Page 1 of 19 12311 ... LastLast
Results 1 to 10 of 188

Thread: Charon : 2.0 Alpha Relized

  1. #1
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Exclamation Charon : 2.0 Alpha Relized

    PLEASE MOVE TO ROOT OF SPEC TOPICS WAS A MYSTAKE TO POST HERE....SORRY...THX MODS

    some user here reminds me that my java knowledge is a little poor.....

    so i decided as usual to do "Practical Learning", so i open a new project in my Works Folder......

    it's called Charon, who was the guy in anciant greece who was helping you cross the Hells River after your death....


    Charon will be A MDK3 GUI FRONT-END ,developed in java, covering all mdk3 dos attacks(and more) against a given ap or all ap in range

    we will be able to deauth continously all clients from all ap in range for ex
    or to cancel traffic on a certain AP or to crash it(really)
    we will be able to bruteforce hidden ssids (or dictionnary it)
    .........


    this is really early stages of codings....and i need to learn some more advanced javas things than i know at the moment ..... so could be long to achieve it.....

    i will keep you informed as soon as possible...........

    BTW....for coders. ...it's built under J2SE JDK+NETBEANS 5(swing+matisse)....i think it's a relatively reliable development environment for java and c++

    ps : i know i can do this in maybe 1 or 2 days in bash or qt, but i really want a GUI and really want LEARN java....

    stay in touch

    WhiteHatly Yours, Sh@m@nVirTuel
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Just remember, don't pay the ferryman until he gets you to the other side.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    they was paying him by advance with a money penny placed in your mouth by your family after your death specially for him........

    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  4. #4
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Moved it for you.

  5. #5
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    http://sv.charon.googlepages.com/charon

    here is the development page for charon...........
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  6. #6
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Interesting name that...Charon...I made, err...use, a program called Charon for harvesting l33t proxies...check it out..






    BTW Shaman...Does the -= =- in the name Charon look familiar???

    Heres my, I mean.... "the" link.
    And no, ..I'm not the creator of this program..although I was apart of a very small group of exclusive testers to -=Rhino=- ...remember?? Remember me telling you how I got my name?? -=Xploitz=- ??? This is the legendary Charon I've been talking to you about...good guy. Been years since we've talked. I wonder if he remembers me?? Or even remembers giving me my wings??? -= =- ???

    Oh well. ...



    You are the most active koder I know Niko..and one of the most talented bash shell scripters and Konquorer scritpers I know. What else do you program / script??
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #7
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    thx again for your so kind words......but i know there's some persons here for which coding is a profession, they live of that and surely are better koders than me.....you know im getting better each time i begin a new project or begin to learn a new language....i never go to IT school...i all learn with my "Practical Learning"....LONG PATH....VALUABLE KNOWLEDGE....

    here are the main languages i play with:

    bash (ok)
    qt (ok)
    c++ (beginner)
    lua (ok, remember my installer for win ... it's lua)
    little py (more soon i hop im coding a packet sniffer)
    little java (my new toy, early stage of learning)
    html/php/dhtml (ok)
    sql (ok)
    javascript (ok)
    ruby (beginner)


    thx again 4 your kind words

    btw... nice project what language was it coded ?
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  8. #8
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    I know it uses the Windows binary...so more than likely...Visual basic. Its no longer a project..its been publicly released. You can d/l it from that website. Its no longer being supported though. -=Rhino=- retired from this business.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  9. #9
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    yep thx for infos....

    NEWS : i upload a develoment log webpage for CHARON

    you can access it here :

    http://shamanvirtuel.googlepages.com/charon-development

    here you can follow what im currently working on....
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  10. #10
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Why are all your development pages marked as "adult content"? Is there some sort of hidden porn I'm missing?
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 1 of 19 12311 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •