Jump to content

Welcome to LeVeL23HackTools

Welcome to LeVeL23HackTools, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be apart of LeVeL23HackTools by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.

  • Announcements

    • dEEpEst

      RESTRICTIONS ON DOWNLOADS   10/17/2018

      You can download 5 files a day, if you want to make unlimited downloads you must buy PRIV8, you will have access to all the parts of the forum and you will be able to download unlimitedly without restrictions for a lifetime.

All Activity

This stream auto-updates     

  1. Today
  2. When the WordPress plugin Snap Creek Duplicator restores a backup, it leaves dangerous files in the filesystem such as installer.php and installer-backup.php. These files allow anyone to call a function that overwrite the wp-config.php file AND this function does not sanitize POST parameters before inserting them inside the wp-config.php file, leading to arbitrary PHP code execution. WARNING: This exploit WILL break the wp-config.php file. If possible try to restore backups of the configuration after the exploit to make the WordPress site work again. View the full article
  3. Exploits HotelDruid 2.3 SQL Injection

    HotelDruid version 2.3 suffers from a remote SQL injection vulnerability. View the full article
  4. Apache OFBiz version 16.11.05 suffers from a cross site scripting vulnerability. View the full article
  5. WordPress AutoSuggest plugin version 0.24 suffers from a remote SQL injection vulnerability. View the full article
  6. ThinkPHP versions prior to 5.0.23 and prior to 5.1.31 suffer from a remote code execution vulnerability. View the full article
  7. Huawei B315s-22 suffers from an information disclosure vulnerability. View the full article
  8. Adobe ColdFusion 2018 suffers from a remote shell upload vulnerability. View the full article
  9. TP-Link Archer C1200 suffers from a cross site scripting vulnerability. View the full article
  10. PrestaShop versions 1.6.x and 1.7.x suffer from a remote code execution vulnerability. View the full article
  11. Tourism Website version Blog suffers from code execution and remote SQL injection vulnerabilities. View the full article
  12. Alumni Tracer SMS version Notification suffers from cross site request forgery and remote SQL injection vulnerabilities. View the full article
  13. SmartFTP Client version 9.0.2623.0 suffers from a denial of service vulnerability. View the full article
  14. Exploits LanSpy 2.0.1.159 Buffer Overflow

    LanSpy version 2.0.1.159 suffers from a local buffer overflow vulnerability. View the full article
  15. PrinterOn Enterprise version 4.1.4 suffers from an arbitrary file deletion vulnerability. View the full article
  16. Linux userfaultfd bypasses tmpfs file permissions. View the full article
  17. Exploits WebKit JIT Proxy Object Issue

    WebKit JIT int32/double arrays can have proxy objects in the prototype chains. View the full article
  18. This paper and proof of concept describes the Wiederganger-Attack, a new attack vector that reliably allows to escalate unbounded array access vulnerabilities occurring in specifically allocated memory regions to full code execution on programs running on i386/x86_64 Linux. Wiederganger-attacks abuse determinism in Linux ASLR implementation combined with the fact that (even with protection mechanisms such as relro and glibc's pointer mangling enabled) there exist easy-to-hijack, writable (function) pointers in application memory. View the full article
  19. Yesterday
  20. The cryptors were taken from another forum, they were hidden from ordinary users. I decided to share with you. Take my friends ScanMyBin IMG IMG2 Download PCLOUD
  21. Shell Checker

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  22. Saudi Sh3ll v1.0

    [Hidden Content]
  23. Zoho ManageEngine OpManager version 12.3 prior to build 123237 has a cross site scripting vulnerability in the domainController API. View the full article
  24. hola foro soy z4z4

    Bienvenido! Prueba el NanoCore!
  25. This Metasploit module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This Metasploit module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit). View the full article
  26. McAfee True Key version 5.1.173.1 on Windows 10 1809 has multiple issues in the implementation of the McAfee.TrueKey.Service which can result in privilege escalation through executing arbitrary processes or deleting files and directories. View the full article
  27. Google Chrome version 70.0.3538.77 stable suffers from cross site scripting and man-in-the-middle vulnerabilities. View the full article
  1. Load more activity
×