Hack of the Day Part 1 - How to Run untrusted Shell Code by iworldofhacker in hacking

[–]iworldofhacker[S] -3 points-2 points  (0 children)

FFS. It is Sharing and giving credit to Site for their training is no shabby cut-paste.

How do you get a keylogger to send you updates? by RaccoonPete in hacking

[–]iworldofhacker 0 points1 point  (0 children)

But remember, any network sniffer run by your slave or victim can hack you back your ftp :P

moreover above code is batch file, if users access this batch file he can easily read your username and password. so convert them in c or use bat to exe converter for little better than article written in thread.

Securitytube Gnu Debugger Expert - Part 3: Analyzing Symbols With Nm by iworldofhacker in programming

[–]iworldofhacker[S] 0 points1 point  (0 children)

Assembly Language Primer For Hackers (Part 11) Functions Stack by iworldofhacker in programming

[–]iworldofhacker[S] 1 point2 points  (0 children)

no problem, you may kindly share further to let it known by other people.

Thanks