:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-26
21:24:32 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2016-07

[EXPLOIT]

>> TeamPass Passwords Management System 2.1.26 File Download

USER: deepcore // 2016-07-24 // 0 CMT

TeamPass Passwords Management System versions 2.1.26 and below suffer from an unauthenticated arbitrary file download vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Rapid7 AppSpider 6.12 Privilege Escalation

USER: deepcore // 2016-07-24 // 0 CMT

Rapid7 AppSpider version 6.12 web application vulnerability scanner suffers from an unquoted search path issue impacting the services ‘AppSpider REST Server’, ‘AppSpider REST Service’ and ‘AppSpiderUpgradeService’ for Windows deployed as…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Barracuda Spam And Virus Firewall 5.1.3.007 Remote Root

USER: deepcore // 2016-07-24 // 0 CMT

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Spam and Virus firewall firmware versions 5.1.3.007 and below by exploiting a vulnerability in the web administration interface….

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Barracuda Web App Firewall / Load Balancer Remote Root

USER: deepcore // 2016-07-24 // 0 CMT

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware version 8.0.1.007 and below and Load Balancer Firmware versions 5.4.0.004 and below by exploiting…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> NetBSD mail.local(8) Local Root

USER: deepcore // 2016-07-24 // 0 CMT

NetBSD mail.local(8) local root exploit that leverages a race condition as noted in NetBSD-SA2016-006.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> TFTP Server 1.4 WRQ Buffer Overflow

USER: deepcore // 2016-07-23 // 0 CMT

TFTP server version 1.4 WRQ buffer overflow exploit with egghunter shellcode.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[DEFACEMENT]

>> http://www.maethacity.go.th/eg.htm

USER: deepcore // 2016-07-22 // 0 CMT

http://www.maethacity.go.th/eg.htm notified by Dr.SiLnT HilL

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[DEFACEMENT]

>> http://www.rungkayai.go.th

USER: deepcore // 2016-07-22 // 0 CMT

http://www.rungkayai.go.th notified by ErrOr SquaD

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> OpenSSHD 7.2p2 User Enumeration

USER: deepcore // 2016-07-22 // 0 CMT

OpenSSHD versions 7.2p2 and below remote username enumeration exploit.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Cisco EPC3925 UPC Modem / Router Default Passphrase

USER: deepcore // 2016-07-22 // 0 CMT

The default SSID and passphrase on the Cisco EPC3925 are derived from the MAC address and the DOCSIS serial number. Since the MAC address of the device is broadcasted via…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 10 11 12 … 44 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7110)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-26
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43704
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-26
TIME 21:24:32 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _