Search:

Type: Posts; User: firebits; Keyword(s):

Page 1 of 15 1 2 3 4

Search: Search took 0.01 seconds.

  1. cudadbcracker - is a brute force password cracker for databases (Oracle 11g/MSSQL)

    This is a brute force password cracker for databases (currently Oracle 11g amd Microsoft SQL Server). I intended to create a password cracker which uses CUDA framework for NVIDIA GPUs to speed up...
  2. fbpwn A cross-platform Java based Facebook profile dumper

    A cross-platform Java based Facebook profile dumper, sends friend requests to a list of Facebook profiles, and polls for the acceptance notification. Once the victim accepts the invitation, it...
  3. Replies
    0
    Views
    5,369

    Spooftooph: The Bluetooth Spoofer!

    Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth...
  4. Replies
    0
    Views
    3,786

    Pentest Bluetooth-> Ubertooth r238

    Ubertooth is an open source 2.4 GHz wireless development platform suitable for passive bluetooth monitoring. It aims to be the world’s first open source and affordable bluetooth monitoring and...
  5. EAPeak - Security Assessment of wireless networks Enterprise Authentication Protocol

    EAPeak is a Python powered script that is meant to parse useful pieces of information for a Security Assessment of wireless networks that use the Enterprise Authentication Protocol. It relies on the...
  6. Ghost Phisher-GUI suite for phishing attacks for Fake DNS, DHCP and BLA, BLA, BLA...!

    GUI suite for phishing attacks for Fake DNS, Fake DHCP, Fake HTTP, Credential Harvester. A similar tool which we have discussed imposter here. ghost-phisher is updated and has many latest tool...
  7. Sniffjoke 0.4.1 - a sniffer evasion tool (Anti-IDS/IPS)

    Sniffjoke 0.4.1 - a sniffer evasion tool (Anti-IDS/IPS)
    SniffJoke (Sj) implements a set of anti sniffing technology itself, but begins developed as a modular framework.

    Will easily be supported...
  8. View Post

    OpenGTS™ ("Open GPS Tracking System") is the first available open source project designed specifically to provide web-based GPS tracking services for a "fleet" of vehicles.

    To date, OpenGTS™...
  9. SWFRETools: A Tool to Reverse Engineer SWF Files! (for reverse engineering menu)

    The SWFRETools are a collection of tools built for vulnerability analysis of the Adobe Flash player and for malware analysis of malicious SWF files. The tools are partly written in Java and partly in...
  10. PRAEDA: A Automated Printer Data Harvesting Tool!!!

    Exciting times! I wish to stay awake all night long and know whats going on at ShmooCon! Unfortunately, I haven’t been there evar! Anyways, about Praeda, it helps you to leverage Multifunction...
  11. Replies
    2
    Views
    7,176

    Update Metasploit Framework 3.7.0

    Update Metasploit Framework 3.7.0

    Download Metasploit Framework | Metasploit Project

    @firebitsbr
  12. Replies
    33
    Views
    9,269

    Sticky: View Post

    Realmente foi um equivoco!!! Veja que depois a abaixo, escrevo corretamente

    "Fundei o site www.backtrack.com.br"

    Eu retiro o que eu disse sobre "Sou fundador do forum backtrack-linux.org", na...
  13. Replies
    33
    Views
    9,269

    Sticky: View Post

    Meu nome é Mauro Risonho de Paula Assumpção, conhecido por firebits. Sou fundador do forum backtrack-linux.org, inclusive foi numa tarde de sábado do ano de 2010, que o muts e eu começamos a criar...
  14. API Monitor and control API - applications and services (Windows Checking APIs) 1-5

    Credits about this software:
    Glauco Marques

    Download:

    Portable
    http://www.rohitab.com/download/api-monitor-v2r6-x86-x64.zip

    64 bits...
  15. Replies
    3
    Views
    8,320

    Google Penetration Testing Hack Database v 1.0

    Google Penetration Testing Hack Database v 1.0

    Database of Google Hacks and a tool for manipulating it.
    Database is separated to files by categories. You could use DB alone, or
    use the tool to...
  16. Replies
    0
    Views
    5,469

    RSYaba: A Modular Brute Force Attacker!

    RSYaba is a tool to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool was written after bad experiences at getting existing tools working correctly...
  17. Replies
    0
    Views
    8,400

    R-U-Dead-Yet: A HTTP POST Denial of Service Tool

    R-U-Dead-Yet, or R.U.D.Y for short, implements the generic HTTP DoS attack via long form field submissions. The attack’s theory is described in the following paper:This tool runs with an interactive...
  18. Replies
    3
    Views
    11,375

    Re: New Script (very simple) Exploit-db Update

    spawn, your code is better!;)
  19. Replies
    3
    Views
    11,375

    New Script (very simple) Exploit-db Update

    New script (very simple script) for update exploits-db in /pentest/exploits/exploit-db

    Step1
    # nano exploit-db-firebits.sh

    Step2
    Edit file exploit-db-firebits.sh

    #!/bin/bash
    # Mauro...
  20. Discussioni: Captcha Breaker

    by firebits
    Replies
    0
    Views
    5,035

    Captcha Breaker

    This howto will take you through using Captcha Breaker to break a given
    captcha. This howto covers only how to use the solvers once you already have
    image files. This howto does NOT cover how to...
  21. Replies
    0
    Views
    6,433

    PWNtcha - captcha decoder

    PWNtcha stands for "Pretend We’re Not a Turing Computer but a Human Antagonist", as well as PWN capTCHAs. This project’s goal is to demonstrate the inefficiency of many captcha implementations.

    ...
  22. Replies
    0
    Views
    3,123

    tnscmd - Oracle's TNS listener

    tnscmd

    tnscmd can be used to speak, on a very simple level, with Oracle's TNS listener.

    http://www.jammed.com/~jwa/hacks/security/tnscmd/tnscmd-doc.html

    @firebitsbr
  23. Replies
    2
    Views
    2,492

    Re: [PWNIE EXPRESS] Um brinquedo bem interessante

    Os caras fizeram o óbvio!:) Mas digo que isso é de longe algo profissional, pois ainda permanece a técnica de correlação humana dos eventos de pentest e podendo ser até automatizado, mas se for a...
  24. Replies
    4
    Views
    3,079

    View Post

    Você pode tentar via SQL Injection no MySQL, o problema é quando o resultado não é o esperado, o mesmo não retorna o erro da tabela de erros do MySQL.

    Veja mais em:
    ...
  25. Replies
    1
    Views
    2,527

    Re: DerbyCon 2011 - Um novo Hackercon

    Vou tentar um paper lá, sobre uma tecnologia que estou terminando de desenvolver para Locking Picking.

    Se der certo, será novidade no mundo, se não apenas tentei;)

    @firebitsbr
Results 1 to 25 of 353
Page 1 of 15 1 2 3 4