Tuesday, June 28, 2016

inurl:login inurl:user inurl:pass -intext:pass -intext:user

Find cPanel portals




inurl:login inurl:user inurl:pass -intext:pass -intext:user

About cPanel


Globally Empowering Hosting Providers through Fully Automated Point-And-Click Hosting Platforms by Hosting Centric Professionals

intext:"powered by webcamXP 5"

Find webcamXP webcams





intext:"powered by webcamXP 5"

intext:"powered by webcamXP"

About webcamXP


webcamXP is the most popular webcam and network camera software for Windows.

It allows you to monitor your belongings from any location with access to Internet by turning your computer into a security system.

Connect remotely by using other computers or your mobile phone. Broadcast live video to your website. Schedule automatic captures or recordings. Trig specific actions using the motion detector. You can easily use those features among others with webcamXP.

It supports a large selection of Network Cameras (1500+) and is used in multiple industries including national security (police, army), aerospace and defense, museums, hotels, shops, zoos and many others.

Most important for us is to provide a stable and high-performance software. webcamXP is designed to be online 24/7 while using reasonable resources on your computer.

Monday, June 27, 2016

Zixmail inurl:/s/login?

Find login portals




Zixmail inurl:/s/login?

inurl:/s/login? & zixmail

About Zixmail


ZixMail is the desktop email encryption solution that provides individuals with a high level of email security. It's an easy-to-use solution that lets users encrypt and decrypt emails and attachments with a single click. ZixMail features include: Secure and private email messages.

inurl:/awcuser/cgi-bin/

Find Mitel systems




inurl:/awcuser/cgi-bin/

inurl:/awcuser/cgi-bin/conference

inurl:/awcuser/cgi-bin/vcs

About MITEL AWC


Mitel Audio and Web Conferencing (AWC) is a simple, cost-effective and scalable audio and web conferencing solution for small, medium, or large-sized businesses. AWC supports up to 200 audio and web conferencing ports and is the perfect solution for connecting people quickly and simply regardless of their location.

Thursday, June 16, 2016

inurl:.ssh intitle:index.of authorized_keys

Find SSH keys




inurl:.ssh intitle:index.of authorized_keys

Possible result


About SSH

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.

SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rlogin, rsh, and rexec protocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH, allowing them to read the content of SSH sessions.