Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Unrestricted file upload vulnerability

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 9

      Share this post


      Link to post
      Share on other sites
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          Easy Share : WiFi File Transfer v1.2.40 (Unlocked)
           Share All Kinds Of Files By Wi-Fi P2P, Speed Goes Up To 20M/S, No Cellular/Mobile Data Used.
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. MCrypt V2
          This project was made for educational purposes and not intended to be malicious.
          What it does
          MCrypt can bind multiple input files or take 1 input file into 1 file
          MCrypt can execute the output with a delay using the --delay-execute=15 switch.
          It should theoretically work on any OS including MAC and Linux (Not tested).
          The input files are encrypted, if the input is a .net executable then it will be executed using reflection, however if it is not a .net executable then the raw inputs will be dropped onto the temp file path and executed.
          Features
          Supports any file type (.doc, .exe, .pdf .... etc)
          Scan-time encryption
          Runtime on same process on .NET executable's which means no file dropping on the file system (Reflection)
          Output is fully self contained so no need to install any extra Microsoft dependencies to run the output executable file
          Delay startup to bypass AV smart scanners
          Requirements to run MCrypt (The user running the output does NOT NEED THIS)
          .NET Core 3 Runtime/SDK Download .NET Core 3.0 (Linux, macOS, and Windows)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like subdomains, ipaddresses, country, org, timezone, region, ans and more ...
          Instead of injecting each and every shell manually like all the other tools do, VulnX analyses the target website checking the presence of a vulnerabilitie if so the shell will be Injected.searching urls with dorks Tool.
          Features
              Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
              Target informations gatherings
              Target Subdomains gathering
              Multi-threading on demand
              Checks for vulnerabilities
              Auto shell injector
              Exploit dork searcher
              Ports Scan High Level
              Dns-Servers Dump
              Input multiple target to scan.
              Dorks Listing by Name& by ExploitName.
              Export multiple target from Dorks into a logfile.

          v1.9
              Add Vulnx−Mode interactive mode
              Add Command Line Interface Class cli
              Add Dork Functionnality to Vulnx−Mode
              Fix DNSDUMP Functionnality
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 0x1
          A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI.

          Hidden Content
          Give reaction to this post to see the hidden content. Abstract
          Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify an image name of the container.
          It is considered to be used in CI. Before pushing to a container registry, you can scan your local container image easily.
          Features
          Detect comprehensive vulnerabilities OS packages (Alpine, Red Hat Universal Base Image, Red Hat Enterprise Linux, CentOS, Debian, Ubuntu, Amazon Linux and Distroless) Application dependencies (Bundler, Composer, Pipenv, Poetry, npm, yarn and Cargo) Simple Specify only an image name Easy installation apt-get install, yum install and brew install is possible No pre-requisites such as installation of DB, libraries, etc. (The exception is that you need rpm installed to scan images based on RHEL/CentOS. This is automatically included if you use our installers or the Trivy container image.) High accuracy Especially Alpine Linux and RHEL/CentOS Other OSes are also high DevSecOps Suitable for CI such as Travis CI, CircleCI, Jenkins, etc. Gif Demo
          More info && Download

          Hidden Content
          Give reaction to this post to see the hidden content.