Search the Community

Showing results for tags 'exploit'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 58 results

  1. XCat XCat is a command-line tool to exploit and investigate blind XPath injection vulnerabilities. It supports a large number of features: Auto-selects injections (run xcat injections for a list) Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval Built-in out-of-bound HTTP server Automates XXE attacks Can use OOB HTTP requests to drastically speed up retrieval Custom request headers and body Built-in REPL shell, supporting: Reading arbitrary files Reading environment variables Listing directories Uploading/downloading files (soon TM) [HIDE][Hidden Content]]
  2. Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner [Hidden Content]
  3. F B I

    BadMod auto exploit tool

    [Hidden Content]
  4. BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1. [Hidden Content]
  5. Descripción In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons. [Hidden Content] [HIDE][Hidden Content]]
  6. dEEpEst

    Binary Exploit Cheatsheet

    [hide] [Hidden Content] [/Hide[
  7. cve_2019_0708_bluekeep_rce.rb > /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb rdp.rb > /usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rb rdp_scanner.rb > /usr/share//metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb cve_2019_0708_bluekeep.rb > /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb [Hidden Content] Source: [Hidden Content]
  8. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  9. [Hidden Content] [HIDE][Hidden Content]]
  10. CVE-2019-2107 CVE-2019-2107 - looks scary. Still remember Stagefright and PNG bugs vulns .... With CVE-2019-2107 the decoder/codec runs under mediacodec user and with properly "crafted" video (with tiles enabled - ps_pps->i1_tiles_enabled_flag) you can possibly do RCE. The codec affected is HVEC (a.k.a H.265 and MPEG-H Part 2) #exploit #rce #android #stagefright #cve [Hidden Content]
  11. MANYVIDS.COM EXPLOIT - GET ALL VIDEOS FOR FREE :m:This method bypasses ManyVids.com payment processor and you can get literally every video from the site for free.The site is [Hidden Content] if you don't know what I am talking about. [HIDE][Hidden Content]] Pass: level23hacktools.com
  12. Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress and Joomla sites on the server. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Extract IPs ● Extract E-mails. ● Auto-detect errors. ● Auto-detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● And more… CHANGES: v17.0.0 – Engine fix. – Some scans fix. [HIDE][Hidden Content]]
  13. [Hidden Content]
  14. [Hidden Content]
  15. WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities. Every Windows OS between Windows XP and Windows 10, including their Windows Server counterparts, is supported. Version 0.96 Support for Windows 10 Redstone 6 (1903) Added option to filter on severity Fixup for French systeminfo file [HIDE][Hidden Content]]
  16. [Hidden Content]
  17. Pompem - Exploit and Vulnerability Finder Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database ... Screenshots Source code You can download the latest tarball by clicking here or latest zipball by clicking here. You can also download Pompem directly from its Git repository: $ git clone [Hidden Content] Dependencies Pompem works out of the box with Python 3.5 on any platform and requires the following packages: Requests 2.9.1+ Installation Get Pompem up and running in a single command: $ pip3.5 install -r requirements.txt You may greatly benefit from using virtualenv, which isolates packages installed for every project. If you have never used it, simply check [this tutorial] ([Hidden Content]) . Usage To get the list of basic options and information about the project: $ python3.5 pompem.py -h Options: -h, --help show this help message and exit -s, --search <keyword,keyword,keyword> text for search --txt Write txt File --html Write html File Examples of use: $ python3.5 pompem.py -s Wordpress $ python3.5 pompem.py -s Joomla --html $ python3.5 pompem.py -s "Internet Explorer,joomla,wordpress" --html $ python3.5 pompem.py -s FortiGate --txt $ python3.5 pompem.py -s ssh,ftp,mysql Download: [HIDE][Hidden Content]]
  18. blackmamba000

    silent url exploit

    i am looking tutorial or where to buy silent url exploit
  19. Using open Adb ports we can exploit an Andriod device. you can find open ports here [Hidden Content] To find out how to access a local device --> [Hidden Content] Recent News (New Update v.1.2) Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery Status Get Current Activity [Hidden Content]
  20. Using open Adb ports we can exploit a device you can find open ports here [Hidden Content] To find out how to access a local device: [Hidden Content]
  21. [Hidden Content]
  22. This is the systemd-journald exploit produced by Qualys that demonstrates the vulnerabilities as highlighted in CVE-2018-16865 and CVE-2018-16866. View the full article
  23. Moore

    EXPLOIT 100% FUD

    I need an exploit with 100% FUD please anyone can help?
  24. Features Extract mikrotik credential (user.dat) Password generator Reverse IP lookup Mac address sniffer Online md5 cracker Mac address lookup Collecting url from web.archive.org Web backdoor (Dark Shell) Winbox exploit (CVE-2018-14847) ChimeyRed exploit for mipsbe (Mikrotik) Exploit web application Mass apple dos (CVE-2018-4407) Libssh exploit (CVE-2018-10933) Discovering Mikrotik device Directory scanner Subdomain scanner Mac address scanner Mac address pinger Vhost scanner (bypass cloudflare) Mass bruteforce (wordpress) Interactive msfrpc client Exploit web application plUpload file upload jQuery file upload (CVE-2018-9206) Laravel (.env) sftp-config.json (misc) Wordpress register (enable) elfinder file upload Drupal 7 exploit (CVE-2018-7600) Drupal 8 exploit (CVE-2018-7600) com_fabrik exploit (joomla) gravityform plugin file upload (wordpress) geoplace3 plugin file upload (wordpress) peugeot-music plugin file upload (wordpress) [HIDE][Hidden Content]]