• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

root

  1. itsMe

    Android Adguard – Block Ads Without Root 4.0.642 [Nightly] [Premium] [Mod Extra]

    Adguard – Block Ads Without Root 4.0.642 [Nightly] [Premium] [No-Root] [Mod Extra] AdGuard is the best way to get rid of intrusive ads and online tracking, and to protect your device from malware. Make your web surfing faster, safer and more comfortable with AdGuard! AdGuard is a unique no...
  2. dEEpEst

    Android How To Root Your Android Device With Just One Click! 

    Hidden content
  3. dEEpEst

    Android How To Root Your Android Device With Just One Click! 

    Hidden content
  4. dEEpEst

    Android How To Use Proxy In Android Phone Without Root

    Hidden content
  5. dEEpEst

    Android AZ SCREEN RECORDER - NO ROOT V5.5.9 B50200 [PREMIUM]

    AZ SCREEN RECORDER - NO ROOT V5.5.9 B50200 [PREMIUM] https://play.google.com/store/apps/details?id=com.hecorat.screenrecorder.free Download: Hidden content
  6. dEEpEst

    Android DNS Changer (no root 3G/WiFi) v1161r (Pro)

    DNS Changer (no root 3G/WiFi) v1161r (Pro) ★★★ World’s first Mobile Data DNS CHANGER (without  root) ★★ DNS Changer is the easiest way to Change DNS. Works without root and works for both WiFi and Mobile Network Data Connection. Unlimited acess to restricted Web Pages No root required WiFi /...
  7. dEEpEst

    Android How To Use Proxy In Android Phone Without Root

    Hidden content
  8. 1

    Exploits Linux Polkit pkexec Helper PTRACE_TRACEME Local Root

    This Metasploit module exploits an issue in ptrace_link in kernel/ptrace.c before Linux kernel 5.1.17. This issue can be exploited from a Linux desktop terminal, but not over an SSH session, as it requires execution from within the context of a user with an active Polkit agent. In the Linux...
  9. 1

    Exploits WebKit WebCore::ReplacementFragment::ReplacementFragment User-Agent Shadow Root Leak

    WebKit suffers from a user-agent shadow root leak in WebCore::ReplacementFragment::ReplacementFragment. View the full article
  10. dEEpEst

    Android ​​Advantage To Root Your Device

    Hidden content
  11. 1

    Exploits AVCON6 Systems Management Platform Remote Root

    AVCON6 Systems Management Platform suffers from a remote root command execution vulnerability. View the full article
  12. dEEpEst

    ​​Advantage To Root Your Device

    Advantage To Root Your Device Hidden content
  13. 1

    Exploits Webmin 1.920 rpc.cgi Remote Root

    This Metasploit module exploits Webmin versions 1.930 and below. This exploit takes advantage of a code execution issue within the function unserialise_variable() located in web-lib-funcs.pl, in order to gain root. The only prerequisite is a valid session id. View the full article
  14. 1

    Exploits Webmin 1.890 expired Remote Root

    Webmin version 1.890 (based on 1.920 research) expired remote root exploit. View the full article
  15. 1

    Exploits Webmin 1.920 Remote Root

    Webmin version 1.920 remote root exploit. View the full article
  16. 1

    Exploits FaceSentry Access Control System 6.4.8 Remote SSH Root Access

    FaceSentry Access Control System version 6.4.8 facial biometric access control appliance ships with hard-coded and weak credentials for SSH access on port 23445 using the credentials wwwuser:123456. The root privilege escalation is done by abusing the insecure sudoers entry file. View the full...
  17. 1

    Exploits FaceSentry Access Control System 6.4.8 Remote Root

    FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script. View the full...
  18. 1

    Exploits Nagios XI Magpie_debug.php Root Remote Code Execution

    This Metasploit module exploits two vulnerabilities in Nagios XI 5.5.6. One allows for unauthenticated remote code execution and another allows for local privilege escalation. When combined, these two vulnerabilities give us a root reverse shell. View the full article
  19. 1

    Exploits Apache 2.4.38 Root Privilege Escalation

    Apache versions 2.4.17 through 2.4.38 suffer from a local root privilege escalation vulnerability due to an out-of-bounds array access leading to an arbitrary function call. View the full article
  20. 1

    Exploits Root Cause Of The CVE-2019-0808 Kernel Privilege Escalation

    This is a write up detailing the root cause of the kernel privilege escalation vulnerabilities Microsoft patched on March 12, 2019. View the full article
Back
Top