Detected 2 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’: def bg_magenta; "\033[45m#{self}\033[0m" end def bg_cyan; "\033[46m#{self}\033[0m" end def bg_gray; "\033[47m#{self}\033[0m" end end def home() text=[ "[*]=========================================[*]", "[*] Auto Sql Injection Exploit V 1.0[*]", "[*] H A M Z A K I L L E R[*]", "[*] Hlyzidi[at]gmail[dot]com[*]", "[*]=========================================[*]" ] for oo in text puts oo.red sleep(0.1) end end […]
↧