Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 98 results

  1. dEEpEst

    Gaana Code 6 Months

    [Hidden Content]
  2. dEEpEst

    ViU Code

    [Hidden Content]
  3. BlogEngine.NET version 3.3.6 suffers from code execution and directory traversal vulnerabilities. View the full article
  4. VA MAX version 8.3.4 suffers from a post-authentication remote code execution vulnerability. View the full article
  5. Indusoft Web Studio version 8.1 SP2 suffers from a remote code execution vulnerability. View the full article
  6. What is BinCAT? BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation. It features: value analysis (registers and memory) taint analysis type reconstruction and propagation backward and forward analysis use-after-free and double-free detection [HIDE][Hidden Content]]
  7. Cisco Identity Services Engine (ISE) version 2.4.0 suffers from cross site scripting, java deserialization, and in conjunction can lead to remote code execution. Full exploit provided. View the full article
  8. Fnord is a pattern extractor for obfuscated code Description Fnord has two main functions: Extract byte sequences and create some statistics Use these statistics, combine length, number of occurrences, similarity and keywords to create a YARA rule 1. Statistics Fnord processes the file with a sliding window of varying size to extract all sequences of with a minimum length -m X (default: 4) up to a maximum length -x X (default: 40). For each length, Fnord will present the most frequently occurring sequences -t X (default: 3) in a table. Each line in the table contains: Length Number of occurrences Sequence (string) Formatted (ascii/wide/hex) Hex encoded form Entropy [HIDE][Hidden Content]]
  9. BEWARD N100 H.264 VGA IP Camera version M2.1.6 suffers from two authenticated command injection vulnerabilities. The issues can be triggered when calling ServerName or TimeZone GET parameters via the servertest page. This can be exploited to inject arbitrary system commands and gain root remote code execution. View the full article
  10. devolo dLAN 550 duo+ version 3.1.0-1 suffers from a remote code execution vulnerability. The devolo firmware has what seems to be a 'hidden' services which can be enabled by authenticated attacker via the the htmlmgr CGI script. This allows the attacker to start services that are deprecated or discontinued and achieve remote arbitrary code execution with root privileges. View the full article
  11. [Hidden Content]
  12. 1) Start this by downloading one of the variants of "Simple Active Bot". Download: (Supervisor DOS V1) [hide][Hidden Content]] 2) Change the API to yours Google API. (PM me if you need help) 3) Grab a list of Google Dorks at [hide][Hidden Content]] 4) Manually explore the dorks and try to figure it out how it works. Once you have found a vulnerability (doesn't need to be a vuln can be a function that it's only available after login) you configure the execution for the script to be automatic. 5) With all in place, execute. Warning: Depending on the severity of each exploit you can make real damage with this simple guide. I have a few exploits that have been build to automaticaly execute the payloads. A payload example will be to authenticate in a router, add the router to a Dynamic DNS address and reboot it in order for it not to be found again (Only by Dynamic DNS). For more than 500 exploits buy Simple Active Bot: [hide][Hidden Content]]
  13. PDF Signer version 3.0 suffers from a server-side template injection vulnerability that can help lead to remote command execution due to improper cookie handling and cross site request forgery issues. View the full article
  14. WordPress Add Code To Head upsite_analytics_plugin plugin version 1.13 suffers from a remote SQL injection vulnerability. View the full article
  15. Ghostscript has an issue with pseudo-operators that can lead to remote code execution. Version 9.26 is affected. View the full article
  16. Microsoft Windows has a flaw where a contact file can be leveraged with a malicious mailto: link to achieve code execution. View the full article
  17. Joomla! vBizz component version 1.0.7 suffers from a code execution vulnerability. View the full article
  18. Nagios XI version 5.5.6 suffers from remote code execution and privilege escalation vulnerabilities. View the full article
  19. Microsoft Windows VCF or Contact file URL manipulation arbitrary code execution proof of concept exploit. Tested on Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. Both x86 and x64 architectures were tested. View the full article
  20. ShoreTel / Mitel Connect ONSITE ST14.2 suffers from a remote code execution vulnerability. View the full article
  21. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to the processing of ".contact" files node param which takes an expected website value, however if an attacker references an executable file it will run that instead without warning instead of performing expected web navigation. This is dangerous and would be unexpected to an end user. View the full article
  22. This Metasploit module is a Hootoo HT-05 remote code execution exploit. View the full article
  23. Live Call Support version 1.5 suffers from code execution and remote SQL injection vulnerabilities. View the full article
  24. Umbraco CMS version 7.12.4 suffers from an authenticated remote code execution vulnerability. View the full article
  25. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of VCard files. Crafted data in a VCard file can cause Windows to display a dangerous hyperlink. The user interface fails to provide any indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of the current user. View the full article