Recent content by Gh0s7

  1. Gh0s7

    Email:Pass DATABASE SITE { zhuzaoguolvwang.cn }

    https://www.mediafire.com/file/krder9aixmwzreq/zhuzaoguolvwang.cn.zip/file
  2. Gh0s7

    Email:Pass DATABASE SITE { www.hopemakers.tn }

    https://www.mediafire.com/file/dxv7fdfetoskjgq/www.hopemakers.tn.zip/file
  3. Gh0s7

    Email:Pass DATABASE SITE { duallineparts.in }

    https://www.mediafire.com/file/vinwi523tm6yhic/duallineparts.in.zip/file
  4. Gh0s7

    Chat message

    anyone do you want buy exploit for wordpress?
  5. Gh0s7

    Chat message

    hi guys
  6. Gh0s7

    CRACK ADMIN PANEL SITE WITH Ruby

    ruby
  7. Gh0s7

    CRACK ADMIN PANEL SITE WITH Ruby

    #!/usr/bin/env ruby # WordPress Admin Panel Brute Force Tool # For authorized penetration testing only require 'net/http' require 'uri' require 'openssl' require 'optparse' require 'thread' require 'json' class WPBruteForcer def initialize(options) @target = options[:target] @userlist...
  8. Gh0s7

    EXPLOIT FOR WORDPRESS 6.8.3 FOR BYPASS ADMIN PANEL SITE

    this code is python
  9. Gh0s7

    EXPLOIT FOR WORDPRESS 6.8.3 FOR BYPASS ADMIN PANEL SITE

    # Exploit Title: WordPress Plugin Wp-FileManager 6.8 - RCE # Date: September 4,2020 # Exploit Author: Mansoor R (@time4ster) # CVE: CVE-2020-25213 # Version Affected: 6.0 to 6.8 # Vendor URL: https://wordpress.org/plugins/wp-file-manager/ # Patch: Upgrade to wp-file-manager 6.9 (or above) #...