what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files

vptrs-exploitation-examples.tgz
Posted Feb 1, 2005
Authored by hackademy | Site thehackademy.net

Some examples and sample code to experiment with C++ exploitation and vptr overwriting.

SHA-256 | 3812cd1a468cea7f002d82cb54fd72d84f9275f492ebe8e187e4d4b2d50f828c
TTLeak.py
Posted Dec 8, 2004
Authored by hackademy, nono2357 | Site thehackademy.net

This tool can, under some conditions, calculate the exact time of a dns query made by someone, using TTL information cached on his ISP's nameservers.

SHA-256 | 397ca55e70fd272383102f3bb1e3eef0aecaffde8efee6c48e40cffcb5463c13
init_ap.sh
Posted Dec 8, 2004
Authored by hackademy, crashfr | Site thehackademy.net

Sample configuration script to configure a WPA-enabled, Linux based Hotspot using hostap (french comments).

systems | linux
SHA-256 | 6d7fd588201726327968d85a04f5156ee5bcde27d4a022af26f34e6baf18cb3f
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close