dba3a55f9e2c2d8696ec1a86792045002b7986a1b2a090c0c163
acros.txt
Posted Feb 3, 2000
Authored by Raven | Site blacksun.box.sk

CaIRA: Computer and Internet-Related Acronyms. 1,725 acronyms and abbreviations with definitions and explanations. Includes a listing of all internet country abbreviations.

tags | paper
SHA-256 | 83ac0240a4fcd64c7877890aa47e1f4dafd74408abdf40036d78a987d242cb4b
icq.txt
Posted Jan 7, 2000
Authored by Raven | Site blacksun.box.sk

ICQ Security Tutorial, version 1.5 - Includes information on bombing, flooding, hijacking, spoofing, getting the ICQ password, gaining access through ICQ webpages, getting IPs and ports, getting information about other ICQ users, adding users without their authorization nor without sending them a "you've been added" message, learning and playing with the ICQ protocol and what not. EVERYTHING you need to know about ICQ security.

tags | spoof, protocol
SHA-256 | 330cffc80092dcd2786857c3dcbe17eeb5d624dd5a48add6aab38b67704d739a
trojans.txt
Posted Dec 8, 1999
Authored by Raven, tHe mAniAc

Trojans: what they are, different kinds of trojans (RATs, keyloggers, password trojans etc') for Unix and Windows, how to look out for trojans and defeat them etc'. Everything you always wanted to know about trojans but were afraid to ask (in fear of appearing to be lame).

tags | paper, trojan, virus
systems | windows, unix
SHA-256 | 35cd278dc8708c046f0ccb7340296c5676e446468e162fa3226e24714507ea84
caching.html
Posted Dec 2, 1999
Authored by Raven | Site blacksun.box.sk

Speeding Up Your Internet Connection using DNS Caching under Unix and Windows: everything you've always wanted to know about DNS caching but were afraid to ask.

tags | paper
systems | windows, unix
SHA-256 | 68e339cb0b62929ec6a1e6f0bca1896fd0fa6920a1475c05ac6a0430e116b8b7
unixsec.txt
Posted Nov 22, 1999
Authored by Raven

A tutorial for a Unix newbie or semi-newbie who is interested in computer security and/or networking. Basic Local/Remote Unix Security: Change default configurations, basic packet filtering, how to secure your system's networking services (or completely remove them or some of them, in case you don't need them, in order to increate your computer's security), how to use, how to avoid trojans, what are sniffers, how to maintain local security between different users in your system (if you're not the only one using this system, whether it's locally or remotely), some stuff about SSH, how to protect yourself against computer viruses under the Unix system, what are security scanners and how to use them, why you should encrypt your important data and how etc'.

tags | paper, remote, local, trojan
systems | unix
SHA-256 | 752f8d456cd2997c648ad6a15e70646527e51406f91a4e955ca9031248eac546
pgp.txt
Posted Nov 17, 1999
Authored by Raven

Don't know anything about PGP? Wanna know what is it good for? How to use it? What are the advantages of encrypting your files and your Email? How PGP works? Why is it so hard to crack? Want a simple tutorial to teach you all this? Then go for this one! Simple, easy to understand and relatively small.

tags | paper
SHA-256 | 4463f8f5e7bbb27c5b104cb8b41cfd2dd3abc45de190a40487ed476b83466913
rmtoolkit.zip
Posted Oct 25, 1999
Authored by Raven | Site blacksun.box.sk

Gives you access to the registry, dos, display properties etc' (control panel too in the next version). Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, registry
SHA-256 | c0e7602f9f22d7569c787cf797f50f6eaed01dba30d5b509ba3d1ea16f6564b9
nemesis11.zip
Posted Oct 25, 1999
Authored by Raven | Site blacksun.box.sk

Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).

tags | remote, local, trojan
systems | windows
SHA-256 | 5c15520fefd5605f5657f5a949af8ad6ed654a62e971f0b206e27b9b80e8e7c6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close