VK_Stealth.bas

VK_Stealth.bas

  'Name: Voltron Kru Stealth Bas 'File: VK_Stealth.bas 'Released: 11-19-99 'Authors: The Voltron Kru 'Originaly Coded: 2-26-99 ' 'Purpose: To hide a program from the alt-ctrl-del menu ' hiding it from the average user while it is ' running. ' 'Disclamer: This is a bas file that I never wanted to ' release. The power of the next few lines has the ' power to.....

Stealth Proxy


Stealth Proxy for Windows 95/98/NT/2000
—————————————

OK. Neccesity is the mother of invention and this was something I needed a while back and finally got around to making. Basically, it’s a SOCKS 4/5 proxy server that runs in the background with no obvious signs that it’s doing so. The idea is, if you have access to a machine and want do ‘stuff’ anonymously and don’t trust public ‘anonymous’ proxy servers this might be for you.

Stealth Proxy


Stealth Proxy for Windows 95/98/NT/2000
—————————————

OK. Neccesity is the mother of invention and this was something I needed a while back and finally got around to making. Basically, it’s a SOCKS 4/5 proxy server that runs in the background with no obvious signs that it’s doing so. The idea is, if you have access to a machine and want do ‘stuff’ anonymously and don’t trust public ‘anonymous’ proxy servers this might be for you.

Seaker version 1.23.5

Seaker version 1.23.5

Seaker version 1.23.5written by Corruption http://www.dinc.nu/oonix Corruption@digitchat.net ICQ: 12447053 program in vc++ Requirements: OS: you must be running under, Windows95/98if you are running under a fravor of unix with X-Windows, and would liketo try this software under that system, please contact me and ill compileit under that or if alot of people start asking me for it ill upload itmy site.Ram: 8bit or higherCPU Speed:.....

AIM Away Message Buffer Overflow Exploit


/*
* AIM Away Message Buffer Overflow Exploit
* Exploit by John Bissell A.K.A. HighT1mes
*
* Exploit:
* ========
* drizzit.c
*
* Vulnerable Software:
* ====================
* – AIM 5.5.3588
* – AIM 5.5.3590 Beta
* – AIM 5.5.3591
* – AIM 5.5.3595
* and a couple others versions…
*
* If you want to try other return addressees for other versions of
* AIM then edit the return address.. But the current one embedded
* will work for sure with all the AIM versions listed above.
*
* I used some of the metasploit shellcode for this exploit with some
* modifications to get this into stealth mode so it is harder to
* detect the attack. Since I’m using metasploit shellcode that means this
* exploit can be used on any NT type OS, like win2k, winnt, winxp across
* any service pack.. I don’t know about SP2 though I haven’t tested
* it yet.
*

Seaker 1.22.5

Seaker 1.22.5

About Seaker: ------------- What Seaker does is like a pwl viewer, it decrpts. the pwl file that is crpted. in microsoft windows. I only made this for a helpful tool, for forgetting your password to your isp, this is only use for legal prurposes, and i am not held responsible for any miss use on this program. Greets: ------- Darkfly,Freshmen,FuNGii,Galactus,MaGiC,War,Mase,Prozak,Dope,Biz,cepture, Stealth,Rj2,and Mike. i know there.....

Cow Pasture #1

Cow Pasture #1

FuCkeRH0sT: *** You are in "Cow Pasture". ***FuCkeRH0sT:FuCkeRH0sT: ZzzZZvVvVv has entered the room.FuCkeRH0sT: Gendronsux has entered the room.Whoohah2: Guide PLEASE send me the guide app.!AMAYOYO: CAN YOU HELP ME GUIDE HUBWhitMarie: Ya I asked you if you'd like to play some T or D with me .. it would be alot more fun thenWhitMarie: THiS!FuCkeRH0sT: SKAxHOrSe has left the room.FuCkeRH0sT: SKAxHOrSe has entered the room.HoSSxMaN7:.....