Waraxe IT Security Portal
Login or Register
August 31, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 116
Members: 0
Total: 116
Full disclosure
Multi-Protocol Traceroute
SEC Consult SA-20250728-0 :: Stored Cross-Site-Scripting in Optimizely Episerver CMS
SEC Consult SA-20250807-0 :: Race Condition in Shopware Voucher Submission
Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality
CSV Injection in nopcommerce v4.10 and 4.80.3
Insufficient Session Cookie Invalidation in nopCommerce v4.10and 4.80.3
Session Fixation Vulnerability in iDempiere WebUI v12.0.0.202508171158
CSV Injection in iDempiere WebUI 12.0.0.202508171158
liblcf v0.8.1 liblcf/lcf2xml: Untrusted LCF data triggers uncaught std::length_error via negative vector resize (DoS)
liblcf v0.8.1 Integer Overflow in liblcf `ReadInt()` Leads to Out-of-Bounds Reads and Denial of Service
Piciorgros TMO-100: Unauthorized configuration change via TFTP (CVE-2025-29617)
Piciorgros TMO-100: Unauthorized log data access
[tool] CRSprober
iOS 18.6 - Undocumented TCC Access to Multiple Privacy Domainsvia preflight=yes
Kigen eUICC issue (custom backdoor vs. FW update bug)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 17 matches
Anyone Can DeCrypt This Hash ?
PostForum:All other hashes Posted: Sat Jan 23, 2010 4:12 pm Subject: Anyone Can DeCrypt This Hash ?
HashManiac
Replies: 2
Views: 6129




It's an md5(unix) hash. I'll give it a try soon.

Yes its a root hash Smile Thank you Smile
Anyone Can DeCrypt This Hash ?
PostForum:All other hashes Posted: Sat Jan 23, 2010 3:27 pm Subject: Anyone Can DeCrypt This Hash ?
HashManiac
Replies: 2
Views: 6129




Hello guys.

Anyone help me to decode or just decode this hash ?

$1$rT9ye8YG$YdiXr9C.X6aJcd4HlGUyX0

Thanks
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Mon Jan 11, 2010 4:09 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 23697




No there is way Exhail Smile

I solved it in 1 minute Smile

Add this codes to Victim Mail Text Box

( Here is TextBox3 )

Private Sub TextBox3_TextChanged(ByVal sender As System.Object, ByV ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sun Jan 10, 2010 6:33 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 23697




I have a question too..

I want to give this program to my friends.. But i'm afrading of what if they attack me ?

Can we cancel an e-mail for attack

Like i dont want to making attack for dasd ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sun Jan 10, 2010 6:50 am Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 23697




Damn you Right ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sat Jan 09, 2010 9:57 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 23697




I have a question.

What about 501 errors.. ?

When i reach +70, Program giving 501 Auth error.

Can i fix it ?
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sat Jan 09, 2010 6:36 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 23697




Its Really Simple and Usefull
Need A Local Root Exploit PLEASE FAST !
PostForum:Linux world Posted: Tue Jan 05, 2010 4:19 pm Subject: Need A Local Root Exploit PLEASE FAST !
HashManiac
Replies: 0
Views: 8137




2.6.18-92.1.18.el5.028stab060.8 #1 SMP Mon Feb 9 21:44:50 MSK 2009 i686 i686 i386 GNU/Linux

Anyone have that ?
Local root exploit ?
PostForum:Linux world Posted: Tue Jan 05, 2010 4:18 pm Subject: Local root exploit ?
HashManiac
Replies: 1
Views: 13277




There is MMAp security there Hard To Root ... Sad
I Need help about Decode a PHPCipher Script..
PostForum:PHP script decode requests Posted: Sat Dec 26, 2009 9:37 am Subject: I Need help about Decode a PHPCipher Script..
HashManiac
Replies: 1
Views: 5398




Please help guys i need to decode a phpcipher file how can i do this ?

A Program or a guide please Smile

Thanks and regards..
How can i learn Admin username In Joomla ?
PostForum:Joomla Posted: Fri Jun 19, 2009 12:46 pm Subject: How can i learn Admin username In Joomla ?
HashManiac
Replies: 3
Views: 11740




But dude. In Joomla 1.5 Admins can change their name like :

username : admin
Show Name : cem

like this.

My access is remote ..
Joomla15 deface
PostForum:Newbies corner Posted: Wed Jun 17, 2009 7:08 pm Subject: Joomla15 deface
HashManiac
Replies: 8
Views: 13600




dude .. Joomla is easiest hacking script I think.
How can i learn Admin username In Joomla ?
PostForum:Joomla Posted: Wed Jun 17, 2009 11:56 am Subject: How can i learn Admin username In Joomla ?
HashManiac
Replies: 3
Views: 11740




Hey guys. I know password but how can i learn admin username ?
Finding salt + hash on 3.8.0 ?
PostForum:vBulletin Board Posted: Wed May 13, 2009 7:02 pm Subject: Finding salt + hash on 3.8.0 ?
HashManiac
Replies: 3
Views: 9003




dude i asked exploit Very Happy lol Very Happy
Finding salt + hash on 3.8.0 ?
PostForum:vBulletin Board Posted: Wed May 13, 2009 5:45 pm Subject: Finding salt + hash on 3.8.0 ?
HashManiac
Replies: 3
Views: 9003




How can i find salt + hash on vbulletin 3.8.0 ?
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.028 Seconds