Dorklarla Shell Bulma (1 Viewer)

Joined
Sep 1, 2018
Credits
442
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
 
Joined
Nov 2, 2019
Credits
1,060
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
ellerine sağlık
 
Joined
Oct 17, 2019
Credits
0
Rating - 0%
KARADAY1 Klavyesinden şimdi 2-3 kod yazacak çarpılacan amk **Küfürbaz** tozu filan koyar bak dikkat et
 
Joined
May 20, 2019
Credits
13
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
teşekkürler
 

Adamındibi

OROSPU EVLADIYIM
Joined
Aug 29, 2019
Credits
0
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
 
Joined
Oct 29, 2019
Credits
0
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
güzel
 
Joined
Sep 9, 2018
Credits
118
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
Alıntı yazaydın bari reis
 
Joined
Jan 19, 2019
Credits
0
Rating - 0%
View hidden content is available for registered users!

intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
masterhack.org
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php"
bakak
 

Users who are viewing this thread

Top