Search the Community

Showing results for tags 'shell'.

The search index is currently processing. Current results may not be complete.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 103 results

  1. Scripteen Image Upload script suffers from a shell upload vulnerability. View the full article
  2. Restaurant Management System version 1.0 suffers from a remote shell upload vulnerability. View the full article
  3. 1337day-Exploits

    Chamilo LMS 1.11.8 Shell Upload

    Chamilo LMS version 1.11.8 suffers from a remote shell upload vulnerability. View the full article
  4. FileThingie version 2.5.7 suffers from a remote shell upload vulnerability. View the full article
  5. [Hidden Content]
  6. 1337day-Exploits

    Baldr Botnet Panel Shell Upload

    This Metasploit module exploits the file upload vulnerability of baldr malware panel in order to achieve arbitrary code execution. View the full article
  7. Comtrend AR-5310 suffers from a restricted shell escape vulnerability. View the full article
  8. This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) [HIDE][Hidden Content]]
  9. BKS EBK Ethernet-Buskoppler Pro versions prior to 3.01 suffer from a remote shell upload vulnerability. View the full article
  10. EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own. Download: [HIDE]. [Hidden Content]]
  11. Level23HackTool

    Find shell backdoor on website

    [Hidden Content]
  12. Level23HackTool

    SHELL X1

    [Hidden Content]
  13. Level23HackTool


    [Hidden Content]
  14. Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting shell and checking it works like all the other tools do, vulnx analyses the response with and recieve if shell success uploaded or no. vulnx is searching for urls with dorks. [HIDE][Hidden Content]] Features Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilites Auto shell injector Exploit dork searcher Exploits Joomla Com Jce Com Jwallpapers Com Jdownloads Com Weblinks Com Fabrik Com Jdownloads Index Com Foxcontact Com Blog Com Users Com Ads Manager Com Sexycontactform Com Media Mod_simplefileupload Com Facileforms Wordpress Simple Ads Manager InBoundio Marketing WPshop eCommerce Synoptic Showbiz Pro Job Manager Formcraft PowerZoom Download Manager CherryFramework Catpro Blaze SlideShow Wysija-Newsletters Drupal Add Admin Drupal BruteForcer Drupal Geddon2 PrestaShop attributewizardpro columnadverts soopamobile pk_flexmenu pk_vertflexmenu nvn_export_orders megamenu tdpsthemeoptionpanel psmodthemeoptionpanel masseditproduct blocktestimonial soopabanners Vtermslideshow simpleslideshow productpageadverts homepageadvertise homepageadvertise2 jro_homepageadvertise advancedslider cartabandonmentpro cartabandonmentproOld videostab wg24themeadministration fieldvmegamenu wdoptionpanel Opencart Opencart BruteForce
  15. Level23HackTool

    Exploit for Shell Upload +Deface

    [Hidden Content]
  16. Level23HackTool

    Python Reverse Shell

    [Hidden Content]
  17. Level23HackTool

    Perl Reverse Shell

    [Hidden Content]
  18. TheFOX

    Shell Cat

    SHELLCAT is a recerse shell manager Download [HIDE][Hidden Content]]
  19. hailmary:~# is a very basic, single-file, PHP shell. It's meant to be a mini destructive tool which you can deploy and destroy files quickly. Use it with caution: this script represents a security risk for the server. It was built for using on remote servers we set for clients who did not pay for the complete product, as consequence hailmary would wipe our product from there. Features: Display directory location where it's placed. Delete all files and folders inside a specified path Commands: WARNING: THIS SCRIPT IS A SECURITY HOLE. DO NOT UPLOAD IT ON A SERVER UNTIL YOU KNOW WHAT YOU ARE DOING! [Hidden Content]
  20. Hamza_BNR


    [Hidden Content]
  21. 1337day-Exploits

    Horde Form Shell Upload

    Horde Groupware Webmail contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. The exploitation requires the Turba subcomponent to be installed. This module was tested on Horde versions 5.2.22 and 5.2.17 running Horde Form subcomponent versions prior to 2.0.19. View the full article
  22. This Metasploit module exploits a path traversal and a local file inclusion vulnerability on WordPress versions 5.0.0 and versions below or equal to 4.9.8. The crop-image function allows a user, with at least author privileges, to resize an image and perform a path traversal by changing the _wp_attached_file reference during the upload. The second part of the exploit will include this image in the current theme by changing the _wp_page_template attribute when creating a post. This exploit module only works for Unix-based systems currently. View the full article
  23. Level23HackTool

    IIS Scanner with Auto Uploading Shell

    [Hidden Content]
  24. Joomla ARI Image Slider component version 2.2.0 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article