Advertisement

Results for "Author: delikon"

2002ASP #7014
delikon's Half-life cd-key changer

this code change the won cdkeys of your halflife (or counterstrike) game. you can save the keys in text file and change it easily with one click. check it out

2002ASP #8019
Packet sniffer

This code shows the source ip and port the flags of the packet and the sequence number

2002C #15618
delikon's Half-life cd-key changer

this code change the won cdkeys of your halflife (or counterstrike) game. you can save the keys in text file and change it easily with one click. check it out

2002C #16623
Packet sniffer

This code shows the source ip and port the flags of the packet and the sequence number

2002VB #24222
delikon's Half-life cd-key changer

this code change the won cdkeys of your halflife (or counterstrike) game. you can save the keys in text file and change it easily with one click. check it out

2002VB #25227
Packet sniffer

This code shows the source ip and port the flags of the packet and the sequence number

ASP_Volume2 #35115
sending sms over handy Version 2

This code now encodes a text in a 7-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms

ASP_Volume2 #36379
sending sms over handy

this code encodes a text in a 8-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms.

ASP_Volume2 #36394
delikon's Half-life cd-key changer

this code change the won cdkeys of your halflife (or counterstrike) game. you can save the keys in text file and change it easily with one click. check it out

ASP_Volume2 #41018
Packet sniffer

This code shows the source ip and port the flags of the packet and the sequence number

ASP_Volume2 #41385
packet sniffer for windows

This programm sniffs connection between 2 hosts, and shows the source-ip/port, dest-ip/port, Flags,and the Packetdata(payload). It is a nice example for rawsockets with winsock. Test is and mail me ;=)

ASP_Volume2 #41491
Pe-file infector

This is an example how easy it is to manipulate the execution flow of an Pe-file (.exe) This little tool will patch a given file, to run the command 'cmd'. This example is not really usefull but as you can imagine that it is also posible to start a backdoor very stealth with this technic. How it works: 1. it will search for the last section of the exe 2. the it will search in the last section where are 69 NULL-bytes to paste your execution code 3. then it start to search for the position in the exe where the first 5 bytes of the code are. 4. save the bytes which will be overwritten (how much it will be u can define with the offset) 5. it will overwrite the bytes with a jump (E9) to the execution-code 6. generate the execution code thst it will look like this NOP + static code + WinExec address + saved bytes + back jump address 7. paste the exeution code at the postion of 2. End For question about this code please mail me.

C_Volume2 #76177
sending sms over handy Version 2

This code now encodes a text in a 7-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms

C_Volume2 #77441
sending sms over handy

this code encodes a text in a 8-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms.

C_Volume2 #77456
delikon's Half-life cd-key changer

this code change the won cdkeys of your halflife (or counterstrike) game. you can save the keys in text file and change it easily with one click. check it out

C_Volume2 #82080
Packet sniffer

This code shows the source ip and port the flags of the packet and the sequence number

C_Volume2 #82447
packet sniffer for windows

This programm sniffs connection between 2 hosts, and shows the source-ip/port, dest-ip/port, Flags,and the Packetdata(payload). It is a nice example for rawsockets with winsock. Test is and mail me ;=)

C_Volume2 #82556
Pe-file infector

This is an example how easy it is to manipulate the execution flow of an Pe-file (.exe) This little tool will patch a given file, to run the command 'cmd'. This example is not really usefull but as you can imagine that it is also posible to start a backdoor very stealth with this technic. How it works: 1. it will search for the last section of the exe 2. the it will search in the last section where are 69 NULL-bytes to paste your execution code 3. then it start to search for the position in the exe where the first 5 bytes of the code are. 4. save the bytes which will be overwritten (how much it will be u can define with the offset) 5. it will overwrite the bytes with a jump (E9) to the execution-code 6. generate the execution code thst it will look like this NOP + static code + WinExec address + saved bytes + back jump address 7. paste the exeution code at the postion of 2. End For question about this code please mail me.

Java_Volume1 #94721
sending sms over handy Version 2

This code now encodes a text in a 7-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms

Java_Volume1 #95985
sending sms over handy

this code encodes a text in a 8-bit-pdu string and send it over your datacable to your siemens mobile phone and send it away as an sms.

Languages
Top Categories
Global Discovery