I'm Siouxsie.
Printable View
I'm Siouxsie.
I lurked with QJ. Before I signed up, (I think) I lurked for a few days...Then signed up.Zitat:
Zitat von twelve
BTW, twelve:
How can you play 4 games if the max was three? :neutral:Zitat:
Zitat von http://forums.qj.net/arcade.php?&act=Arcade&do =viewtourney&tid=1
And my score is higher than your's, so why am I not moved up?
wow is this thread open again yahoo!!!!!!
Where the **** have you been then?Zitat:
Zitat von master_place_forever
i have been out of internet like a month
You now where it said dont refresh. I refreshed.Zitat:
Zitat von duh
I dunno why you haven't moved up tho, i think TeamOverload has to come and verify them or something.
lol i didnt know you can get a cd full of hacking stuff ^^
I have one. Full of viruses, keyloggers, trojans, and the likes.Zitat:
Zitat von L_o_N_e_R
Meh, it's just a tournament.Zitat:
Zitat von twelve
talk about sloppy seconds...Zitat:
Zitat von cowsruledaworld
Zitat:
Zitat von duh
mine has a few viruses....whats the cd called?
i got a new country...
lol trust budd to show up with a random post.Zitat:
Zitat von Darth Budd
im bored.....some1 do something funny -.-
I LIEK TEH ****
I can't find it atm, but it came from this book:Zitat:
Zitat von L_o_N_e_R
Uberhacker II
More ways to break into a computer
By: Carolyn Meinel
meh my cd is called hacker toolbox...Zitat:
Zitat von duh
ill make a list of waht is has in a sec
-= Double Post =-
Zitat:
Zitat von Siouxsie
same here!!!!!!!
assuming ****s=chicken
-= Double Post =-
ok heres what the cd has:
Backdoor
1. Back Orifice: Tools about back orifice.
2. Backdoor kit: Collection of many backdoor program.
3. Backdoor kit new: New collection of many backdoor program.
4. Backdoor source: Source of backdoor program.
5. Minigift: Another backdoor program.
6. Net spy: Allow you to gain control of another computer using the Internet.
7. Trojan: Control other people's computer.
Crack tool
1. AMI BIOS & AMI WIN BIOS password cracker: A command-line utility.
2. AMI Crack: Crack the Ami BIOS.
3. AMI Decoder: Crack the password of ami bios.
4. ARJ Cracker: Cracks Password Protected ARJ Files.
5. AW: Crack the password of bios.
6. AWARD BIOS password cracker: A command-line utility to generate matching password or to reset one.
7. Accent Office Password Recovery: Recover lost or forgotten passwords to open Microsoft Office documents.
8. Adv Office 2000 Password Recovery (pro): Crack the password.
9. Adv Office 2000 Password Recovery (std): Crack the password.
10. Advanced Archive Password Recovery: Crack the password of archive.
11. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Microsoft Excel.
12. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security.
13. Advanced Office Password Breaker: Decrypt Word and Excel files.
14. Advanced Office XP Password Recovery Professional: Recover passwords for the files created in Microsoft Office applications.
15. Advanced Outlook Express Password Recovery: Crack the outlook express password.
16. Advanced PDF Password Recovery Pro: Crack the PDF password.
17. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
18. Advanced ZIP Password Recovery: Crack the password of zip.
19. Ami BIOS cracker: Crack password of ami bios.
20. BIOS / CMOS tools: Crack the password of bios and cmos.
21. CmosPwd: Recover your cmos password.
22. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
23. Dictionary: Used by cracker to crack the password.
24. Dictionary Maker: Makes Dictionary Files password Crackers.
25. Excel Key: Recover all types of passwords for *.xls files.
26. FBRUTE: Crack unix password.
27. FileMaker Key: Recover passwords for FileMaker databases.
28. Hades cracker: Crack the password.
29. John The Ripper: Crack unix password.
30. Kill CMOS ver 1.00: Crack the password of cmos.
31. L0phtCrack 2.01: Recover passwords for Windows NT.
32. LILOPwd: Display lilo password with it.
33. Lilo crack: Crack password of lilo.
34. Linux crack: Crack password on linux.
35. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
36. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
37. Mac crack: Crack password on Mac.
38. Mail Password Recovery: Recover forgotten password from ANY POP3 client.
39. MailPassword: Recover lost password of e-mail.
40. MakePwl: Create the pwl files.
41. NTFS driver: Access ntfs partition files from MSDOS and change password.
42. NtPassword: Find holes in system security.
43. Office Key: Recover many types of passwords for MS Office files.
44. PGP Crack: Crack the PGP.
45. PWLCRACK: Crack the PWL files.
46. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
47. Paradox Password Recovery Key: Recover passwords for Paradox Database.
48. Passware Kit: Recover the password.
49. Password Recovery Tools: Recover some passwords.
50. Password tools: tools for crack password.
51. Peachtree Key: Recover passwords for Peachtree Complete Accounting company files.
52. PwlTools: Recover login password.
53. Quicken Password Recovery Key: Quicken Key is a program to recover passwords for Quicken (.QDF) files.
54. Register: Register the software.
55. RemPass Ver 2.6: Crack password of bios.
56. SERIALS 2000: Crack the register code.
57. Serial number: Used by cracker to crack s/n.
58. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
59. THC-PrintDates: Crack password using date.
60. Ultimate ZIP Cracker: crack zip files.
61. Unix password crackers: Crack passwords for unix.
62. WPC: WINDOWS PASSWORD CRACKERS.
63. Windows XP / 2000 / NT Key: Reset your Windows XP / 2000 / NT security.
64. Windows crack: Crack password on windows.
65. Windows password crackers: Crack password on windows.
66. Word Key: Recover all types of passwords for *.doc files.
67. Word List: Word dictionary.
68. WordPerfect Password Recovery Key: Recover passwords for WordPerfect Document files.
69. Wzippwd: Creates valid Serial number for Winzip.
70. iMesh Password Recovery: Recover a password installed in the iMesh Client.
71. variation tool: Prepare the word list used by cracker to crack password.
Disassembler
1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi's Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
DoS tool
1. Apache DoS Evasive Maneuvers Module: The Apache DoS Evasive Maneuvers Module is a replacement module for mod_access that provides functionality for fighting off DoS attacks. It does this by rejecting rapidly repeated requests for the same URL from the same addresses using an internal hash table on a per-child basis.
2. Black: Bomb someone's computer with it.
3. IGMP Nuker: Bomb other's computer with this popular tool.
4. Windows DoS kit: Attack computer systems with this useful tools.
5. pagebomb: Bomb windows pager with this tool.
6. windows95/98 patch: Patch you system in order to avoid attack by hackers.
Document
1. Article about hack: Introduce some knowledge about hack.
2. Article about hacker: Tell you how to become a hacker.
3. Articles about DoS: Describe what is DoS attack.
4. Articles about crack: Teach you how to crack.
5. Articles about programming: Introduce some knowledge about programming.
6. Aticles about hack: Narrate some knowledge about hack.
7. Books about hacking: Narrate some knowledge about hacking.
8. Books about linux: Introduce information about linux.
9. Books about network: Tell you knowledge about network.
10. Books about programming: Introduce some knowledge about programming, too.
11. Document about jargon: Tell you some about jargon.
12. Document about pbx: Introduce some pbx knowledge.
13. Document about phreaking: Introduce knowledge about phreaking.
14. Other documents: Introduce you some information.
15. Phrack Documents: Discuss some questions about phrack.
16. The Trojans Removal Database: Describe a lot of Trojan programs.
E-mail tool
1. Anonymous emailer: Send e-mail without being recognized.
2. Bomber: Bomb someone's e-mail box with it.
3. E-mail bomber kit: Bomb some e-mail box with these tools.
4. Extreme mailer: Bomb some victim's e-mail address with it.
5. Fake Mailer: Send fake emails from any email address.
6. Haktek: Use this program to attack your victim or protect yourself from being hacked.
7. KaBoom!: Bomb other's e-mail box.
8. Mail Bomb: Bomb your victim by this e-mail bomber.
9. News Mail Agent: Find any e-mail address in news groups.
10. Phasma 3k: Bomb someone's e-mail box with this program.
11. Quick Fyre: QuickFyre is an anonymous emailer \ mail bomber.
12. Stealth Mailer: Send bombs to other people with this tool.
13. Web Mail Agent: Find any e-mail address in the Internet.
Editor
1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Editor: Edit your binary file with it.
4. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
5. Hex edit: Edit your raw files.
6. HexCmp: HexCmp is a visual binary file compare application and easy to use hex editor. It can help you with to compare two files as a binary raw quickly and easily.
7. HexEditorShareware: User friendly & efficient hexadecimal editor, featuring: unlimitted undo/redo, copy/paste, search/replace, print, jump to offset, etc. It can edit and truncate files of unlimitted size in 4 different modes: HEX, BIN, DEC & ANSI. It contains base converter and hex calculator tools.
8. Hexplorer: Hexplorer is a hexadecimal file editor that offers many features.
9. Hiew: Dump NE-executable file and dump LE/LX-executable file.
Encryption & decryption tool
1. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me.
2. EasyFP: Performs file encryption to protect your files and folders from being read by others.
3. Encrypted Virtual File System: EVFS is a Linux virtual filesystem which sits on top of VFS to access the underlying filesystem.
4. Encryption tools: Collecting a huge munber of encryption and decryption tools.
5. Encryptonite: Encrypt and decrypt text file with it easily.
6. Faena MyID: Keep your ID and password in security.
7. HTML Encrypt: Encrypt your HTML/Script program.
8. Lazy Encryption Algorithm: LEA is a simple algorithm for file encryption that uses boolean algebra and modular arithmetic to test the stream and generate numbers with a logical order.
9. Macintosh Encryption: Include various Macintosh Encryption tools.
10. NetMangler: Encrypt your emails and protect yourself with NetMangler.
11. PC-Encrypt: Compress and encrypt almost any type of file.
12. Password Assistant: Store your all passwords in an encrypted and password protected database.
13. RSA encrypting tool: This is a simple RSA algorithm implementation.
14. WebPassword: Protect your web pages with password.
15. Webroot's PrivacyMaker: Protect your computer with 128-bit encryption.
16. WinSafe: Encrypt your files with some powerful algorithms.
Executable file tool
1. Bound File Detector & Remover: Detect Bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be "bundled" with an executable file.
7. Topo: Scan all sections in order to find large 'usable' areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.
Icq tool
1. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts.
2. Aquila: Recover your passwords with it.
3. Auth bypass 99: Add people without authorization with the tool.
4. ICQ Document: There are two documents about ICQ.
5. ICQ FORCE: Crack ICQ passwords.
6. ICQ MachineGun: Attack victim computer by ICQ.
7. ICQ kit: Attack your victim with these tools.
8. ICQr Information: ICQr Information is able to read and reveal personal information, such as nickname, address, birthday and much more.
9. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive.
10. Send It Agent: Send very large data in no time to the ICQ users.
11. Source code about ICQ: Snoop ICQ traffic for a set host.
Keylogger
1. G2kBIOSspoof: Spoof BIOS password for Gateway pc's simply.
2. HookThis: Set a systemwide keyboard-hook.
3. Hooker: Make intelligent trojan keylogger module.
4. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable.
5. KeySpy: Spy program as a keyboard logger and a PC remote controller.
6. KeyTrap: Log keyboard key effectively!.
7. Keycopy: Keep a record of any keyboard activity on your computer.
8. Keylog: Include keylog tools such as Keylogwn, Keylog95, Keylog5 and Keylog25, IKS12d-m.
9. PC Activity Monitor Net: PC Activity Monitor Net is ultimately invisible and undetectable easy-to-use monitoring and surveillance software for both networked and personal PCs.
10. PC Activity Monitor Pro: PC Activity Monitor Pro is ultimately invisible and undetectable easy-to-use monitoring and surveillance software for both networked and personal PCs.
11. PC Activity Monitor v6.3: Monitor software on PC and saves all information in the LOG files.
12. Phantom2: Record and playback a keystroke program for MS-DOS.
13. Playback!: Record the complete task and then play it back with one keystroke.
14. SKInNT: Monitoring program developed for Windows NT and Windows 2000.
15. Skin: Monitors kit of Skin5pro, Skin98as, Skint5, and Skin5 Demo.
16. Slog: Provide you with a log of what you have typed on your own computer for later review.
MISC
1. Game Hack: Having Game Wizard 32 and CrackAid, two tools.
2. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks.
3. Linux_misc: Collect many Linux misc tools with some source files as TCFS, SILC, DDNSF, St Jude, FreeVSD.
4. Login?Monitor: Login Monitor monitors idle times for logins and kicks users off after they are idle for a set amount of time.
5. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket.
6. Shutdown 2000: Disturb running application program.
7. Strict Login: Set a password before starting Windows.
8. Windows_misc: Contain all kinds of Windows misc tools, especially Wat, Stealth Proxy, Outlook Header Exp, WebClicker2.0, Ap2.74, etc.
Packet forging
1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Netcat for unix: Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol.
3. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
4. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
5. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed or executable files and source files of packet driver programs.
6. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire.
7. Snot: Use snort rules files as its source of packet information.
8. Winject: Inject packet for Windows 9x, also called drugs for Windows.
Phreak tool
1. Auto Dial: MS-DOS based war dialer utility.
2. Blue Dial: Make it easy to create and use different frequency settings for dialing.
3. Boxtone: Create phone tones.
4. CATCALL: Deal out a sentence from mildly annoying to downright galling.
5. CHaoS DeViCe: Call random pagers, puts in a phone number, hangs up, and goes all over again.
6. CPhreak: It is the first fone phreaking utility.
7. Dialing Demon: Wardialer.
8. Grim Scanner: SEARCH FOR DIAL TONES AND CARRIERS IN THE SAME CALL.
9. No Carrier: Scan with Dos shell, graphics and more!.
10. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second.
11. Pageit: Page a BILLION different pagers and put in one number, or Page ONE pager and put in a BILLION numbers!.
12. PhoneTag: Check for STARTTIME every second while it's running.
13. Phreak box: Construct and use phreak box.
14. Super Dial: Call all of your town (or cities) phone numbers.
15. TC Dialer: DTMF dialer for X Windows. Requires soundcard.
16. THC-SCAN: Scan phone-number areas with your modem.
17. The Little Operator: It is another wardialer.
18. Tone Loc Utilities: It is also a wardialer.
19. ToneLoc: Dials numbers, looking for some kind of tone with it.
Scanner
1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.
3. Advanced Net Tools Free: Trace routes and scan ports using it.
4. Angry IP Scanner: Scan IP very easily and rapidly!.
5. Dave's Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.
6. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.
7. IPScanner: Get IP address and computer names.
8. JMap Port Scanner: JMap is a Java network portscanner, a security tool to identify open ports on any host or network subnet.
9. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD 's system security kit!.
10. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.
11. Mpscan: mpscan is a parallel network scanner that checks for open ports.
12. Nessus: Scan security of computer.
13. NessusWX: NessusWX is a client program for Nessus security scanner which is designed specially for Windows platform.
14. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.
15. Netmon: Monitor network connections.
16. Nmap: Explore or security audit network on Linux or Unix.
17. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
18. Port Scan Attack Detector: Port Scan Attack Detector (psad) is a program written in Perl that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans.
19. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
20. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
21. Scanner: Collect 84 tools and misc to scan.
22. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.
23. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
24. THC-Probe: Scan compilation for Linux.
25. THC-Scan: Automate tone, carrier, vmb scanning.
26. Ultima Port Scanner: Scan local and remote ports.
27. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
28. WifiScanner: WifiScanner is an analyzer and detector of 802.11b stations and access points.
29. WinNessus: Scan security of computer.
30. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
31. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
32. XSharez scanner: Scan, search and get specific resources for you.
Sniffer
1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.
3. Ethereal0914: Analyze network protocol freely for Win32.
4. Golden Eye: Monitor your computer with it.
5. InternetPeriscope: Monitor your computer's ports using this program.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure Internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Microsoft ActiveX technology.
11. Phenoelit's own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.
12. ProBot: Monitor your computer using log.
13. ProBot SE: Monitor your computer with it.
14. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.
15. Snarp: Allow the host to sniff the data from the wire.
16. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
17. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
18. Socket Workbench: Designed to analyze socket communications.
19. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
20. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
21. Win Sniffer: Win Sniffer captures passwords on LAN.
22. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
23. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.
Snoop tool
1. ID: Display the ID information of machine's specific hardware.
2. IDScenter: Snort IDScenter is a GUI for Snort IDS on Windows platforms.
3. IPQuery: Show the current IP Address.
4. NetroSnooper: Find hidden files on the Internet!.
5. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.
6. Quadsoft's IP Tool: Tell you your IP Address in a variety of ways.
7. ShellSPY: Track every process running on your PC.
8. SocksChain: Utilite for connecting through chain of SOCKS-proxies. Allows to hide Real IP-address of client.
9. iNetTools for Windows: Collect menu-driven testing tools for Internet and IP-based networks.
Source code
1. APG: Set for random password generation.
2. ARP Monitor: Trace arp requests from/to your machine.
3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.
4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.
5. Blue Beep: Blue Beep is a wardialer, this includes its source code.
6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.
7. Emailcrk: Crack password of e-mail account.
8. Findhost: Scan port on the net for you.
9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.
10. IgmpNuke: Use IGMP packet tool's source code.
11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.
12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.
13. Misc_src: Misc source code of 10 tools.
14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.
15. Nutcracker: check/crack password tool for Unix/Linux.
16. PgpIcq: Encrypt your ICQ messages using the power of the world's best encryption software.
17. Portscanner: Scan a group of IP address.
18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.
19. ShareDecryption: Extract share passwords from registry.
20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.
21. Wnuke4: This is the complete wnuke4 source file package.
22. Zebedee: Secure IP tunnel tool's source code!.
Spoof
1. Credit probe: Creates fake credit card numbers.
2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.
3. IP Spoofer: Support IP spoofing software kit.
4. Ircgspoofer: Spoofer software on IRC Ghost.
5. Pinger: Trick your ISP into thinking you are always active.
Virus
1. Virus_exe: Including six most typical executable virus programs.
2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan's, 89 files in all.
whoa O.o thats a lot
put it in a spoiler for petes sake!
how i do that?
i got bitdefender for free. it rapes.
moomoo..
Worship me!
Zitat:
Zitat von MisterBeefy
are we gonna call this new religion misterbeefy-ism?
I suppose if you really wanted to. But I'm changing my username to KlicK. So henceforth, all MDPR users shall live by KlicK-ism religion.Zitat:
Zitat von L_o_N_e_R
What about Bundy-ism?
http://img49.imageshack.us/img49/7653/larshoo6.png
i dont know what to post so ill just post this.
Agreed.Zitat:
Zitat von gmansixfo
gmansixfo is bringing sexy back .. >_>
god what a beautiful post it is and no one will worship eirther of you 2
Was Up Ma Asian *****z
Why is everybody trying to steal from me? =/
2) Thief
Thief attempt was unsuccessful from duh.
TheMarioKarters 09-24-2006, 03:23 PM 9,187.08
3) Thief
Thief attempt was unsuccessful from duh.
TheMarioKarters 09-24-2006, 03:22 PM 4,593.54
4) Thief
Thief attempt was unsuccessful from duh.
TheMarioKarters 09-24-2006, 03:21 PM 2,296.77
5) Thief
Thief attempt was unsuccessful from duh.
TheMarioKarters 09-24-2006, 03:20 PM 1,148.38
6) Thief
Thief attempt was successful from duh.
SeanyP 09-23-2006, 05:00 PM 100.00
7) Thief
Thief attempt was unsuccessful from duh.
SeanyP 09-23-2006, 04:59 PM 100.00