Submit
Jumat, 08 April 2011
~
Peraturan Submit
Kami tidak akan menerima posting Vulnerable atau exploit terhadap website nyata ( real website ).
Untuk mempercepat di terimanya pengajuan postingan anda silahkan mengikuti panduan berikut:
1) Kirim satu Exploit setiap satu email,dengan judul email seperti judul Exploit.
2) Kirim file Exploit anda menggunakan ekstensi file attachment seperti berikut (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Cantumkan link software yang memiliki celah / kerentanan jika memungkinkan
Peraturan Artikel yang bisa di posting
1) Kami tidak akan menerima non-persistent kerentanan / vulnerable XSS
2) Kami tidak akan menerima kerentanan / vulnerable XSS untuk aplikasi kecil.
3) Kami tidak akan menerima laporan kerentanan / vulnerable tanpa memicu rincian.
4) Kami tidak akan menerima eksploitasi untuk perangkat lunak yang tidak dapat ditemukan di internet.
5) Kami tidak akan menerima duplikat eksploitasi yang hanya ditulis dalam bahasa yang berbeda.
Ketika menyerahkan Eksploit, Anda harus menyertakan setidaknya header seperti di bawah ini:
# Judul Eksploit: [judul]
# Google Dork: [jika relevan]
# Tanggal: [data]
# Author: [author]
# Software Link: [link download jika tersedia]
# Version: [app version]
# Kategori: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Kirimkan artikel ke email : root@exploit-id.com
Submissions rules
We will NOT accept, process or post any vulnerabilities which are targeted against live websites.
To speed up your submission entry please follow these guidelines:
1) Send 1 exploit per mail, with the mail subject as the exploit title.Exploit Database Submit Exploit
2) Send your exploit as a file attachment, (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Include a link to the vulnerable software if possible.
Submission Entry Rules:
1) We will not accept non-persistent XSS vulnerabilities
2) We will not accept XSS vulnerabilities for minor applications.
3) We will not accept vulnerability reports without triggering details.
4) We will not accept exploits for software which can’t be found on the net.
5) We will not accept duplicate exploits that are simply written in a different language.
When submitting an exploit, you should include at least these headers:
# Exploit Title: [title]
# Google Dork: [if relevant]
# Date: [date]
# Author: [author]
# Software Link: [download link if available]
# Version: [app version]
# Category:: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Send article to email : root@exploit-id.com
4 komentar:
gan post tutorial hack login page pada mikrotik !!! :)
Aplikasi hacker terbaik apa sih.. ??
Test
Hello Friends
Dm me for all kind of spamming tools
AMAZON HACKED SES SMTP
Aws ses smtp inbox office365
OFFCIE INBOX SENDER
INBOX HACKED SMTP
OFFICE365 TRUE LOGIN
WEBMAIL INBOX
SENDGRIND SMTP INBOX
MAILGUN, GSUITE SMTP INBOX
FUD LINK SERVICE
SCAM PAGE
HTTPS CPANEL/ SHELL
BULLETPROOF CPANEL WITH CUSTOM DOMAIN
FRESH OFFICE 365 Logs
INBOX HTML LETTER
RDP ADMIN PORT 25 OPENED
OFFICE Leads/ALL Domain/Bank LEADS/ Ceo - Cfo Leads...All Email Leads Verified
Method send SMS
Fresh 2021 Blockchain/ Huntington scampage
You can also book for spamming, I spam for you 💯guarantee
Serious buyers only
Store: https://wolfcc.ru/
ICQ: @Wolfcc
Skype: Wolfcc.ru
Posting Komentar