intext:saved from url To be precise, intext:saved from url= (0010) intext:saved from url= (0012)
filetype:dbx filetype:pst
filetype:ctt "msn" inurl:indexFrame.shtml Axis intitle:phpmyadmin inurl:server_processlist.php
admin backup filetype:sql -trunk -trac -forum filetype:ste
inurl:"com_hashcash"
inurl:"/_vti_log/" inurl:"/_private/" inurl:"/_vti_log/"
Filetype: inc dbconn Filetype: inc intext: mysql_connect allinurl: admin mdb
ext:passwd -intext:the -sample -example
"parent directory" +proftpdpasswd
server-dbs "intitle:index of"
inurl:"tinymce.xml"
filetype:swf inurl:login OR inurl:secure OR inurl:admin
intitle:”EvoCam” inurl:”webcam.html” intitle:”Live View / – AXIS” | inurl:view/view.shtml^
allintext:”Safe-mode: OFF (not secure)”
"Welcome to phpMyAdmin" AND " Create new database"
allinurl:postscript.php?p_mode= inurl:index.php?pg=
filetype:pdf file c (htm OR html OR mhtml) site:gov.pk
filetype:inc mysql_connect("localhost","root"
inurl:servlet/com (REF: Apache Tomcat InvokerServlet) inurl:servlet/mil inurl:servlet/net inurl:servlet/com +admin
"index of" "My RoboForm Data"
inurl:phpldapadmin/cmd.php? (REF: http://www.securityfocus.com/bid/37327/exploit)
inurl:/phpmyadmin/scripts/setup.php
/components/com_galleria/galleria.html.php allinurl:/com_galleria/ inurl:com_galleria index.php?option=com_galleria allinurl:com_galleria com_galleria
allinurl:monatsblatt.php (REF: http://www.securityfocus.com/bid/37327/exploit) allinurl:datumscalc.php allinurl:/frontend/x3/files/ (REF: http://www.exploit-db.com/exploits/10519)
allinurl:/chat.ghp?username (REF: http://www.exploit-db.com/exploits/11179) allinurl:/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/ (REF: http://www.exploit-db.com/exploits/11263) allinurl:/libraries/joomla/client/ldap.php (REF: http://www.exploit-db.com/exploits/11262) inurl:passlist.txt inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg inurl:view/indexFrame.shtml inurl:view/index.shtml inurl:view/view.shtml intitle:”live view” intitle:axis intitle:liveapplet allintitle:”Network Camera NetworkCamera” intitle:axis intitle:”video server” intitle:liveapplet inurl:LvAppl intitle:”EvoCam” inurl:”webcam.html” intitle:”Live NetSnap Cam-Server feed” intitle:”Live View / – AXIS” intitle:”Live View / – AXIS 206M” intitle:”Live View / – AXIS 206W” intitle:”Live View / – AXIS 210? inurl:indexFrame.shtml Axis inurl:”MultiCameraFrame?Mode=Motion” intitle:start inurl:cgistart intitle:”WJ-NT104 Main Page” intext:”MOBOTIX M1? intext:”Open Menu” intext:”MOBOTIX M10? intext:”Open Menu” intext:”MOBOTIX D10? intext:”Open Menu” intitle:snc-z20 inurl:home/ intitle:snc-cs3 inurl:home/ intitle:snc-rz30 inurl:home/ intitle:”sony network camera snc-p1? intitle:”sony network camera snc-m1? intitle:”Toshiba Network Camera” user login intitle:”netcam live image” intitle:”i-Catcher Console – Web Monitor” inurl:/view/index.shtml inurl:viewerframe?mode= inurl:/view:shtml inurl:view/indexframe.shtml inurl:lvappl live webcams inurl:"viewerframe?mode=motion" intitle:"snc-rz30 home" intitle:"WJ-NT104 Main" inurl:LvAppl intitle:liveapplet intitle:"Live View / - AXIS" inurl:indexFrame.shtml "Axis Video Server"
allinurl:/level/15/exec
inurl:"f?p=" inurl:pls/htmldb allinurl:WS_FTP.LOG
allinurl=profil.php?id= inurl:com_jbudgetsmagic (Joomla) inurl:com_surveymanager inurl:index.php?option=com_joomlaconnect_be inurl:"com_joaktree" allinurl:wp-content/plugins/wp-wall/
allinurl:gitweb.cgi (REF: http://www.exploit-db.com/exploits/11497)
allinurl:search.php?search_type vbulletin (REF: http://inj3ct0r.com/exploits/9697)
Index of / wp-content/plugins/nextgen-gallery/ (REF: http://www.exploit-db.com/exploits/12098)
wordpress inurl:"/?event_id=" (REF: http://www.exploit-db.com/exploits/11302)
site:pastebin.com "-----BEGIN RSA PRIVATE KEY-----" allinurl:/_layouts/help.aspx (REF: http://www.exploit-db.com/exploits/12450)
allinurl:/owa/(REF: http://www.exploit-db.com/exploits/12728)
inurl:"axis2/services" "list Services" (REF: http://www.exploit-db.com/exploits/12721)
site:cloudshark.org captures
inurl:/scripts/wgate
inurl:"https" outlook web access
intitle:"CRiMEPACK v2" intitle:"CRiMEPACK v3.0" intitle:"CRiMEPACK v3.0-delta" intitle:login "User name:" "Remember (MD5 cookies)" inurl:"_reports" bot_id Auth! user: intitle:"Yes 3.0"
intitle:"Rx08.ii36B.Rv"
filetype:swf inurl:admin inurl:login
Publicar un comentario