Search the Community

Showing results for tags 'root'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 26 results

  1. [Hidden Content]
  2. AZ SCREEN RECORDER - NO ROOT V5.5.9 B50200 [PREMIUM] [Hidden Content] Download: [Hidden Content]
  3. DNS Changer (no root 3G/WiFi) v1161r (Pro) ★★★ World’s first Mobile Data DNS CHANGER (without root) ★★ DNS Changer is the easiest way to Change DNS. Works without root and works for both WiFi and Mobile Network Data Connection. Unlimited acess to restricted Web Pages No root required WiFi / Mobile Data Network (2G/3G/4G) support Tablet and smartphone support Unblock the restricted web… Download Link : [Hidden Content]
  4. [Hidden Content]
  5. This Metasploit module exploits an issue in ptrace_link in kernel/ptrace.c before Linux kernel 5.1.17. This issue can be exploited from a Linux desktop terminal, but not over an SSH session, as it requires execution from within the context of a user with an active Polkit agent. In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. View the full article
  6. WebKit suffers from a user-agent shadow root leak in WebCore::ReplacementFragment::ReplacementFragment. View the full article
  7. [Hidden Content]
  8. AVCON6 Systems Management Platform suffers from a remote root command execution vulnerability. View the full article
  9. dEEpEst

    ​​Advantage To Root Your Device

    Advantage To Root Your Device [Hidden Content]
  10. 1337day-Exploits

    Webmin 1.920 rpc.cgi Remote Root

    This Metasploit module exploits Webmin versions 1.930 and below. This exploit takes advantage of a code execution issue within the function unserialise_variable() located in, in order to gain root. The only prerequisite is a valid session id. View the full article
  11. 1337day-Exploits

    Webmin 1.890 expired Remote Root

    Webmin version 1.890 (based on 1.920 research) expired remote root exploit. View the full article
  12. 1337day-Exploits

    Webmin 1.920 Remote Root

    Webmin version 1.920 remote root exploit. View the full article
  13. FaceSentry Access Control System version 6.4.8 facial biometric access control appliance ships with hard-coded and weak credentials for SSH access on port 23445 using the credentials wwwuser:123456. The root privilege escalation is done by abusing the insecure sudoers entry file. View the full article
  14. FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script. View the full article
  15. This Metasploit module exploits two vulnerabilities in Nagios XI 5.5.6. One allows for unauthenticated remote code execution and another allows for local privilege escalation. When combined, these two vulnerabilities give us a root reverse shell. View the full article
  16. Apache versions 2.4.17 through 2.4.38 suffer from a local root privilege escalation vulnerability due to an out-of-bounds array access leading to an arbitrary function call. View the full article
  17. dEEpEst

    Root Crypter v1.4 [Cracked]

    Scan: Download: [hide][Hidden Content]] Password:
  18. This is a write up detailing the root cause of the kernel privilege escalation vulnerabilities Microsoft patched on March 12, 2019. View the full article
  19. BEWARD N100 H.264 VGA IP Camera version M2.1.6 suffers from two authenticated command injection vulnerabilities. The issues can be triggered when calling ServerName or TimeZone GET parameters via the servertest page. This can be exploited to inject arbitrary system commands and gain root remote code execution. View the full article
  20. dEEpEst

    How To Root A Server

    [Hidden Content]
  21. An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group. View the full article
  22. 1337day-Exploits

    xorg-x11-server Local Root

    xorg-x11-server versions prior to 1.20.3 local root exploit. View the full article
  23. 0x1

    Auto Root Exploit

    Auto Root Exploit Tool Author : Nilotpal Biswas USAGE : for kernel version 2.6 all ./ 2 for kernel version 3 all ./ 3 for kernel version 4 all ./ 4 for freebsd & openbsd all ./ bsd for apple macos all ./ app for kernel 2.6,3,4 bsd & app all ./ all Download & Source : [Hidden Content]
  24. The FLIR AX8 thermal sensor camera version 1.32.16 suffers from two unauthenticated command injection vulnerabilities. The issues can be triggered when calling multiple unsanitized HTTP GET/POST parameters within the shell_exec function in res.php and palette.php file. This can be exploited to inject arbitrary system commands and gain root remote code execution. View the full article
  25. Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. View the full article