Submit



Peraturan Submit
Kami tidak akan menerima posting Vulnerable atau exploit terhadap website nyata ( real website ).
Untuk mempercepat di terimanya pengajuan postingan anda silahkan mengikuti panduan berikut:
1) Kirim satu Exploit setiap satu email,dengan judul email seperti judul Exploit.
2) Kirim file Exploit anda menggunakan ekstensi file attachment seperti berikut (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Cantumkan link software yang memiliki celah / kerentanan jika memungkinkan
Peraturan Artikel yang bisa di posting
1) Kami tidak akan menerima non-persistent kerentanan / vulnerable XSS
2) Kami tidak akan menerima kerentanan / vulnerable XSS untuk aplikasi kecil.
3) Kami tidak akan menerima laporan kerentanan / vulnerable tanpa memicu rincian.
4) Kami tidak akan menerima eksploitasi untuk perangkat lunak yang tidak dapat ditemukan di internet.
5) Kami tidak akan menerima duplikat eksploitasi yang hanya ditulis dalam bahasa yang berbeda.
Ketika menyerahkan Eksploit, Anda harus menyertakan setidaknya header seperti di bawah ini:
# Judul Eksploit: [judul]
# Google Dork: [jika relevan]
# Tanggal: [data]
# Author: [author]
# Software Link: [link download jika tersedia]
# Version: [app version]
# Kategori: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Kirimkan artikel ke email : root@exploit-id.com


Submissions rules
We will NOT accept, process or post any vulnerabilities which are targeted against live websites.
To speed up your submission entry please follow these guidelines:
1) Send 1 exploit per mail, with the mail subject as the exploit title.Exploit Database Submit Exploit
2) Send your exploit as a file attachment, (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Include a link to the vulnerable software if possible.
Submission Entry Rules:
1) We will not accept non-persistent XSS vulnerabilities
2) We will not accept XSS vulnerabilities for minor applications.
3) We will not accept vulnerability reports without triggering details.
4) We will not accept exploits for software which can’t be found on the net.
5) We will not accept duplicate exploits that are simply written in a different language.
When submitting an exploit, you should include at least these headers:
# Exploit Title: [title]
# Google Dork: [if relevant]
# Date: [date]
# Author: [author]
# Software Link: [download link if available]
# Version: [app version]
# Category:: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Send article to email : root@exploit-id.com

~ Jumat, 08 April 2011 4 komentar

Team





The Official Team Exploit ID
jos_ali_joe : Founder / Administrator
El-Farhatz : Founder / Administrator Server
r3m1ck : Webmaster / Exploit coding
falcon : Security network
Don Tukulesto : Exploit coding / Bug research / Webmaster
KaMtiEz : Exploit coding / Bug research
vYc0d : Exploit coding / Bug research
FalkEn : Bug research / Tool maker
K4pT3N : Bug research / Tool maker
Yur4kh4 : Network exploit
Chaer.Newbie : Network exploit

~ 10 komentar

About

Exploit-ID adalah Indone­sian Exploit Archive yang mem­pun­yai tujuan untuk berbagi ten­tang hal kea­manan di bidang jaringan dan kom­puter. Awal berdiri Exploi-ID meru­pakan keti­dak­sen­ga­jaan founder per­tama yang mem­pun­yai cita-cita untuk mem­buat sebuah archive exploit. Dari ide terse­but terny­ata men­da­pat respon posi­tif dari beber­apa senior hacker di Indone­sia, sehingga dapat ter­ben­tuk­lah team untuk meng­garap Exploit-ID. Semoga Exploit-ID dapat men­jadi solusi arsip exploit yang berguna :D
Admin…
Exploit-ID is the Indonesian Exploit Archive which has the objective to share about security in the area of network and computer. Initial stand Exploi-ID is the founder of the first accident that has aspirations to create an archive exploit. From that idea has received positive responses from some senior hackers in Indonesia, so as to forming a team to work on the Exploit-ID. Hopefully Exploit-ID can be a useful solution for the exploits archive :D
Admin …

~ 7 komentar