what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files

uniqueid-0.5.0.tar.gz
Posted Feb 3, 2004
Authored by Alan De Smet | Site highprogrammer.com

Unique ID is a Perl CGI that calculates and reverse engineers driver's license numbers. Given your name, birthday and gender, it will tell you your license number. Given the number it will tell you your birthday, gender, and take educated guesses at your name. It currently supports Florida, Illinois, Maryland, Michigan, Minnesota, New Hampshire, Washington, and Wisconsin. It's likely that similar systems are used in other states.

Changes: Added encoder and decoder for Machine Readable Zone on Machine Readable Passports. Added encoder for New York State (Pre September 1992 only). Refined radio options, they can now have labels. Long radio options are now implemented as drop lists.
tags | cgi, perl
SHA-256 | 7f0cd9881734d0c362a66865179a6c3cdc62c650b649fdf4747da591e15ad243
uniqueid-0.4.2.tar.gz
Posted Jan 8, 2004
Authored by Alan De Smet | Site highprogrammer.com

Unique ID is a Perl CGI that calculates and reverse engineers driver's license numbers. Given your name, birthday and gender, it will tell you your license number. Given the number it will tell you your birthday, gender, and take educated guesses at your name. It currently supports Florida, Illinois, Maryland, Michigan, Minnesota, New Hampshire, Washington, and Wisconsin. It's likely that similar systems are used in other states.

tags | cgi, perl
SHA-256 | bca4b7f1f575c5f4794346bc1f17461fc8a0978a5b9153f722045999b9748b08
psibrute.com.txt
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.

systems | vax
SHA-256 | b300bdc9bf7a8a50ee833fcd7c6502f1b542165feca28c88b135ae16d0afbccb
d7-awu260.c
Posted Jun 10, 2002
Authored by Smurfy

WuFTPd 2.6.0 Mass Rooter. Exploit code used from wu260 exploit by God- of efnet.

SHA-256 | c3782f9af2c3a26d2718ae45ef915b943c9f7346b0fafd73c5d57d99e2becc3b
incognitomail2.c
Posted Apr 24, 2000
Authored by Chandler

incognitomail2.c sends fake mail using a wingate proxy to obscure the true origin of the message.

SHA-256 | 2db83f0aa98b6e3f8d8a8da4354b8fb4d3e12832b720864635806f9cb449ef61
gr2k.zip
Posted Apr 20, 2000
Authored by psico nauta

Getting r00t 2k. A hacking guide for newbies that is completely written in Spanish. This has been created as a knowledge base for an understanding of hacking in South America and Spain as knowledge of hacking has gained more importance in these areas.

SHA-256 | 1773578b04e321244b6e66f4d60c103506061359e9e02c2945bfe8b49ffb063a
OS2HKS.ZIP
Posted Apr 20, 2000
Authored by Johnny Cyberpunk

OS/2 suite of hacking tools - dnsscan scans a range of ip's for presents and resolves hostname, tcpscan is a classical connect() scanner for TCP service ports, udpscan scans UDP service ports, nbping Netbios information gathering tool, rhs, an os/2 trojan, epwrna is a portmapper service daemon, and rnc is the client for the trojan.

tags | udp, trojan, tcp
SHA-256 | 3250b4a3bdd558904de809b765769a243ce5de6535df2a5edd0393d7a5bc0da1
pro-lite.zip
Posted Dec 8, 1999
Authored by Term | Site islandnet.com

Pro-lite is a database for the OmniRemote palm pilot program which allows you to reprogram Pro-Lite brands of LED signs.

SHA-256 | 1b6b30e4b8f7f6ad7d9045b28be15a381647f5343e50745cdf661dc543572754
walker.c
Posted Oct 26, 1999
Authored by m0f0

Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.

SHA-256 | 165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
jan99ddk-ecd.lsm
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | 0d700395d92b4b5e1213978ca8b685784e60be3dd8f42aa0954001ca70b0701d
jan99ddk.zip
Posted Aug 17, 1999

Electronic Civil Disobedience Disturbance Developer's Kit - Java-based Electronic Civil Disobedience Virtual Sit-in website creation kit and instructions for customizing those files for your own ECD action. Basically, this kit helps you to mass flood a target, and all you have to do is make a public call for participation in a tactical strike, leave your browser open while the target page is reloaded every few seconds. The intent is to disrupt access to the targeted site by flooding the host server with requests. In doing so, attention is drawn to a particular political issue, without hacking the website, according to ECD. Check out the Electronic Civil Disobedience web site for details.

tags | java, web
SHA-256 | 82c218e9a83f160e20ec3a93c1666093172cd2fcfa0da1a657ae1243c2413259
Mrip250.zip
Posted Aug 17, 1999

Multi Ripper v2.5. Multi-purpose File Ripper, rips over 100 file formats, 20 libraries. Win16/Win32 Resource Decompiler.

systems | windows
SHA-256 | 627c80234cb7d6585e4f2ca70935624da09d95531266b4d6350cd19a058c128b
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close