Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   12456

OVH Method Leak and explaination.

by Varkov - 21 February, 2021 - 12:30 AM
This post is by a banned member (LULHAXOR69x420) - Unhide
16
Posts
0
Threads
4 Years of service
#57
Is this working? Thanks for sharing
This post is by a banned member (KatExoDew) - Unhide
KatExoDew  
Registered
6
Posts
0
Threads
3 Years of service
#58
Thanks you very good
This post is by a banned member (DeLeTeD9) - Unhide
DeLeTeD9  
Registered
72
Posts
2
Threads
3 Years of service
#59
Thank you bro
[Image: 1656824223830_mty2.png]
 


?Join For More Post?
This post is by a banned member (href) - Unhide
href  
Registered
29
Posts
0
Threads
4 Years of service
#60
Thanks
This post is by a banned member (Zqseh) - Unhide
Zqseh  
Registered
19
Posts
0
Threads
3 Years of service
#61
(21 February, 2021 - 12:30 AM)Varkov Wrote: Show More
General Information
Name: OVH-SLAVIC.C
Targets: OVH Servers
Protocol: UDP
Type: Raw
Payload (hex): 081e77da + random
 
Description:
This method was used on several stressers under different names.
It was sold by someone called 'Slavicd' who claims to have written the code but in reality was just reselling a script.
 
Disclaimer
Only use the method for education purpose only.
 

Thank you big daddy
This post is by a banned member (utku1114) - Unhide
This post is by a banned member (meneljebany620) - Unhide
This post is by a banned member (mintyplugz111) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)