Search the Community

Showing results for tags 'google'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 17 results

  1. " _ _ " " _ /|| . . ||\ _ " " ( } \||D ' ' ' C||/ { % " " | /\__,=_[_] ' . . ' [_]_=,__/\ |" " |_\_ |----| |----| _/_|" " | |/ | | | | \| |" " | /_ | | | | _\ |" It is all fun and games until someone gets hacked! ------------------------------------------------------------------------------------------ Explanations: cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. For instance, [cache:www.google.com] will show Google’s cache of the Google homepage. Note there can be no space between the “cache:” and the web page url. ------------------------------------------------------------------------------------------ link: The query [link:] will list webpages that have links to the specified webpage. For instance, [link:www.google.com] will list webpages that have links pointing to the Google homepage. Note there can be no space between the “link:” and the web page url. ------------------------------------------------------------------------------------------ related: The query [related:] will list web pages that are “similar” to a specified web page. For instance, [related:www.google.com] will list web pages that are similar to the Google homepage. Note there can be no space between the “related:” and the web page url. ------------------------------------------------------------------------------------------ info: The query [info:] will present some information that Google has about that web page. For instance, [info:www.google.com] will show information about the Google homepage. Note there can be no space between the “info:” and the web page url. ------------------------------------------------------------------------------------------ define: The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. The definition will be for the entire phrase entered (i.e., it will include all the words in the exact order you typed them). ------------------------------------------------------------------------------------------ stocks: If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols. For instance, [stocks: intc yhoo] will show information about Intel and Yahoo. (Note you must type the ticker symbols, not the company name.) ------------------------------------------------------------------------------------------ site: If you include [site:] in your query, Google will restrict the results to those websites in the given domain. For instance, [help site:www.google.com] will find pages about help within www.google.com. [help site:com] will find pages about help within .com urls. Note there can be no space between the “site:” and the domain. ------------------------------------------------------------------------------------------ allintitle: If you start a query with [allintitle:], Google will restrict the results to those with all of the query words in the title. For instance, [allintitle: google search] will return only documents that have both “google” and “search” in the title. ------------------------------------------------------------------------------------------ intitle: If you include [intitle:] in your query, Google will restrict the results to documents containing that word in the title. For instance, [intitle:google search] will return documents that mention the word “google” in their title, and mention the word “search” anywhere in the document (title or no). Note there can be no space between the “intitle:” and the following word. Putting [intitle:] in front of every word in your query is equivalent to putting [allintitle:] at the front of your query: [intitle:google intitle:search] is the same as [allintitle: google search]. ------------------------------------------------------------------------------------------ allinurl: If you start a query with [allinurl:], Google will restrict the results to those with all of the query words in the url. For instance, [allinurl: google search] will return only documents that have both “google” and “search” in the url. Note that [allinurl:] works on words, not url components. In particular, it ignores punctuation. Thus, [allinurl: foo/bar] will restrict the results to page with the words “foo” and “bar” in the url, but won’t require that they be separated by a slash within that url, that they be adjacent, or that they be in that particular word order. There is currently no way to enforce these constraints. ------------------------------------------------------------------------------------------ inurl: If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url. For instance, [inurl:google search] will return documents that mention the word “google” in their url, and mention the word “search” anywhere in the document (url or no). Note there can be no space between the “inurl:” and the following word. Putting “inurl:” in front of every word in your query is equivalent to putting “allinurl:” at the front of your query: [inurl:google inurl:search] is the same as [allinurl: google search]. ------------------------------------------------------------------------------------------ Nina Simone intitle:”index.of” “parent directory” “size” “last modified” “description” I Put A Spell On You (mp4|mp3|avi|flac|aac|ape|ogg) -inurl:(jsp|php|html|aspx|htm|cf|shtml|lyrics-realm|mp3-collection) -site:.info Bill Gates intitle:”index.of” “parent directory” “size” “last modified” “description” Microsoft (pdf|txt|epub|doc|docx) -inurl:(jsp|php|html|aspx|htm|cf|shtml|ebooks|ebook) -site:.info parent directory /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums filetype:config inurl:web.config inurl:ftp “Windows XP Professional” 94FBR ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential ext:inc "pwd=" "UID=" ext:ini intext:env.ini ext:ini Version=... password ext:ini Version=4.0.0.4 password ext:ini eudora.ini ext:ini intext:env.ini ext:log "Software: Microsoft Internet Information Services *.*" ext:log "Software: Microsoft Internet Information ext:log "Software: Microsoft Internet Information Services *.*" ext:log \"Software: Microsoft Internet Information Services *.*\" ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:mdb inurl:*.mdb inurl:fpdb shop.mdb filetype:SWF SWF filetype:TXT TXT filetype:XLS XLS filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:asp "Custom Error Message" Category Source filetype:asp + "[ODBC SQL" filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:asp DBQ=\" * Server.MapPath(\"*.mdb\") filetype:asp “Custom Error Message” Category Source filetype:bak createobject sa filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:bak inurl:\"htaccess|passwd|shadow|htusers\" filetype:conf inurl:firewall -intitle:cvs filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals filetype:dat "password.dat filetype:dat \"password.dat\" filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To" filetype:eml eml +intext:\"Subject\" +intext:\"From\" +intext:\"To\" filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To” filetype:inc dbconn filetype:inc intext:mysql_connect filetype:inc mysql_connect OR mysql_pconnect filetype:log inurl:"password.log" filetype:log username putty PUTTY SSH client logs can reveal usernames filetype:log “PHP Parse error” | “PHP Warning” | “PHP Error” filetype:mdb inurl:users.mdb filetype:ora ora filetype:ora tnsnames filetype:pass pass intext:userid filetype:pdf "Assessment Report" nessus filetype:pem intext:private filetype:properties inurl:db intext:password filetype:pst inurl:"outlook.pst" filetype:pst pst -from -to -date filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" filetype:reg reg +intext:\"defaultusername\" +intext:\"defaultpassword\" filetype:reg reg +intext:â? WINVNC3â? filetype:reg reg +intext:”defaultusername” +intext:”defaultpassword” filetype:reg reg HKEY_ Windows Registry exports can reveal filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype:sql "insert into" (pass|passwd|password) filetype:sql ("values * MD5" | "values * password" | "values * encrypt") filetype:sql (\"passwd values\" | \"password values\" | \"pass values\" ) filetype:sql (\"values * MD\" | \"values * password\" | \"values * encrypt\") filetype:sql +"IDENTIFIED BY" -cvs filetype:sql password filetype:sql password filetype:sql “insert into” (pass|passwd|password) filetype:url +inurl:"ftp://" +inurl:";@" filetype:url +inurl:\"ftp://\" +inurl:\";@\" filetype:url +inurl:”ftp://” +inurl:”;@” filetype:xls inurl:"email.xls" filetype:xls username password email index of: intext:Gallery in Configuration mode index.of passlist index.of perform.ini mIRC IRC ini file can list IRC usernames and index.of.dcim index.of.password intext:" -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board" intext:"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd intext:"#mysql dump" filetype:sql intext:"#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 intext:"A syntax error has occurred" filetype:ihtml intext:"ASP.NET_SessionId" "data source=" intext:"About Mac OS Personal Web Sharing" intext:"An illegal character has been found in the statement" -"previous message" intext:"AutoCreate=TRUE password=*" intext:"Can't connect to local" intitle:warning intext:"Certificate Practice Statement" filetype:PDF | DOC intext:"Certificate Practice Statement" inurl:(PDF | DOC) intext:"Copyright (c) Tektronix, Inc." "printer status" intext:"Copyright © Tektronix, Inc." "printer status" intext:"Emergisoft web applications are a part of our" intext:"Error Diagnostic Information" intitle:"Error Occurred While" intext:"Error Message : Error loading required libraries." intext:"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights- intext:"Fatal error: Call to undefined function" -reply -the -next intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu intext:"Generated by phpSystem" intext:"Generated by phpSystem" intext:"Host Vulnerability Summary Report" intext:"HostingAccelerator" intitle:"login" +"Username" -"news" -demo intext:"IMail Server Web Messaging" intitle:login intext:"Incorrect syntax near" intext:"Index of" /"chat/logs" intext:"Index of /network" "last modified" intext:"Index of /" +.htaccess intext:"Index of /" +passwd intext:"Index of /" +password.txt intext:"Index of /admin" intext:"Index of /backup" intext:"Index of /mail" intext:"Index of /password" intext:"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log intext:"Microsoft CRM : Unsupported Browser Version" intext:"Microsoft ® Windows * ™ Version * DrWtsn32 Copyright ©" ext:log intext:"Network Host Assessment Report" "Internet Scanner" intext:"Network Vulnerability Assessment Report" intext:"Network Vulnerability Assessment Report" intext:"Network Vulnerability Assessment Report" 本文来自 pc007.com intext:"SQL Server Driver][SQL Server]Line 1: Incorrect syntax near" intext:"Thank you for your order" +receipt intext:"Thank you for your order" +receipt intext:"Thank you for your purchase" +download intext:"The following report contains confidential information" vulnerability -search intext:"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the" intext:"phpMyAdmin MySQL-Dump" filetype:txt intext:"phpMyAdmin" "running on" inurl:"main.php" intextpassword | passcode) intextusername | userid | user) filetype:csv intextpassword | passcode) intextusername | userid | user) filetype:csv intitle:"index of" +myd size intitle:"index of" etc/shadow intitle:"index of" htpasswd intitle:"index of" intext:connect.inc intitle:"index of" intext:globals.inc intitle:"index of" master.passwd intitle:"index of" master.passwd 007电脑资讯 intitle:"index of" members OR accounts intitle:"index of" mysql.conf OR mysql_config intitle:"index of" passwd intitle:"index of" people.lst intitle:"index of" pwd.db intitle:"index of" spwd intitle:"index of" user_carts OR user_cart intitle:"index.of *" admin news.asp configview.asp intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com inurl:admin inurl:userlist Generic userlist files ------------------------------------------------------------------------------------------ Using special search string to find vulnerable websites: inurl:php?=id1 inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= andinurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= Source
  2. First Android Clipboard Hijacking Crypto Malware Found On Google Play Store February 11, 2019Swati Khandelwal A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post. Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out. The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency. To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node. Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores. However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard. As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app. Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1. Google took down the malicious app almost immediately after being notified by the researcher. While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry. Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
  3. assender

    Adding 3rd party SDK to your apps?

    I know, a lot has been said now about adding some 3rd party SDK to your app, as Google started banning a lot of apps or developers recently. But tbh, most of the cases i have seen, were developers fault. As i have read, if your app has been removed due to having 3rd party SDK, its basically, coz you havent mentioned it properly in TOS. You had to change your TOS with providing info of what you have added, and what you are collecting, and then you could have reuploaded the app without the fear of getting banned. Most of developers havent done that, and just reuploaded apps back, without clearing up anything, which resulted in ban from store. TL;DR, do you think its still profitable doing that, if you make all the TOS clear, and do everything "by the book"?
  4. Normally a user uses Google to search and this results are showned in a page with 10 results to a maximum of 1000 results. Since anyone uses Google to search they have release a way to narrow the results down to a few domains. This is called CSE (Custom Search Engine). Recently Google have release a method to get results using CSE in a whitelabel basis. This means that the results won't show any reference to Google and a user can retrieve up to 10 results. This page results delivers 10 links from the search engine using a keyword you want. Instead of showing the results, the webmaster can convert the results to actionable items. For example: a iframe. This can be used to make File Path Traversal attacks, Directory Traversal attacks or build your own botnet by gathering information using dorks and creating custom HTTP attacks. So, let start. Requirements Google API account Google CSE account Some coding... Start by creating a CSE engine with the sites: "*.com*" and get the search engine code "cx=...something goes here". Open notepad and paste this code > <script> var xmlhttp = new XMLHttpRequest(); xmlhttp.onreadystatechange = function() { if (this.readyState == 4 && this.status == 200) { var myObj = JSON.parse(this.responseText); document.write('<center><table><tr><td>'); for (x in myObj.items) { document.write('<iframe src="'+ myObj.items[x].link +'/YOUR-ACTIONABLE-DORK-GOES" height="0" width="0" frameborder="0">');} }; xmlhttp.open("GET", "[Hidden Content]", true); xmlhttp.send(); } </script> Change the document.write code to your hack. Change key to yours. Change cx to your search engine.
  5. Joomla GMapFP Google Map component version 3.52 suffers from a remote SQL injection vulnerability. View the full article
  6. SQLi Google Dork Scanner by ViraX @ 2018 - 2019 for Python 2.7 - compatible Android(NoRoot) - Termux A simple 'naive' python tool to find SQLi Vulnerable websites in the wild via Google. [!] DISCLAIMER: I am not responsible for illegal acts that you would do with this program !, only educational . [!] SQL Dork Scanner SQL Dumper module (basic) Simple Tools Video: [Hidden Content] [HIDE][Hidden Content]]
  7. Google Chrome V8 JavaScript Engine version 71.0.3578.98 suffers from a denial of service vulnerability. View the full article
  8. unCaptcha2 is a proof of concept that defeats the latest version of ReCaptcha with 91% accuracy as of January, 2019. View the full article
  9. PrestaShop Google GSnippetsReviews modules version 1.6.1.4 suffers from a database disclosure vulnerability. View the full article
  10. Facebook And Google Reviews System For Businesses version 1.1 suffers from a code execution vulnerability. View the full article
  11. Facebook And Google Reviews System For Businesses version 1.1 suffers from a remote SQL injection vulnerability. View the full article
  12. Facebook And Google Reviews System For Business version 1.0 suffers from a cross site request forgery vulnerability. View the full article
  13. Google Chrome version 70.0.3538.77 stable suffers from cross site scripting and man-in-the-middle vulnerabilities. View the full article
  14. dEEpEst

    mhetod Google Play Balance Method

    [Hidden Content]
  15. 1337day-Exploits

    Exploits Google Allo Denial Of Service

    Google Allo suffers from a denial of service vulnerability. View the full article
  16. dEEpEst

    dorks Google Dorks List 2018

  17. Android suffers from a directory traversal vulnerability leveraged over USB via injection in blkid output. View the full article