๐2
๐ฑDatabase Leaks: https://system32.ink/f/database/
Leak //softjoias.com.br : https://system32.ink/d/leak-softjoias-com-br/
Leak //baianomateriais.com.br: https://system32.ink/d/leak-baianomateriais-com-br-2/
Leak //papelariaamaral.com.br: https://system32.ink/d/leak-papelariaamaral-com-br/
Leak //pensoupneus.com.br: https://system32.ink/d/leak-pensoupneus-com-br/
Leak //vlpcomercial.com.br: https://system32.ink/d/leak-vlpcomercial-com-br/
๐ฑCrack Softwares: https://system32.ink/f/crack-tools/
Acunetix v15.6 Crack: https://system32.ink/d/acunetix-v15-6-crack/
Leak //softjoias.com.br : https://system32.ink/d/leak-softjoias-com-br/
Leak //baianomateriais.com.br: https://system32.ink/d/leak-baianomateriais-com-br-2/
Leak //papelariaamaral.com.br: https://system32.ink/d/leak-papelariaamaral-com-br/
Leak //pensoupneus.com.br: https://system32.ink/d/leak-pensoupneus-com-br/
Leak //vlpcomercial.com.br: https://system32.ink/d/leak-vlpcomercial-com-br/
๐ฑCrack Softwares: https://system32.ink/f/crack-tools/
Acunetix v15.6 Crack: https://system32.ink/d/acunetix-v15-6-crack/
๐ฅCVE-2017-6195 (SQL-Injection in MOVEit Transfer aka MOVEit DMZ)
https://system32.ink/d/cve-2017-6195-exploit/
https://system32.ink/d/cve-2017-6195-exploit/
*โ ๏ธ Researchers claim Windows โbackdoorโ affects hundreds of Gigabyte motherboards โ ๏ธ*
_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._
Link:https://nakedsecurity.sophos.com/2023/06/02/researchers-claim-windows-backdoor-affects-hundreds-of-gigabyte-motherboards/
via _"Naked Security"_
#hacker_bano_chutiya_nhe ๐ซ
_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._
Link:https://nakedsecurity.sophos.com/2023/06/02/researchers-claim-windows-backdoor-affects-hundreds-of-gigabyte-motherboards/
via _"Naked Security"_
#hacker_bano_chutiya_nhe ๐ซ
Leak Databases:
๐๐ปLeak bamsi org : https://system32.ink/d/leak-bamsi-org/
๐๐ปAl Tamimi: https://system32.ink/d/leak-tamimi-com/
Tools:
๐๐ปKittyStager: https://system32.ink/members/mcracker2002/activity/392/
A simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
๐๐ปLeak bamsi org : https://system32.ink/d/leak-bamsi-org/
๐๐ปAl Tamimi: https://system32.ink/d/leak-tamimi-com/
Tools:
๐๐ปKittyStager: https://system32.ink/members/mcracker2002/activity/392/
A simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
๐ฅ2
Real time attempts to break into my servers by attackers trying to guess usernames and passwords. No legitimate services are offered on the addresses receiving these attempts, so there is no chance of a real user accidently submitting their credentials. (Yes things other than SSH occasionally show up)
brute.fail
brute.fail
๐จ๐ปโ๐ปBest ASUS Laptop for Programming๐จ๐ปโ๐ป
ASUS laptops for programming are known for their powerful performance, including fast processors and ample RAM. They also feature high-quality displays, which are crucial for coding and viewing code.
๐Link: https://pentestingguide.com/asus-laptop-for-programming/
ASUS laptops for programming are known for their powerful performance, including fast processors and ample RAM. They also feature high-quality displays, which are crucial for coding and viewing code.
๐Link: https://pentestingguide.com/asus-laptop-for-programming/
๐ฅTools:
๐๐ปLightsOut : Generate an obfuscated DLL that will disable AMSI & ETW
https://system32.ink/d/lightsout-generate-an-obfuscated-dll-that-will-disable-amsi-etw/
๐๐ปBinder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".
Very useful when Android reversing and VR.
https://system32.ink/d/%f0%9f%92%a5binder-trace/
๐๐ปLightsOut : Generate an obfuscated DLL that will disable AMSI & ETW
https://system32.ink/d/lightsout-generate-an-obfuscated-dll-that-will-disable-amsi-etw/
๐๐ปBinder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".
Very useful when Android reversing and VR.
https://system32.ink/d/%f0%9f%92%a5binder-trace/
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Forwarded from WE ARE BLOODNET
==================
โ ๏ธ[SITE]: https://mopa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10228d8bkb16
==================
โ ๏ธ[SITE]: https://pifra(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227de5k96a
==================
โ ๏ธ[SITE]: https://pspc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227e1fk490
==================
โ ๏ธ[SITE]: https://nspp(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/102287b0kee8
==================
โ ๏ธ[SITE]: http://csa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10229174kc21
==================
โ ๏ธ[SITE]: http://ecopsc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022926bkfa8
==================
โ ๏ธ[SITE]: https://pbrr(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022971ak781
==================
โ ๏ธ[SITE]: http://ncndt(.)org(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a280ke5d
==================
โ ๏ธ[SITE]: https://onsa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a481ke39
==================
#FuckNato
#BLOODNET
#Phoenix
#PhoenixALLIANCE
#DDoS_Attack
โ ๏ธ[SITE]: https://mopa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10228d8bkb16
==================
โ ๏ธ[SITE]: https://pifra(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227de5k96a
==================
โ ๏ธ[SITE]: https://pspc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227e1fk490
==================
โ ๏ธ[SITE]: https://nspp(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/102287b0kee8
==================
โ ๏ธ[SITE]: http://csa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10229174kc21
==================
โ ๏ธ[SITE]: http://ecopsc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022926bkfa8
==================
โ ๏ธ[SITE]: https://pbrr(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022971ak781
==================
โ ๏ธ[SITE]: http://ncndt(.)org(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a280ke5d
==================
โ ๏ธ[SITE]: https://onsa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a481ke39
==================
#FuckNato
#BLOODNET
#Phoenix
#PhoenixALLIANCE
#DDoS_Attack
=========BLOODNET========check-host.net
Check report was removed
: Check host - online website monitoring
: Check host - online website monitoring
Check report was removed:
website monitoring with useful tools, Check IP, Check website
website monitoring with useful tools, Check IP, Check website
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (HackLock)
SO HERE'S THE CHANNEL FOR YOU GUYS WHERE WE WILL GONNA POST ALL POSSIBLE JOBS AND INTERNSHIPS OFFERS IN INDIA FOR FRESHERS AND EXPERIENCED BOTH โ๏ธ๐ฎ๐ณ
๐๐๐๐๐๐๐๐๐๐๐๐๐
https://t.me/cyberdemonsindiaDDJ
TEAM @cyberdemonsindia ๐ฎ๐ณ
JAY SHREE RAAM ๐ฅฐ
๐๐๐๐๐๐๐๐๐๐๐๐๐
https://t.me/cyberdemonsindiaDDJ
TEAM @cyberdemonsindia ๐ฎ๐ณ
JAY SHREE RAAM ๐ฅฐ
Injecting scripts into web pages
Draining the theme of injections, chromium extension for working with bots
Functional:
Injecting scripts into web pages
Collection of cookies in .json format
Sending PUSH notifications
Create a hidden screenshot of the current browser screen
View all installed extensions and enable/disable them
Getting the actual URL where the bot is located
Download browser history in .json format
Using the botโs IP and its cookies (reverse proxy)
link https://xss.is/threads/80558/
Product price on the forum : 5.000$
Download: https://system32.ink/d/injecting-scripts-into-web-pages/
Draining the theme of injections, chromium extension for working with bots
Functional:
Injecting scripts into web pages
Collection of cookies in .json format
Sending PUSH notifications
Create a hidden screenshot of the current browser screen
View all installed extensions and enable/disable them
Getting the actual URL where the bot is located
Download browser history in .json format
Using the botโs IP and its cookies (reverse proxy)
link https://xss.is/threads/80558/
Product price on the forum : 5.000$
Download: https://system32.ink/d/injecting-scripts-into-web-pages/
๐ฅ2
DataLeak:
๐๐ปLeak haztutienda com : https://system32.ink/d/leak-haztutienda-com/
๐๐ปLeak voiswitch : https://system32.ink/d/leak-voiswitch-net/
๐๐ปLeak unja.ac.id : https://system32.ink/d/leak-unja-ac-id/
Tools:
๐๐ปPyrai - Mirai python variant : https://system32.ink/d/pyrai-mirai-python-variant/
Exploit:
๐๐ปCVE-2023-33246 RocketMQ Remote Code Execution Exploit : https://system32.ink/d/cve-2023-33246-rocketmq-remote-code-execution-exploit/
๐๐ปLeak haztutienda com : https://system32.ink/d/leak-haztutienda-com/
๐๐ปLeak voiswitch : https://system32.ink/d/leak-voiswitch-net/
๐๐ปLeak unja.ac.id : https://system32.ink/d/leak-unja-ac-id/
Tools:
๐๐ปPyrai - Mirai python variant : https://system32.ink/d/pyrai-mirai-python-variant/
Exploit:
๐๐ปCVE-2023-33246 RocketMQ Remote Code Execution Exploit : https://system32.ink/d/cve-2023-33246-rocketmq-remote-code-execution-exploit/
๐1
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: DOM XSS
๐๐๐ฃ๐ : https://youtube.com/shorts/CGCI_uar67g?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/CGCI_uar67g?feature=share
YouTube
DOM XSS
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: DOM XSS๐ฟ๐๐จ๐๐ง๐๐ฅ๐ฉ๐๐ค๐ฃ: DOM-based XSS vulnerabilities usually arise when JavaScript takes data from an attacker-controllable source,...