#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapimp(at)gmail(dotcom)####LoveCMSExploitSeries##Episode3:changingsitesettings...####Description:Simplychangethesitesettings!#
#TGSCMSRemoteCodeExecutionExploit#by0in#fromDark-CodersGroup!#www.dark-coders.pl#Contact:0in(dot)email[at]gmail(dot)com#Greetingsto:die_angel,suN8Hclf,m4r1usz,cOndemned,str0ke#Dork:NULL-because"Youc
/*h0dns_spoof.c-zmda-saik0pod@yahoo.com*-spoofdnsonircd'susingtheh0dnscode**-spoofdnsonanythingusingtheadns(asynchronousdnsresolver)code**-Thebug:*-Staticsourceportusedbytheadns
#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapimp(at)gmail(dotcom)####LoveCMSExploitSeries##Episode1:addingasideblock####Description:addsomephpintoablockcontainer
#!/usr/bin/perl#carved-outby:crit3rion,justmakingth3worldab3tt3rplac3!#Xerox_Remote_DoS.20080801.ver01(tanxtodr0pz0N3forremindingmetoclosemy#$*&*!s0ck3t)#Make:Xerox#Model:Phaser8400#Firmware:03/03/
#!/usr/bin/perl##moziloCMS1.10.1Perlexploit##discovered&writtenbyAms#ax330d[doggy]gmail[dot]com##DESCRIPTION:#Vulnerabilityhidesin"download.php",whichwecanusetodownloadanyfilewewantto.
#!/usr/bin/perl#Note:Sometimesyouhavetochangetheregexptoviewcategory/catid,".$cid."useLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"
<!--Inadditiontotheoverflowfoundinthe"FriendlyTechnologies"dialersActiveX,Hereisa"remotecommandexecution"exploit.ItssosadpeopledontactuallyThink...GreetztoBinaryvision=================
<!--"FriendlyTechnologies"providesoftwarelikeL2TPandPPPoEclientstoISPs,whogivethesoftwaretotheircustomersonCDsotheyhavelesstroublesettingupthireconnections.Theyalsoprovideremoteconfigurationsoluti
/**IntelliTamper2.07(imgsrc)RemoteBufferOverflowExpoit**Discovered&Writtenbyr0ut3r(writ3r[at]gmail.com)*ManyThankstoLuigiAuriemma(http://aluigi.org)**Greetstoshinnai(http://www.shinnai.net)*an
-----------------------------------------------------------------------------UltraOfficeActiveXControlRemoteBufferOverflowurl:http://www.ultrashareware.comAuthor:shinnaimail:shinnai[at]autistici[dot]orgsite:http://www.shi
vBulletinPhotoPostvBGalleryv2.xRemoteFileUploadFoundby:Coldz3roe-mail:exploiter@hackteach.orgHomepage:www.Hack.ps==============================exploitusage:http://localhost/Forum/$gallery_path/upl
###################################################################################VivaIslaMVivaIslaM########################RemoteSQLinjectionVulnerability####HockeystatsOnlineVBASIC&ADVANCED(index.phpopt)##
###############################################################################################...:::::GalatoloWebManager1.3aInsecureCook
######################################################Author:BeyazKurt#Contact:Djm-sut@Hotmail.Com##Script:phpHelpAgent(v1.1Full&1.0)#Risk:LocalFileInclude#Download:http://sourceforge.net/projects/ph
________________________________________/____/|\_____|__)_///~/||\___Y/|/_______/______/___|_/_______///
<<InTheNameOfGOD>>--------------------------------------------------------------[PersianBoysHackingTeam]-:-2008-
====================================================|pSysv0.7.0AlphaMultipleRemoteFileInclude|(worksonlywithregister_globals=on)|FoundedByrXhRoMaNTiC-TeaM=================
##########################www.BugReport.ir###########################AmnPardazSecurityResearchTeam##Title:PluckLocalFileinclusion#Vendor:http://www.pluck-cms.org#Bug:LocalFileInclusion#VulnerableVer
<?php/*CodedByRMx-Liz0zimBiyoSecurity.Com&Coderx.orgKizavaKiZava:)Thanx:Crackers_Child-TR_IP-Volqan-AllSQLLow3rz*/error_reporting("E_ALL");ini_set("max_execution_time",0);