Skip to main content

Allah bless Tunisia and protects Tunisian people from Khwanji and the like

The khwanji are hungry, as they have been since  ever, they never get full, and because of why, they are the British voracious reptilian beings'disciples. They are angry about their freedom to do evil and make FASSAD FIL ARTH, warmonger since their beginning, ALLATHIN YAKHOULLOUNA ADDONYA BIDDIN, shame on Khwanji. He is hungry, that is why in his anger, he targets our security forces, the foundation of national unity, integrity and Salam. May Allah almighty protects, our Security Forces+Government+Presidency.  The most important is that, we Tunisian people, with the guidance of OUR presidency+ OUR Government + Our Security forces we enjoy the NIIMAA that we live in OUR country, we work OUR land, and breathe OUR full freedom and OUR air. Of course, the envious greedy KHwanji HASSOUD like IBLISS, he made the unforgivable crimes, that is to make pact with the evils in England and to betray Tunisia. Alhamdou Lillah here in Tunisia we live naturally our freedom to the extent that we forget to name it, we focus on more important matters. But a Khwanji in England, is imprisoned within the unbreakable jail of shame, treason and envy. The only way to escape that prison is to spread chaos in Tunisia, but Tunisia is protected by Allah Almighty, Alhamdou Lillah we Tunisian we know that greedy Khwanji will die far from Tunisia jailed within their MI6 made virtual freedom.  Carnivorous face, voracious face, ready to annihilate Tunisia for his appetite, that alas can't be teased, he is Khwanji, and Khwanji never get full from this Donya. 
 
 
 


Comments

Popular posts from this blog

Unrestricted Upload File Vulnerability bWAPP

We present a step by step guide for testing the Unrestricted Upload File Vulnerability in bWAPP, we did perform the lab ourselves  based on widely available literature on the net, 1. Introduction 2. Step 1 : php backdoor creation 3. Step 2 : meterpreter exploit configuration 4. Step 3 : connection to bWAPP server 5. Step 4 : php backdoor upload to the bWAPP server 6. Step 5 : php backdoor activation 7. Meterpreter session exploitation
 Pyramids again to not disturb innocents

PHP Shells PentesterLab & DVWA

WE RECALL THAT ALL THE TECHNIQUES SHOWN HEREBY ARE WELL DESCRIBED ON THE NET, YET WE PERFORMED BY OURSELVES STEP BY STEP ALL THE LABS DEMONSTRATED IN THIS BLOG, MTIBAA Riadh PHP Web Shells in Forensic Analysis Backdoor scripts, Uploaded on web servers, Illegitimate access (read/write/edit/delete). 1. Simple Backdoor Shell John Troon, Remote code execution. 2. qsd-php Backdoor Shell Daniel Berliner, Platform to execute system command. 3. PHP-reverse shell Pentestmonkey, Outbounds TCP connection from server to host, Attaches shell to TCP connection, Runs interactive programs (telnet/ssh). 4. MSFvenom based PHP Backdoor Shell  5. Weevely Shell Simulates Telnet. ...