CyberGuerrilla 2013
 Vol.3--No.2013 | 6 Users Online
Saturday,Jan 25,2020 
By Anonymous | June 13, 2013 - 22:08 | Posted in AnonyNews | 1 Comment | Post is random.

By ro0ted | May 31, 2013 - 12:30 | Posted in /b/ | Comments Off on #ro0ted #OpNewblood | Metasploit Meterpreter Script: Getcountermeasure Automated Disable Security

Metasploit Meterpreter Script Getcountermeasure Getcountermeasure is an automated script Disable security measures such as antivirus, firewall, and more.     getgui getgui script is used to enable RDP on a target system.       Telnet gettelnet script is used to enable telnet on the victim.       Winenum Winenum script is used to Read more » 

By Anonymous | July 28, 2013 - 04:47 | Posted in AnonyNews | Comments Off on NSA – Anonymous . Enough, elite. You are FINISHED.

Greetings NSA, Thanks to the actions of Edward Snowden the world is now aware of your absurdly intrusive and elaborate monitoring agenda. Every Verizon user. Every Facebook LinkedIn, Google+ and Twitter account. Every Yahoo!, Bing and Google search result. Every Microsoft Windows, Google Chrome and Apple Mac operating system. Every Safari, Chrome and Internet Explorer Read more » 

By Anonymous | July 26, 2013 - 03:11 | Posted in AnonyNews | 1 Comment

PLEASE READ THE DESCRIPTION FIRST! The video was made in teamwork by Anons around the world and its content belongs to the Internet. This is only an excerpt from the actions of Anonymous during 2012. The operations which are listed in the video are only examples, there are far more operations. Some of them still Read more » 

By Anonymous | July 22, 2013 - 22:59 | Posted in AnonyNews | 1 Comment

For all the newfags & famefags saying shit don’t matter. You obviously haven’t heard of??Agent Robert Smith yet, eh??? [This paste has been removed!]

By Anonymous | July 9, 2013 - 23:46 | Posted in AnonyNews | Comments Off on @MeltemArikan, is victim of a vicious smear campaign in Turkey.

We hear worrying reports that ours friends Memet Ali Alabora, Meltem Arikan, and Pinar Ogun who have been behind the first massively digital play Mi Minor are being the targets of vicious smear campaign by some newspapers. Read Meltem’s post on her website. This sounds like opportunists who have been waiting for an excuse to Read more » 

By Doemela | July 28, 2013 - 05:33 | Posted in CyberGuerrilla | Comments Off on Anarchists in the Turkish Uprising

An interview with anarchists in ??stanbul. They talk about the background of the revolt, the relationship between this uprising and others around the world, and its implications for the future of Turkey. What preexisting organizations have played a role in this new explosion of social struggle? The important thing about this rebellion is that there Read more » 

By ro0ted | July 28, 2013 - 04:33 | Posted in CyberGuerrilla | Comments Off on #ro0ted Hack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer Overflow

This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the ???name??? attribute of the file element. This results in overwriting a structured exception handler record. Exploit Targets Apple Quicktime 7.7.3 Internet Explorer 8 Windows XP Read more » 

By ro0ted | July 27, 2013 - 11:56 | Posted in CyberGuerrilla | Comments Off on #ro0ted Big banks paid corrupt detectives to spy, hack and steal personal data in run-up to the financial crash

Global banks and big City institutions paid corrupt private detectives to carry out spying missions in Britain in the run-up to the financial crisis. International banking institutions dominate a list of 102 companies and named individuals who hired private investigators engaged in hacking, blagging and stealing private information. The revelations are a further blow to Read more » 

By ro0ted | July 27, 2013 - 11:28 | Posted in CyberGuerrilla | Comments Off on #ro0ted Computer researchers demonstrate how cars can by hacked via laptop

A team of computer security researchers recently demonstrated just how easy it is for malicious hackers to physically hijack a modern car using a laptop. By taking advantage of the computer hardware and software built into the automobile???s systems, researchers Chris Miller and Chris Valasek showed that they were able manipulate the displays on the Read more » 

nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <