Real Name | Saeid Bostandoust |
---|---|
Email address | private |
First Active | 2014-11-06 |
Last Active | 2015-12-15 |
MyBB versions 1.8.2 and below reverse shell remote code execution exploit.
c7b673efcf8b3123fbfd25dffb1c266d5f7e31d87791c64b0ba51ffb88102c2b
Datalife Engine version 9.7 engine/preview.php bindshell exploit that binds a shell to port 4444.
22a542d06634c1a6e671951a5661b2c397de011d5eacda316639c87a1010a36d
This is a proof of concept that demonstrates how the Bash shellshock vulnerability can be used in PHP to bypass disable_functions, safe_mode, etc.
b9bd9444e5105c1afeb7ec6b5e23447262e07246b635b19251ef95b61a88d237
GNU libc versions 2.12.1 and below LD_AUDIT libmemusage.so local root exploit.
b0f0cc6fe6c822efac1097b42f5743176fc7620d8aed638fb40cc3cbfc95d1e5
GNU libc versions 2.12.1 and below LD_AUDIT libpcprofile.so local root exploit.
11997246f78036a9735342aed99ef6bbde5fdf224f85ba7703ee81308de43bad