Wired – Smells like Mean Spirit – February 09, 2000
Wired – Smells like Mean Spirit – February 09, 2000

10:50 a.m. 9.Feb.2000 PST Hackers, who pride themselves on Web attacks with a purpose, are scornful of the "packet monkeys" responsible for this week's attacks on Yahoo, CNN, and other high-profile sites. The cracker or crackers responsible for the attacks have been contemptuously dubbed "packet monkeys" because their exploits involve flooding a site with packets of information and, detractors say, betray a distinctly simian intelligence......
Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000
Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend.....
InternetNews – Hackers Again Strike AOL – June 19, 2000
InternetNews – Hackers Again Strike AOL – June 19, 2000

America Online, Inc. is the latest Net crime victim to have the privacy of some of its 23 million members violated. While the extent of weekend damage is unknown, the knowledge of how to access security holes in America Online's (Quote, Chart) network is spreading quickly through Internet channels. While AOL members are assured at every point of contact that their information is secure from potential maliciousness,.....
ABC News – FAA Computers are Insecure – September 27, 2000
ABC News – FAA Computers are Insecure – September 27, 2000

 The Federal Aviation Administration skips key background checks on workers, leaves open known security holes, doesn’t even use passwords sometimes and has inadequate firewalls, the report says.      The air-traffic control system hasn’t been successfully attacked, but at least one hacker has broken into an FAA e-mail server. And a year after identifying holes in one FAA system, contractors found the agency had not fixed.....
DCIS – YTCracker charged with website defacements. – May 15, 2000
DCIS – YTCracker charged with website defacements. – May 15, 2000

A 17-year-old minor residing in Colorado Springs, CO, was charged with violating Colorado State computer crime statutes. The 17-year-old, known throughout the hacker community as "YTCracker" (pronounced "Whitey Cracker"), was charged with one count of computer crime and one count of criminal mischief by compromising and defacing numerous Internet web sites, including DoD web site servers in Boston, MA, and Fort Belvoir, VA. On November.....
MasterAOL for AOL 7.0
MasterAOL for AOL 7.0

MasterAOL for AOL 7.0 US GM

sup[z] to: adam, artem, atm, dime, infamous, nec, plex, syg, xom and countless others.

Here it is, the first masteraol (star tool) for aol7. To install just double click on the .exe file (you will need to input the path to your aol7), then copy over the master.tol file into your \america online 7.0\tool\ folder.

Once you sign on you’ll get the master menu, however it’s a really crappy one. To fix this delete 32-487 in the main.idx file using dbview (available at aol-files.com). If you can’t find dbview you could hex the main.idx and rename 32-487 to something else. Once deleted, when you load aol the master menu will be 32-2543, which is also the aol4/5/6 masteraol menu.

Credit goes to Artem for hexing the main install file and the tool file. I should mention that aol added extra security to the aol7 tools (masteraol and vpd), so be careful. I am not aware of any security issues with this, however be careful. In general aol7 is a big pile of spyware so i would stick to aol5 if possible 🙂

All files were scanned with newest version of norton antivirus updated.

-d4rk h4rk3r

Master.AOL for AOL 4.0
Master.AOL for AOL 4.0

Master.AOL for AOL 4.0 Installation: Place all files, except Master.AOL, in the root AOL directory. The Master.AOL file should be put into the AOL tool folder. This file was made available by: O0O, YTC and Glitch
VBDE version 0.85

VBDE version 0.85
by iorior

This tool can rescue part of lost sources and offset of the procedures,
if you have an executable compiled with Visual Basic 6.

NEWS:
version 0.85:
various things

version 0.84:
serious bug for form text fixed
bug fixed for captions with ”
log
some properties, methods (Natif)

version 0.83:
The procedures concerning the form (Form_load, Form_resize etc…)
More events
Give you the compilation: P-Code / Natif
Some bugs fixed

version 0.82: a lot of bugs fixed, and now you have the offsets whith ‘ in the form text
———————————————————————————————–

Key Logger Visual Basic
Key Logger Visual Basic

This keylogger program logs almost all your keystrokes while running in your background. You won't see its interface. It's useful to monitor what your little brother/sister is doing when you're not here. You can also apply in in your school computers to help monitor malicious activities. The invisible keylogger will create a isp8311.txt file or upload it in C: drive every 20 seconds. As a.....
ICQ Visual Basic
ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampiretranslated from the mirabilis documentation and other. the project lastest well over 6 months -------------- everything else included in this zip file was by theirrespective owners. I just thought it might be nice tobe able to get everything you wanted to know from oneplace, as opposed to the months of hunting the net thatI had to do......
VK_Stealth.bas
VK_Stealth.bas

  'Name: Voltron Kru Stealth Bas 'File: VK_Stealth.bas 'Released: 11-19-99 'Authors: The Voltron Kru 'Originaly Coded: 2-26-99 ' 'Purpose: To hide a program from the alt-ctrl-del menu ' hiding it from the average user while it is ' running. ' 'Disclamer: This is a bas file that I never wanted to ' release. The power of the next few lines has the ' power to.....