:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-21
16:58:08 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> CATEGORY: exploit

[EXPLOIT]

>> Backdoor.Win32.Noknok.50 Insecure Permissions

USER: deepcore // 2021-01-26 // 0 CMT

Backdoor.Win32.Noknok.50 malware suffers from an insecure permissions vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Backdoor.Win32.Jokerdoor Insecure Permissions

USER: deepcore // 2021-01-26 // 0 CMT

Backdoor.Win32.Jokerdoor malware suffers from an insecure permissions vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Library System 1.0 SQL Injection

USER: deepcore // 2021-01-26 // 0 CMT

Library System version 1.0 suffers from a remote SQL injection vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Trojan.Win32.Xocry.ff Insecure Permissions

USER: deepcore // 2021-01-26 // 0 CMT

Trojan.Win32.Xocry.ff malware suffers from an insecure permissions vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Backdoor.Win32.Wollf.16 Hardcoded Password

USER: deepcore // 2021-01-26 // 0 CMT

Backdoor.Win32.Wollf.16 malware creates and runs a service named contime.exe with SYSTEM integrity and listens on port 5240. The malware uses a weak hardcoded password of 12345678 which can easily be…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> MobileIron MDM Hessian-Based Java Deserialization Remote Code Execution

USER: deepcore // 2021-01-26 // 0 CMT

This Metasploit module exploits an ACL bypass in MobileIron MDM products to execute a Groovy gadget against a Hessian-based Java deserialization endpoint.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> PEAR Archive_Tar Arbitrary File Write

USER: deepcore // 2021-01-26 // 0 CMT

This Metasploit module takes advantages of Archive_Tar versions prior to 1.4.11 which fail to validate file stream wrappers contained within filenames to write an arbitrary file containing user controlled content…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Backdoor.Win32.DarkKomet.bhfh Insecure Permissions

USER: deepcore // 2021-01-26 // 0 CMT

Backdoor.Win32.DarkKomet.bhfh malware suffers from an insecure permissions vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> SonicWall Says It Was Hacked Using Zero-Days In Its Own Products

USER: deepcore // 2021-01-26 // 0 CMT

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Oracle WebLogic Server 14.1.1.0 Remote Code Execution

USER: deepcore // 2021-01-23 // 0 CMT

Oracle WebLogic Server version 14.1.1.0 authenticated remote code execution exploit.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 408 409 410 … 2,233 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7107)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-20
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43701
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-21
TIME 16:58:08 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _