Exploit Database Exploit Database
  • Exploits

  • GHDB

  • Papers

  • Shellcodes


  • Search EDB

  • SearchSploit Manual

  • Submissions


  • Online Training

    • PWK PEN-200
    • WiFu PEN-210
    • ETBD PEN-300
    • AWAE WEB-300
    • WUMED EXP-301
Exploit Database
  • Stats

  • About Us

    About Exploit-DB Exploit-DB History FAQ
  • Search

intitle:"admin panel" +"Powered by RedKernel"

GHDB-ID:

1061

Author:

anonymous

Published: 2005-08-16

Google Dork Description:

intitle:"admin panel" +"Powered by RedKernel"

Google Search: intitle:"admin panel" +"Powered by RedKernel"
This finds all versions of RedKernel Referer Tracker(stats page) it just gives out some nice info
            
Downloads Certifications Training Professional Services
Kali Linux OSCP Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Penetration Testing
Kali NetHunter OSWP Offensive Security Wireless Attacks (WiFu) (PEN-210) Advanced Attack Simulation
Kali Linux Revealed Book OSEP Evasion Techniques and Breaching Defences (PEN-300)
All new for 2020
Application Security Assessment
OSWE Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
OSED Windows User Mode Exploit Development (EXP-301)
All new for 2021
OSEE
KLCP [Free] Kali Linux Revealed
Downloads
Kali Linux Kali NetHunter Kali Linux Revealed Book
Certifications
OSCP OSWP OSEP OSWE OSED OSEE KLCP
Training
- Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Offensive Security Wireless Attacks (WiFu) (PEN-210) Evasion Techniques and Breaching Defences (PEN-300)
All new for 2020
Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
Windows User Mode Exploit Development (EXP-301)
All new for 2021
[Free] Kali Linux Revealed
Pro Services
Penetration Testing Advanced Attack Simulation Application Security Assessment
  • Exploit Database by Offensive Security
  • Terms
  • Privacy
  • About Us
  • FAQ
  • Cookies
© OffSec Services Limited 2023. All rights reserved.
About The Exploit Database

Offensive Security The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by Offensive Security.

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.

The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information.

The process known as “Google Hacking” was popularized in 2000 by Johnny Long, a professional hacker, who began cataloging these queries in a database known as the Google Hacking Database. His initial efforts were amplified by countless hours of community member effort, documented in the book Google Hacking For Penetration Testers and popularised by a barrage of media attention and Johnny’s talks on the subject such as this early talk recorded at DEFCON 13. Johnny coined the term “Googledork” to refer to “a foolish or inept person as revealed by Google“. This was meant to draw attention to the fact that this was not a “Google problem” but rather the result of an often unintentional misconfiguration on the part of a user or a program installed by the user. Over time, the term “dork” became shorthand for a search query that located sensitive information and “dorks” were included with may web application vulnerability releases to show examples of vulnerable web sites.

After nearly a decade of hard work by the community, Johnny turned the GHDB over to Offensive Security in November 2010, and it is now maintained as an extension of the Exploit Database. Today, the GHDB includes searches for other online search engines such as Bing, and other online repositories like GitHub, producing different, yet equally valuable results.

Offensive Security Resources
Downloads Certifications Training Services
Kali Linux OSCP Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Penetration Testing
Kali NetHunter OSWP Offensive Security Wireless Attacks (WiFu) (PEN-210) Advanced Attack Simulation
Kali Linux Revealed Book OSEP Evasion Techniques and breaching Defences (PEN-300)
All new for 2020
Application Security Assessment
OSWE Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
OSED Windows User Mode Exploit Development (EXP-301)
All new for 2021
OSEE
KLCP [Free] Kali Linux Revealed
Search The Exploit Database