 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 249
Members: 0
Total: 249
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
It's an md5(unix) hash. I'll give it a try soon.
Yes its a root hash Thank you  |
|
|
|
|
Hello guys.
Anyone help me to decode or just decode this hash ?
$1$rT9ye8YG$YdiXr9C.X6aJcd4HlGUyX0
Thanks |
|
|
|
|
No there is way Exhail
I solved it in 1 minute
Add this codes to Victim Mail Text Box
( Here is TextBox3 )
Private Sub TextBox3_TextChanged(ByVal sender As System.Object, ByV ... |
|
|
|
|
I have a question too..
I want to give this program to my friends.. But i'm afrading of what if they attack me ?
Can we cancel an e-mail for attack
Like i dont want to making attack for dasd ... |
|
|
|
|
I have a question.
What about 501 errors.. ?
When i reach +70, Program giving 501 Auth error.
Can i fix it ? |
|
|
|
|
Its Really Simple and Usefull |
|
|
|
|
2.6.18-92.1.18.el5.028stab060.8 #1 SMP Mon Feb 9 21:44:50 MSK 2009 i686 i686 i386 GNU/Linux
Anyone have that ? |
|
|
|
|
There is MMAp security there Hard To Root ...  |
|
|
|
|
Please help guys i need to decode a phpcipher file how can i do this ?
A Program or a guide please
Thanks and regards.. |
|
|
|
|
But dude. In Joomla 1.5 Admins can change their name like :
username : admin
Show Name : cem
like this.
My access is remote .. |
|
|
|
|
dude .. Joomla is easiest hacking script I think. |
|
|
|
|
Hey guys. I know password but how can i learn admin username ? |
|
|
|
|
dude i asked exploit lol  |
|
|
|
|
How can i find salt + hash on vbulletin 3.8.0 ? |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|