Search the Community

Showing results for tags 'php'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 52 results

  1. This Metasploit module exploits a vulnerability in the PHP Laravel Framework for versions 5.5.40, 5.6.x up to 5.6.29. Remote command execution is possible via a correctly formatted HTTP X-XSRF-TOKEN header, due to an insecure unserialize call of the decrypt method in Illuminate/Encryption/Encrypter.php. Authentication is not required, however exploitation requires knowledge of the Laravel APP_KEY. Similar vulnerabilities appear to exist within Laravel cookie tokens based on the code fix. In some cases the APP_KEY is leaked which allows for discovery and exploitation. View the full article
  2. dEEpEst

    IRC PHP BOT Simple

    [Hidden Content]
  3. itsMe

    web-based-crypter C & PHP

    Full Source C and Web Files [HIDE][Hidden Content]]
  4. Versionscan - A PHP Version Scanner For Reporting Possible Vulnerabilities Versionscan is a tool for evaluating your currently installed PHP version and checking it against known CVEs and the versions they were fixed in to report back potential issues. PLEASE NOTE: Work is still in progress to adapt the tool to linux distributions that backport security fixes. As of right now, this only reports back for the straight up version reported. [HIDE][Hidden Content]]
  5. This Metasploit module exploits a php object instantiation vulnerability that can lead to remote code execution in Shopware. An authenticated backend user could exploit the vulnerability. The vulnerability exists in the createInstanceFromNamedArguments function, where the code insufficiently performs whitelist check which can be bypassed to trigger an object injection. An attacker can leverage this to deserialize an arbitrary payload and write a webshell to the target system, resulting in remote code execution. Tested on Shopware git branches 5.6, 5.5, 5.4, 5.3. View the full article
  6. Security controls configured via php.ini directives at the PHP_INI_SYSTEM level are ineffective as they could be bypassed by malicious scripts via writing their own process memory on the Linux platform. Proof of concept code included. View the full article
  7. hailmary:~# is a very basic, single-file, PHP shell. It's meant to be a mini destructive tool which you can deploy and destroy files quickly. Use it with caution: this script represents a security risk for the server. It was built for using on remote servers we set for clients who did not pay for the complete product, as consequence hailmary would wipe our product from there. Features: Display directory location where it's placed. Delete all files and folders inside a specified path Commands: WARNING: THIS SCRIPT IS A SECURITY HOLE. DO NOT UPLOAD IT ON A SERVER UNTIL YOU KNOW WHAT YOU ARE DOING! [Hidden Content]
  8. PHP version 7.2 suffers from an imagecolormatch() out-of-band heap write vulnerability. View the full article
  9. Jettweb PHP Hazir Rent A Car Sitesi Scripti version 2 suffers from a remote SQL injection vulnerability. View the full article
  10. Jettweb Php Hazir ilan Sitesi Scripti version 2 suffers from a remote SQL injection vulnerability. View the full article
  11. A simple mailer to test the php mail function on a webserver or to simply send emails. Download: [hide][Hidden Content]]
  12. Jettweb PHP Hazir Haber Sitesi Scripti version 3 suffers from multiple remote SQL injection vulnerabilities. View the full article
  13. Jettweb PHP Hazir Haber Sitesi Scripti version 2 suffers from a remote SQL injection vulnerability that allows for authentication bypass. View the full article
  14. Jettweb PHP Hazir Haber Sitesi Scripti version 1 suffers from multiple remote SQL injection vulnerabilities. View the full article
  15. Netartmedia PHP Real Estate Agency version 4.0 suffers from a remote SQL injection vulnerability. View the full article
  16. Netartmedia PHP Business Directory version 4.2 suffers from a remote SQL injection vulnerability. View the full article
  17. Netartmedia PHP Car Dealer suffers from a remote SQL injection vulnerability. View the full article
  18. Netartmedia PHP Dating Site suffers from a remote SQL injection vulnerability. View the full article
  19. dEEpEst

    700+ PHP Scripts 

    700+ PHP Scripts Download: [Hidden Content]
  20. Netartmedia PHP Mall version 4.1 suffers from a remote SQL injection vulnerability. View the full article
  21. PHP MySQLi Database Class version 2.9.2 which is from joshcam suffers from a remote SQL injection vulnerability. View the full article
  22. This Metasploit module exploits a command injection vulnerability in elFinder versions prior to 2.1.48. The PHP connector component allows unauthenticated users to upload files and perform file modification operations, such as resizing and rotation of an image. The file name of uploaded files is not validated, allowing shell metacharacters. When performing image operations on JPEG files, the filename is passed to the exiftran utility without appropriate sanitization, causing shell commands in the file name to be executed, resulting in remote command injection as the web server user. The PHP connector is not enabled by default. The system must have exiftran installed and in the PATH. This module has been tested successfully on elFinder versions 2.1.47, 2.1.20, and 2.1.16 on Ubuntu. View the full article
  23. PHP Ecommerce Script version 2.0.6 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  24. dEEpEst

    Check PHP Codes Error 

    Check PHP Codes Error Check PHP Errors Online : [Hidden Content]
  25. [HIDE][Hidden Content]] Welcome to Parva Keylogger - Pro HOW TO USE: To use Parva keylogger, you will need a webhost. Parva Keylogger is using a php script to upload the logs. 1. Open Parva Keylogger. 2. Click "Show upload files" 3. Upload all the content to you website. 4. In Parva keylogger, insert the full path to upload.php 5. Click "Build" You have now generated a keylogger that will send logs to you. Logs will be sent each time a infected client machine is restarted.