Search the Community

Showing results for tags 'shell'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 103 results

  1. _____ _______ _____ _____ _____ _ _ _ _ | __ \ |__ __/ ____| __ \ / ____| | | | | | | | |__) |_____ _____ _ __ ___ ___| | | | | |__) | | (___ | |__| | ___| | | | _ // _ \ \ / / _ \ '__/ __|/ _ \ | | | | ___/ \___ \| __ |/ _ \ | | | | \ \ __/\ V / __/ | \__ \ __/ | | |____| | ____) | | | | __/ | | |_| \_\___| \_/ \___|_| |___/\___|_| \_____|_| |_____/|_| |_|\___|_|_| - By: @ZHacker13 - | Modules | - Show C2-Server Modules. - | Info | - Show Remote-Host Info. - | Upload | - Upload File from Local-Host to Remote-Host. - | Download | - Download File from Remote-Host to Local-Host. - | Screenshot | - Save Screenshot from Remote-Host to Local-Host. Tutorial: [Hidden Content] Download: [HIDE][Hidden Content]]
  2. Scripteen Image Upload script suffers from a shell upload vulnerability. View the full article
  3. Restaurant Management System version 1.0 suffers from a remote shell upload vulnerability. View the full article
  4. 1337day-Exploits

    Chamilo LMS 1.11.8 Shell Upload

    Chamilo LMS version 1.11.8 suffers from a remote shell upload vulnerability. View the full article
  5. FileThingie version 2.5.7 suffers from a remote shell upload vulnerability. View the full article
  6. [Hidden Content]
  7. 1337day-Exploits

    Baldr Botnet Panel Shell Upload

    This Metasploit module exploits the file upload vulnerability of baldr malware panel in order to achieve arbitrary code execution. View the full article
  8. Comtrend AR-5310 suffers from a restricted shell escape vulnerability. View the full article
  9. This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) [HIDE][Hidden Content]]
  10. BKS EBK Ethernet-Buskoppler Pro versions prior to 3.01 suffer from a remote shell upload vulnerability. View the full article
  11. EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own. Download: [HIDE]. [Hidden Content]]
  12. [Hidden Content]
  13. F B I

    SHELL X1

    [Hidden Content]
  14. F B I

    SHELL UPLOAD X1

    [Hidden Content]
  15. Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting shell and checking it works like all the other tools do, vulnx analyses the response with and recieve if shell success uploaded or no. vulnx is searching for urls with dorks. [HIDE][Hidden Content]] Features Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilites Auto shell injector Exploit dork searcher Exploits Joomla Com Jce Com Jwallpapers Com Jdownloads Com Weblinks Com Fabrik Com Jdownloads Index Com Foxcontact Com Blog Com Users Com Ads Manager Com Sexycontactform Com Media Mod_simplefileupload Com Facileforms Wordpress Simple Ads Manager InBoundio Marketing WPshop eCommerce Synoptic Showbiz Pro Job Manager Formcraft PowerZoom Download Manager CherryFramework Catpro Blaze SlideShow Wysija-Newsletters Drupal Add Admin Drupal BruteForcer Drupal Geddon2 PrestaShop attributewizardpro columnadverts soopamobile pk_flexmenu pk_vertflexmenu nvn_export_orders megamenu tdpsthemeoptionpanel psmodthemeoptionpanel masseditproduct blocktestimonial soopabanners Vtermslideshow simpleslideshow productpageadverts homepageadvertise homepageadvertise2 jro_homepageadvertise advancedslider cartabandonmentpro cartabandonmentproOld videostab wg24themeadministration fieldvmegamenu wdoptionpanel Opencart Opencart BruteForce
  16. [Hidden Content]
  17. F B I

    Python Reverse Shell

    [Hidden Content]
  18. F B I

    Perl Reverse Shell

    [Hidden Content]
  19. TheFOX

    Shell Cat

    SHELLCAT is a recerse shell manager Download [HIDE][Hidden Content]]
  20. hailmary:~# is a very basic, single-file, PHP shell. It's meant to be a mini destructive tool which you can deploy and destroy files quickly. Use it with caution: this script represents a security risk for the server. It was built for using on remote servers we set for clients who did not pay for the complete product, as consequence hailmary would wipe our product from there. Features: Display directory location where it's placed. Delete all files and folders inside a specified path Commands: WARNING: THIS SCRIPT IS A SECURITY HOLE. DO NOT UPLOAD IT ON A SERVER UNTIL YOU KNOW WHAT YOU ARE DOING! [Hidden Content]
  21. Hamza_BNR

    shell

    [Hidden Content]
  22. 1337day-Exploits

    Horde Form Shell Upload

    Horde Groupware Webmail contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. The exploitation requires the Turba subcomponent to be installed. This module was tested on Horde versions 5.2.22 and 5.2.17 running Horde Form subcomponent versions prior to 2.0.19. View the full article
  23. This Metasploit module exploits a path traversal and a local file inclusion vulnerability on WordPress versions 5.0.0 and versions below or equal to 4.9.8. The crop-image function allows a user, with at least author privileges, to resize an image and perform a path traversal by changing the _wp_attached_file reference during the upload. The second part of the exploit will include this image in the current theme by changing the _wp_page_template attribute when creating a post. This exploit module only works for Unix-based systems currently. View the full article
  24. [Hidden Content]