repo: resdb
action: commit
revision: 
path_from: 
revision_from: 74a8b94c5d12e6f94def15cddd23a439194163fd:
path_to: 
revision_to: 
git.thebackupbox.net
resdb
git clone git://git.thebackupbox.net/resdb
commit 74a8b94c5d12e6f94def15cddd23a439194163fd
Author: d3v11 
Date:   Wed Dec 28 12:18:26 2011 +0000

    updates to splicex

diff --git a/contrib/splicex/tools/im-steal/README b/contrib/splicex/tools/im-steal/README
index 895a1a6046cf9fc7e6275a0397a4676b9d85e585..
index ..eeda10835218860d5d5401daeca33e379c64bcc4 100644
--- a/contrib/splicex/tools/im-steal/README
+++ b/contrib/splicex/tools/im-steal/README
@@ -10,6 +10,13 @@ SPLICEX USAGE:

 splicex --command='im-steal   PASSWORD' -- --test='Account Connected'

+PROXY:
+        --command='torify im-steal   PASSWORD'
+
+        --command='usewithtor im-steal   PASSWORD'
+
+        --command='proxychains im-steal   PASSWORD'
+
 DEPENDS:
 	libpurple-dev, libpurple

diff --git a/contrib/splicex/tools/nicksrv/nicksrv b/contrib/splicex/tools/nicksrv/nicksrv
new file mode 100644
index 0000000000000000000000000000000000000000..e1e2fc115642659e6d8277d85aec94898073d2b2
--- /dev/null
+++ b/contrib/splicex/tools/nicksrv/nicksrv
@@ -0,0 +1,16 @@
+#!/usr/bin/env python
+
+'''
+       This currently does nothing
+       When its finished you will
+       be able to brute force IRC
+       nicksrv.
+                                  '''
+
+from time import sleep
+from socket import *
+import sys
+s=socket(AF_INET,SOCK_STREAM)
+s.connect((sys.argv[1],int(sys.argv[2])))
+s.send('NICK '+sys.argv[3]+'\r\n')
+sleep(5)

-----END OF PAGE-----