Waraxe IT Security Portal
Login or Register
August 31, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 87
Members: 0
Total: 87
Full disclosure
Multi-Protocol Traceroute
SEC Consult SA-20250728-0 :: Stored Cross-Site-Scripting in Optimizely Episerver CMS
SEC Consult SA-20250807-0 :: Race Condition in Shopware Voucher Submission
Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality
CSV Injection in nopcommerce v4.10 and 4.80.3
Insufficient Session Cookie Invalidation in nopCommerce v4.10and 4.80.3
Session Fixation Vulnerability in iDempiere WebUI v12.0.0.202508171158
CSV Injection in iDempiere WebUI 12.0.0.202508171158
liblcf v0.8.1 liblcf/lcf2xml: Untrusted LCF data triggers uncaught std::length_error via negative vector resize (DoS)
liblcf v0.8.1 Integer Overflow in liblcf `ReadInt()` Leads to Out-of-Bounds Reads and Denial of Service
Piciorgros TMO-100: Unauthorized configuration change via TFTP (CVE-2025-29617)
Piciorgros TMO-100: Unauthorized log data access
[tool] CRSprober
iOS 18.6 - Undocumented TCC Access to Multiple Privacy Domainsvia preflight=yes
Kigen eUICC issue (custom backdoor vs. FW update bug)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 27 matches
Defacer
PostForum:All other security holes Posted: Tue May 14, 2013 7:11 am Subject: Defacer
Vishy
Replies: 1
Views: 10322




Exploit a web app to receive password in hash, Resolve the hash and login upload a shell and deface it.
Selling Bangladesh Government Databases and Shell link.
PostForum:Php Posted: Thu Apr 25, 2013 5:29 pm Subject: Selling Bangladesh Government Databases and Shell link.
Vishy
Replies: 0
Views: 7807




Sellin Bangladesh Government Database.

This database was hard to dump because they were using a wamp server so the database did not have a user to connect to so i had to do manual.

there are a t ...
1 MD5
PostForum:PHP script decode requests Posted: Sat Mar 02, 2013 12:53 am Subject: 1 MD5
Vishy
Replies: 0
Views: 5089




pLease crack this

4953b1f9902256c5da71cb9212786da8
vBulletin 5.0.0 Sqli For Sale
PostForum:Links Posted: Wed Feb 27, 2013 9:08 am Subject: vBulletin 5.0.0 Sqli For Sale
Vishy
Replies: 0
Views: 8015




Hell guy selling a vBulletin 5.0.0 SQl. Only 3-5 people have it that i i know.

Purchase and get full TuT on how to use it..

Price

$99

NOTE: this gives you hash for any member so i am only ...
Selling 4.2.0 0day
PostForum:Newbies corner Posted: Sun Feb 24, 2013 7:33 am Subject: Selling 4.2.0 0day
Vishy
Replies: 0
Views: 10249




Hello guys. Made a perl script which can get you admin md5 on a vbulletin 4.2.0 website. This 0day is very private and you can not fix it.

I am selling for $299

proof

.

http://www.yout ...
vbulletin 4.2.0 0day
PostForum:PHP script decode requests Posted: Sun Feb 24, 2013 7:31 am Subject: vbulletin 4.2.0 0day
Vishy
Replies: 0
Views: 7129




im a skid hurrdurr
Vbulletin 5 SQLI Deadly
PostForum:All other hashes Posted: Wed Jan 30, 2013 11:09 am Subject: Vbulletin 5 SQLI Deadly
Vishy
Replies: 0
Views: 6785




Hello I will be posting videos soon but there is a deadly SQLi Injection which allows you to get admins hash. or User 1 or any user. This SQLi is going out fo $1.2K. I am only selling it for 1K, 100$ ...
Vbulletin Hash + Salt = ?? Pleas help
PostForum:All other hashes Posted: Sun Jan 13, 2013 5:02 pm Subject: hash
Vishy
Replies: 8
Views: 15937




its a vbulletin hash <3.8.5
Please Crack these Vb Hashe(s)
PostForum:PHP script decode requests Posted: Wed Jan 09, 2013 12:28 am Subject: Please Crack these Vb Hashe(s)
Vishy
Replies: 0
Views: 5108




Please give them a shot TeamWaraxe!! Smile

93e09d85181f0f223b7a12d1ab02b6d8:53NM6=u4;VYx52&1bi3K2;|{{uVb3&
c04786b6c3de27e21ac5454bf1eb576a:Toa
7ff7266a6d243dd6cee660656196 ...
please crack 8 vb hashes
PostForum:PHP script decode requests Posted: Thu Dec 20, 2012 9:37 am Subject: please crack 8 vb hashes
Vishy
Replies: 1
Views: 9120




9afc17944f7d0d4b77818d39f602f640:u=ur$/1F#y\%x]I*ZR:_Lv"^ZGu!r"
a8a5cae7f5e8885449c3e60991492c1f:d}P
00ad56c846a76aeb01c5131c8266b63d:{WgZR6^S*K[mry0kOqDj'fgluOP(m/
2a11b2c0ac5e029276101e31b5d44 ...
please crack 1 vb hash
PostForum:PHP script decode requests Posted: Wed Dec 12, 2012 11:25 am Subject: please crack 1 vb hash
Vishy
Replies: 0
Views: 5273




Hey guys can you crack one hash for me Vbulletin.
7b3cd153de50b598d5ea52132084969c:)mq

TnX
Please Crack my Vb Hash
PostForum:PHP script decode requests Posted: Tue Dec 11, 2012 12:42 pm Subject: ?
Vishy
Replies: 2
Views: 6611




What do you mean, is it possible? Its a hash Team Waraxe and its members crack them with wordlists.
Someone accepts this challenge? - Decode
PostForum:PHP script decode requests Posted: Mon Dec 10, 2012 9:09 pm Subject: ,,
Vishy
Replies: 6
Views: 8803




Not sure if this is what you are looking for this is what i got. JÚâž(¹f§´7œ¡×
Please crack 3 hashes (VB)
PostForum:PHP script decode requests Posted: Mon Dec 10, 2012 9:02 pm Subject: Please crack 3 hashes (VB)
Vishy
Replies: 0
Views: 7043




Hey can you guys please crack 3 of these hashes.

03e6be796e041127caec57e6bbdde4dc:h;I
f662d4f9acf959fd7e4916539217ca40:_d]
b21ba346dcb1a30f98b99ace1f371e21:rQw
please crack 1 vb hash
PostForum:PHP script decode requests Posted: Sun Dec 09, 2012 8:01 pm Subject: please crack 1 vb hash
Vishy
Replies: 0
Views: 5146




please crack this 1 vb hash. 8d3a33ee1ad064a68217fa3d445f325f:Wp:
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.039 Seconds