Skip to main content

Allah Blesses and Protects Tunisia from The Khwanji rothdhilds commandos

BE CAREFUL, but do not worry, these are the khwanji, Allathin yakhoullouna Addounya Biddin. Look at the face, the reptile strait (VORACIOUS shape shifting with carnivorous eyes and teeth, a predator well trained by MI6), never forget, it is not an illusion, it is the fact. These khwanji, rejected by the TUNISIAN NATION, expelled from the MI6 agency, keep on begging for mercy from their little masters within the Winmester club. Why don't they try to beg for mercy from the grand reptilian shapeshifter masters in Buckingham palace!?  Three screenshots, letting no room to any illusion, typically the three postures of voracious reptilians hunting for a prey (hungry, the lust for blood: terrorism and wars) ; effectively, Allathin Yakhollouna Addounya Biddin are like this. Khwanji still begging for mercy from their Winmester's little masters, even in tvshows, they are looser, failers, deceivers, they can't meet and talk without Winmesters building picture still behind them, Wa itha lam tastahy Fafaal maa shiita. They need comfort, so they turn towards Winmesters square palace to pray and to beg. BUT WE THE TUNISIAN NATION, Alhamdou Lillah, we are still keeping on turning towards Kibla of Rasoul Allah Salla Allahou Alaihi Wasallam to pray Allah Alhak the All mighty, and we ask him for the true mercy. Alhamdou Lillah we TUNISIAN NATION keep on fighting and expelling the khwanji rothshilds commandos from our beloved country TUNISIA. MAy Allah protect our presidency+Government+Security and lead our steps towards his infinite mercy. 



 

 


 

Comments

Popular posts from this blog

Unrestricted Upload File Vulnerability bWAPP

We present a step by step guide for testing the Unrestricted Upload File Vulnerability in bWAPP, we did perform the lab ourselves  based on widely available literature on the net, 1. Introduction 2. Step 1 : php backdoor creation 3. Step 2 : meterpreter exploit configuration 4. Step 3 : connection to bWAPP server 5. Step 4 : php backdoor upload to the bWAPP server 6. Step 5 : php backdoor activation 7. Meterpreter session exploitation

Exploitation of the OS Command Injection Threat in bWAPP

In this tutorial is based in literature and tools widely available in the Internet, we did perform all the steps by ourselves, hope useful,  1. Introduction 2. Firefox configuration 3. bWAPP Cookie Interception by Burp Suite 4. Attack with Commix to Establish a Shell

PHP Shells PentesterLab & DVWA

WE RECALL THAT ALL THE TECHNIQUES SHOWN HEREBY ARE WELL DESCRIBED ON THE NET, YET WE PERFORMED BY OURSELVES STEP BY STEP ALL THE LABS DEMONSTRATED IN THIS BLOG, MTIBAA Riadh PHP Web Shells in Forensic Analysis Backdoor scripts, Uploaded on web servers, Illegitimate access (read/write/edit/delete). 1. Simple Backdoor Shell John Troon, Remote code execution. 2. qsd-php Backdoor Shell Daniel Berliner, Platform to execute system command. 3. PHP-reverse shell Pentestmonkey, Outbounds TCP connection from server to host, Attaches shell to TCP connection, Runs interactive programs (telnet/ssh). 4. MSFvenom based PHP Backdoor Shell  5. Weevely Shell Simulates Telnet. ...