Search results

  1. Gh0s7

    Wordlist 202,340,4 Lines ComboList

    Download ComboList
  2. Gh0s7

    Wordlist 999999 Lines ComboList > { Telegram: Gh0s7771H }

    Downlaod ComboList
  3. Gh0s7

    Iranian Military Information PT2

    Name: meysam kheyrallahi National Code: 0410078581 Father Name: Rostam Address: Iran, Tehran, Bagher Shahr, kh, 22 bahman kh karami Mobile Number: 09363890522
  4. Gh0s7

    Iranian Military Information

    Name: Sajad Mohammadi National Code: 0559956487 Birthday: 1986 January 12 , Sunday Father Name: AbdolAzim Address: Iran, khomein robotv morad kh 15 khordad
  5. Gh0s7

    Wordlist IRANIAN PHONE NUMBERS <3

    +989054816712 +989056821712 +989038259962 +989054816725 +989396270071 +989156331288 +989379139281 +989037216524 +989158057861 +989182364894
  6. Gh0s7

    SOCKS V2RAY CONFIGS > { TELEGRAM: Gh0s7771H }

    , %22rules%22: [ { %22domain%22: %22fr.api-music-fa.com%22, %22server%22: %22dns-direct%22 }, { %22domain%22: %22cp.cloudflare.com%22, %22server%22: %22dns-remote%22, %22rewrite_ttl%22: 3000 }, { %22rule_set%22: [...
  7. Gh0s7

    Email:Pass HACKED SITE DATABASE > { myfuturejob.in }

    DOWNLOAD DATA
  8. Gh0s7

    Chat message

    hi all
  9. Gh0s7

    Email:Pass DATABASE SITE { zhuzaoguolvwang.cn }

    https://www.mediafire.com/file/krder9aixmwzreq/zhuzaoguolvwang.cn.zip/file
  10. Gh0s7

    Email:Pass DATABASE SITE { www.hopemakers.tn }

    https://www.mediafire.com/file/dxv7fdfetoskjgq/www.hopemakers.tn.zip/file
  11. Gh0s7

    Email:Pass DATABASE SITE { duallineparts.in }

    https://www.mediafire.com/file/vinwi523tm6yhic/duallineparts.in.zip/file
  12. Gh0s7

    Chat message

    anyone do you want buy exploit for wordpress?
  13. Gh0s7

    Chat message

    hi guys
  14. Gh0s7

    CRACK ADMIN PANEL SITE WITH Ruby

    ruby
  15. Gh0s7

    CRACK ADMIN PANEL SITE WITH Ruby

    #!/usr/bin/env ruby # WordPress Admin Panel Brute Force Tool # For authorized penetration testing only require 'net/http' require 'uri' require 'openssl' require 'optparse' require 'thread' require 'json' class WPBruteForcer def initialize(options) @target = options[:target] @userlist...
  16. Gh0s7

    EXPLOIT FOR WORDPRESS 6.8.3 FOR BYPASS ADMIN PANEL SITE

    this code is python
  17. Gh0s7

    EXPLOIT FOR WORDPRESS 6.8.3 FOR BYPASS ADMIN PANEL SITE

    # Exploit Title: WordPress Plugin Wp-FileManager 6.8 - RCE # Date: September 4,2020 # Exploit Author: Mansoor R (@time4ster) # CVE: CVE-2020-25213 # Version Affected: 6.0 to 6.8 # Vendor URL: https://wordpress.org/plugins/wp-file-manager/ # Patch: Upgrade to wp-file-manager 6.9 (or above) #...