what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 117 RSS Feed

9x

9x

The 9x group has been around since 1995. Since their arrival into the hacking and phreaking scene, scores of articles, programs, and wardialling scans have been made available. They are definitely worth checking out.

9x_uksw.zip
Posted May 7, 2000
Authored by 9x

UK Switching Systems & line tests

SHA-256 | 2bf9bab84048873e28d3c3bd4a5b80456387439a98584bca0da70d799754bc88
9x_ukpg.zip
Posted May 7, 2000
Authored by 9x

Intermediate UK Phreakers guide

SHA-256 | 80a2a16882e45bdba4fbe723c9f84ca8b4a2fab89b6235c60cb1785e0f9d10c6
9x_tom8k.zip
Posted May 7, 2000
Authored by 9x

Time O Matic's system 8000

SHA-256 | a2979d6c55e0f7d6cd7e177630ec182deee03fe99338cea5c770c30c73c22973
9x_tel.zip
Posted May 7, 2000
Authored by 9x

Telecom. system and structures

SHA-256 | 3fbe69f89056bd56b254084ca04f6a6637e260b07352e729bead8f443093e72c
9x_swtch.zip
Posted May 7, 2000
Authored by 9x

BT network admin spt systems development

SHA-256 | de965a674bf305d20435815d1fcf47e5453f38b6ccca48f9b7627caacc31f32d
9x_swr8.zip
Posted May 7, 2000
Authored by 9x

Switched route of tf setup networks

SHA-256 | c20699a8a2224d2e26ed76117134ee754dd94b06d6f5943cb6d53c91281ecf8e
9x_swbtd.zip
Posted May 7, 2000
Authored by 9x

South Western Bell codes

SHA-256 | 374c26a38be9858984b04bbebb1661619005887f36c5777668347d07bfedf211
9x_style.zip
Posted May 7, 2000
Authored by 9x

Local vs. Net hacking

tags | local
SHA-256 | 94a451f5ab5b16859f1fcf5d7d776e5a28b0e4063678a808163965cd20ceec36
9x_stm.zip
Posted May 7, 2000
Authored by 9x

Skytel Command Refernce Chart

SHA-256 | 97b7411d3905ed2f737753fcc301c21c3ad01af88b0bba6fc84fce0b9b63fd4e
9x_sky.zip
Posted May 7, 2000
Authored by 9x

hacking skytel pager VMBs

SHA-256 | 8c3c514dd2617ee600dd7153adb4abdebe7f3644d8006c650c591c2e54e2de9c
9x_sid2.zip
Posted May 7, 2000
Authored by 9x

More info on SecurID

SHA-256 | 4aedc8f7cac3b5a000adf223ff8494ca855fecb31e89a439bb8db8cf01528a33
9x_sid1.zip
Posted May 7, 2000
Authored by 9x

Inpho on SecurID

SHA-256 | 67704e3d45802e175b755dd5e6008f493cc924b1693d0315d794472d810f5da5
9x_sid.zip
Posted May 7, 2000
Authored by 9x

Cellular System ID List

SHA-256 | db565d05192549b02b3274a3f557d96d76020375edcb4ef0eb5cf6283e1babb4
9x_sglng.zip
Posted May 7, 2000
Authored by 9x

Info on Signalling

SHA-256 | 2e81cd211c6a789aebfdb9fc120ce991d6601cb3d0eb5502d35f5028393faac4
9x_secid.zip
Posted May 7, 2000
Authored by 9x

SecurID All Over

SHA-256 | b0a4f0ba2a083c3c05b2c3f24c9dfec513250e248f7abaa9f3e82a3a86e12c61
9x_scntp.zip
Posted May 7, 2000
Authored by 9x

Exploring UK Prefix assignment

SHA-256 | 7cc16485a4eb7e51a0b0d4f033210c76588e9215cbb398a848ff9bc0e04ee4eb
9x_sat1.zip
Posted May 7, 2000
Authored by 9x

Satellite communications

SHA-256 | 989a61d7ad0d278cf386bfb8693cc106fbd730c0a352700bfd587999be50e145
9x_rolm2.zip
Posted May 7, 2000
Authored by 9x

Followup to hacking PMs

SHA-256 | 0f7dd0156bcd4e773a334d492123be0d10e511b71fa915d0b3e271b5a10970c8
9x_rolm1.zip
Posted May 7, 2000
Authored by 9x

Hacking Rolm PhoneMail

SHA-256 | dfaf7192043771ba52a4dcaf1ee0cb305bc4cdcda161e92d20ed3641b1da8b48
9x_rlmpm.zip
Posted May 7, 2000
Authored by 9x

Some information on ROLM PhoneMail systems

SHA-256 | 04b060cb77710a9183eab875121931ef763643a8d05642e59b83f7fbc8d16ac8
9x_relay.zip
Posted May 7, 2000
Authored by 9x

TTYs/TTDs and Relay service

SHA-256 | 39ea5851ae060faad99fc28ce8f805ba232edf81ee6be2b3c7756e9b9596480a
9x_rboc.zip
Posted May 7, 2000
Authored by 9x

dialups to most telco PSNs

SHA-256 | 878b323bdfc3bed0fc23d8ad8a8351f8c5b24c9ab851d114a14bfd816bfe4f57
9x_psx1.zip
Posted May 7, 2000
Authored by 9x

Playstation game development

SHA-256 | 6f3e9b79c2489b646d92977a990b08c6d88e948fde64c28875dce0560cd75bb7
9x_pcs.zip
Posted May 7, 2000
Authored by 9x

why pcs phones cant be cloned

SHA-256 | 650559f3bc6c73844dc848d3c242aa1be2df1f4158d1a35233b7ffaee0a769b0
9x_pbxs.zip
Posted May 7, 2000
Authored by 9x

The PBX: History and hacking

SHA-256 | 753391f9ddde83bec783fbdc0f456b0dd25ae7f5900d10f9e9a565009a6e2b83
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close