Search the Community

Showing results for tags 'code'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 173 results

  1. Horde Webmail version 5.2.22 suffers from code execution, cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. View the full article
  2. This Metasploit module exploits a remote code execution vulnerability found in GetSimpleCMS versions 3.3.15 and below. An arbitrary file upload (PHPcode for example) vulnerability can be triggered by an authenticated user, however authentication can be bypassed by leaking the cms API key to target the session manager. View the full article
  3. View File Code School + Pluralsight [Site Riper - All Courses PACK 99.01 GB] Code School + Pluralsight [Site Riper - All Courses PACK 99.01 GB] You can download for free if you are a PRIV8 user Submitter dEEpEst Submitted 16/05/19 Category Libro Online Password ********  
  4. Version 1.0.0

    Code School + Pluralsight [Site Riper - All Courses PACK 99.01 GB] You can download for free if you are a PRIV8 user

    $100.00 PRIV8

  5. @.Root

    Source Code AndroRat

    [Hidden Content]
  6. This Metasploit module exploits a command execution vulnerability in PHP-Fusion versions 9.03.00 and below. It is possible to execute commands in the system with ordinary user authority. View the full article
  7. Nosophoros

    Mosaique RAT Source Code

    Mosaique - Remote administration tools Mosaique is writing in C# under the MVC architecture, ZeroFormatter serializer is used. The wpf was used to create the graphical interface of the server application. Features UI : Flat Design Tcp Protocol : IPv4 & IPv6 Customizable executable icon Manage features : Uninstall client Close client System features : System information File manager Task manager Startup manager //Broken Administrator elevator Registry editor Spying features : Remote desktop Remote webcam Remote shell Password recovery //Broken Keylogger Fun Features Open/Close tray CD Send MessageBox Hide desktop Play song Remote chat [HIDE][Hidden Content]]
  8. The probably most powerful SQLi Dumping Panel named SIB! This panel is faster than SQLi Dumper and many other sqli tools. [HIDE][Hidden Content]]
  9. An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. View the full article
  10. ReadyAPI versions 2.5.0 and 2.6.0 suffer from a remote code execution vulnerability. View the full article
  11. LG SuperSign EZ CMS, that many LG SuperSign TVs have built-in, is prone to a remote code execution vulnerability due to an improper parameter handling. View the full article
  12. WordPress Social Warfare plugin versions prior to 3.5.3 suffer from a remote code execution vulnerability. View the full article
  13. Microsoft Windows PowerShell ISE will execute wrongly supplied code when debugging specially crafted PowerShell scripts that contain array brackets as part of the filename. This can result in ISE executing attacker supplied scripts pointed to by the filename and not the "trusted" PS file currently loaded and being viewed by a user in the host application. This undermines the integrity of PowerShell ISE allowing potential unexpected remote code execution. View the full article
  14. Download: [HIDE][Hidden Content]] Password:
  15. This Metasploit module exploits a vulnerability in Ruby on Rails. In development mode, a Rails application would use its name as the secret_key_base, and can be easily extracted by visiting an invalid resource for a path. As a result, this allows a remote user to create and deliver a signed serialized payload, load it by the application, and gain remote code execution. View the full article
  16. Combo Type: Email or user | Pass Proxy: Yes - SOCKS4/5 | Http | Https | Bots/Threads: 50 Capture: Premium | Free Capture: Yes Site Link: [HIDE][Hidden Content]]
  17. This Metasploit module will execute an arbitrary payload on an "ESEL" server used by the AIS logistic software. The server typically listens on port 5099 without TLS. There could also be server listening on 5100 with TLS but the port 5099 is usually always open. The login process is vulnerable to an SQL Injection. Usually a MSSQL Server with the 'sa' user is in place. This module was verified on version 67 but it should also run on lower versions. An fixed version was created by AIS in September 2017. However most systems have not been updated. In regard to the payload, unless there is a closed port in the web server, you dont want to use any "bind" payload. You want a "reverse" payload, probably to your port 80 or to any other outbound port allowed on the firewall. Currently, one delivery method is supported This method takes advantage of the Command Stager subsystem. This allows using various techniques, such as using a TFTP server, to send the executable. By default the Command Stager uses 'wcsript.exe' to generate the executable on the target. NOTE: This module will leave a payload executable on the target system when the attack is finished. View the full article
  18. This is the full source code of Carbanak used some years back for banking intrusions worth 1 billion euros: [HIDE][Hidden Content]] and analysis: [HIDE][Hidden Content]] I hope is useful for the forum.
  19. This Metasploit module exploits a PHP unserialize() in Pimcore before 5.7.1 to execute arbitrary code. An authenticated user with "classes" permission could exploit the vulnerability. The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method makes it possible to exploit the unserialize function when passing untrusted values in "data" parameter. Tested on Pimcore 5.4.0-5.4.4, 5.5.1-5.5.4, 5.6.0-5.6.6 with the Symfony unserialize payload. Tested on Pimcore 4.0.0-4.6.5 with the Zend unserialize payload. View the full article
  20. An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. View the full article
  21. Recover Deleted photo is an application that has a very high search on google play because most people lose photos and want to recover them. This application is for illiterate users, those who delete an image in the gallery and do not know how to search in the hidden directory, then the image can be in a directory (whatsapp folder for example) so this application can help these users to recover their images. Demo: [Hidden Content] [Hidden Content]
  22. [Hidden Content]
  23. In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path. This module will attempt to extract a payload to the startup folder of the current user. It is limited such that we can only go back one folder. Therefore, for this exploit to work properly, the user must extract the supplied RAR file from one folder within the user profile folder (e.g. Desktop or Downloads). User restart is required to gain a shell. View the full article
  24. The hardened VirtualBox process on a Windows host does not secure its COM interface leading to arbitrary code injection and elevation of privilege. View the full article