 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 278
Members: 0
Total: 278
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
MySQL: *64F34B05B7055765D0F1A4D66C1124505F0A5F76 |
|
|
|
|
PLEASE DECODE THIS!!
EMERGENCY!!
Algorithm: HMAC-SHA256
Code: 2.AQDYlXNH8vdr7lTg.3600.1326830400.5-100000402868985|FxfxMOW9GydllcH437m1S24P4i4 |
|
|
|
|
ThX!
But this not cracked
efba34176747544f0941046a63b4e5bb:@]J[T
You have jabber? Pls, give me your adress |
|
|
|
|
All hash type is IPB3
MD5: 2d68d72eb525963e4773442f65adfd14 Salt: Ls,k[
MD5: 0bde741a3c31f2f99309322a9c3defca Salt: U9lZL
MD5: efba34176747544f0941046a63b4e5bb Salt: @]J[T |
|
|
|
|
Md5: 277d4346b57601f9078c2bf1fd9a8856
Salt: ,YEw4
Type: IPB 3 |
|
|
|
Heniut |
|
Replies: 0 |
Views: 11663 |
|
|
 |
 |
 |
|
SQL Injection or exploit? |
|
|
|
|
f382f3bbea5406175d3ef15d30ac9510 MD5
And I still have a question:
How to crack MD5? I am a beginner so please bear with us  |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|