This media is not supported in your browser
VIEW IN TELEGRAM
Pakistan is beizzati magnet everywhere
๐ฟ8๐คฉ2
๐Xavier Marks Indonesian Data Leak : Download
๐พCVE-2023-34039 Exploit : Download
๐ฒCraxs Rat V6.7 : Download
๐ธInvicti Standard V23.9.0.42095 Crack : Download
๐ช Telegram Bot For Remote Access To Computer Files : Download
๐ฏGet IP Address On Other Side Audio Call In Telegram : Download
๐พCVE-2023-34039 Exploit : Download
๐ฒCraxs Rat V6.7 : Download
๐ธInvicti Standard V23.9.0.42095 Crack : Download
๐ช Telegram Bot For Remote Access To Computer Files : Download
๐ฏGet IP Address On Other Side Audio Call In Telegram : Download
๐4
Any tryhackme supplier here ?
Only dm me if one year and three months available , dm @cyberdin
Only dm me if one year and three months available , dm @cyberdin
Forwarded from OSINT AMBITION (Dheeraj Yadav)
New blog in OSINT Ambition
OSINT: Revealing the digital identity of an invitation link creator on telegram by @ManuelBot59
https://publication.osintambition.org/osint-revealing-the-digital-identity-of-an-invitation-link-creator-on-telegram-de88b747c046
Join @osintambition for more.
#osint #socmint #telegramosint #infosec #cybersec #privacy #security #opsec
OSINT: Revealing the digital identity of an invitation link creator on telegram by @ManuelBot59
https://publication.osintambition.org/osint-revealing-the-digital-identity-of-an-invitation-link-creator-on-telegram-de88b747c046
Join @osintambition for more.
#osint #socmint #telegramosint #infosec #cybersec #privacy #security #opsec
Medium
๐ฅ๐ฅOSINT: Revealing the digital identity of an invitation link creator on telegram.
The screenshot shows a search performed on the Google search engine using Google Hacking techniques, with the goal of finding Telegramโฆ
Hey Guys I have developed a new python based port scanner tool which is platform independent and accuracy with concurrency, easy tool management, user friendly etc.. you can visit here for more https://github.com/sanjai-AK47/Khonshu
GitHub
GitHub - RevoltSecurities/Khonshu: Khonsu is a powerful port scanning tool written in python that detect open ports with concurrentโฆ
Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately - RevoltSecurities/Khonshu
Forwarded from ๐พ๐ฟ๐ (๐๐๐๐๐) ๐ฉ
DM @CYBERDIN IF YOU NEED
CHECK @PROOFSCDI FOR PROOFS
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
Forwarded from CrackCodes ๐ฎ๐ณ (Prapatti ็ชใๅ า)
https://system32.ink/positive-technologies-network-attack-discovery-crack-v11-keygen/
Positive Technologies Network Attack Discovery Crack v11 Keygen
๐1
Forwarded from Cybertix
Whenever you test Login or Registration Feature.
Apply this SQL Payload in the Email Parameter๐๐ป
๐ฃ๐ฎ๐๐น๐ผ๐ฎ๐ฑ: ';WAITFOR DELAY '0:0:5'--
๐ก๐ผ๐๐ฒ: You have to intercept the Login/Registration Request and then Enter the Given Payload.
If there is No Validation then it will be a Blind SQL Injection๐๐ฅ
Apply this SQL Payload in the Email Parameter๐๐ป
๐ฃ๐ฎ๐๐น๐ผ๐ฎ๐ฑ: ';WAITFOR DELAY '0:0:5'--
๐ก๐ผ๐๐ฒ: You have to intercept the Login/Registration Request and then Enter the Given Payload.
If there is No Validation then it will be a Blind SQL Injection๐๐ฅ
๐1
Forwarded from Cybertix
๐๐๐น๐ธ ๐๐ผ๐บ๐ฎ๐ถ๐ป ๐ฆ๐ฐ๐ฎ๐ป ๐๐ถ๐๐ต ๐๐๐จ๐ฑ
๐๐ถ๐ป๐ธ:
https://twitter.com/thecybertix/status/1755118515470905497?t=oCymkflQaXCF4TMX_Z05FA&s=19
๐๐ถ๐ป๐ธ:
https://twitter.com/thecybertix/status/1755118515470905497?t=oCymkflQaXCF4TMX_Z05FA&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
Use xargs with gau to scan bulk domains without losing speed ๐
xargs -a alive.txt -I@ sh -c 'gau --blacklist css,jpg,jpeg,JPEG,ott,svg,js,ttf,png,woff2,woff,eot,gif "@"' | tee -a gau.txt
๐๐ฐ๐ฐ๐ฒ๐๐ ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ๐ ๐ณ๐ฟ๐ผ๐บ ๐๐ถ๐๐ต๐๐ฏ:
https://t.co/Lv5AeEDSFl
xargs -a alive.txt -I@ sh -c 'gau --blacklist css,jpg,jpeg,JPEG,ott,svg,js,ttf,png,woff2,woff,eot,gif "@"' | tee -a gau.txt
๐๐ฐ๐ฐ๐ฒ๐๐ ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ๐ ๐ณ๐ฟ๐ผ๐บ ๐๐ถ๐๐ต๐๐ฏ:
https://t.co/Lv5AeEDSFl
Forwarded from ๐พ๐ฟ๐ (๐๐๐๐๐) ๐ฉ
DM @CYBERDIN IF YOU NEED
CHECK @PROOFSCDI FOR PROOFS
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
Forwarded from ฤฑllฤฑll โข TeAm UcC OpErAtIoNs โข ฤฑllฤฑll
https://ispr.gov.bd/en/home/
FULL DEFACE DONE โ ๐ช
JAI SHREE RAM ๐โฅ๏ธโฃ๏ธ
#UNKNOWN_CYBER_CULT
โโค @UCC_TEAM โคโ
FULL DEFACE DONE โ ๐ช
JAI SHREE RAM ๐โฅ๏ธโฃ๏ธ
#UNKNOWN_CYBER_CULT
โโค @UCC_TEAM โคโ
โค1
https://system32.ink/disable-windows-defender-uac-bypass-upgrade-to-system/
Disable Windows Defender ( UAC Bypass + Upgrade to SYSTEM)
System32.ink For Sell
โ๏ธDomain Already Renewed For 3 Years (2026)
โ Adsense Approved
๐ฐPrice: $180 (Negotiable)
DM: @mynk0x00
โ๏ธDomain Already Renewed For 3 Years (2026)
โ Adsense Approved
๐ฐPrice: $180 (Negotiable)
DM: @mynk0x00
๐3
Forwarded from CDI๐บ๐คง
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Team Chutiya pk Exposed ๐ฉ๐ต๐ฐ
1. ISRO doesn't use cpanel hosting ๐คฃ
[https://www.isro.gov.in:2083/] ๐
2. ISRO doesn't make Brahmos ๐ ๐
3. Main Server pe Brahmos ka docs store nhi hota ๐ซข
4. Chutiya ki tarah yesterday all file update nhi karta (Last Modification: Yesterday) ๐๐๐ฆ
Point to be highlighted *bad thing is we got access only for few minutes ๐คฃ๐คฃ๐คฃ๐ฆ๐ซ๐ต๐ฐ
Chutiyo Ne Login1.php Bhi Nahi Hataya
Uske Liye Bhi Dimag Chahiye Jo Tumne Cpanel Par Domain Dir. Add karke Kiya ๐
LoL Hacker Bano Chutiya Nahi
1. ISRO doesn't use cpanel hosting ๐คฃ
[https://www.isro.gov.in:2083/] ๐
2. ISRO doesn't make Brahmos ๐ ๐
3. Main Server pe Brahmos ka docs store nhi hota ๐ซข
4. Chutiya ki tarah yesterday all file update nhi karta (Last Modification: Yesterday) ๐๐๐ฆ
Point to be highlighted *bad thing is we got access only for few minutes ๐คฃ๐คฃ๐คฃ๐ฆ๐ซ๐ต๐ฐ
Chutiyo Ne Login1.php Bhi Nahi Hataya
Uske Liye Bhi Dimag Chahiye Jo Tumne Cpanel Par Domain Dir. Add karke Kiya ๐
LoL Hacker Bano Chutiya Nahi
๐คฃ28๐ฟ2โค1๐1๐1
https://system32.ink/kitty-0.76.1.13-command-injection-cve-2024-23749-exploit/
KiTTY 0.76.1.13 Command Injection CVE-2024-23749 Exploit
Forwarded from ๐พ๐ฟ๐ (๐๐๐๐๐) ๐ฉ
DM @CYBERDIN IF YOU NEED
CHECK @PROOFSCDI FOR PROOFS
Please open Telegram to view this post
VIEW IN TELEGRAM
https://system32.ink/ivanti-connect-secure-cve-2024-22024-xxe-exploit/
Ivanti Connect Secure CVE-2024-22024 XXE Exploit
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
CHECK @PROOFSCDI FOR PROOFS
Please open Telegram to view this post
VIEW IN TELEGRAM