Waraxe IT Security Portal
Login or Register
November 17, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 100
Members: 0
Total: 100
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 17 matches
Anyone Can DeCrypt This Hash ?
PostForum:All other hashes Posted: Sat Jan 23, 2010 4:12 pm Subject: Anyone Can DeCrypt This Hash ?
HashManiac
Replies: 2
Views: 5493




It's an md5(unix) hash. I'll give it a try soon.

Yes its a root hash Smile Thank you Smile
Anyone Can DeCrypt This Hash ?
PostForum:All other hashes Posted: Sat Jan 23, 2010 3:27 pm Subject: Anyone Can DeCrypt This Hash ?
HashManiac
Replies: 2
Views: 5493




Hello guys.

Anyone help me to decode or just decode this hash ?

$1$rT9ye8YG$YdiXr9C.X6aJcd4HlGUyX0

Thanks
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Mon Jan 11, 2010 4:09 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 22168




No there is way Exhail Smile

I solved it in 1 minute Smile

Add this codes to Victim Mail Text Box

( Here is TextBox3 )

Private Sub TextBox3_TextChanged(ByVal sender As System.Object, ByV ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sun Jan 10, 2010 6:33 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 22168




I have a question too..

I want to give this program to my friends.. But i'm afrading of what if they attack me ?

Can we cancel an e-mail for attack

Like i dont want to making attack for dasd ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sun Jan 10, 2010 6:50 am Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 22168




Damn you Right ...
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sat Jan 09, 2010 9:57 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 22168




I have a question.

What about 501 errors.. ?

When i reach +70, Program giving 501 Auth error.

Can i fix it ?
How to make an email Bomber [Tutorial][with screenies]
PostForum:Visual Basic Posted: Sat Jan 09, 2010 6:36 pm Subject: How to make an email Bomber [Tutorial][with screenies]
HashManiac
Replies: 9
Views: 22168




Its Really Simple and Usefull
Need A Local Root Exploit PLEASE FAST !
PostForum:Linux world Posted: Tue Jan 05, 2010 4:19 pm Subject: Need A Local Root Exploit PLEASE FAST !
HashManiac
Replies: 0
Views: 7520




2.6.18-92.1.18.el5.028stab060.8 #1 SMP Mon Feb 9 21:44:50 MSK 2009 i686 i686 i386 GNU/Linux

Anyone have that ?
Local root exploit ?
PostForum:Linux world Posted: Tue Jan 05, 2010 4:18 pm Subject: Local root exploit ?
HashManiac
Replies: 1
Views: 11338




There is MMAp security there Hard To Root ... Sad
I Need help about Decode a PHPCipher Script..
PostForum:PHP script decode requests Posted: Sat Dec 26, 2009 9:37 am Subject: I Need help about Decode a PHPCipher Script..
HashManiac
Replies: 1
Views: 4828




Please help guys i need to decode a phpcipher file how can i do this ?

A Program or a guide please Smile

Thanks and regards..
How can i learn Admin username In Joomla ?
PostForum:Joomla Posted: Fri Jun 19, 2009 12:46 pm Subject: How can i learn Admin username In Joomla ?
HashManiac
Replies: 3
Views: 10864




But dude. In Joomla 1.5 Admins can change their name like :

username : admin
Show Name : cem

like this.

My access is remote ..
Joomla15 deface
PostForum:Newbies corner Posted: Wed Jun 17, 2009 7:08 pm Subject: Joomla15 deface
HashManiac
Replies: 8
Views: 11062




dude .. Joomla is easiest hacking script I think.
How can i learn Admin username In Joomla ?
PostForum:Joomla Posted: Wed Jun 17, 2009 11:56 am Subject: How can i learn Admin username In Joomla ?
HashManiac
Replies: 3
Views: 10864




Hey guys. I know password but how can i learn admin username ?
Finding salt + hash on 3.8.0 ?
PostForum:vBulletin Board Posted: Wed May 13, 2009 7:02 pm Subject: Finding salt + hash on 3.8.0 ?
HashManiac
Replies: 3
Views: 8169




dude i asked exploit Very Happy lol Very Happy
Finding salt + hash on 3.8.0 ?
PostForum:vBulletin Board Posted: Wed May 13, 2009 5:45 pm Subject: Finding salt + hash on 3.8.0 ?
HashManiac
Replies: 3
Views: 8169




How can i find salt + hash on vbulletin 3.8.0 ?
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.054 Seconds