Kembolle Amilkar


Kembolle Amilkar

Link to Kembolle Amilkar


Posted: 17 Nov 2012 06:04 PM PST

























Hi Dudes Again! :*

- nice job boy's ! i love IT translate for portuguese:
The Staff
SkyDogCon was born from a very simple idea. "We (as a community) can do better!" A group of volunteers realized that between them they had DECADES of combined conference attendance in common and their combined experiences had let them see what worked, what didn't, what people raved about and what was a total waste of time and money.

Every year the staff meets in virtual and real places to rant, rave, discuss, and preach ideas about what a con should have. At the end, decisions are made and plans executed. In short, SkyDogCon is the amalgamation of everything the staff has seen that works at other cons, plus some extras that take things to the next level. SkyDogCon staff members freely give of their time and talent to help run this con, a con run by hackers for hackers.

HappyHacking  !!! 

Movie Files at Here! Cinepack h.264 Ogg Video
SkyDogCon 2 - 01 Opening Remarks-Trevor Hearn-Skydog 188.3 MB 155.3 MB 113.1 MB
SkyDogCon 2 - 02 Hack The Badge-Sachin Paranjupe-Sachin 189.1 MB 163.4 MB 118.8 MB
SkyDogCon 2 - 03 Physical Security Make sure your building is Butter Knife Proof-Charles Selfridge-GCS8-Ginsu 186.9 MB 139.0 MB 101.7 MB
SkyDogCon 2 - 04 THE TALK WITH NO NAME-Marcus Carey 320.6 MB 319.1 MB 229.1 MB
SkyDogCon 2 - 05 Dealing with Difficult CoWorkers How I became the Thanks for the Candy Guy-SpikeyGeek 234.4 MB 252.2 MB 182.8 MB
SkyDogCon 2 - 06 Pivot2Pcap-Peter Shaw 224.1 MB 237.1 MB 170.8 MB
SkyDogCon 2 - 08 Your Business Model is Naked and Ugly-Shane Lawson-Valanx 217.9 MB 223.7 MB 161.5 MB
SkyDogCon 2 - 09 Gangs and the Use of Technology-Carter Smith 317.2 MB 315.7 MB 228.3 MB
SkyDogCon 2 - 10 Hacking As An Act Of War-G Mark Hardy-GMark 344.7 MB 333.6 MB 245.4 MB
SkyDogCon 2 - 11 RE,CND and Geopolitics, Oh My!-Jeff Brown 438.7 MB 316.9 MB 226.0 MB
SkyDogCon 2 - 12 Insanely Great-Curtis Koenig 313.6 MB 294.3 MB 210.2 MB
SkyDogCon 2 - 13 Setting up BackTrack and Automating Various Tasks with Bash Scripts-Lee Baird 364.7 MB 325.4 MB 232.5 MB
SkyDogCon 2 - 14 Cryptanalysis of the Enigma-Bob Weiss-Benjamin Gatti 372.7 MB 344.1 MB 246.8 MB
SkyDogCon 2 - 15 Bioveillance The Surreptitius Analysis of Physiological Behavior Data-Noah Schiffman 316.5 MB 309.6 MB 221.1 MB
SkyDogCon 2 - 16 Advanced Phishing Tactics Beyond User Awareness-Martin Bos-PureHate-Eric Milam-JohnnyBravo 422.7 MB 366.8 MB 264.6 MB
SkyDogCon 2 - 17 Build a UAV!-Sonny Mounicou 238.1 MB 237.6 MB 169.1 MB
SkyDogCon 2 - 18 Life Cycle and Detection of an Exploit Kit-Alex Kirk 317.7 MB 295.7 MB 212.6 MB
SkyDogCon 2 - 19 Go With the Flow Strategies for Successful Social Engineering-Chris Silvers 299.9 MB 293.1 MB 206.6 MB
SkyDogCon 2 - 20 Hack your Credit Score, How the System is Flawed-Scott Moulton-ByteAssassin 474.5 MB 531.7 MB 381.1 MB
SkyDogCon 2 - 21 User-Readable Data and Multiple Personality Disorder - David Wyde 29.6 MB 30.9 MB 22.4 MB
SkyDogCon 2 - 22 SkyDogCon 2012 Closing 858.4 MB 577.5 MB 417.4 MB
Image Files Animated GIF Thumbnail
SkyDogCon 2 - 01 Opening Remarks-Trevor Hearn-Skydog 320.6 KB 3.6 KB
SkyDogCon 2 - 02 Hack The Badge-Sachin Paranjupe-Sachin 336.0 KB 5.0 KB
SkyDogCon 2 - 03 Physical Security Make sure your building is Butter Knife Proof-Charles Selfridge-GCS8-Ginsu 262.5 KB 4.4 KB
SkyDogCon 2 - 04 THE TALK WITH NO NAME-Marcus Carey 336.6 KB 4.7 KB
SkyDogCon 2 - 05 Dealing with Difficult CoWorkers How I became the Thanks for the Candy Guy-SpikeyGeek 335.6 KB 5.1 KB
SkyDogCon 2 - 06 Pivot2Pcap-Peter Shaw 332.4 KB 4.7 KB
SkyDogCon 2 - 08 Your Business Model is Naked and Ugly-Shane Lawson-Valanx 321.7 KB 4.1 KB
SkyDogCon 2 - 09 Gangs and the Use of Technology-Carter Smith 360.5 KB 5.2 KB
SkyDogCon 2 - 10 Hacking As An Act Of War-G Mark Hardy-GMark 331.6 KB 5.3 KB
SkyDogCon 2 - 11 RE,CND and Geopolitics, Oh My!-Jeff Brown 367.9 KB 5.5 KB
SkyDogCon 2 - 12 Insanely Great-Curtis Koenig 291.7 KB 5.6 KB
SkyDogCon 2 - 13 Setting up BackTrack and Automating Various Tasks with Bash Scripts-Lee Baird 336.7 KB 5.9 KB
SkyDogCon 2 - 14 Cryptanalysis of the Enigma-Bob Weiss-Benjamin Gatti 349.8 KB 5.5 KB
SkyDogCon 2 - 15 Bioveillance The Surreptitius Analysis of Physiological Behavior Data-Noah Schiffman 365.2 KB 6.8 KB
SkyDogCon 2 - 16 Advanced Phishing Tactics Beyond User Awareness-Martin Bos-PureHate-Eric Milam-JohnnyBravo 363.5 KB 6.8 KB
SkyDogCon 2 - 17 Build a UAV!-Sonny Mounicou 352.6 KB 5.1 KB
SkyDogCon 2 - 18 Life Cycle and Detection of an Exploit Kit-Alex Kirk 355.0 KB 6.3 KB
SkyDogCon 2 - 19 Go With the Flow Strategies for Successful Social Engineering-Chris Silvers 358.1 KB 6.1 KB
SkyDogCon 2 - 20 Hack your Credit Score, How the System is Flawed-Scott Moulton-ByteAssassin 345.0 KB 6.1 KB
SkyDogCon 2 - 21 User-Readable Data and Multiple Personality Disorder - David Wyde 114.2 KB 4.8 KB
SkyDogCon 2 - 22 SkyDogCon 2012 Closing 380.4 KB 4.6 KB
Information FormatSize
Skydogcon2012_files.xml Metadata [file]
Skydogcon2012_meta.xml Metadata 467.0 B
Other Files Archive BitTorrent
Skydogcon2012_archive.torrent 109.0 KB         
Thanks for all  Fabiano Matias [ Brasil Underground ] && Grupo de profissionais da área de tecnologia da informação do estado de Mato Grosso. GTI-MT
Posted: 17 Nov 2012 04:33 PM PST


Zeus, SpyEye e Palevo são famílias infames de malware. Estes tipos de malware estão espalhados principalmente através de drive-by downloads e esquemas de phishing. Eles são cavalos de Tróia chamados que são projetados para roubar credenciais de vários serviços online, como redes sociais (como Facebook, Hi5, Yahoo, Netlog), contas bancárias online (phising), contas de FTP, e-mail-contas e outros. Eles fazem parte de botnets que são estimados para incluir milhões de computadores comprometido.

Estes tipos de malware são notoriamente difíceis de detectar ou remover a partir de qualquer computador. Mesmo se um usuário tiver um programa antivírus atualizado instalado, computadores ainda pode ser infectado.

Porque o seu programa antivírus nem sempre é o que lhe dá proteção suficiente contra esses tipos de malware, decidimos criar um programa que pode ser usado como uma camada extra de segurança.

Mirage Anti-Bot é proteger os usuários contra Zeus, SpyEye, Palevo e algum malware relacionado. Mirage Anti-Bot será o download e instalar uma ou mais listas de blocos de www.abuse.ch, um respeitável suíça site anti-malware. Isso efetivamente pára o computador de alcançar sites infectados, minimizando assim o risco de ser infectado com este tipo extremamente perigoso de malware.

Ouvimos nossos usuários e, como resultado Mirage Anti-Bot 2.0 tem vários recursos novos.

Mirage Anti-Bot é gratuito e projetado para ser simples de instalar e fácil de usar. Ele pode correr tranquilamente e eficiente em segundo plano para que você não tem que se preocupar com interrupções ou atualizações que fazem.

Pretendemos adicionar características mais frescas ao longo do tempo. Eventualmente nós queremos criar a melhor ferramenta para bloquear, remover e detectar uma série de tipos os mais temidos de malware.

Changelog:
[+] Instalador
[+] Nova interface gráfica, mais pró
[+] Iniciar com o Windows
[+] Protegê-lo contra Palevo, TDL3, Rogues, C & C, etc.
[+] Protegê-lo contra botnet SpyEye
[+] Confirmar ao sair
[+] Limite exceder bug corrigido, agora ele pega os dados localmente usando SSL
Autenticação [+] Proxy adicionado

Download it via : Brothersoft
http://www.brothersoft.com/mirage-anti-bot-486899.html

This software was coded in Delphi XE (Pascal Object) and still maintain by DarkCoderSc (Jean-Pierre LESUEUR) and directed by Fred De Vries.

Seen on :
http://www.crazyws.fr/securite/mirage-anti-bot-un-outil-anti-botnet-EF8TC.html
http://www.undernews.fr/malwares-virus-antivirus/mirage-anti-bot-2-0-logiciel-de-protection-efficace-contre-les-botnets.html
http://thehackernews.com/2012/02/mirage-anti-bot-20-protection-against.html
http://www.pentestit.com/mirage-anti-bot-anti-botnet-tool/
http://betanews.com/2012/02/16/lightweight-mirage-anti-bot-is-heavy-on-malware/


Posted: 17 Nov 2012 04:27 PM PST
Hello Haxor's  

- Jean-Pierre LESUEUR (DarkCoderSc) lança mais uma ferramenta para Navegador Forense comunitário chamado "Browser Orion Dumper v1.0". Este software é um avançado local, histórico do navegador extractor (dumper), em menos de alguns segundos (como para ferramentas do navegador Forense) que irá extrair o conteúdo de toda história do navegador mais famoso, Na verdade o Internet Explorer, Mozilla Firefox, Google Chrome, Comodo Dragon , RockMelt e Opera. 




Postar um comentário