Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 667 Vote(s) - 3.51 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Bunch of Stolen Attack Scripts (and lists)

#1
These were stolen from (the booter that shall not be named), after some kid bragged about all of his attack scripts and proceeded to try and boot me offline
There are also some private scripts and xml, amp, ntp, whatever lists in here as well. I'm not responsible for what you do with these
The reason its name is "root.tar.gz" is because it's the compress /root directory. No, not the / directory, the /root directory

tl;dr - If you do stupid shit with this, you're responsible for it

[To see links please register here]

Reply

#2
By stupid shit, you mean less-than-legal activites? :p
Reply

#3
Quote:(09-11-2014, 02:15 AM)MiS Wrote:

[To see links please register here]

By stupid shit, you mean less-than-legal activites? :p

Yup, but hopefully they won't get caught even if they decide to do less-than-legal activities
Reply

#4
Thanks for sharing :smile: Contribution will be appreciated
Reply

#5
Getting somebody to extract this into /root would be amusing... Nobody in their right mind would do that.
Reply

#6
Quote:(12-19-2014, 10:04 PM)phyrrus9 Wrote:

[To see links please register here]

Getting somebody to extract this into /root would be amusing... Nobody in their right mind would do that.
Have social engineering in the mix would maybe work it.
Reply

#7
Quote:(12-20-2014, 12:20 AM)Six Wrote:

[To see links please register here]

Have social engineering in the mix would maybe work it.

I feel like anyone who uses linux wouldn't be this stupid XD haha
Reply

#8
Quote:(12-20-2014, 12:23 AM)Blunt Wrote:

[To see links please register here]

I feel like anyone who uses linux wouldn't be this stupid XD haha
You'd be surprised.
Reply

#9
Guys usually you aren't tricking someone into extracting this to /root. It's usually stuff you find in /root after a server has been rooted, and the malicious user is putting their tools on the system. It's a tar.gz of /root, because whoever archived it all up just made an archive of /root of an already rooted server. Also, if the server was created for the purpose of malicious activity, the root user may have just been malicious anyway, IE no root compromise, just a baddy bad :p
Reply

#10
Quote:(12-20-2014, 12:20 AM)Six Wrote:

[To see links please register here]

Have social engineering in the mix would maybe work it.

That would only work if you have a noob ubuntu user...
If you encounter an arch user, good luck getting them to extract it anywhere except /dev/null
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through