![]() YOU WILL WANT 50-200 LINKS FOR AROUND 5-10 GOOD HQ PRIVATE COMBOS.Īfter you have got your private injectable links, you want to select all of the links. Once that is done, head over to the “Injectables” tab, NOTE: This is where your Private URL’s will have the combos (some will, some won’t)Ĭlick on “Start Analizer” and wait for the links to start popping up. Head over right to the “Exploitables” tab, and click on “Start Exploiter”Īfter around 5-20 minutes (depending on how many private URL’s you have), you will have your exploitable URL’s. Now with our private links, insert the links into SQLi Dumper via Import (orange file folder) or Add (white paper) ![]() Open up SQLi Dumper 8.5, if there is anything inside URL’s queue, delete it. Now that we FINALLY have our private links, it is time to use SQLi Dumper in order to find HQ Combos. ![]() To check what links you have, click the green folder on top right corner. THIS IS WHAT MAKES YOUR COMBOS PRIVATE.Īfter you have waited approximately 2-10 minutes, you now will have PRIVATE links. As well as your new proxies in “Proxy”īEFORE CLICKING START, MAKE SURE YOU TICK AntiPublic. Head over back to Dork Searcher EZ and load in the keywords via “Source”. Now that you have all of your proxies, open up Dork Searcher EZ. A way of obtaining good proxies is thru some websites which provide daily proxies. To make our private combo lists, we will be using Dork Searcher EZ, this program gathers keywords and converts it into many links that could have a vulnerability.īefore using the program, gather a few HQ proxies.
0 Comments
Leave a Reply. |