Jump to content

dr.d3v1l

Active Members
  • Content Count

    187
  • Joined

  • Last visited

  • Days Won

    2

dr.d3v1l last won the day on October 23 2017

dr.d3v1l had the most liked content!

Community Reputation

57 Excellent

2 Followers

About dr.d3v1l

  • Rank
    Registered user

Recent Profile Visitors

1723 profile views
  1. dr.d3v1l

    Decompilare aplicatie Android

    https://github.com/Konloch/bytecode-viewer
  2. dr.d3v1l

    HOF telecom ITALY

    Da, doar HOF
  3. dr.d3v1l

    HOF telecom ITALY

    INFO -> http://www.telecomitalia.com/tit/it/footer/responsible-disclosure.html ->
  4. dr.d3v1l

    [XSS] *.*.microsoft.com

  5. Dear Dr.d3v1l The vulnerabilities you reported has been fixed. As a token of our appreciation we would like to offer you a t-shirt. If you would like a t-shirt please provide us with your preferred t-shirt size (S/M/L/XL/XXL) and on what address you would like to receive the t-shirt. Thanks in advance for your reply and thanks again for your report. Sincerely,
  6. dr.d3v1l

    leak database

    leak database 8700+ (user,pass,mail ecc)
  7. dr.d3v1l

    [LFI]REGISTER.IT

    PRIVATE BUGBOUNTY AM PRIMIT 2 VPS SI 1 DOMENIU PENTRU 1 AN. STATUS:FIXED
  8. dr.d3v1l

    XSS *htc.com

    aici spunea ca mar hof aveai http://www.vulnerability-lab.com/list-of-bug-bounty-programs.php
  9. dr.d3v1l

    XSS *htc.com

    http://estore.htc.com/tw/buy/zh-TW/shop/SearchDisplay?searchTerm=asd'- confirm(document.domain)-'&storeId=10001&catalogId=10001&langId=-7&pageSize =20&beginIndex=0&sType=SimpleSearch&resultCatEntryType=2&showResultsPa ge=true&searchSource=Q&pageView=
  10. dr.d3v1l

    XXE EXPLOITATION AJUTOR [$$$ recompensa]

    5) da sunt autizat , doar ca au cerut ce pot exploita . De asta am pus ($$) , dar din cate am mai verificat ... nu merge
  11. dr.d3v1l

    XXE EXPLOITATION AJUTOR [$$$ recompensa]

    am incerca si cuv gopher:// file:// ftp:// php://filter/convert.base64-encode/resource=/etc/passwd , dar nimica . Am log per server de la request dar nu pot citi etc/passwd
  12. dr.d3v1l

    XXE EXPLOITATION AJUTOR [$$$ recompensa]

    xxe = XML External Entity
  13. Salut Rst , cum as putea exploita complet aceasta xxe ? Am vazut un pic de topic de la owasp , da este local daca nu gresesc da se poate face si remote cred din cate am citit *Ofer o mica suma pentru cine ma ajuta sa gasesc un exploit valid .
  14. dr.d3v1l

    Cont de facebook spart

    http://www.ipgeek.net/109.166.136.78 ______________________________________ IP:109.166.136.78 Decimal:1839630414 ISP:Orange RomaniaOrganization:Orange RomaniaTime zone:Europe/BucharestIP Latitude:46 Longitude:25 Continent:EU
  15. dr.d3v1l

    [XSS]pornhub.com

    STATE:DUPLICATE bugbounty:https://hackerone.com/pornhub
×