|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 69
Members: 0
Total: 69
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
If someone can crack this, I would be so happy!
89793034100331e3177de8deda7374e704a0fa57 |
|
|
|
|
Hi
I'm trying to crack this hash.
bc3775c3c484b7e56ad110630b15fc3c
Thanks |
|
|
|
|
3c701e78e2b6ca7807bc8a5944143cbb
Thx |
|
|
|
|
I'm in Xoops (2.4.5) Admin Panel now what? Blocks are disabled by file removing... How Can I upload shell ? |
|
|
|
|
I dont have time to decode both
this is the first:
<?php
if(!function_exists("rotencode")){
function rotencode($string,$amount) {
$key = subst ... |
|
|
|
|
<?php
${"GLOBALS"}["eyjasourltw"]="o_substr";
$fxpwhk="o_substr";
${"GLOBALS"}["kybhas"]=" ... |
|
|
|
|
Hi,
I found a xoops module bug (videotube)
www.site.com/module/videotube/reportvideopopup.php?op=generateform&vid=[SQL]
This is the bug but i don't know how to exploit this beca ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|