Search results for query: *

  • Users: cazra
  • Content: Threads
  • Order by date
  1. cazra

    MetaDrain Wallet Drainer - verified or ❌?

    Anybody? http://usnicuapjnop4xmect4lm5z7mno3dqbpbpzlwzszg2h7n6po6jmavaad.onion/
  2. cazra

    How to make $$ with crypto flasher?

    Noob here -- what's your best method to make actual $$ with a crypto flasher? Winning proven method gets a % of the gain!
  3. cazra

    Help wanted! Disassembling & decompiling static lib

    Hi all, I would like to know from you experts if there is a specific tool that I should be using if I want to disassemble and then decompile a static library file. I am trying Hopper Disassembler but it is really tedious... and the decompilation does not work that well. Thanks for any advice...
  4. cazra

    Hiring hacker to access a website

    Hi community I am looking to hire a hacker to get admin control and the db of a website with a tech stack known for vulnerabilities. $$ through DNA escrow. Thank you!!
  5. cazra

    Help! RCE with pearcmd through a LFI vulnerability

    Hi everyone A website I am targeting right now is based on thinkphp v5.1.41 and has a language pack so it's exposed to that vulnerability: Thinkphp 多语言 RCE - 跳跳糖. And that example here shows an execution using the local pearcmd.php. I'm trying locally in a VM with a dummy thinkphp v5.1.41...
  6. cazra

    Old jQuery + thinkphp website resisting

    Hi I am looking for help & tools to exploit jquery & thinkphp vulnerabilities on a (simple looking) website. So far it has been resisting me. $$
Top