Search the Community

Showing results for tags 'project'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 24 results

  1. Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  2. dEEpEst

    Iky project tool

    Description Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Project - Previous version We want to warn you that we have changed the Frontend from AngularJS to Angular 7. For this reason we left the project with AngularJS as Frontend in the iKy-v1 branch. The reason of changing the Frontend was to update the technology and get an easier way of installation. Video Demo: [Hidden Content] Download: [Hidden Content]
  3. The probably most powerful SQLi Dumping Panel named SIB! This panel is faster than SQLi Dumper and many other sqli tools. [HIDE][Hidden Content]]
  4. AV|Ator is a backdoor generator utility, which uses cryptographic and injection techniques in order to bypass AV detection. More specifically: It uses AES encryption in order to encrypt a given shellcode Generates an executable file which contains the encrypted payload The shellcode is decrypted and injected to the target system using various injection techniques [HIDE][Hidden Content]] Current Detection Rate: 3/71
  5. TheHive Project Cortex versions 2.1.3 and below suffer from a server-side request forgery vulnerability. View the full article
  6. Symphony Project sfDoctrinesfPropel version 1.x suffers from a database password disclosure. View the full article
  7. Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also they can be used for privilege escalation by pentesters/red teamers. Vulmap can be used to, scan vulnerabilities on localhost, see related exploits and download them. Scripts basically, scan localhost to gather installed software information and ask vulmon.com api if there are any vulnerabilies and exploits related with installed software. If vulnerabilities exist, vulmap give CVE ID, risk score, vulnerability's detail link, exploit id and exploit title. Exploits can be downloaded with vulmap also. [HIDE][Hidden Content]]
  8. OrangeScrum Project Management Software version 1.6.1 suffers from a database disclosure vulnerability. View the full article
  9. Mash Project Integrated version 4.2.7.1 suffers from a database disclosure vulnerability. View the full article
  10. Rukovoditel Project Management CRM version 2.4.1 suffers from a cross site scripting vulnerability. View the full article
  11. Rukovoditel Project Management CRM version 2.4.1 suffers from a remote SQL injection vulnerability. View the full article
  12. Teameyo Project Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  13. [HIDE][Hidden Content]] Introduction JoomScan, OWASP Vulnerability Scanner, is an open source project developed in perl which detects Joomla CMS vulnerabilities and analyses them. This tool enables seamless and effortless scanning of Joomla installations, and has a modular and lightweight architecture, so it doesn’t leave to much footprints. JoomScan: If you want to perform penetration testing on a Joomla CMS, then you should try out OWASP JoomScan, since it’s faster then ever with regular updates on Joomla vulnerabilities. Beside ability to detect known offensive vulnerabilities, JoomScan can also detect many misconfigurations and admin-level shortcomings which can lead to the system compromise. Furthermore, OWASP JoomScan provides a friendly UI and compiles the final reports in both text and HTML formats. Features: Version enumerator Vulnerability enumerator (based on version) Components enumerator (1209 most popular by default) Components vulnerability enumerator (based on version)(+1030 exploit) Firewall detector Reporting to Text & HTML output Finding common log files Finding common backup files
  14. R2Games In late 2015, the gaming website R2Games was hacked and more than 2.1M personal records disclosed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 11M accounts were added in March 2016 and another 9M in July 2016 bringing the total to over 22M. Breach date: 1 November 2015 Compromised accounts: 22,281,337 Requirements: - CPU QuadCore Processor with 3GHZ or more - 8 GB of RAM or more - Why? - Maximum execution time of 30 seconds. Download: [Hidden Content].rar Virus Scan: The file is to large...
  15. Releasing an archive with a searchable engine for 000Webhost, 5 Million Gmail and nulled accounts. To use just extract to a webhosting site with support for PHP or run it locally. All the combos are in one file and all the combos available have been around the web for a while so it's public domain now. 000Webhost combo is from 2014... The reason why i'm releasing this three databases into one file is because the data is correct. My email credentials were available and the passwords were a match. Download [Hidden Content] Virus Check File is too large. Compressed 391 MB. Uncompressed 1.2 GB
  16. MyT Project Management version 1.5.1 suffers from a remote SQL injection vulnerability. View the full article
  17. Rukovoditel Project Management CRM version 2.3.1 suffers from a remote code execution vulnerability. View the full article
  18. The Open ISES Project version 3.30A suffers from an arbitrary file download vulnerability. View the full article
  19. The Open ISES Project version 3.30A suffers from a remote SQL injection vulnerability. View the full article
  20. Ekushey Project Manager CRM version 3.1 suffers from a persistent cross site scripting vulnerability. View the full article
  21. Rukovoditel Project Management CRM version 2.3 suffers from a remote SQL injection vulnerability. View the full article