Useful links : Invite Your Friends | Recover password |  Advertising in CM | Join Carding Class


Search:

Type: Posts; User: Void

Page 1 of 3 1 2 3

Search: Search took 0.00 seconds.

  1. Replies
    4
    Views
    2,986

    MSSQL Injection Cheat Sheet

    ** Some of the queries in the table below can only be run by an admin (SA Privilege).
    These are marked with "-- priv" at the end of the query. **
    ...
  2. Replies
    4
    Views
    6,114

    nice share ...

    nice share ...
  3. Linux Kernel Associative Array Garbage Collection - Crash PoC

    /**
    * Poc for cve_2014_3631 vulnerability
    */
    int main()
    {
    key_serial_t currentKey = 0;
    key_serial_t topKey = 0;
    int i = 0;
    int fp;
    char kname[16]={0};
  4. Replies
    0
    Views
    1,890

    BEdita CMS 3.5.0 - Multiple Vulnerabilities

    BEdita CMS - XSS & CSRF Vulnerability in Version 3.5.0

    ----------------------------------------------------------------

    Product Information:

    Software: BEdita CMS
    Tested Version: 3.5.0,...
  5. [Detailed] Boolean Based Blind Injection [Tutorial]

    Introduction

    So a lot of people view bling injection as having to guess everything, when it's called blind injection because no data is visible on the page as an outcome.

    Remember, whenever...
  6. Replies
    1
    Views
    2,243

    Mysql Injection Tutorial 1

    Mysql has 2 types only as mentioned above.you need to know the following things about the DB you are attacking-

    # Number of columns
    # Table names
    # column names

    # Let's start with union...
  7. Replies
    2
    Views
    3,387

    Vulnerable Shop [LINK]

    www.caninefitness.com/index.php?pid=35&m=1417417200
  8. Replies
    12
    Views
    18,523

    [source] GET ALL WIFI SAVED PASSWORDS

    Hello All,
    This script runs several commands that eventually containing all saved wifi profiles with clear text passwords



    'Show_Wifi_Keys by Hackoo 2015
    Option Explicit
    Dim...
  9. Replies
    3
    Views
    3,557

    2 vuln sqli target

    http://icbs.berkeley.edu/news/story.php?rid=45'
    http://www.vritikaherbotech.com/basket.php?id=5'
  10. Replies
    1
    Views
    2,954

    FaceBook Cracking Tool 2015

    #!usr/bin/python


    #Facebook Cracker Version 2 can crack into Facebook Database 100% without Interruption By Facebook Firewall !

    #This program is for educational purposes only.

    #Don't attack...
  11. Replies
    0
    Views
    1,864

    WordPress IntelexXx Changer

    <html>
    <head>
    <title>[ IWH Wordpress IntelexXx Changer ]</title>
    </head>
    <body bgcolor="#000000">
    <font color=FF8000>
    <font face=verdana>
    <?php
    print"<table bgcolor=#191919...
  12. Replies
    40
    Views
    11,068

    The TOP 10 FREE VPN list

    Listed below you will find a compilation of the 10 best free VPN (Virtual Private Network) services.

    The TOP 10 FREE VPN list will be updated regularly. Please inform me by Mail if you know...
  13. Replies
    1
    Views
    10,083

    YMSG Login Error Codes

    here is a short list of the YMSG error codes and what they mean. This way maybe we can start making fixes.

    From challenge server
    0 - Success/No Error
    100 - Required information not found

    YMSG...
  14. Replies
    10
    Views
    49,550

    Stay Safe While Chatting On Yahoo Messenger

    Yahoo Messenger and its 'chats', told us how to talk and make new friends online years before the launch of Facebook. But he also gave birth to spam line that has infected thousands of users and...
  15. Replies
    0
    Views
    2,091

    (Metasploit) Search Email Collector

    This module allows us to extract all emails related to a domain using Metasploit.

    Open metasploit console and type:


    use auxiliary/gather/search_email_collector

    Then determine the domain...
  16. Replies
    0
    Views
    2,224

    Admin panel scanner with extra features

    import java.net.URL;
    import java.net.MalformedURLException;
    import java.util.ArrayList;
    import java.io.*;
    import java.util.Scanner;

    //Must save as Admin_Finder.java
    ...
  17. Replies
    0
    Views
    2,093

    WordPress WPML XSS / Deletion / SQL Injection

    OVERVIEW
    ==========

    WPML is the industry standard for creating multi-lingual WordPress
    sites. Three vulnerabilities were found in the plug-in. The most
    serious of them, an SQL injection...
  18. ElasticSearch Unauthenticated Remote Code Execution

    #!/bin/python2
    # coding: utf-8
    # Author: Darren Martyn, Xiphos Research Ltd.
    # Version: 20150309.1
    # Licence: WTFPL - wtfpl.net
    import json
    import requests
    import sys
    import readline...
  19. Thread: Php irc ddoser

    by Void
    Replies
    2
    Views
    2,091

    Your Wellcome

    Your Wellcome
  20. Parsing binary data in PHP on an example with the PCAP format

    Not every problem should be solved with PHP. For certain types of applications it’s simply more appropriate to select a different programming language. You might be glad to hear that parsing binary...
  21. Thread: USA templates PSD

    by Void
    Replies
    50
    Views
    63,070

    Sticky: its hard to keep these things on shared hosting...

    its hard to keep these things on shared hosting ...
  22. Thread: Php irc ddoser

    by Void
    Replies
    2
    Views
    2,091

    Php irc ddoser

    <?php
    $irc_server = "yourserver";
    $irc_port = "6667";

    $channel = "#ddos";
    $channel_pass = "ddos";

    $nick = "LudiX-".time();
    $reg_con = "$nick...
  23. Replies
    13
    Views
    4,908

    Your Wellcome :D

    Your Wellcome :D
  24. Replies
    0
    Views
    1,915

    Reading Log Files in Postgresql Sql Injection

    Hey everyone,

    So I guess it's time to learn something juicy about Postgresql.
    If you're injecting a Website based on a Postgresql database then you might wanna check your privileges because this...
  25. UltraVNC 1.0.2 Client (vncviewer.exe) Buffer Overflow

    ##
    # $Id$
    ##

    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # web site for more information...
Results 1 to 25 of 69
Page 1 of 3 1 2 3

CardMafia Official twitter AccountCardMafia Official Telegram Channel

CardMafia Official Youtube Channel

The administration is not responsible for the actions of users. The information on this site is for informational purposes only. Contact us at [email protected] for removal of any objectionable material.
logo