Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 257 results

  1. This Metasploit module exploits a vulnerability in Total.js CMS. The issue is that a user with admin permission can embed a malicious JavaScript payload in a widget, which is evaluated server side, and gain remote code execution. View the full article
  2. Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below suffer from a remote code execution vulnerability. View the full article
  3. Whatsapp version 2.19.216 suffers from a remote code execution vulnerability. View the full article
  4. Remote exploit for Podman when configured with Varlink that allows for remote command execution, denial of service, directory traversal, and information disclosure vulnerabilities. View the full article
  5. SugarCRM versions 9.0.1 and below suffer from multiple PHP code injection vulnerabilities. View the full article
  6. Visual Studio Code enables its remote debugger by default when installed. View the full article
  7. vBulletin versions 5.5.4 and below suffers from an updateAvatar remote code execution vulnerability. View the full article
  8. IcedTeaWeb suffers from multiple vulnerabilities including directory traversal and validation bypass issues that can lead to remote code execution. The affected versions are 1.7.2 and below, 1.8.2 and below. 1.6 is also vulnerable and not patched due to being EOL. Proof of concepts are provided. View the full article
  9. IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution. View the full article
  10. Joomla versions 3.0.0 through 3.4.6 suffer from a remote code execution vulnerability in configuration.php. View the full article
  11. You would need Oracle VirtualBox to make it work. [Hidden Content]
  12. Intensio-Obfuscator v1.0.6 What is this ? Intensio-Obfsucator tool takes a python source code and transform it into an obfuscated python code Replace all names of variables/classes/functions/files-name to random strings with length defined and all chars to their hexadecimal value Remove all comments, all spaces lines Padding random scripts with an always differents values Requirements Python >= 3.5 requirements.txt Steps usage Put your source code in directory dedicated at your project (directory source will scanned and obfuscated recursively) Create empty directory for output code obfuscated Read all the practices of coding that be ought respect absolutely required code format Modify your source code if it's necessary after have reading required code format Read malfunctions to be informed Obfuscate your code ! commands explained in README [HIDE][Hidden Content]]
  13. 1337day-Exploits

    Exploits mintinstall 7.9.9 Code Execution

    mintinstall version 7.9.9 suffers from an object injection vulnerability. View the full article
  14. Notepad++ (x64) versions prior to 7.7 allow remote code execution or denial of service via a crafted .ml file. View the full article
  15. Counter-Strike Global Offensive (vphysics.dll) versions prior to 1.37.1.1 allow remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, using a crafted map that causes memory corruption. View the full article
  16. vBulletin version 5.x pre-authentication remote code execution Metasploit module. View the full article
  17. Adbot Android Spying Adbot a spying rat whom you can host on web and access through any browser. Realtime command execution Schedule commands Hidden app icon (stealth mode) Fetch SMS in Fetch call logs Fetch contacts Send SMS command Forward received/sent SMS Monitor location Update apk remotely Data collected are retained in database Realtime notifications about device status Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  18. vBulletin version 5.x pre-authentication remote code execution zero day exploit. View the full article
  19. pfSense versions 2.3.4 and 2.4.4-p3 remote code injection exploit. View the full article
  20. Webmin version 1.920 remote code execution exploit that leverages the vulnerability noted in CVE-2019-15107. View the full article
  21. This Metasploit module exploits an Authenticated user with permission to upload and manage media contents can upload various files on the server. Application prevents the user from uploading PHP code by checking the file extension. It uses black-list based approach, as seen in octobercms/vendor/october/rain/src/Filesystem/ Definitions.php:blockedExtensions(). This module was tested on October CMS version version 1.0.412 on Ubuntu. View the full article
  22. FusionPBX version 4.4.8 remote code execution exploit. View the full article