• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

google

  1. A

    Adding 3rd party SDK to your apps?

    I know, a lot has been said now about adding some 3rd party SDK to your app, as Google started banning a lot of apps or developers recently. But tbh, most of the cases i have seen, were developers fault. As i have read, if your app has been removed due to having 3rd party SDK, its basically...
  2. E

    Making Google search results actionable

    Normally a user uses Google to search and this results are showned in a page with 10 results to a maximum of 1000 results. Since anyone uses Google to search they have release a way to narrow the results down to a few domains. This is called CSE (Custom Search Engine). Recently Google have...
  3. 1

    Exploits Joomla GMapFP Google Map 3.52 SQL Injection

    Joomla GMapFP Google Map component version 3.52 suffers from a remote SQL injection vulnerability. View the full article
  4. itsMe

    XGDork v1.0- ViraX Google Dork Scanner [FIX UPDATE]

    SQLi Google Dork Scanner by ViraX @ 2018 - 2019 for Python 2.7 - compatible Android(NoRoot) - Termux A simple 'naive' python tool to find SQLi Vulnerable websites in the wild via Google. [!] DISCLAIMER: I am not responsible for illegal acts that you would do with this program !, only...
  5. 1

    Exploits Google Chrome V8 JavaScript Engine 71.0.3578.98 Denial Of Service

    Google Chrome V8 JavaScript Engine version 71.0.3578.98 suffers from a denial of service vulnerability. View the full article
  6. 1

    Exploits unCaptcha2 - Google ReCaptcha Proof Of Concept

    unCaptcha2 is a proof of concept that defeats the latest version of ReCaptcha with 91% accuracy as of January, 2019. View the full article
  7. 1

    Exploits PrestaShop Google GSnippetsReviews 1.6.1.4 Database Disclosure

    PrestaShop Google GSnippetsReviews modules version 1.6.1.4 suffers from a database disclosure vulnerability. View the full article
  8. 1

    Exploits Facebook And Google Reviews System For Businesses 1.1 Code Execution

    Facebook And Google Reviews System For Businesses version 1.1 suffers from a code execution vulnerability. View the full article
  9. 1

    Exploits Facebook And Google Reviews System For Businesses 1.1 SQL Injection

    Facebook And Google Reviews System For Businesses version 1.1 suffers from a remote SQL injection vulnerability. View the full article
  10. 1

    Exploits Facebook And Google Reviews System For Business 1.0 CSRF

    Facebook And Google Reviews System For Business version 1.0 suffers from a cross site request forgery vulnerability. View the full article
  11. 1

    Exploits Google Chrome 70.0.3538.77 Cross Site Scripting / Man-In-The-Middle

    Google Chrome version 70.0.3538.77 stable suffers from cross site scripting and man-in-the-middle vulnerabilities. View the full article
  12. 1

    Exploits Google Allo Denial Of Service

    Google Allo suffers from a denial of service vulnerability. View the full article
  13. dEEpEst

    Google Dorks List 2018

  14. 1

    Exploits Google Android USB Directory Traversal

    Android suffers from a directory traversal vulnerability leveraged over USB via injection in blkid output. View the full article
Back
Top