Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 25, 2019
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: Williampauch
New Today: 0
New Yesterday: 0
Overall: 9142

People Online:
Visitors: 377
Members: 0
Total: 377
PacketStorm News
Currently there is a problem with headlines from this site
Last 10 waraxe advisories

· [waraxe-2018-SA#109] - Multiple vulnerabilities in Wordfence Wordpress plugin
· [waraxe-2018-SA#108] - Username Disclosure in Breadcrumb NavXT Wordpress plugin
· [waraxe-2018-SA#107] - Reflected XSS in FV Flowplayer Wordpress plugin
· [waraxe-2013-SA#106] - Multiple Vulnerabilities in Saurus CMS 4.7.1
· [waraxe-2013-SA#105] - Multiple Vulnerabilities in Spider Catalog Wordpress Plugin
· [waraxe-2013-SA#104] - Multiple Vulnerabilities in Spider Event Calendar Wordpress Plugin
· [waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin
· [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7
· [waraxe-2013-SA#101] - Update Spoofing Vulnerability in Royal TS 2.1.5
· [waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50

Last Posts to Forum

Topics  Replies   Author   Views   Last Post 
 can you decode this pls? 0 a1232q 1886   12/30/2018 at 18:15 
a1232q Latest Post
 phpshield Loader decoding 1 fantastikky 1036   12/29/2018 at 02:14 
kolaz Latest Post
 Please Decode 4 devilhunter 3300   10/10/2018 at 09:32 
devilhunter Latest Post
 decode please because I dont understand encryption method 1 shinemagin 3178   05/24/2018 at 15:46 
kolaz Latest Post
 hash help 0 VERTIGO 3851   11/19/2017 at 01:15 
VERTIGO Latest Post
 mIRC socks/proxy scanner+leecher - Proxy Studio v1.2 0 Independent 22039   11/16/2017 at 06:12 
Independent Latest Post
 mIRC- Proxy Studio v1.1 by independent 1 Independent 22173   11/16/2017 at 06:11 
Independent Latest Post
 CONNECT proxys for cracking 0 Independent 1308815   11/09/2017 at 23:08 
Independent Latest Post
 What do I need to unhash MD5(PhpBB3)? 0 DeutscheGamer 3945   09/16/2017 at 10:12 
DeutscheGamer Latest Post
 Some MD5(phpBB3) Hashes 0 DeutscheGamer 3997   09/15/2017 at 15:56 
DeutscheGamer Latest Post
 md5 hash 0 q7w8e9 3973   08/30/2017 at 01:42 
q7w8e9 Latest Post
 what is this hash? 2 webdok 6051   07/30/2017 at 18:46 
webdok Latest Post
 Md5+salt 0 black_raptor 3957   07/30/2017 at 09:52 
black_raptor Latest Post
 Crack md5 hashes / help! 1128 safer 469208   07/29/2017 at 11:00 
black_raptor Latest Post
 Hash help 0 VERTIGO 5159   04/26/2017 at 17:21 
VERTIGO Latest Post
 cs cart hash 0 VERTIGO 4813   02/24/2017 at 18:05 
VERTIGO Latest Post
 md5(phpbb3) without salt given, please decrypt 21 MasterZin 41245   08/28/2016 at 02:33 
Blizniakus Latest Post
 Can someone smoke this salted IPB hash for me ;D 0 BlackMacaque 5467   08/15/2016 at 22:53 
BlackMacaque Latest Post
 IPB Hash Needed Cracked 0 OpticalGaminghd 5676   07/31/2016 at 14:23 
OpticalGaminghd Latest Post
 BARRACUDA SPAM FIREWALL + WEBFILTER - UNLOCKING/ROOT ACCESS 2 tinman 42240   05/31/2016 at 23:12 
goofy Latest Post
 md5 crack 0 gygymuschi 6616   05/06/2016 at 12:36 
gygymuschi Latest Post
 Decoding FOPO encoded file 48 amin 66792   04/21/2016 at 11:59 
ver_shine Latest Post
 MD5 0 akens 5673   04/13/2016 at 07:09 
akens Latest Post
 hi guys. ioncube 0046b plase help me! 1 usertolem 4526   04/09/2016 at 22:19 
azer Latest Post
 Help me 1 Decode files 3 azer 5487   04/09/2016 at 22:13 
azer Latest Post
 Please Help Me! Decode This File /$OOO000000=urldecode('%66 8 cbpartner 12528   03/29/2016 at 01:07 
myg3nx Latest Post
 New PHP Obfuscator That realy obfuscate your code 2 myg3nx 8255   03/29/2016 at 01:00 
myg3nx Latest Post
 need to decode ioncube please help 1 erick 4096   02/27/2016 at 16:29 
kolaz Latest Post
 please help me to decode this javascript 1 seudesign 5630   02/22/2016 at 11:15 
kolaz Latest Post
 LM and NTLM Hash decryption 1166 errorlogin 535357   02/22/2016 at 11:14 
wowgrad11 Latest Post

WebApp Sec

·SiteWIX - (edit_photo2.php id) SQL Injection Exploit
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·Re: hsecscan v0 (https://github.com/riram ar/hsecscan)
·hsecscan v0 (https://github.com/riram ar/hsecscan)
·Invitation to X0RC0NF Security Conference 2015

read more...

pen-test@insecure.org

·[HITB-Announce] HITB2016AMS Call for Papers

read more...

Top members by posts
waraxe  waraxe - 2407
vince213333  vince213333 - 737
pexli  pexli - 665
Mullog  Mullog - 539
demon  demon - 485
shai-tan  shai-tan - 477
LINUX  LINUX - 404
Cyko  Cyko - 375
tsabitah  tsabitah - 328
y3dips  y3dips - 281
SecurityFocus
·Vuln: Oracle Java SE CVE-2015-4860 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4872 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4911 Remote Security Vulnerability
·Vuln: Oracle Java SE CVE-2015-4903 Remote Security Vulnerability
·Bugtraq: [SECURITY] [DSA 3413-1] openssl security update
·Bugtraq: [SECURITY] [DSA 3412-1] redis security update
·Bugtraq: [security bulletin] HPSBGN03525 rev.1: HP Performance Center Virtual Table Server, Remote Code Execution
·Bugtraq: ESA-2015-171 EMC NetWorker Denial-of-service Vulnerability
·More rss feeds from SecurityFocus

read more...
alexa



Hard drive recovery - Game Cheats - Book Reviews - Cisco VPN error 412
Harry Potter - Book Reviews - Old Science Books Online - Biographies Online Database
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.121 Seconds