• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

format

  1. itsMe

    Cracking Format Changer V1.0.0

    Support : Peb , Loli , LoliX , LoliM , Cyb , Svb , Anom Put Your CFG At Configs Folder You Can Change Many Configs Formats !! Hidden content
  2. itsMe

    Converting Playlists to Smart IPTV Format (beta)

    Hidden content
  3. 1

    Exploits ABB IDAL HTTP Server Uncontrolled Format String

    The IDAL HTTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server. The IDAL HTTP server does not safely handle username or cookie strings during the...
  4. 1

    Exploits ABB IDAL FTP Server Uncontrolled Format String

    The IDAL FTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server. View the full article
  5. 1

    Exploits Siemens LOGO! 8 Recoverable Password Format

    Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext. View the full article
  6. dEEpEst

    Hide your "server" in files of any format (JPG, txt, PSD)

    Source @prizrack95  Hidden content
  7. 1

    Exploits Huawei eSpace 1.1.11.103 Meeting Image File Format Handling Buffer Overflow

    Huawei eSpace version 1.1.11.103 Meeting conference whiteboard functionality is vulnerable to a buffer overflow issue when inserting known image file formats. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will...
  8. 1

    Exploits RARLAB WinRAR ACE Format Input Validation Remote Code Execution

    In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as...
  9. S

    How to format combo lists for cracking software

    Hello and thank you for your time and consideration into my inquiry. I am using EZCrack V1.7 multi-purpose cracking tool and I have a considerable list of credentials and mass-sourced E-mail addresses but I am unsure as to A. what type of file extension i should be saving the combolist as, and...
  10. 1

    Exploits Microsoft Windows Contact File Format Arbitary Code Execution

    This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact...
Back
Top