Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
December 13, 2018
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: Glass
New Today: 0
New Yesterday: 0
Overall: 9140

People Online:
Visitors: 318
Members: 1
Total: 319

Online Now:
01: kolaz - Homepage
PacketStorm News
Currently there is a problem with headlines from this site
Last 10 waraxe advisories

· [waraxe-2018-SA#109] - Multiple vulnerabilities in Wordfence Wordpress plugin
· [waraxe-2018-SA#108] - Username Disclosure in Breadcrumb NavXT Wordpress plugin
· [waraxe-2018-SA#107] - Reflected XSS in FV Flowplayer Wordpress plugin
· [waraxe-2013-SA#106] - Multiple Vulnerabilities in Saurus CMS 4.7.1
· [waraxe-2013-SA#105] - Multiple Vulnerabilities in Spider Catalog Wordpress Plugin
· [waraxe-2013-SA#104] - Multiple Vulnerabilities in Spider Event Calendar Wordpress Plugin
· [waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin
· [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7
· [waraxe-2013-SA#101] - Update Spoofing Vulnerability in Royal TS 2.1.5
· [waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50

Last Posts to Forum

Topics  Replies   Author   Views   Last Post 
 Please Decode 4 devilhunter 1876   10/10/2018 at 09:32 
devilhunter Latest Post
 decode please because I dont understand encryption method 1 shinemagin 2220   05/24/2018 at 15:46 
kolaz Latest Post
 hash help 0 VERTIGO 3091   11/19/2017 at 01:15 
VERTIGO Latest Post
 mIRC socks/proxy scanner+leecher - Proxy Studio v1.2 0 Independent 18694   11/16/2017 at 06:12 
Independent Latest Post
 mIRC- Proxy Studio v1.1 by independent 1 Independent 18711   11/16/2017 at 06:11 
Independent Latest Post
 CONNECT proxys for cracking 0 Independent 1273850   11/09/2017 at 23:08 
Independent Latest Post
 What do I need to unhash MD5(PhpBB3)? 0 DeutscheGamer 3212   09/16/2017 at 10:12 
DeutscheGamer Latest Post
 Some MD5(phpBB3) Hashes 0 DeutscheGamer 3251   09/15/2017 at 15:56 
DeutscheGamer Latest Post
 md5 hash 0 q7w8e9 3110   08/30/2017 at 01:42 
q7w8e9 Latest Post
 what is this hash? 2 webdok 5117   07/30/2017 at 18:46 
webdok Latest Post
 Md5+salt 0 black_raptor 3238   07/30/2017 at 09:52 
black_raptor Latest Post
 Crack md5 hashes / help! 1128 safer 441619   07/29/2017 at 11:00 
black_raptor Latest Post
 Hash help 0 VERTIGO 4354   04/26/2017 at 17:21 
VERTIGO Latest Post
 cs cart hash 0 VERTIGO 4073   02/24/2017 at 18:05 
VERTIGO Latest Post
 md5(phpbb3) without salt given, please decrypt 21 MasterZin 38612   08/28/2016 at 02:33 
Blizniakus Latest Post
 Can someone smoke this salted IPB hash for me ;D 0 BlackMacaque 4762   08/15/2016 at 22:53 
BlackMacaque Latest Post
 IPB Hash Needed Cracked 0 OpticalGaminghd 4953   07/31/2016 at 14:23 
OpticalGaminghd Latest Post
 BARRACUDA SPAM FIREWALL + WEBFILTER - UNLOCKING/ROOT ACCESS 2 tinman 41132   05/31/2016 at 23:12 
goofy Latest Post
 md5 crack 0 gygymuschi 5917   05/06/2016 at 12:36 
gygymuschi Latest Post
 Decoding FOPO encoded file 48 amin 53659   04/21/2016 at 11:59 
ver_shine Latest Post
 MD5 0 akens 5013   04/13/2016 at 07:09 
akens Latest Post
 hi guys. ioncube 0046b plase help me! 1 usertolem 3756   04/09/2016 at 22:19 
azer Latest Post
 Help me 1 Decode files 3 azer 4548   04/09/2016 at 22:13 
azer Latest Post
 Please Help Me! Decode This File /$OOO000000=urldecode('%66 8 cbpartner 11289   03/29/2016 at 01:07 
myg3nx Latest Post
 New PHP Obfuscator That realy obfuscate your code 2 myg3nx 7286   03/29/2016 at 01:00 
myg3nx Latest Post
 need to decode ioncube please help 1 erick 3296   02/27/2016 at 16:29 
kolaz Latest Post
 please help me to decode this javascript 1 seudesign 4989   02/22/2016 at 11:15 
kolaz Latest Post
 LM and NTLM Hash decryption 1166 errorlogin 510800   02/22/2016 at 11:14 
wowgrad11 Latest Post
 shell code decoding 4 rmill54 5496   02/18/2016 at 05:01 
rmill54 Latest Post
 WP hash 0 kolaz 4578   02/12/2016 at 05:08 
kolaz Latest Post

WebApp Sec

·SiteWIX - (edit_photo2.php id) SQL Injection Exploit
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·hsecscan v0 (https://github.com/riram ar/hsecscan)
·Invitation to X0RC0NF Security Conference 2015

read more...

pen-test@insecure.org

·[HITB-Announce] HITB2016AMS Call for Papers

read more...

Top members by posts
waraxe  waraxe - 2407
vince213333  vince213333 - 737
pexli  pexli - 665
Mullog  Mullog - 539
demon  demon - 485
shai-tan  shai-tan - 477
LINUX  LINUX - 404
Cyko  Cyko - 375
tsabitah  tsabitah - 328
y3dips  y3dips - 281
SecurityFocus
·Vuln: Oracle Java SE CVE-2015-4860 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4872 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4911 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4903 Remote Security Vulnerability
·Bugtraq: [SECURITY] [DSA 3413-1] openssl security update
·Bugtraq: [SECURITY] [DSA 3412-1] redis security update
·Bugtraq: [security bulletin] HPSBGN03525 rev.1: HP Performance Center Virtual Table Server, Remote Code Execution
·Bugtraq: ESA-2015-171 EMC NetWorker Denial-of-service Vulnerability
·More rss feeds from SecurityFocus

read more...
alexa



Hard drive recovery - Game Cheats - Book Reviews - Cisco VPN error 412
Harry Potter - Book Reviews - Old Science Books Online - Biographies Online Database
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.079 Seconds