Originally Posted by [s] The Garage4Hackers CTF level 1 challenge came to life on 25th December, 2013 at 10:30 PM IST. It saw nice participation from across the globe with some really creative attempts to crack the challenge. It took us some serious judging to filter out the top attempts. Finally we are done with it. And now we are pleased to announce the results of our Level 1 challenge !! The Challenge was 54.197.234.66/index.php?wish=hohohoSanta : To try to execute simple PHP code or pwn ...
Originally Posted by [s] Supb Guys , Year ago i seeking Bugs in Google Applications. I found one bug which is already know to Google , in fact Google added this vulnerability to make fool (Newbies). After a long time waiting , i have deiced to release it ! Code: Fake Vuln URL : https://www.google.com/appserve/security-bugs/new?rl=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E Google used common payload to make fool ! It was wired for me when i use alert(1) , it was popping 41 As ...
Fake Vuln URL : https://www.google.com/appserve/security-bugs/new?rl=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E
Originally Posted by [s] Simple release Code: #!/usr/bin/env python from pickle import * from struct import * from _winreg import * print "\n" print "\n\t##################################################" print "\t# #" print "\t# #" print "\t#G4H// Anti-Intruders System Cleaner ver 0.1 #" print ...
#!/usr/bin/env python from pickle import * from struct import * from _winreg import * print "\n" print "\n\t##################################################" print "\t# #" print "\t# #" print "\t#G4H// Anti-Intruders System Cleaner ver 0.1 #" print