Forwarded from Cybertix
๐ง๐ถ๐บ๐ฒ ๐ฏ๐ฎ๐๐ฒ๐ฑ ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐๐ถ๐ป๐ด ๐๐ฎ๐๐ฏ๐ฎ๐ฐ๐ธ๐๐ฟ๐น๐ ๐ฅ๐
๐๐ถ๐ป๐ธ:
https://twitter.com/thecybertix/status/1785903749300699339?t=FZreV2KXhzHPsTAsBQdDGA&s=19
๐๐ถ๐ป๐ธ:
https://twitter.com/thecybertix/status/1785903749300699339?t=FZreV2KXhzHPsTAsBQdDGA&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
Time based SQL Injection using waybackurls
waybackurls https://t.co/3VO737zctv | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt
continuing oneliner in another Thread๐
#bugbountytipsโฆ
waybackurls https://t.co/3VO737zctv | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt
continuing oneliner in another Thread๐
#bugbountytipsโฆ
๐1
Forwarded from Team-Network-Nine ๐ฎ๐ณ
We have successfully taken control of an Indonesian satellite, gaining full authority over its communication and broadcasting services. Additionally, we now possess the capability to alter the satellite's coordinates.
Furthermore, we have assumed control over the reactors and heat syncs of various Indonesian chemical companies.
#the_nh_india
#kingsman
#indian_rcf
#Team404Error
#darkpredatorz #TeamNwh
#Network_Nine #TEAM_ICP
#UnknownCyberCult #GarunaOps
#Indian_Cyber_Punk
#UCC_TEAM #GlorySec
#DarkCyberWarrior #DemonSec
#Indian_Cyber_Union
#Black_Dragon_Sec #RANSOMCYBERARMY
#team_4bit
Furthermore, we have assumed control over the reactors and heat syncs of various Indonesian chemical companies.
#the_nh_india
#kingsman
#indian_rcf
#Team404Error
#darkpredatorz #TeamNwh
#Network_Nine #TEAM_ICP
#UnknownCyberCult #GarunaOps
#Indian_Cyber_Punk
#UCC_TEAM #GlorySec
#DarkCyberWarrior #DemonSec
#Indian_Cyber_Union
#Black_Dragon_Sec #RANSOMCYBERARMY
#team_4bit
๐ซก7๐2
โค1
Media is too big
VIEW IN TELEGRAM
Port Forwarding With a Lifetime Static Address Without Router Complete Tutorial Video
Old But Gold๐ฅ
๐4โคโ๐ฅ1
https://system32.ink/cisco-asa-and-ftd-cve-2024-20353-exploit/
Cisco ASA and FTD CVE-2024-20353 Exploit
A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1
https://system32.ink/predator-crypter-source-code/
Main Features
'''.NET โ Coded in C#, required framework 4.0 dependency.
Injection โ Hide payload behind a legit process
Startup โ comes back at restart
Assembly โ assembly cloner
icon โ icon changer'''
Predator Crypter Source Code
Main Features
'''.NET โ Coded in C#, required framework 4.0 dependency.
Injection โ Hide payload behind a legit process
Startup โ comes back at restart
Assembly โ assembly cloner
icon โ icon changer'''
๐2
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
https://system32.in/product/full-stack-web-development-by-using-python-and-django-durgasoft/
Full Stack Web Development By using Python And Django [DurgaSoft]
Hello Everyone As Today Is The Third Phase Of The Voting Of Loksabha Election Those Who Are Under The Phase (III) Election, Do Cast Your Vote As Your Responsibility .
๐3
https://system32.ink/wordpress-core-stored-xss-cve-2024-4439-exploit/
A significant security vulnerability has been identified in WordPress Core versions up to 6.5.1, tracked as CVE-2024-4439. This vulnerability is a stored Cross-Site Scripting (XSS) flaw, allowing attackers to inject harmful web scripts through the Avatar block. The flaw arises due to insufficient output escaping of user display names, enabling both authenticated and unauthenticated attackers to execute arbitrary PHP commands.
WordPress Core Stored XSS CVE-2024-4439 Exploit
A significant security vulnerability has been identified in WordPress Core versions up to 6.5.1, tracked as CVE-2024-4439. This vulnerability is a stored Cross-Site Scripting (XSS) flaw, allowing attackers to inject harmful web scripts through the Avatar block. The flaw arises due to insufficient output escaping of user display names, enabling both authenticated and unauthenticated attackers to execute arbitrary PHP commands.
https://system32.ink/cve-2024-33788-cve-2024-33789-command-injection-exploit/
Linksys E5600 Router CVE-2024-33788,CVE-2024-33789 Command Injection Exploit
โค2
๐ Attention, everyone! ๐
We have an important task at hand that can significantly enhance our nation's security. If you come across anyone selling Indian data (and only Indian data), we urge you to notify us immediately via DM at @Mynk0x00. Your cooperation can play a pivotal role in apprehending these individuals.
Your contribution could be the key to safeguarding our country's sensitive information. If you don't have such information, please help spread this message across your groups and channels.
Kindly note that we are specifically interested in reports related to the selling of data. Reports concerning fraud or spamming will not be entertained.
Together, let's ensure the safety and security of our nation's data. Thank you for your assistance! ๐ฎ๐ณ
We have an important task at hand that can significantly enhance our nation's security. If you come across anyone selling Indian data (and only Indian data), we urge you to notify us immediately via DM at @Mynk0x00. Your cooperation can play a pivotal role in apprehending these individuals.
Your contribution could be the key to safeguarding our country's sensitive information. If you don't have such information, please help spread this message across your groups and channels.
Kindly note that we are specifically interested in reports related to the selling of data. Reports concerning fraud or spamming will not be entertained.
Together, let's ensure the safety and security of our nation's data. Thank you for your assistance! ๐ฎ๐ณ
๐10๐พ1๐พ1
https://system32.in/product/adobe-dreamweaver-2021-v21-4-0-15620/
Adobe Dreamweaver 2021 (v21.4.0.15620)