Search results

  1. Prince

    Botnet basics [General]

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. Prince

    Agony Custom Booter Source

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. Prince

    Some tips on creating a botnet

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. Prince

    [Business Guide] Setup your own professional stresser - Everything you need to know!

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. Prince

    [Source Code] UDP, Lag-UDP, SSYN, ARME, RUDY, Slowloris & More ! (Layer 4 & Layer 7)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. Prince

    [Tutorial]First Lesson C#(HelloWorld)

    introduction to C# : C# is a simple, modern, object-oriented, and type-safe programming language. It will immediately be familiar to C and C++ programmers. C# combines the high productivity of Rapid Application Development (RAD) languages and the raw power of C++. Visual C# .NET is Microsoft's...
  7. Prince

    Phc Virus Maker

    Virus total scan : https://www.virustot...sis/1370330131/ Anubis Scan : http://anubis.isecla...5de&format=html DOWNLOAD : http://www.uploadmb....p?id=1370295394
  8. Prince

    How to keep your self safe on windows 7 [TUT]

    Introduction : Today i will teach you how to secure your computer with the OS windows 7 (yes shitty). This will not be 100% but it will be 80%+ to secure your computer, with a 3 anti virus programs, and a very good firewall. Program's and firewall's 1. MalawareBytes : Very good and trusted...
  9. Prince

    [Tutorial]Deep-Web how to login anonymoity

    introduction: Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used...
  10. Prince

    DNS Servers

    OpenDNS's servers: 208.67.222.222 208.67.220.220 208.67.222.220 208.67.220.22 Google's (very good net neutrality, but not good privacy): 8.8.8.8 8.8.4.4 The Swiss Privacy Foundation (does not log and does not censor any DNS) 77.109.138.45 87.118.85.241 note that their old servers will be...
  11. Prince

    Being Completely Anonymous

    Virus Scan: https://www.virustot...sis/1357196724/ Download: http://localhostr.com/WuFFD5dnw3Ax passwd: Un0wn_X Tools Included:SSH Client (PuTTY) Proxifier (With Serial)
  12. Prince

    [IP Spoofing] Remote Server Proxy

    0x00 - Sommaire :Introduction Scripts Utilisations Conclusion 0x01 - Introduction : Wikipédia says : Quote In our case we will be mask our identity under target server and stay "anonymous" when your attacks. 0x02 - Scripts : We going to take 2 scripts, one in .php and the second in .pl...
  13. Prince

    SecuritySafe on Social Media Sites II

    Hello guys, I have wrote this as I have had 5 of you message me with concerns about Facebook security the last few weeks so I will say it here. sl1nk knows more about this than me but being around him he has taught me a lot about security too. Facebook is not worth it.Put it this way if you...
  14. Prince

    Create a Free Proxy Server with Google App Engine

    Here’s one such proxy site that you can build for your friends in China or even for your personal use (say for accessing blocked sites from office). This is created using Google App Engine and, contrary to what you may think, the setup is quite simple. Step 1: Go to appengine.google.com and...
  15. Prince

    Anonymity/Security Breached

    This paper not speak of anonymity or security techniques... But his illusion ! I create this paper only for expose important points for you descend your feet down to earth... And create a sense of fear in you I will not talk about theories but to facts ! Hm, since many years in the network...
  16. Prince

    [UNIX] Spoofing wlan0 [Wi-Fi]

    If a user chooses to spoof his or her MAC address in order to protect the user's privacy,[8] this is called identity masking. One might wish to do this because a Wi-Fi network's connection will continuously send out each user's MAC address. Even the secure WEP/WPA encryption methods do not...
  17. Prince

    Installing I2P in Ubuntu

    Installation In the terminal: sudo apt-add-repository ppa:i2p-maintainers/i2p && sudo apt-get update This will add the official I2P repositories and refresh your package list. Then: sudo apt-get install i2p will install I2P and all dependencies. Create a new Firefox profile Open the...
  18. Prince

    3 tools firefox for stop the track

    Hey brothers, I offer three addons for the care for your privacy ... Google is perhaps not so clean that? :) https://addons.mozilla.org/en-US/firefox/addon/gdc/?src=search https://addons.mozilla.org/en-US/firefox/addon/fbdc/?src=search...
  19. Prince

    Beginners Guide to Anonymity

    +Firstly I Recommend switching to Linux is Open source and very secure system and can be configure how you desire, Windows isnt bad but it is way more vulnerable and is a free gateway for backdoors and virus. Also way less secure and sends reports. So first thing you might to do is that, If...
  20. Prince

    TOR relay and transparent routing

    You already know about TOR, The Onion Router for anonymity to protect your privacy. TOR is a network so it can only work if there are nodes (relays). If you have a server, you can run one so consider it. Afraid of legal issues? You do not need to run an exit node, a relay is just fine...
Top Bottom