Waraxe IT Security Portal
Login or Register
October 20, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 110
Members: 0
Total: 110
Full disclosure
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 15 matches
Can sameone crack this hash ?
PostForum:MD5 hashes Posted: Wed Apr 21, 2010 4:51 pm Subject: Can sameone crack this hash ?
Xelion
Replies: 0
Views: 5113




Can someone crack this hash please ?

b45fb9feb7bfa79460e0a656554ca4ea
XSS
PostForum:Cross-site scripting aka XSS Posted: Fri Jun 20, 2008 10:17 am Subject: XSS
Xelion
Replies: 8
Views: 22351




f.aspx?style=lol"><body onload="alert(123);"><lol lol= >> I have the alert "123"

f.aspx?style=lol"><body onload="document.location='http://www.yahoo.com'"><lol lol= & ...
XSS
PostForum:Cross-site scripting aka XSS Posted: Fri Jun 20, 2008 10:01 am Subject: XSS
Xelion
Replies: 8
Views: 22351




http://www.startimes2.com/f.aspx?style=blue%22;t=document;alert(t.cookie);%22
I have the cookie, how to use it ?
XSS
PostForum:Cross-site scripting aka XSS Posted: Fri Jun 20, 2008 9:53 am Subject: XSS
Xelion
Replies: 8
Views: 22351




I don't know :s
XSS
PostForum:Cross-site scripting aka XSS Posted: Fri Jun 20, 2008 9:25 am Subject: XSS
Xelion
Replies: 8
Views: 22351




http://www.startimes2.com/f.aspx?style=lol%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E%3Clol%20lol=%22
Is blank too :s[/code]
XSS
PostForum:Cross-site scripting aka XSS Posted: Thu Jun 19, 2008 4:31 pm Subject: XSS
Xelion
Replies: 8
Views: 22351




Hi,
At this website : http://www.startimes2.com

I found this loophole :
http://www.startimes2.com/f.aspx?style=lol">lol<lol lol="

But if I do :
http://www.startimes2.com/f.aspx?style=lo ...
md5.xelionblog.com cracked passwords
PostForum:Wordlists Posted: Thu Jun 19, 2008 1:01 pm Subject: md5.xelionblog.com cracked passwords
Xelion
Replies: 2
Views: 11096




This is the http://md5.xelionblog.com cracked passwords ( 318 333 passwords )

Download :

MegaUpload : http://www.megaupload.com/fr/?d=V0X4Y9NE
FileSend : http://www.filesend.net/download.php?f ...
$_GET Hack
PostForum:Newbies corner Posted: Thu Jun 19, 2008 10:21 am Subject: $_GET Hack
Xelion
Replies: 4
Views: 13039




Yes I'm sure Sad

Otherwise I try to trust someone who send a PHP script to find a loophole =)
$_GET Hack
PostForum:Newbies corner Posted: Wed Jun 18, 2008 6:14 pm Subject: $_GET Hack
Xelion
Replies: 4
Views: 13039




Thank's
The code is :
<? if (isset($_GET['trick']))
echo '<span class="trick">'.$_GET['trick'].'</span><br/>';
?>

But if I do : ...
$_GET Hack
PostForum:Newbies corner Posted: Wed Jun 18, 2008 12:59 pm Subject: $_GET Hack
Xelion
Replies: 4
Views: 13039




Hi,
I would like to know if there is a possibility to hack from displaying a $_GET:

<? PHP
echo $ _GET [ 'trick'];
?>
MD5 hashes
PostForum:MD5 hashes Posted: Wed Jun 18, 2008 10:21 am Subject: MD5 hashes
Xelion
Replies: 2
Views: 8982




Thank's
MD5 hashes
PostForum:MD5 hashes Posted: Tue Jun 17, 2008 11:30 am Subject: MD5 hashes
Xelion
Replies: 2
Views: 8982




Someone can decrypt this hashes plz :

e114aeb0395f87411979d038a956edcc
c02h7a631n54g12et709h1e4w2o45r78
7a631n54g12et709h1e4w2o45r78l77d
d2d57bb5e817f178da591c5330cb8f3e
44c06fa41f1218050264439 ...
Help to SQL Injection
PostForum:Sql injection Posted: Mon Jun 16, 2008 3:21 pm Subject: Help to SQL Injection
Xelion
Replies: 2
Views: 7593




Thank you !
Help to SQL Injection
PostForum:Sql injection Posted: Mon Jun 16, 2008 9:55 am Subject: Help to SQL Injection
Xelion
Replies: 2
Views: 7593




Hi,
I have this sql query :

$query = mysql_query("SELECT * FROM `table` WHERE `field`=".$_GET['field']);
$field = mysql_fetch_array($query);
echo $field['ps ...
MD5 Crypter / Décrypter
PostForum:Links Posted: Sun Jun 15, 2008 4:47 pm Subject: MD5 Crypter / Décrypter
Xelion
Replies: 0
Views: 11273




Hi,
I just launch an md5 encryption / decryption website.
The decrypted word listal ready 280 000 words.

http://md5.xelionblog.com

The form allows you to encrypt words is in left and the form ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.031 Seconds