Search the Community

Showing results for tags 'shell'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 83 results

  1. hailmary:~# is a very basic, single-file, PHP shell. It's meant to be a mini destructive tool which you can deploy and destroy files quickly. Use it with caution: this script represents a security risk for the server. It was built for using on remote servers we set for clients who did not pay for the complete product, as consequence hailmary would wipe our product from there. Features: Display directory location where it's placed. Delete all files and folders inside a specified path Commands: WARNING: THIS SCRIPT IS A SECURITY HOLE. DO NOT UPLOAD IT ON A SERVER UNTIL YOU KNOW WHAT YOU ARE DOING! [Hidden Content]
  2. Hamza_BNR

    shell

    [Hidden Content]
  3. 1337day-Exploits

    Exploits Horde Form Shell Upload

    Horde Groupware Webmail contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. The exploitation requires the Turba subcomponent to be installed. This module was tested on Horde versions 5.2.22 and 5.2.17 running Horde Form subcomponent versions prior to 2.0.19. View the full article
  4. This Metasploit module exploits a path traversal and a local file inclusion vulnerability on WordPress versions 5.0.0 and versions below or equal to 4.9.8. The crop-image function allows a user, with at least author privileges, to resize an image and perform a path traversal by changing the _wp_attached_file reference during the upload. The second part of the exploit will include this image in the current theme by changing the _wp_page_template attribute when creating a post. This exploit module only works for Unix-based systems currently. View the full article
  5. [Hidden Content]
  6. Joomla ARI Image Slider component version 2.2.0 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  7. WordPress version 5.0.4 with FormCraft plugin version 2.0 suffers from a cross site request forgery vulnerability that can be leveraged to perform a shell upload. View the full article
  8. WordPress WP-Image-News-Slider plugin version 3.3 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  9. WordPress WP-DreamworkGallery plugin version 2.3 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  10. Joomla ModPPCSimpleSpotLight module versions 1.2 and 3.0 suffer from cross site request forgery and remote shell upload vulnerabilities. View the full article
  11. dEEpEst

    AnonGhost Private shell

    [Hidden Content]
  12. HanYazilim Paper Submission System .NET version 1.0 suffers from a remote shell upload vulnerability. View the full article
  13. Joomla JWallPapers component version 2.0.1 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  14. Joomla Attachments component version 3.2.6 suffers from a remote shell upload vulnerability. View the full article
  15. Digi TransPort LR54 suffers from a restricted shell bypass vulnerability that gets a root shell. View the full article
  16. Slims CMS Senayan Library Management System version 7.0 suffers from a remote shell upload vulnerability. View the full article
  17. dEEpEst

    anonymous shell

    [Hidden Content]
  18. WordPress WP User Manager plugin version 2.0.8 suffers from a remote shell upload vulnerability. View the full article
  19. WordPress Ultimate-Member plugin version 2.0.38 suffers from cross site request forgery and remote shell upload vulnerabilities. View the full article
  20. Joomla Remository component version 3.58 suffers from database disclosure, remote shell upload, and remote SQL injection vulnerabilities. View the full article
  21. Dr HeX Zombi Bot 5.7 Red Evil Best Auto Shell Upload Bot For FREE. Zombi 5.7 is The Latest And Best Auto Exploit Bot Ever. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  22. WordPress MM-Forms-Community plugin version 2.2.7 suffers from remote shell upload and remote SQL injection vulnerabilities. View the full article
  23. WordPress pitajte-strucnjaka plugin version 4.9.6 suffers from a remote shell upload vulnerability. View the full article
  24. Pydio / AjaXplorer versions 5.0.3 and below suffer from directory traversal and remote shell upload vulnerabilities. View the full article
  25. itsMe?

    Remote Hell - Another PHP Shell

    Remote Hell - Another PHP Shell [HIDE][Hidden Content]] With Remote Hell you can execute commands like if they're executing in your system. You can do things like: rh ls -l and Remote Hell will execute the command and gives you the output on the terminal. This permits the usage of remote commands and local commands, like this: rh cat /var/www/wordpress/wp-config.php > wp-config.php You are sending the content of the remote file to a local file. It's really simple. But it's really usefull! ;) Authentication Remote Hell authenticates you with a very basic mecanism: You send the password with each HTTP request, if the password is correct, the commands are executed, if not, nothing happens. Note: If the connection is plaintext (HTTP and not HTTPS), the password will be sent in cleartext. Execution Methods Remote Hell automatically tries various PHP command execution methods, or functions: system shell_exec exec passthru popen When it finds an allowed method, uses it. Configuration You can adjust some parameters editing the ~/.rhell.cfg file, that it's created the first time that you run Remote Hell.