๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐ : Reflected XSS
๐๐๐ฃ๐ : https://youtube.com/shorts/Mw9tXoozrKo?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/Mw9tXoozrKo?feature=share
YouTube
Reflected XSS
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: Reflected XSS๐ฟ๐๐จ๐๐ง๐๐ฅ๐ฉ๐๐ค๐ฃ: Reflected XSS vulnerability happens when a website fails to validate user input, allowing malicious cod...
๐Google Dorks: Learn to Hack Anyone's Account with Google๐
โ What you'll learn?
โข Complete understanding of Google Dorks
โข How to find Vulnerabilities
โข How to find anyone's Username & Password
โข How to do Google search like a Hacker
๐Link: http://bit.ly/GoogleDorksForHacking
Share with Love๐
โ What you'll learn?
โข Complete understanding of Google Dorks
โข How to find Vulnerabilities
โข How to find anyone's Username & Password
โข How to do Google search like a Hacker
๐Link: http://bit.ly/GoogleDorksForHacking
Share with Love๐
web2shell
A Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.
A Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.
CVE-2023-32243 | wordpress
Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation
Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation
usage: exploit.py [-h] -u URL -p PASSWORD [-usr USERNAME]Download Exploit
โค2
gg's hacker's ( I love you โโค๏ธ
โผ๏ธHere we go again
here we go again ๐
#OSINT
1โพ Visual Ping web page monitoring service,
helps to track of changes on any particular website.
( hourly/everyday )
2โพ All the internet combines results from
different search engines and social media.
3โพ izito searches and combines all Search Engines!
Yahoo, Microsoft Bing, YouTube, Wikipedia, Entireweb etc...
#exploit
1. CVE-2023-1586:
Avast Anti-Virus privileged arbitrary file create on virus restore
and as always #hacker_bano_chutiya_nhe ๐๐
โผ๏ธHere we go again
here we go again ๐
#OSINT
1โพ Visual Ping web page monitoring service,
helps to track of changes on any particular website.
( hourly/everyday )
2โพ All the internet combines results from
different search engines and social media.
3โพ izito searches and combines all Search Engines!
Yahoo, Microsoft Bing, YouTube, Wikipedia, Entireweb etc...
#exploit
1. CVE-2023-1586:
Avast Anti-Virus privileged arbitrary file create on virus restore
and as always #hacker_bano_chutiya_nhe ๐๐
โก2
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
State Times
Hackers attack Ahmedabad hospital with ransomware, demand USD 70,000 to restore data
AHMEDABAD: Servers of a private multi-speciality hospital here has come under a ransomware attack with the hackers demanding Bitcoin worth USD 70,000 to restore data, police said.Based on a complaint filed by K D Hospital, located on the outskirts of
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
The GitHub Blog
How GitHub Copilot is getting better at understanding your code
With a new Fill-in-the-Middle paradigm, GitHub engineers improved the way GitHub Copilot contextualizes your code. By continuing to develop and test advanced retrieval algorithms, theyโre working on making our AI tool even more advanced.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Realpython
Use ChatGPT to Learn Python Programming โ Real Python
Learn Python with ChatGPT! Get instant help, pair program, fix errors, and explore alternate solutions to grow your Python coding skills.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
DEV Community
Git Cheat Sheet: Essential Commands for Effective Code Management
In this blog post, I have tried to cover some basic Git commands that I used frequently in my work...
OEBuilder | Hack Using Excel And Doc
OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.
Features:
*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.
Features:
*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
A new blog on OWASP ZAP Tool
A perfect tool for beginners to start their web application security testing journey
Here is the links to that blog:
https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/
Join our group for more such Cyber Security content:
t.me/ethicalhackingtechofide
A perfect tool for beginners to start their web application security testing journey
Here is the links to that blog:
https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/
Join our group for more such Cyber Security content:
t.me/ethicalhackingtechofide
๐1
๐ฅ How to Start Bug Bounty for Beginners ๐ฅ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://pentestingguide.com/bug-bounty-for-beginners/
(Click on Ads to Support us๐ฅบ)
Share if you found it helpful โค๏ธ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://pentestingguide.com/bug-bounty-for-beginners/
(Click on Ads to Support us๐ฅบ)
Share if you found it helpful โค๏ธ
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still โeasy winsโ out there which can be found, if you have a good strategy when it comes to reconnaissance.
Read: https://bit.ly/AdvanceRecon_Guide
Read: https://bit.ly/AdvanceRecon_Guide
Forwarded from BlackDragonSec ๐ฎ๐ณ
This media is not supported in your browser
VIEW IN TELEGRAM
Team insane right now๐
๐ฅ4
Forwarded from ONE-FOUR-ONE 1-4-1 ๐ฎ๐ณ
Scada system of Chemical factory of porkis has been compromised by Team 1-4-1 ๐ฎ๐ณ
โคโ๐ฅ5
This media is not supported in your browser
VIEW IN TELEGRAM
Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.