Search the Community

Showing results for tags 'database'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 165 results

  1. jSQL Injection is a lightweight application used to find database information from a distant server. It is free, open-source, and cross-platform (Windows, Linux, Mac OS X). It is also part of the official penetration testing distribution Kali Linux and is included in other distributions like Pentest Box, Parrot Security OS, ArchStrike, or BlackArch Linux. This software is developed using great open-source libraries like Spring, Spock, and Hibernate, and it uses the platform Travis CI for continuous integration. Each program update is tested with Java version 8 through 13 in the cloud, against various MySQL, PostgreSQL, and H2 databases. Source code is open to pull requests and to any contribution on multi-threading, devops, unit and integration tests, and optimization. Features Automatic injection of 23 kinds of databases: Access, CockroachDB, CUBRID, DB2, Derby, Firebird, H2, Hana, HSQLDB, Informix, Ingres, MaxDB, Mckoi, MySQL{MariaDb}, Neo4j, NuoDB, Oracle, PostgreSQL, SQLite, SQL Server, Sybase, Teradata and Vertica Multiple injection strategies: Normal, Error, Blind and Time SQL Engine to study and optimize SQL expressions Injection of multiple targets Search for administration pages Creation and visualization of Web shell and SQL shell Read and write files on the host using injection Bruteforce of password’s hash Code and decode a string Changelog jSQL Injection v0.85 Compliance to Java 17 Switch to native HttpClient [hide][Hidden Content]]
  2. SnitchDNS SnitchDNS is a database-driven DNS Server with a Web UI, written in Python and Twisted, that makes DNS administration easier with all configuration changed applied instantly without restarting any system services. One of its main features is the logging of all DNS queries allowing the discovery of network traffic endpoints, and it can also be used to implement canary tokens as it supports notifications via e-mail, web push, Slack, and Teams. Red teamers can also use SnitchDNS to monitor phishing domains for sandboxes, integrate with SIEM solutions, restrict responses to specific IP ranges, egress data via a DNS tunnel and catch-all domains, and more. Basic Features Database Driven. Changes are reflected immediately on each DNS request. Supported DBMS: SQLite MySQL / MariaDB Postgres DNS Server Support for common DNS Records. A, AAAA, AFSDB, CNAME, DNAME, HINFO, MX, NAPTR, NS, PTR, RP, SOA, SPF, SRV, SSHFP, TSIG, TXT. Catch-All Domains. Ability to match any subdomain (no matter the depth) to a specific parent domain, for instance, *.hello.example.com. Unmatched Record Forwarding. Functionality to intercept specific queries (ie only A and CNAME) and forward all other records to a third-party DNS server (ie Google). Tags and Aliases. IP Rules Configure Allow/Block rules per domain. Notifications. Receive a notification when a domain is resolved, via: E-mail Web Push Slack Microsoft Teams User Management Multi-User support Each user is given their own subdomain to use. LDAP Support Two Factor Authentication Password Complexity Management Logging All DNS queries are logged, whether they have been matched or not. CSV Logging for SIEM integration. Swagger 2.0 API Deployment Ansible scripts for Ubuntu 18.04 / 20.04 Docker CLI support for the zone, record, user, and settings management. CSV Export/Import [hide][Hidden Content]]
  3. jSQL Injection is a lightweight application used to find database information from a distant server. It is free, open-source, and cross-platform (Windows, Linux, Mac OS X). It is also part of the official penetration testing distribution Kali Linux and is included in other distributions like Pentest Box, Parrot Security OS, ArchStrike, or BlackArch Linux. This software is developed using great open-source libraries like Spring, Spock, and Hibernate, and it uses the platform Travis CI for continuous integration. Each program update is tested with Java version 8 through 13 in the cloud, against various MySQL, PostgreSQL, and H2 databases. Source code is open to pull requests and to any contribution on multi-threading, devops, unit and integration tests, and optimization. Features Automatic injection of 23 kinds of databases: Access, CockroachDB, CUBRID, DB2, Derby, Firebird, H2, Hana, HSQLDB, Informix, Ingres, MaxDB, Mckoi, MySQL{MariaDb}, Neo4j, NuoDB, Oracle, PostgreSQL, SQLite, SQL Server, Sybase, Teradata and Vertica Multiple injection strategies: Normal, Error, Blind and Time SQL Engine to study and optimize SQL expressions Injection of multiple targets Search for administration pages Creation and visualization of Web shell and SQL shell Read and write files on the host using injection Bruteforce of password’s hash Code and decode a string Changelog jSQL Injection v0.83 Various new preferences like thread control, User-agent, Zip, and Dios modes Add 11 database engines: a total of 34 engines Multi modules for continuous integration Fingerprint, stability, and more [hide][Hidden Content]]
  4. MTDb is a multi-purpose movie and TV series platform. It can be used to create many different types of sites, including IMDb or Netflix clones or sites providing free movie streaming links. [Hidden Content] [hide][Hidden Content]]
  5. About Carina Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so that we don't need to store webshell, VPS or cPanel data in "strange places". [HIDE][Hidden Content]]
  6. 208 downloads

    Big Database Combolist Private/Public HQ 700 GB Link Download: Free for users PRIV8

    $100.00 PRIV8

  7. View File Big Database Combolist Private/Public HQ 700 GB Big Database Combolist Private/Public HQ 700 GB Link Download: Free for users PRIV8 Submitter dEEpEst Submitted 17/03/20 Category Files Password ********  
  8. [Hidden Content]
  9. About Pentest Tools Framework INFO: Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. Modules EXPLOIT ========= Exploit Name Rank Description -------------- ------- ------------- exploit/inject_html normal Inject Html code in all visited webpage exploit/robots normal robots.txt Detected exploit/jenkins_script_console good Jenkins-CI Script-Console Java Execution exploit/php_thumb_shell_upload good php shell uploads exploit/cpanel_bruteforce normal cpanel bruteforce exploit/joomla_com_hdflayer manual joomla exploit hdflayer exploit/wp_symposium_shell_upload good symposium shell upload exploit/joomla0day_com_myngallery good exploits com myngallery exploit/jm_auto_change_pswd normal vulnerability exploit/android_remote_access expert Remote Acces Administrator (RAT) exploit/power_dos manual Denial Of Service exploit/tp_link_dos normal TP_LINK DOS, 150M Wireless Lite N Router, Model No. TL-WR740N exploit/joomla_com_foxcontact high joomla foxcontact exploit/joomla_simple_shell high joomla simple shell exploit/joomla_comfields_sqli_rce high Joomla Component Fields SQLi Remote Code Execution exploit/inject_javascript normal Inject Javascript code in all visited webpage exploit/dns_bruteforce high Dns Bruteforce with nmap exploit/dos_attack normal hping3 dos attack exploit/shakescreen high Shaking Web Browser content exploit/bypass_waf normal bypass WAf exploit/enumeration high simple enumeration exploit/restrict_anonymous normal obtain credentials exploit/vbulletin high vBulletin v5.x 0day pre-auth RCE exploit exploit/openssl_heartbleed high dump openssl_heartbleed exploit/samba good Samba EXploits exploit/webview_addjavascriptinterface good Android Browser and WebView addJavascriptInterface Code Execution SCANNERS ======== Scanner Name Rank Description -------------- ------- ------------- scanner/ssl_scanning good SSL Vulnerability Scanning scanner/nmap_scanner normal port scanners nmap scanner/smb_scanning good scan vulnerable SMB server scanner/joomla_vulnerability_scanners high vulnerability scanner/joomla_scanners_v.2 good joomla scaning scanner/joomla_scanners_v3 normal joomla scaning scanner/jomscan_v4 good scan joomla scanner/joomla_sqli_scanners high vulnerability scanners scanner/lfi_scanners good lfi bug scan scanner/port_scanners manual port scan scanner/dir_search high directory webscan scanner/wordpress_user_scan good get wordpress username scanner/cms_war high FULL SCAN ALL WEBSITES scanner/usr_pro_wordpress_auto_find good find user pro vulnerability scanner/nmap_vuln normal vulnerability Scanner scanner/xxs_scaner normal Detected vulnerability xss scanner/spaghetti high Web Application Security Scanner scanner/dnslookup normal dnslookup scan scanner/domain_map normal scanner domain map scanner/dns_report normal dns report scanner/find_shared_dns normal find shared dns scanner/dns_propagation low dns propagation scanner/find_records normal find records scanner/cloud_flare normal cloud flare scanner/extract_links normal links extract scanner/web_robot normal web robots scanner scanner/enumeration normal http-enumeration [Hidden Content]
  10. CentOS Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. View the full article
  11. There exists a command injection vulnerability in the Wordpress plugin wp-database-backup for versions less than 5.2. For the backup functionality, the plugin generates a mysqldump command to execute. The user can choose specific tables to exclude from the backup by setting the wp_db_exclude_table parameter in a POST request to the wp-database-backup page. The names of the excluded tables are included in the mysqldump command unsanitized. Arbitrary commands injected through the wp_db_exclude_table parameter are executed each time the functionality for creating a new database backup are run. Authentication is required to successfully exploit this vulnerability. View the full article
  12. This script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels. The LST file can be generated in IDA from the File menu: Produce file -> Create LST file... [HIDE][Hidden Content]]
  13. In May 2016, the cracking community forum known as Nulled was hacked and 599k user accounts were leaked publicly. This is a partial combo of cracked accounts. Download [hide][Hidden Content]] Download 2 [hide][Hidden Content]] Note: The data was not validated.
  14. Symphony Project sfDoctrinesfPropel version 1.x suffers from a database password disclosure. View the full article
  15. itsMe

    DataBase Splitter

    [Hidden Content]
  16. Zikula Core CMS version 2.0.13 suffers from a database disclosure vulnerability. View the full article
  17. RingsDB Software version 1.0.0 suffers from a database disclosure vulnerability. View the full article
  18. OpenDocMan Document Management System version 1.3.5 suffers from a database disclosure vulnerability. View the full article
  19. ChurchCRM Software version 3.3.2 suffers from a database disclosure vulnerability. View the full article
  20. NIT-Warangal Dispensary Management System India version 1.0 suffers from a database disclosure vulnerability. View the full article
  21. OrangeScrum Project Management Software version 1.6.1 suffers from a database disclosure vulnerability. View the full article
  22. Opus Online Placement University System version 4.2.0 suffers from a database disclosure vulnerability. View the full article
  23. JobSkee Open Source JobBoard version 1.1.3 suffers from a database disclosure vulnerability. View the full article
  24. Gibbonedu The Flexible School Platform version 17.0.00 suffers from a database disclosure vulnerability. View the full article