Search the Community

Showing results for tags 'remote'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 170 results

  1. BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from theme Cookie directory traversal and remote code execution vulnerabilities. View the full article
  2. BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from dirPath directory traversal and remote code execution vulnerabilities. View the full article
  3. BlogEngine.NET versions 3.3.7 and earlier are vulnerable to two separate directory traversal issues that can lead to remote code execution. View the full article
  4. This Metasploit module exploits a command execution vulnerability in AROX School-ERP. "import_stud.php" and "upload_fille.php" do not have session control. Session start/check functions in Line 8,9,10 are disabled with slashes. Therefore an unauthenticated user can execute the command on the system. View the full article
  5. The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. View the full article
  6. Sitecore versions 8.x suffer from a deserialization vulnerability that allows for remote code execution. View the full article
  7. FusionPBX versions 4.4.3 and below suffer from a remote code execution vulnerability via cross site scripting. View the full article
  8. WordPress Insert or Embed Articulate Content plugin versions 4.2995 through 4.2997 suffers from a remote code execution vulnerability. View the full article
  9. This Metasploit module exploits an arbitrary command execution vulnerability in Webmin 1.910 and lower versions. Any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges. View the full article
  10. DISCLAIMER Stitch is for education/research purposes only. The author takes NO responsibility and/or liability for how you choose to use any of the tools/source code/any files provided. The author and anyone affiliated with will not be liable for any losses and/or damages in connection with use of ANY files provided with Stitch. By using Stitch or any files included, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again Stitch and ALL files included are for EDUCATION and/or RESEARCH purposes ONLY. Stitch is ONLY intended to be used on your own pentesting labs, or with explicit consent from the owner of the property being tested. About Stitch A Cross Platform Python Remote Administration Tool: This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on. Features Cross Platform Support Command and file auto-completion Antivirus detection Able to turn off/on display monitors Hide/unhide files and directories View/edit the hosts file View all the systems environment variables Keylogger with options to view status, start, stop and dump the logs onto your host system View the location and other information of the target machine Execute custom python scripts which return whatever you print to screen Screenshots Virtual machine detection Download/Upload files to and from the target system Attempt to dump the systems password hashes Payloads' properties are "disguised" as other known programs Windows Specific Display a user/password dialog box to obtain user password Dump passwords saved via Chrome Clear the System, Security, and Application logs Enable/Disable services such as RDP,UAC, and Windows Defender Edit the accessed, created, and modified properties of files Create a custom popup box View connected webcam and take snapshots View past connected wifi connections along with their passwords View information about drives connected View summary of registry values such as DEP Mac OSX Specific Display a user/password dialog box to obtain user password Change the login text at the user's login screen Webcam snapshots Mac OSX/Linux Specific SSH from the target machine into another host Run sudo commands Attempt to bruteforce the user's password using the passwords list found in Tools/ Webcam snapshots? (untested on Linux) Implemented Transports All communication between the host and target is AES encrypted. Every Stitch program generates an AES key which is then put into all payloads. To access a payload the AES keys must match. To connect from a different system running Stitch you must add the key by using the showkey command from the original system and the addkey command on the new system. Implemented Payload Installers The "stitchgen" command gives the user the option to create NSIS installers on Windows and Makeself installers on posix machines. For Windows, the installer packages the payload and an elevation exe ,which prevents the firewall prompt and adds persistence, and places the payload on the system. For Mac OSX and Linux, the installer places the payload and attempts to add persistence. To create NSIS installers you must download and install NSIS. Wiki Crash Course of Stitch Requirements Python 2.7 For easy installation run the following command that corresponds to your OS: # for Windows pip install -r win_requirements.txt # for Mac OSX pip install -r osx_requirements.txt # for Linux pip install -r lnx_requirements.txt Pycrypto Requests Colorama PIL Windows Specific Py2exe pywin32 Mac OSX Specific PyObjC Mac OSX/Linux Specific PyInstaller pexpect To Run python main.py or ./main.py Motivation My motivation behind this was to advance my knowledge of python, hacking, and just to see what I could accomplish. Was somewhat discouraged and almost abandoned this project when I found the amazing work done by n1nj4sec, but still decided to put this up since I had already come so far. Other open-source Python RATs for Reference vesche/basicRAT n1nj4sec/pupy Screenshots Download: [HIDE][Hidden Content]]
  11. dEEpEst

    Chrome Remote Desktop

    Chrome Web Store Escritorio Remoto de Chrome ofrecido por Chrome Remote Desktop Release Managers Para descargar la aplicación o la extensión en tu ordenador, inicia sesión en Chrome y habilita la sincronización o envíate un recordatorio (39282) Aplicaciones de oficina 0 usuarios Descripción general De Google Accede a otros ordenadores o permite que otro usuario acceda a tu ordenador de forma segura a través de Internet. Chrome Remote Desktop allows users to remotely access another computer through Chrome browser or a Chromebook. Computers can be made available on an short-term basis for scenarios such as ad hoc remote support, or on a more long-term basis for remote access to your applications and files. All connections are fully secured. Chrome Remote Desktop is fully cross-platform. Provide remote assistance to Windows, Mac and Linux users, or access your Windows (XP and above) and Mac (OS X 10.6 and above) desktops at any time, all from the Chrome browser on virtually any device, including Chromebooks. For information about privacy, please see the Google Privacy Policy and the Chrome Privacy Policy. For help or troubleshooting please click here: [Hidden Content] Stay tuned for future updates! [Hidden Content]
  12. Supra Smart Cloud TV suffers from an openLiveURL() remote file inclusion vulnerability. View the full article
  13. This Metasploit module exploits untrusted serialized data processed by the WAS DMGR Server and Cells in the IBM Websphere Application Server. NOTE: There is a required 2 minute timeout between attempts as the neighbor being added must be reset. View the full article
  14. Cisco RV130W version 1.0.3.44 suffers from a remote stack overflow vulnerability. View the full article
  15. Microsoft Windows Remote Desktop BlueKeep denial of service exploit. View the full article
  16. Interspire Email Marketer version 6.20 suffers from a remote code execution vulnerability in surveys_submit.php. View the full article
  17. Brocade Network Advisor version 14.4.1 unauthenticated remote code execution exploit. View the full article
  18. Spy MAX Remote control system in Android systems with simple graphical interfaces and easy to use requirements Java NET framework 4.5 The program is compatible with the following Microsoft Windows application windows 10 windows 8 windows 7 windows Pach is compatible with modern Android systems 9.0 - eBay 8.0 - Orio / oreo 7.0 - Noga / nougat 6.0 - Marshmallow One of the most important features Multi-port Size 18.5 KB / Clean Encode with insertion point Run more than one patch on one phone Secure data sent and received over the network Ability to control the program settings to suit your needs and your own taste And other features .. Explanation Code: +----------------------+ | [1] Files Manager | | [2] SMS Manager | | [3] Calls Manager | | [4] Contacts Manager | | [5] Location Manager | > +--+[6] GPS | | | | | +--+[7] GSM | [8] Account Manager | | [9] Camera Manager | > +--+[10] Front | | | | | +--+[11] Back | [12] Shell Terminal | | [13] informations | | [14] Applications | | [15] Microphone | | [16] Server | > +--+[17] EditSocket | | | +----------------------+ +--+[18] Restart | +--+[19] Rename | +--+[20] Close [1] files [2] Messages [3] Calling [4] Contact [5] Location [6] Global Positioning System (GPS) [7] Global System for Mobile communications (GSM) [8] Calculations [9] What is your favorite camera? [10] Front camera [11] Rear camera [12] Execution of linux commands [13] Information [14] Installed applications [15] The microphone [16] server [17] Editing or modifying the communication [18] Restart the connection [19] Renaming contact [20] Close the connection after restarting the phone Code: +---------------+ | | | [1] Build | | | | [2] Settings | | | | [3] About | | | | [4] Exit | | | +---------------+ [1] Window Builder Patch [2] Settings [3] About the program 4 Code: +-----------------------------------------+ | [1] connection | | + | | +-> [2] dynamic DNS/ip +--+ | | v | | +----------------------+ | | | | | +-> [3] port | | | [8] DNS/ip:port | | | | | | +-> [4] Add | | | | | | | | | +-> [5] DEL | | | | | | | | | +-> [6] up | | | | | | | +----------------------+ +-> [7] down | | | +-----------------------------------------+ [1] Communications [2] Your address is on LAN or WAN external domain [3] Port number Preferably choose a port between 1024 to 65535 [4] Add the title and entry in the list [5] Delete title and port from list [6] Upload contact information up to become a priority in communication [7] Contact information down [8] List of contacts Code: +----------------------------+ |[1] installation | | + | | +--> [2] name of victim | | | | | +--> [3] name patch | | | | | +--> [4] version | | | | | | +-----------+ | | | | | | | +--> | [5] hide | | | | | [6] icon | | | | | [7] doze | | | | | | | | | +-----------+ | | | | | +--> [8] sleep | | | | | +--> [9] futex | | | | | +--> [10] flavor | | | +----------------------------+ [1] Composition [2] Contact Name [3] The name of the patch is the name shown when installed on the phone [4] issue number [5] How to hide the patch after playback [6] Choosing the icon You can add custom icons to the res \ Icons \ Apps folder and the sizes must be 144 in 144 or 192 in 192 pixels [7] In case of non-activation will be restricted to doze system and applications and other artificial intelligence systems and control on activation You can add custom icons to the folder res \ Icons \ Notification The sizes must be 24 in 24 or 32 in 32 pixels [8] You have to set the time in milliseconds. Click on the box to see the timing, it will work under any circumstance doze or other. If you do not need a timer, you can set the value to 0. [9] Generating keys to secure communication and data synchronization Pass the key on the box and the keys will be generated automatically [10] to create different versions after the dot. You must put your own suffix in English only without letters, numbers or symbols Code: +------------------------------------+ | | | +---------------+ +--------+ | | | [1] browse | | [2] OK | | | +---------------+ +--------+ | | | +------------------------------------+ [1] You must install java and then select the bin folder from the operating environment of jre java applications Code: \Java\jre x.x.x\bin [2] Select the patch that is included with the program to configure your settings Code: +------------------------------------------+ | | | [1] socket +> [3] high | | + | | | +> [2] performance+> [4] normal | | | | | | +> [6] Encoding +> [5] low | | | + | | | | | | | +-------+> [7] Default | | | | | | | +> [8] UTF8 | | | | | | | +> [9] UTF32 | | | | | | | +> [10] ASCII | | | | | +> [11] Disconnected | | + | | | | | +----------+-----------+ | | v v | | [12] Close windows [13] Just tell me | | | +------------------------------------------+ [1] The Socket [2] Program performance with communications, processor and data traffic [3] If you have a high-quality device and have lots of connections, you can make the most of the program [4] Using normal mode will work on low and high mode (recommended) [5] If you have a low-specification device and have little communication you can use low mode [6] Character encoding [7] The default codec on your device [8] UTF8 [9] UTF32 [10] ASCII [11] Disconnect [12] Close all active client windows if connection is interrupted [13] You will be notified only when you disconnect and will not close any window Code: +-----------------------------------+ | | | [1] Alert | | + | | +> [2] Show Alert +> [3] Yes | | | | | | | +> [4] No | | | | | +> [5] Location | | + | | +------+------+ | | v v | | [6] Left [7] Right | | | | | +-----------------------------------+ [1] Alert [2] View alert or notification of new customer login or connection [3] Yes if you need to show the alarm [4] No need to show the alarm [5] Alert site on desktop screen [6] Left desktop screen [7] Right desktop screen Code: +---------------------------------------+ | | | [1] Camera Manager | | + +-> [3] Yes | | +> [2] Auto focus | | | | +-> [4] No | | | | | | | | +> [5] Effects +-> [7] Gray | | | + | | | | +-+-------> [8] Raw-01 | | | | | | | | v +-> [9] Raw-02 | | | [6] Normal | | | | | | | | | | | +> [10] Quality | | + | | +---+--> [11] Auto | | | | | v | | [12] high quality | | | +---------------------------------------+ [1] Camera settings [2] Auto focus [3] Autofocus activation (not recommended) [4] Auto focus is inactive [5] Effects [6] without any default effect [7] Gradient effect [8] Raw Impact 01 model click here [9] The raw effect 02 is similar to the impact of crude 01 and the difference coloration of the model model click here [10] Broadcast quality [11] Automatic depending on the speed of communication between the parties [12] Top quality (not recommended) Code: +---+ +---------------------------------------+ | | | | | | [1] Location Manager | | | | + | | | | | | | | | +---> [2] Style | | | | + | | | | | | | | | +--> [3] Silver | | | | | | | | | [4] Aubergine <--+ | | | | | | | | | +--> [5] Dark | | | | | | | | | [6] Standard <--+ | | | | | | | +---------------------------------------+ | +---+ [1] Site settings [2] Map format [3] Silver model click here [4] Eggplant Form Click Here [5] Dark model click here [6] Basic Form Click Here Code: +------------------------------------+ |[1] Saving data | | + + | | | | | | | +>[2] Auto save | | | + | | | +----------+-----------+ | | | | | | | | +-> [3] No [4] Yes <-+ | | | | | + | |[5] Colors | | + + | | | +---------+ | | | | | | + | | |[10] Font | | | + +-> [6] Foreground | | | | | | +-----+ +-> [7] Background | | | | | | +-> [11] Size +-> [8] Titles | | | | | | +-> [12] Style +-> [9] New Files | | | +------------------------------------+ [1] Save data [2] Autosave [3] No data saving will appear on the records. You can save them again [4] Yes to save data automatically Records and data will be saved in the client folder Use (Firefox - Google Chrome) to open the records [5] Color in the sample program click here [6] Color Foreground - one color includes text, buttons, icons, etc. [7] Background color - one color will be used in the program background [8] Color Titles [9] Color of new files shared or modified by user or software [10] Program line [11] font size [12] Style font - bold or regular Show client folder Two clicks on the contacts To show contact information, click on the first column Total frames per second = FPS (Frames Per Second) Size = one frame size 170.25kb = 15fps * 11.35KB total size per second The accuracy of the site was less than all the best. The correct location is almost 0 to 75.0 = Accuracy Speedometer in kilometers per hour The speed of the vehicle or any other vehicle is measured = km / h Go to Google Maps two clicks on the map Zoom the map with the mouse wheel or the keyboard up or down To the end of the explanation here was to cover the most important details in the program If you encounter problems with the program, write down the details of the bugs, and they will be fixed in the next version. [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  19. This Metasploit module exploits a remote code execution vulnerability found in GetSimpleCMS versions 3.3.15 and below. An arbitrary file upload (PHPcode for example) vulnerability can be triggered by an authenticated user, however authentication can be bypassed by leaking the cms API key to target the session manager. View the full article
  20. This Metasploit module exploits a command execution vulnerability in PHP-Fusion versions 9.03.00 and below. It is possible to execute commands in the system with ordinary user authority. View the full article
  21. Firefly CMS version 1.0 suffers from a remote command execution vulnerability. View the full article
  22. An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. View the full article
  23. ReadyAPI versions 2.5.0 and 2.6.0 suffer from a remote code execution vulnerability. View the full article
  24. LG SuperSign EZ CMS, that many LG SuperSign TVs have built-in, is prone to a remote code execution vulnerability due to an improper parameter handling. View the full article