Search results

  1. Gh0s7

    Email:Pass DATABASE SITE { zhuzaoguolvwang.cn }

    https://www.mediafire.com/file/krder9aixmwzreq/zhuzaoguolvwang.cn.zip/file
  2. Gh0s7

    Email:Pass DATABASE SITE { www.hopemakers.tn }

    https://www.mediafire.com/file/dxv7fdfetoskjgq/www.hopemakers.tn.zip/file
  3. Gh0s7

    Email:Pass DATABASE SITE { duallineparts.in }

    https://www.mediafire.com/file/vinwi523tm6yhic/duallineparts.in.zip/file
  4. Gh0s7

    CRACK ADMIN PANEL SITE WITH Ruby

    #!/usr/bin/env ruby # WordPress Admin Panel Brute Force Tool # For authorized penetration testing only require 'net/http' require 'uri' require 'openssl' require 'optparse' require 'thread' require 'json' class WPBruteForcer def initialize(options) @target = options[:target] @userlist...
  5. Gh0s7

    EXPLOIT FOR WORDPRESS 6.8.3 FOR BYPASS ADMIN PANEL SITE

    # Exploit Title: WordPress Plugin Wp-FileManager 6.8 - RCE # Date: September 4,2020 # Exploit Author: Mansoor R (@time4ster) # CVE: CVE-2020-25213 # Version Affected: 6.0 to 6.8 # Vendor URL: https://wordpress.org/plugins/wp-file-manager/ # Patch: Upgrade to wp-file-manager 6.9 (or above) #...