 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 466
Members: 0
Total: 466
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
got the middle one solved. it was enterprise. Now I just need this one the most
d3548565253e7da8c23aefe9340306ba:{.!.!,o#.[O#rf?2|R|LnA.S4)*+-n |
|
|
|
|
d3548565253e7da8c23aefe9340306ba:{.!.!,o#.[O#rf?2|R|LnA.S4)*+-n
5e9d0c61514e82a4d3fe4c2d08ef52b2:`rq@GXHq_J=XDAGt^-U9BW2y|-ce],
589cc33a1f9537022efa2dfe10834d30:VCXtmL8F6BHkhqgS>N#Qjb^nOyZn ... |
|
|
|
|
53f827413f1dfcff36d76385a8b42f57:h$R"9+I|dB>58=w{=p8"/+d%I9CH(0
40f72d3b69bc2df89e4b89c4128888d8:o&Q
b87b693f620e87c814a937f87b349db2:DbPQ0lZPXUiKpCAr`B(r.Uc{`^HQ/*
14080795605963da ... |
|
|
|
|
4f2cd7e0679f140c9e7a36d5d7f541e1:3vh"A=EuS[Y$png)8-y`J
Thanks guys |
|
|
|
|
53f827413f1dfcff36d76385a8b42f57:h$R"9+I|dB>58=w{=p8"/+d%I9CH(0
Out of all the hashes I posted this one is the most important. Whoever cracks it gets full credit. Will PM with details after its ... |
|
|
|
|
:B:9d1aaa2c:f4ca0cb35f8d60d96e44e69c2f96f2ef
EDIT: Found the algorithm. I ran it thru and got nothing. Can someone help crack it?
Thx
Toasty
:B:9d1aaa2c:f4ca0cb35f8d60d96e44e69c2f96f2e ... |
|
|
|
|
Can somebody try the other 2? |
|
|
|
|
53f827413f1dfcff36d76385a8b42f57:h$R"9+I|dB>58=w{=p8"/+d%I9CH(0
c75d87f408357f10d1e74a77662f94b1:{6Nst4\LoQR5f4N3!]CYiX!G~;ibo&
edab65e0112b2d67e73994f6ebfaf4af:q~"^.Z;_:d@|FdW^LO0`<}n}ke\ ... |
|
|
|
|
:B:9d1aaa2c:f4ca0cb35f8d60d96e44e69c2f96f2ef
EDIT: Found the algorithm. I ran it thru and got nothing. Can someone help crack it?
Thx
Toasty |
|
|
|
|
Thank you so much  |
|
|
|
|
077fa019a50123d8245d47565eca1642:x@:CCo@su*8HC?`|kF\]=ph%Kc^=Kg
Hey guys I got this hash of of a vB. Can someone tell me which type of algorithm it uses and if anyone could crack it. Thx |
|
|
|
|
Bumping, I really need the one with the QO? Salt. Thx |
|
|
|
|
Hey guys I really need these cracked. Thanks :D
b3a4833ca42faad1a9f81266c9549083:$,]
67142bd46b9d3e19d8eb18367acd75a1:6vX
--
f6dcc3d4db367f5e05b91631f08a32c3:QO?
56a101bc08025e0d701 ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|