Search the Community

Showing results for tags 'open'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 94 results

  1. The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn’t be able to get from just looking at their profile. The information includes: Username Profile Name URL Followers Following Number of Posts Bio Profile Picture URL Is a Business Account? Connected to a FB account? External URL Joined Recently? Business Category Name Is private? Is Verified? Downloads Public Photos [HIDE][Hidden Content]]
  2. Black Widow black-widow is one of the most useful, powerful and complete offensive penetration testing tool. It provides easy ways to execute many kinds of information gatherings and attacks. Fully Open Source Written in Python Continuously updated and extended Features: Localhost Web GUI Sniffing Website crawling Web page parsing SQL injection Injected database management Brute force attacks Cluster between other black-widows Multiple asynchronous requests Multiple targets management Useful CTF features [HIDE][Hidden Content]]
  3. ProxyMaid is and open source proxy scraper + proxy checker. Building ProxyMaid is written in C# and can be built with Microsoft Visual Studio. Currently I have only build ProxyMaid on Visual Studio Community edition 2013, but other versions will probably work. [HIDE][Hidden Content]]
  4. BLUTO DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Enumeration | Metadata Harvesting It has gone through a large code base change and various feature additions have been added since its first day on the job. Now that RandomStorm has been consumed and no longer exists, I felt it time to move the repo to a new location. So from this git push onwards, Bluto will live here. I hope you enjoy the new Bluto. The target domain is queried for MX and NS records. Sub-domains are passively gathered via Netcraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will attempt to identify if SubDomain Wild Cards are being used. If they are not Bluto will brute force subdomains using parallel sub-processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’ If Wild Cards are in place, Bluto will still Brute Force SubDomains but using a different technique which takes roughly 4 x longer. Netcraft results are then presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted. Changelog v2.4.16 PDFminer Version set – bug fix [HIDE][Hidden Content]]
  5. Devinim Library Software version 19.0504000 suffers from an open redirection vulnerability. View the full article
  6. ParantezTeknoloji Library Software version 16.0519000 suffers from an open redirection vulnerability. View the full article
  7. [Hidden Content]
  8. cdcrossy

    Open Bullet Configs

    Here thought id share with everyone [Hidden Content]
  9. 1337day-Exploits

    Zurmo 3.2.6 Open Redirection

    Zurmo version 3.2.6 suffers from an open redirection vulnerability. View the full article
  10. Cisco Small Business switches versions 200, 300, and 500 suffer from information leakage and open redirection vulnerabilities. View the full article
  11. Penta (PENTest + Automation tool) Penta is a Pentest automation tool using Python3. Main menu Port scanning To check ports for a target. Log output supported. Nmap To check ports by additional means using nmap Check HTTP option methods To check the methods (e.g. GET, POST) for a target. Grab DNS server info To show the info about DNS server. Shodan host search To collect host service info from Shodan. Request Shodan API key to enable the feature. FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with anonymous login. SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in data/dict. [HIDE][Hidden Content]]
  12. Koha Library Software version 18.1106000 suffers from an open redirection vulnerability. View the full article
  13. Spring Security OAuth versions 2.3 prior to 2.3.6 suffer from open redirection vulnerabilities. View the full article
  14. Using open Adb ports we can exploit an Andriod device. you can find open ports here [Hidden Content] To find out how to access a local device --> [Hidden Content] Recent News (New Update v.1.2) Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery Status Get Current Activity [Hidden Content]
  15. dotCMS version 5.1.1 suffers from cross site scripting and open redirection vulnerabilities. View the full article
  16. Using open Adb ports we can exploit a device you can find open ports here [Hidden Content] To find out how to access a local device: [Hidden Content]
  17. WordPress WPAds plugin version 1.0 suffers from an open redirection vulnerability. View the full article
  18. WordPress Nya-Comment-DoFollow plugin version 1.0 suffers from an open redirection vulnerability. View the full article
  19. WordPress LaneMotorSport Responsive theme version 1.8.4 suffers from an open redirection vulnerability. View the full article
  20. WordPress DingTalk theme version LTS 4.6 suffers from an open redirection vulnerability. View the full article
  21. WordPress 4DMayi theme version 4.6 suffers from an open redirection vulnerability. View the full article
  22. WordPress lqcPlugin-regiePublicites plugin version 1.0 suffers from an open redirection vulnerability. View the full article
  23. WordPress Tigin theme version 1.0.5 suffers from an open redirection vulnerability. View the full article
  24. WordPress Xunjin theme version 4.6 suffers from an open redirection vulnerability. View the full article
  25. WordPress Divi-Child theme version 1.0 suffers from an open redirection vulnerability. View the full article