Search the Community

Showing results for tags 'php'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 28 results

  1. This page will show html to the user and after serving the page it will self-destructe. index.php <?php echo "YOUR HTML GOES HERE"; unlink('index.php'); ?> Download: [hide][Hidden Content]] Virus Scan: [hide][Hidden Content]]
  2. A simple mailer to test the php mail function on a webserver or to simply send emails. Download: [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  3. This is a simple CMS (Content Management System) written in PHP. Requirements: Xampp or any PHP enabled server Files: > add.html - Manage the database . Add - Add text to the database . View DB - View the text written to the database . Delete DB - Erases the database add.php - Add the text to the DB . Do not invoke directly, use add.html db.txt - Where the files are stored del.php - Delete the DB . Can be called directly but use add.html index.php - Show the text in the DB . This is the homepage - Text or HTML will show in here Online Demo [Hidden Content] You can navigate in the online demo. > add.html - Add/View/Delete text > index.php - View the text Download [hide][Hidden Content]] Virustotal [hide][Hidden Content]]
  4. Panel [Hidden Content] Pass: level23hacktools.com
  5. dEEpEst

    php mass e-mail sender

    1- Provide a hosting / domain to store php files . 2- Provide an email list and the contents of the email that will be sent. 3- Run this email sender php. [Hidden Content]
  6. PHP Dashboards NEW version 5.8 suffers from a local file inclusion vulnerability. View the full article
  7. PHP Uber-style GeoTracking version 1.1 suffers from a remote SQL injection vulnerability. View the full article
  8. PHP Dashboards NEW version 5.8 suffers from a remote SQL injection vulnerability. View the full article
  9. Remot3d - An Simple Exploit for PHP Language It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program. Made to bypass the system that is disabled on the server, especially for reading sensitive files that are /etc/passwd Donate If this project very help you to penetration testing and u want support me , you can give me a cup of coffee :) List of Remot3d Functions Create backdoor for windows or linux servers (can run php file) Bypass disable function's with imap_open vulnerability Bypass read file /etc/passwd with cURL or Unique Logic Script's Generating Backdoor and can be remoted on Tools Some other fun stuff :) [HIDE][Hidden Content]]
  10. sQuoII

    Remote Hell - Another PHP Shell

    Remote Hell - Another PHP Shell [HIDE][Hidden Content]] With Remote Hell you can execute commands like if they're executing in your system. You can do things like: rh ls -l and Remote Hell will execute the command and gives you the output on the terminal. This permits the usage of remote commands and local commands, like this: rh cat /var/www/wordpress/wp-config.php > wp-config.php You are sending the content of the remote file to a local file. It's really simple. But it's really usefull! ;) Authentication Remote Hell authenticates you with a very basic mecanism: You send the password with each HTTP request, if the password is correct, the commands are executed, if not, nothing happens. Note: If the connection is plaintext (HTTP and not HTTPS), the password will be sent in cleartext. Execution Methods Remote Hell automatically tries various PHP command execution methods, or functions: system shell_exec exec passthru popen When it finds an allowed method, uses it. Configuration You can adjust some parameters editing the ~/.rhell.cfg file, that it's created the first time that you run Remote Hell.
  11. PEAR Archive_Tar versions prior to 1.4.4 suffers from a php object injection vulnerability. View the full article
  12. SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through the "trigger_event" parameter is not properly sanitized before being used to save PHP code into the 'logic_hooks.php' file through the Web Logic Hooks module. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
  13. SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'labels_' parameters is not properly sanitized before being used to save PHP code within the "ParserLabel::addLabels()" method when saving labels through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
  14. SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a PHP code injection vulnerability in the WorkFlow module. User input passed through the $_POST['base_module'] parameter to the "Save" action of the WorkFlow module is not properly sanitized before being used to write data into the 'workflow.php' file. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
  15. SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'list_value' JSON parameter is not properly sanitized before being used to save PHP code when adding/saving dropdowns through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
  16. PHP Server Monitor version 3.3.1 suffers from a cross site request forgery vulnerability. View the full article
  17. The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials. View the full article
  18. 1337day-Exploits

    Exploits PHP Mass Mail 1.0 Shell Upload

    PHP Mass Mail version 1.0 suffers from a remote shell upload vulnerability. View the full article
  19. 1337day-Exploits

    Exploits PHP 5.2.3 imap_open Bypass

    PHP version 5.2.3 (Debian) suffers from an imap imap_open disable functions bypass vulnerability. View the full article
  20. Hi , This is my first post here and i will like to share with you a mailer i got from a friend, i tested and it delivers inbox. Download link: INFECTED
  21. PHP Proxy version 3.0.3 suffers from a local file inclusion vulnerability. View the full article
  22. Simple PHP Shopping Cart version 0.9 suffers from remote shell upload and remote SQL injection vulnerabilities. View the full article
  23. 10000 MB Monthly Bandwidth 1000 MB Disk Space Support for PHP, MySQL and No Ads Visit and Register [Hidden Content]
  24. A simple search engine + local db + add entry in php. File list add.php - Add links/text to db.txt db.txt - Where the links/text is stored index.html - The visual interface for the user search.php - The search mechanism. It searches in db.txt looking for the corresponding text. Download [Hidden Content] Virustotal [Hidden Content]
  25. Moodle versions 3.5.2, 3.4.5, 3.3.8, and 3.1.14 suffer from a remote php unserialize code execution vulnerability. View the full article