Search results

  1. M

    Cardmafia.pw leak 206k | Carding forum

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. M

    FULL LEAK: Indonesia's IT Vendor For All Major Insurance Companies Hacked by DESORDEN

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. M

    Bankinglab-ConnectPay database

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. M

    Swachh.city | Swachhata Platform - Leaked, Download! [16ml]

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. M

    Digital stakeout of Chinese hacker gang reveals 100+ victims

    Crew behind 'Comfoo' RAT may have rooted through videoconferencing vendor for ways to watch confidential meetings in government, businesses A Chinese hacker gang whose malware targeted RSA in 2011 infiltrated more than 100 companies and organizations, and was so eager to steal data that it...
  6. M

    How to make a bot in IRC

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. M

    Read and write file in Java

    // get which file you want to read and write File file = new File("D://test.txt"); try { // check whether the file is existed or not if (file.exists()) { // create a new file if the file is not existed file.createNewFile(); } // new a writer and point the writer...
  8. M

    Learn Java using Eclipste and TDD

    A Quick Video Introduction to Java Programming using Eclipse. Also cover a few basics of test driven development. Covers : Objects, Classes, Datatypes, String, BigDecimal, Enum, Variable Arguments, OOPS Concepts & More.. Java Tutorial For Beginners - YouTube
  9. M

    List of shortcuts key for Eclipse

    Shortcut keys make life that little bit quicker! They aid you in working faster and become very handy when programming in Eclipse. For a full list of shortcuts, in Eclipse 3.1 and above you can press Ctrl+Shift+L for a handy popup. Shortcuts: Ctrl+Shift+T Find Java Type Start typing the...
  10. M

    Almost Half of Tor sites compromised by FBI [Exclusive details]

    As many of you might know the US has been pushing for the extradition of Eric Eoin Marques who an FBI agent has called as "the largest facilitator of child porn on the planet." But most of you might not know that he is also the owner of "freedom hosting" the largest hosting provider for .onion...
  11. M

    [Perl] vBulletin 5 Beta XX SQLi 0day

    #!/usr/bin/perl use LWP::UserAgent; use HTTP::Cookies; use HTTP::Request::Common; use MIME::Base64; system $^O eq 'MSWin32' ? 'cls' : 'clear'; print " +===================================================+ | vBulletin 5 Beta XX SQLi 0day | | Author: Orestis...
  12. M

    MyBB User Profile Skype ID Plugin - Post SQL Injection Vulnerability

    # Exploit Title: Profile Skype ID MyBB plugin privilege escalation. # Google Dork: intext:"Skype ID Skype I" inurl:member # Date: 12.20.2012 # Exploit Author: Zixem # Software Link: http://mods.mybb.com/view/user-profile-skype-id # Version: 1.0 # Tested on: Linux...
  13. M

    Wordpress 3.5.x Persistent XSS

    # Exploit Title: Wordpress 3.5.x Persistent XSS # Google Dork: inurl:/wp-content/ # Date: 09/05/2013 # Exploit Author: n0tch # Vendor Homepage: http://www.wordpress.com/ # Software Link: [download link if available] # Version: 3.5.2 # Tested on: Windows/Linux # CVE : [if one exists, or other VDB...
  14. M

    Wordpress 3.5.x Userspoofing

    # Exploit Title: Wordpress 3.5.x Userspoofing # Google Dork: inurl:/wp-content/ # Date: 09/05/2013 # Exploit Author: n0tch # Vendor Homepage: http://www.wordpress.com/ # Software Link: http://www.wordpress.com/ # Version: 3.5.2 # Tested on: Windows/Linux # CVE : [/about/] Wordpress 3.5.x...
  15. M

    Force Read Thread 0day

    # Exploit Title: vBulletin force Read Thread 0day ## Author(s): n3tw0rk & xiJBx # # Contact: Mail:[email protected] # # Product: 4.0.x # # Software Version x.x.x...
  16. M

    Joomla All v1.5 Error Based SQL Injection Vulnerability

    1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \...
  17. M

    (XSS) Feshop Store

  18. M

    Bypass XSS Filters

    Introduction XSS is one of the most common web vulnerability, XSS attacks are often overlooked by administrators while there are a lot of way to exploit this vulnerability. In this tutorial i will explain how to bypass xss filters with few tricks. Remember first you must know XSS attack...
Top Bottom