|
|
STICKY:
easy-way-to-generate-reverse-shell/
(Preview)
n this article, we will learn how to get a reverse in a few easy steps. Usually, the problem when reverse shell commands is to remember its long and complicating syntax. But due to growing AI of our digital world, this problem tackled and dealt with. Let’s see how it is done through this article.Table of...
|
cYber-coder
|
0
|
78
|
|
|
|
|
STICKY:
UPload shell in mybb and wordpress and Hack via simlink
(Preview)
Hie Hf it is my first tut here i hope it will help some noobs : Lets Start: Here I will use my site just to show you how u can upload shell in mybb sites: Go to the admin panel :site.com/admin: username:ImNotGoing To show here pass:yourpass Now we are inside the mybb control panel: Now go to >>Themes a...
|
cYber-coder
|
0
|
724209
|
|
|
|
|
STICKY:
ثغره في Powered By Vbulletin Version 3.8.6
(Preview)
السلام عليكم ورحمه الله طبعا اليوم سنتكلم عن ثغره تسمح لك برويه البيانات المسجله في ملف config وهذه البيانات ستودي طبعا الى اختراق الموقع اذا لم يكن السيرفر-------طبعا فكره الثغره هي البحث داخل المنتدى عن كلمه database من خلال عمليه البحث سيظهر لك كل المعلومات الثمينه عن الملف طبعا الى الاستغلال::::...
|
cYber-coder
|
0
|
29313
|
|
|
|
|
What is SSH? How does it work?
(Preview)
Telnet and rlogin are communication protocols used to communicate with a remote server. However, Telnet and rlogin are not a secure communication protocol because it does not have any security mechanism and transfers data containing your sensitive information, user passwords over the network...
|
cYber-coder
|
0
|
78
|
|
|
|
|
what is websploit used for ??
(Preview)
WebSploit Labs is a learning environment created by Omar Santos for different Cybersecurity Ethical Hacking, Bug Hunting, Incident Response, Digital Forensics, and Threat Hunting training sessions. WebSploit Labs includes several intentionally vulnerable applications running in Do...
|
cYber-coder
|
0
|
76
|
|
|
|
|
Today we will tell you how to collect information with Dmitry? I will explain this. Since one of the most important sta
(Preview)
Today we will tell you how to collect information with Dmitry? I will explain this.Since one of the most important stages of penetration tests is to collect information about the target, I recommend that you read the subject carefully.DmitryDmitry is a console-based information gathering appli...
|
cYber-coder
|
0
|
86
|
|
|
|
|
What is Wpscan? , How to use ?
(Preview)
WHAT CAN WPSCAN DO?-Information about WordPress version and update can be obtained.-Information about plugins and themes on the target site can be obtained.-Usernames of authors and administrators on the target site can be found.-Brute-force attacks can be made.-Information about security...
|
cYber-coder
|
0
|
79
|
|
|
|
|
What is SQLMap and how to use it.
(Preview)
SQLMap SQLMap is a tool used to detect SQL injection vulnerabilities and gain access to the database by exploiting these vulnerabilities. Now let's take a look at how it is used. Our target site -> How to link to our articles SQLMap Installation Before moving on to its use, let's briefly show...
|
cYber-coder
|
0
|
92
|
|
|
|
|
What is FTP and Where is it Used?
(Preview)
FTP is the abbreviation of the English words " File Transfer Protocol " . This protocol is a communications protocol used to facilitate file transfer between computers. The main purpose of FTP is to securely transfer files from one computer to another computer.FTP's usage areas are quite w...
|
cYber-coder
|
0
|
78
|
|
|
|
|
burp-suite-for-pentester
(Preview)
Not only the fronted we see or the backend we don’t, are responsible to make an application be vulnerable. A dynamic web-application carries a lot within itself, whether it’s about JavaScript libraries, third-party features, functional plugins and many more. But what, if the installed features...
|
cYber-coder
|
0
|
71
|
|
|
|
|
Beginner Guide to Google Dorks
(Preview)
google is the main tool for hackers because its ability of gathering info on any site or person as a hacker you have to understad using dork .... in this tut : Intitlee.g->intitle:hackingarticlesThis query will return the pages which include the term “hackingarticles” in it.inurle.g-&g...
|
cYber-coder
|
0
|
83
|
|
|
|
|
Successfully Hack a Website in 2016!
(Preview)
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions.Second i want to say sorry for the series i left in stand by mode, as soon as i get time i will re...
|
cYber-coder
|
0
|
1191
|
|
|
|
|
ثغرات السيرفرات
(Preview)
الدرس الاول التعرف علي انوع الثغرات و المصطلحات المنتشره ' هناك الكتير من المشاكل التي تواجه المبتداء عن دخوله لمجال الهاكر وهذا يرجع لعد معرفته الاساسيات و المصطلحات ولكن في هذا الدرس البسيط هضع شرح للمصطلحات حسنا, يمكنني الان افتراض بانك قرات جميع السطور السابقة وفهمت جيدا من سنقوم به وتريد المتابع...
|
cYber-coder
|
0
|
2654
|
|
|
|
|
أختراق السيرفرات
(Preview)
درس اليوم هوه عن بعد ما اخذت الرووت وكيف استفيد منه كمبتدى في السيطره على السيرفر ومن اهم الاوامر التي اهم الاغراض يلي يفكر فيها بعد ما اخذ الرووت فالكثيرمن الشباب يوخذ رووت ولا يعرف ما يفعل بعد ذلك ويوقف على الرووت ولا يعرف ما يفعل؟؟؟ الان ماخذ رووت على احد السيرفرات ومعي باسورد الرووت الان نقوم بالدخول عن...
|
cYber-coder
|
0
|
2568
|
|
|
|
|
Directory Traversal hack server
(Preview)
Directory Traversal is a vulnerability which allows hacker to gain access to directories and execute commands outside of the web server's root directory. lets strated: as you know, most of servers are worked under two main opreating systems: 1-windows2-linux this bug could lead you to the pas...
|
cYber-coder
|
0
|
1333
|
|
|
|
|
hack sql as a root
(Preview)
A treatise on SQLi"The price of greatness is responsibility." Introduction: For the purposes of this guide, we are going to create a classic ASP login system using a MSSQL database. We’ll be going through the vulnerabilities as well as how to fix them. Credits: Credits for this guide g...
|
cYber-coder
|
0
|
1423
|
|
|
|
|
عمل طريقه تتطفش بها الروت وتتطيل الاختراق
(Preview)
http://www.bing.com/search?q=ip%3A74...=QBRE&filt=allكو...
|
cYber-coder
|
0
|
3953
|
|
|
|
|
ثغرات الورد برس SQLi in plugin
(Preview)
inurl:"/wp-content/plugins/hd-webplayer/config.php?id="
|
cYber-coder
|
0
|
2039
|
|
|
|
|
رفع الشل في الوردبرس
(Preview)
Hi all! Today i'm going to show you how to upload shell in Wordpress software. You will need: 1) Admin access to Worpress panel 2) Any php shell First you need to go to: Plugins -> Editor Once there you can edit plugins installed on the site. Choose any plugin you want... For example i selected "S...
|
cYber-coder
|
0
|
3471
|
|
|
|
|
[Tutorial] Hack WHMCS via symlinking
(Preview)
Hi guys. Today i will be showing how to hack a WHMCS via symlinking so lets get started. Big thanks for HeXagone for helping me. :) Things you will need: 1) Shelled website 2) Tool i will post at the end of the tutorial 3) Putty 4) Symlink script 5) MySQL manager What is WHMCS?Code:“WHMCS is an all-in-one c...
|
cYber-coder
|
0
|
6717
|
|
|