exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

ha_SQWebmail_css.txt
Posted May 7, 2005
Authored by Zinho | Site hackerscenter.com

SQWebMail is vulnerable to Cross-site scripting / HTTP Response Splitting.

tags | advisory, web, xss
SHA-256 | b1598238af35468ae7390ddb40c1325dab2802e792487ba37010e46dfab6bc58

Related Files

HaasCMS 1.0 Cross Site Scripting
Posted Aug 28, 2023
Authored by indoushka

HaasCMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d387c18431b97602ac99d6b219b32088892e08d8f0884502b0292a6bc46a7997
Network Pivoting HackerEnv
Posted Jun 18, 2021
Authored by Hejap Zairy Al-Sharif

Brief whitepaper that goes through proxy, ssh, and vpn pivoting during an attack. Written in Arabic.

tags | paper
SHA-256 | a1e855c508e17641d2eb114eced9cbb69be22f676f04484aaf30c490b078784e
HackBack - A DIY Guide To Rob Banks - Spanish Version
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks. Written in Spanish.

tags | paper
SHA-256 | 27c62be8c0f63cf1ea3399eb23af8641daf76da0da42c41d2bcd2bfc8fd2bdbe
HackBack - A DIY Guide To Rob Banks
Posted Nov 19, 2019
Authored by Phineas Fisher

Whitepaper that appears to be authored by Phineas Fisher called HackBack - A DIY Guide To Rob Banks.

tags | paper
SHA-256 | 6f4bda574c8c9dd1977b94777b2459398ec711e90dcdc1ffba003ee3fe468b72
HackBack - A DIY Guide For Those Without The Patience To Wait For Whistleblowers
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.

tags | paper
SHA-256 | 8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
HackBack - A DIY Guide, Spanish Version
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.

tags | paper
SHA-256 | cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
HackBack - A DIY Guide
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide.

tags | paper
SHA-256 | 13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
hack4 2016 Call For Papers
Posted Sep 27, 2016
Authored by dash | Site hack4.org

hack4 has announced its Call For Papers. It will be held December 29th through the 30th, 2016 in Berlin, Germany.

tags | paper, conference
SHA-256 | ef4f6d88341c88a807480c594f4168027177c29a2cf5e642e44020d858f86245
hack4 2015 Call For Papers
Posted Oct 15, 2015
Authored by dash | Site hack4.org

Hack4 has announced its Call For Papers. It will be held December 28th through the 29th, 2015 in Berlin, Germany.

tags | paper, conference
SHA-256 | 9a73e2c5a4a814f1788902cac7b6660fe6c951d88c9799ef03fa833ef6d16d92
Hack4 Call For Papers
Posted Dec 2, 2014
Authored by dash | Site hack4.org

Hack4 has announced its Call For Papers. It will be held December 29th through the 30th, 2014 in Berlin, Germany.

tags | paper, conference
SHA-256 | 8bd8d0107cba3e6990b5c796da3abbd9efe8451353a0df658a656537e05f6e17
Habbomobile / Sulake Blind SQL Injection
Posted Jun 6, 2013
Authored by Juan Carlos Garcia

Habbomobile.com and Sulake.com suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7216bccc44fb13d787aae8860bec2a3ca9a20013ccc5d83fdc5c15b30a10aa39
Hackersh 0.1.0
Posted Apr 4, 2013
Authored by Itzik Kotler | Site hackersh.org

Hackersh ("Hacker Shell") is a free and open source shell (command interpreter) written in Python with built-in security commands, and out-of-the-box wrappers for various security tools, using Pythonect as its scripting engine. Pythonect is a new, experimental, general-purpose high-level dataflow programming language based on Python. It aims to combine the intuitive feel of shell scripting (and all of its perks like implicit parallelism) with the flexibility and agility of Python.

tags | tool, shell, rootkit, python
systems | unix
SHA-256 | c188aaa57fe58d3d722bde76e26f37d182dad24c2a123c3691f08b71d8849d85
How To Hack A Website With Metasploit
Posted Feb 20, 2013
Authored by Sumedt Jitpukdebodin | Site r00tsec.blogspot.com

This article discusses how to use Metasploit for scanning, crawling, and attacking web applications.

tags | paper, web
SHA-256 | f1cc7c7ac8d8fc3a74105e7d8d02584bf9e083b1aa1fc066326798f75e73ec12
H.A.A.M SQL Injection
Posted Jul 2, 2012
Authored by Taurus Omar

H.A.A.M suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | cd03d431efef55c324edccc037794e3fabcc260c24b36501fa3eabea4f6b46fa
The Hackers Conference 2012 Call For Papers
Posted May 12, 2012
Site thehackersconference.com

The Hackers Conference 2012 Call For Papers has been announced. It will take place in New Delhi, India on July 29th, 2012.

tags | paper, conference
SHA-256 | 2df905cfab372c60d91883baf18207d362798725de61105f13e35ec782b04499
Hackademic Call For Papers
Posted Mar 13, 2012
Site hackademic.info

The Hackademic Call For Papers has been announced. Hackademic is a three day security conference that aims to bring together the hacking community and members from the academic community in order to learn from each others successes and failures. Hosted by the IEEE Reliability Society, this innagural event will be held in the Clayton Hall conference facility at the University of Delaware in Newark DE. Everything about the conference, from the venue to the speakers to the schedule, is structured to facilitate collaboration and information sharing between attendees.

tags | paper, conference
SHA-256 | 5a88ec9adde7999975d27221f31798ffdcfa01d28f4b5c830356377cb44f8332
H4ckcity Sheller Code And Tutorial
Posted Aug 7, 2011
Authored by 2MzRp, LocalMan | Site h4ckcity.org

This archive has the H4ckcity PHP backdoor script along with a tutorial written in Persian.

tags | tool, php, rootkit
systems | linux, unix
SHA-256 | 8ebfc9a80c59fc7685830768e0b0e61b40167f043d648478e5de84c59a300d6e
Habari 0.6.5 Cross Site Scripting / Path Disclosure
Posted Dec 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Habari version 0.6.5 suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 1b0095d90339378ae79534a78080f0a4f8982c7a2d0034a905a795a2e9b8925b
Hacker Space Fest 2009
Posted Apr 14, 2009
Site hackerspace.net

Call for Proposals - Hacker Space Fest 2009 will be taking place in Paris, France on June 26th through June 30th of 2009.

tags | paper, conference
SHA-256 | 5de246a1cb47121a96adb8b56bdbbc7df10177d4cb5d78982411ced8504d252e
habaricms-xss.txt
Posted Oct 17, 2008
Authored by swappie aka faithlove

Habari version 0.5.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 09c94531927e3d214e904ad94ede9a60a869691d18e7296049bd1e0e58ecfb01
hackers-rfc.txt
Posted Oct 16, 2008
Authored by fckD

The Hacker's RFC - This document introduces best practices a computer hacker should know about and implement for his own safety.

tags | paper
SHA-256 | 5dfd6596e321d2e81fa6a2c7d9595a98bfcbbebec637c8ddb53d37a350a936d3
hackerfestCFP-2008.txt
Posted Mar 19, 2008
Site tmplab.org

Call for Participation - The first Hacker Space Fest (HSF) will be held at the /tmp/lab near Paris, France in June 2008. The goal of this festival is to bring together people from many cultural and technological backgrounds and from different Hacker Spaces and Autonomous zones in France and Europe (and from beyond, if they can attend) to share and show what is going on.

tags | paper, conference
SHA-256 | 6c927c91724a4a605a202c85286124244b8d83b61ed14377b8394af814b8d6f4
hackersafe-plesk.txt
Posted Sep 13, 2007
Authored by Nick Merritt | Site hackersafe.com

Plesk for Windows versions 7.6.1, 8.1.0, 8.1.1, and 8.2.0 suffer from a SQL injection vulnerability.

tags | exploit, sql injection
systems | windows
SHA-256 | 6820b6d403266ffb6c0c18c382a856c79294617ac669b4642f6d8092d55b3809
haberx.txt
Posted Sep 16, 2006
Authored by Fix TR | Site hack.gen.tr

Haberx version 1.1 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 41125b7c38881d9dbe9e0cf3a5a3afd4d8bbb28667326904d4c52cc4599a81e6
HackernetworkMail.txt
Posted May 26, 2006
Authored by ajann

Hackernetwork Mail suffers from XSS in the search parameter.

tags | advisory
SHA-256 | 2de18c0a41e43b0b6a8216b1e4771d262c88e0aee3f573c66e3d64964bf21e62
Page 1 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close