PakistanDatabase.com

Search results

  1. H

    JS malware. How Chrome helped me reverse ransomware

    JS malware. How Chrome helped me reverse a ransomware virus You've probably received an email with a link to a suspicious archive at least once. The authors of such emails do everything possible to make an inattentive user follow the link and let them infect their computer. A similar letter...
  2. H

    Web Hacking Mining CC on the example of Magento

    CC mining using Magento as an example In this article, I will describe one of the working options for CC mining using brute using the AccessBomber application as an example. You can choose not to use this application, but use other free/paid alternatives. So, initial conditions. We have...
  3. H

    General Hacking Complete Guide About Layer4 DDOS Attack

    DDOS By H3llSh3ll THIS MANUAL IS PROVIDED FOR INFORMATION ONLY. THE AUTHOR DOES NOT CALL READERS TO ILLEGAL ACTIONS. I urge you not to attack government resources and large companies, especially banks. Commercial organizations do not forgive this, they bite hard in court. Otherwise, a...
  4. H

    Web Hacking Application attack. Using Xposed to Bypass SSLPinning on Android

    Application attack. Using Xposed to bypass SSLPinning on Android There are different approaches to analyzing the security of applications, but sooner or later everything comes down to studying the interaction of the program with the API. It is this stage that provides the most information about...
  5. H

    Uploading shell code to a vulnerable site

    In this article I will talk about most public methods. To make it easier, we will divide this article into 3 parts, the first will tell you how to do it using MySql, the second through Apache logs and the third through public bugs. Hidden content
  6. H

    Exploitation Tools 🌐K2ll33d Php WebShell🌐

    🌐K2ll33d Php WebShell🌐 k2ll33d.php shell is a very useful and fast php shell. Especially the config grabber section is very robust and allows you to easily pull configs from the server. It pulls the config information of hundreds of sites with one click, even reads forbidden configs from file...
  7. H

    Exploitation Tools 🌐WSO Linux Version WebShell🌐

    🌐WSO Linux Version WebShell🌐 If you are looking for a Linux php shell, here is an encrypted special shell that will meet all your needs, Wso infrastructure has been used and a great job has been done. A very effective shell with green-black colors and the added Imap bypass technique...
  8. H

    Exploitation Tools 🌐WSO 2017-V WebShell🌐

    🌐WSO 2017-V WebShell🌐 It draws attention as the latest modified and undetected version (till 2017) of WSO PHP Shell! It is also available in extra sections such as infect, safe mode, brute force. Since you can change the password as you wish, it ensures security and no one can infiltrate your...
Top