Search the Community

Showing results for tags 'remote'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 228 results

  1. Webmin version 1.920 remote code execution exploit that leverages the vulnerability noted in CVE-2019-15107. View the full article
  2. Opencart version pre-authentication remote command execution exploit. View the full article
  3. AVCON6 Systems Management Platform suffers from a remote root command execution vulnerability. View the full article
  4. Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. View the full article
  5. WordPress versions 5.2.3 and below remote cross site host modification proof of concept demo exploit. View the full article
  6. FusionPBX version 4.4.8 remote code execution exploit. View the full article
  7. Pulse Secure versions 8.1R15.1, 8.2, 8.3, and 9.0 SSL VPN remote code execution exploit. View the full article
  8. FileThingie version 2.5.7 suffers from a remote shell upload vulnerability. View the full article
  9. The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products. View the full article
  10. DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). View the full article
  11. A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to are affected. RV130W Wireless-N Multifunction VPN Router versions prior to are affected. RV215W Wireless-N VPN Router versions prior to are affected. Note: successful exploitation may not result in a session, and as such, on_new_session will never repair the HTTP server, leading to a denial-of-service condition. View the full article
  12. 1337day-Exploits

    Exploits Webmin 1.920 rpc.cgi Remote Root

    This Metasploit module exploits Webmin versions 1.930 and below. This exploit takes advantage of a code execution issue within the function unserialise_variable() located in, in order to gain root. The only prerequisite is a valid session id. View the full article
  13. Remote Access Tool Trojan List - Android Github: [Hidden Content] This repo contents all RAT trojan android as I know so far (free or paid app) with permission and feature used list for my documentation. Looking for free port forwarding without buy VPN or Router setting?? Use Ngrok DroidJack [Hidden Content] Camera Storage SMS CALL Whatsapp Reader Contact Browser History App Manager GPS Location Microphone AndroRAT [Hidden Content] Get contacts (and all theirs informations) Get call logs Get all messages Location by GPS/Network Monitoring received messages in live Monitoring phone state in live (call received, call sent, call missed..) Take a picture from the camera Stream sound from microphone (or other sources..) Streaming video (for activity based client only) Do a toast Send a text message Give call Open an URL in the default browser Do vibrate the phone SpyNote Bind your server APK with any other Game or App. Explore Files with full access. Read/Write Messages. Make a call, record a call and browse call logs. Read and write contact list. Capture photos and videos. Listen live conversation through mic, record mic sound live. Check browser history. Get GPS Location. Check installed apps. Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER). Fun Panel (Show messages, shake the phone etc) AhMyth [Hidden Content] Camera Storage Microphone Location Contact Message Call Logs TheFatRAT [Hidden Content] execute command getuid process lost sysinfo record microphone camera snap, stream, list BetterAndroRAT [Hidden Content] Remote Update & Install Application Remote WebCam Remote Microphone Record Remote File Management Remote Call & SMS Remote Device Controller UnknownRAT Storage access Android Tools such, take photo, screenshot etc Record audio android_trojan / Android Trojan [Hidden Content] shell command upload file sms dump download restart location info record mic stream sync file clear and quit storage call log history contact OmniRAT Fully Remote Access Activity Information File Manager App Widgets Audio Information Battery Information Bluetooth Information Call Information Camera Information Configuration Information Connectivity Information Contacts Information, Device admin Information Display Information Installed Apps Information Location Information Memory Information APK Installer Call & SMS Surveillance and many more Android Voyage Remote Android Screen Screenshot Keylogger Traffic Monitor Make as system application Lock and unlock application Hide and unhide application Remove android password Message Access Bricks the device, Anti Antivirus Self Destructive Mode Password Grabbers NetWire camera audio keylogger storage download upload location etc rdroid [Hidden Content] Contact System App Storage Call Message Shell LokiDroid Call Contact Message Storage Location App KevDroid Installed applications Phone number Phone Unique ID Location (the application tries to switch on the GPS), this information is collected every 10 seconds, which is aggressive for this kind of spying tool Stored contacts information (name, phone numbers, emails, photos, etc.) Stored SMS Call logs Stored emails Photos Recording calls columbus-trojan [Hidden Content] (cute trojan) Image (front-facing camera) 10-second sound clip (microphone) Location (mobile triangulation) GhostCtrl Admin Voice record Message Location Pupy [Hidden Content] Text to speech for Android to say stuff out loud webcam snapshots (front cam & back cam) GPS tracker ! TeleRAT and IIRAT (Telegram BOT) Contact Clipboard App list Camera SMS Storage Control Admin Screen Microphone Vibrate Hidden Cobra Proxy Contact SMS Payload Dendroid [Hidden Content] Deleting call logs Opening web pages Dialing any number Recording calls SMS intercepting Uploading images and video Opening an application Performing denial-of-service attacks Changing the command and control server Casperspy [Hidden Content] Similar with dendroid Actually Botnet by dendroid SMS Camera Mic Storage Browser open page Joanap Mic botnet steal log SHConnect [Hidden Content] Camera Location Storage HighRise Incoming outgoing SMS LaRAT [Hidden Content] Get messages Screenshot Functionality Camera Access Add Google form for passwords Triout Framework Record phonecall, save it, send it to C&C SMS Logs Call Logs Steal Images or Video, Camera Access Hide Cerberusapp [Hidden Content] Storage Location Camera Admin notdeleteable more Pegasus Storage Mic Screenshot Calender Instant Messaging Contact & Call & SMS & Mail Browser History Device Setting Location Adobot [Hidden Content] Realtime command execution Schedule commands Hidden app icon (stealth mode) Fetch SMS in Fetch call logs Fetch contacts Send SMS command Forward received/sent SMS etc Adroid Spy App [Hidden Content] Contact Logs SMS Location Photos Etc SpyApp Client [Hidden Content] Notification Listener (Facebook, whatsapp, email, instagram etc) Call Logs Contact SMS Etc i-spy Android [Hidden Content] Camera Location Storage Etc FinSpy Storage Phone information Call Sms Mms Contact GPS Location Voip record such Skype, WeChat, Viber, LINE etc Monokle GPS location Audio record, call record Screen recording Keylogger and fingerprint-device duplicate History browser and Call log, SMS Email logs, create a Call and SMS Contact and calender Shell as root (rooted/rootable) Cerberus Banking Bots Bank and CC Logs information Mail logs SMS, Call (+Forward), Contact, GPS, Audio Monitoring all activity / logs Push to turnoff Play Protected (Disable) Download, Install, Remove Apps Lock device
  14. YouPHPTube version 7.4 suffers from a remote code execution vulnerability. View the full article
  15. This python script mints a .ps file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell. View the full article
  16. 1337day-Exploits

    Exploits Webmin 1.890 expired Remote Root

    Webmin version 1.890 (based on 1.920 research) expired remote root exploit. View the full article
  17. 1337day-Exploits

    Exploits Webmin 1.920 Remote Root

    Webmin version 1.920 remote root exploit. View the full article
  18. 1337day-Exploits

    Exploits Webmin Remote Comman Execution

    Webmin unauthenticated remote command execution exploit that identifies whether or not a target is vulnerable. View the full article
  19. EyesOfNetwork version 5.1 authenticated remote command execution exploit. View the full article
  20. This Metasploit module exploits a command injection vulnerability in the Tesla Agent botnet panel. View the full article
  21. ManageEngine opManager version 12.3.150 suffers from an authenticated code execution vulnerability. View the full article
  22. TortoiseSVN version 1.12.1 suffers from a remote code execution vulnerability. View the full article
  23. This Metasploit module exploits SQL injection and command injection vulnerabilities in the ManageEngine Application Manager versions 14.2 and below. View the full article
  24. This Metasploit module exploits SQL injection and command injection vulnerability in the OpManager versions 12.4.034 and below. View the full article
  25. This Metasploit module bypasses the user password requirement in the OpManager versions 12.4.034 and below. It performs authentication bypass and executes commands on the server. View the full article