Jump to content
YOUR-AD-HERE
HOSTING

All Activity

This stream auto-updates

  1. Today
  2. 400K gmail combo , country united states Priv 400 000 combo lines US [Hidden Content]
  3. [Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData
  4. [hide][Hidden Content]]
  5. Bagisto version 2.1.2 suffers from a client-side template injection vulnerability.View the full article
  6. [hide][Hidden Content]]
  7. User Registration and Management System version 3.2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.View the full article
  8. where are we back in 2007/8! this is your fifth post talking about the something and asking the something. All you have to do is go to Remote Administrator section and check the new updated post and use the latest rats that are posted recently and stop wasting your and everyone else time. We don't do discussion on this site.
  9. Which button doesn't work? Can you show images?
  10. Yesterday
  11. [Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData
  12. I can't even navigate the site correctly as the buttons do not work when clicking on them.
  13. 🖥️Darkcomet Rat is the best rat ever during its time. My question is "is it Darkcomet still working for hacking on Windows 11 and window 10"? if not its ok. As i am not an up to date person i don't know which Rat sofware are up to date and very good for windows 11 and windows 10, if you can give me suggestion on which RAT is good for 2024 i will be very thankful to you guys. best regards, chhurabura. 💓
  14. AppSpider Pro AppSpider Pro is a desktop solution that scans web and mobile applications for vulnerabilities. AppSpider dynamically assesses these applications for vulnerabilities across all modern technologies, provides tools that speed remediation, and monitors applications for changes. How AppSpider Scans work AppSpider requires basic information about their target applications, such as the name and the base URL. AppSpider then visits the target application and performs the following actions: Registration Tutorial: After installing the Program, Step 1 is to get your reference code, open license and click on this "Using a License Key" Copy Reference Code, go to the Telegram channel to generate your key. Use ucare's appspider keygen bot! in Telegram Channel. [Hidden Content] *That's it, you will have the latest version registered, I tried to make the tutorial as easy as possible to explain it. [hide][Hidden Content]]
  15. This Metasploit module exploits a PHP CGI argument injection vulnerability affecting PHP in certain configurations on a Windows target. A vulnerable configuration is locale dependant (such as Chinese or Japanese), such that the Unicode best-fit conversion scheme will unexpectedly convert a soft hyphen (0xAD) into a dash (0x2D) character. Additionally a target web server must be configured to run PHP under CGI mode, or directly expose the PHP binary. This issue has been fixed in PHP 8.3.8 (for the 8.3.x branch), 8.2.20 (for the 8.2.x branch), and 8.1.29 (for the 8.1.x branch). PHP 8.0.x and below are end of life and have note received patches. XAMPP is vulnerable in a default configuration, and we can target the /php-cgi/php-cgi.exe endpoint. To target an explicit .php endpoint (e.g. /index.php), the server must be configured to run PHP scripts in CGI mode.View the full article
  16. Apache OFBiz versions prior to 18.12.13 are vulnerable to a path traversal vulnerability. The vulnerable endpoint /webtools/control/forgotPassword allows an attacker to access the ProgramExport endpoint which in turn allows for remote code execution in the context of the user running the application.View the full article
  17. PowerVR suffers from an out-of-bounds write of firmware addresses in PVRSRVRGXKickTA3DKM().View the full article
  18. PowerVR suffers from an uninitialized memory disclosure and crash due to out-of-bounds reads in hwperf_host_%d stream.View the full article
  19. Microweber version 2.0.15 suffers from a persistent cross site scripting vulnerability.View the full article
  20. Backdoor.Win32.Plugx malware suffers from an insecure permissions vulnerability.View the full article
  21. Cloudflare Warp+Speed | Unlimited | For 5 Devices | 18.06.2024 [Hidden Content]
  22. Progressive Web App (PWA) Phishing Attack Scenario A user lands on index.html and clicks the "Install Microsoft Application" button. The install app prompt appears and once it is installed by the user, the JavaScript embedded in index.html redirects the PWA window to the phishing page that hase a fake URL bar at the top (i.e. mrd0x.html). Ensure that you're testing this over HTTPS to avoid encountering issues. Files index.html - Landing page that has an "Install Microsoft Application" button. manifset.json - The PWA manifest file. service-worker.js - The PWA service worker. mrd0x.html - This is a sample Microsoft phishing page that has a fake URL bar at the top of the page. styles.css - CSS stylesheet. submit.php - Simple PHP file that logs the credentials entered on the Microsoft phishing page. Usage This repository is simply to demonstrate how PWA phishing works. Don't use it for illegal purposes. A PWA Phishing template which was explained here: [hide][Hidden Content]] Download [hide][Hidden Content]]
  23. Last week
  24. Demo: The new generation of network security technology achieves rapid security emergency through the establishment of a complete asset database for the target. Meet Cyberspace Mapping The core idea of cyberspace mapping technology is a knowledge base established by first analyzing the rules of the target network IT assets, which is a new technology that can respond in the shortest time in the event of a security incident. Different from traditional port scanning and vulnerability scanning, Goby only deals with certain affected areas in case of a vulnerability incident, resulting in quickest response with the least impact on the target network. Others Features: [Hidden Content] [Hidden Content]
  25. SPA-CART CMS version 1.9.0.6 suffers from business logic and user enumeration flaws.View the full article
  26. Payroll Management System version 1.0 suffers from a remote code execution vulnerability.View the full article
  27. WordPress RFC WordPress plugin version 6.0.8 suffers from a remote shell upload vulnerability.View the full article
  28. Cyber Bot-Worm RAT PREVIEW DOWNLOAD: upload.ee: [hide][Hidden Content]]
  1. Load more activity
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.