Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1
https://system32.ink/predator-crypter-source-code/
Main Features
'''.NET โ Coded in C#, required framework 4.0 dependency.
Injection โ Hide payload behind a legit process
Startup โ comes back at restart
Assembly โ assembly cloner
icon โ icon changer'''
Predator Crypter Source Code
Main Features
'''.NET โ Coded in C#, required framework 4.0 dependency.
Injection โ Hide payload behind a legit process
Startup โ comes back at restart
Assembly โ assembly cloner
icon โ icon changer'''
๐2
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
https://system32.in/product/full-stack-web-development-by-using-python-and-django-durgasoft/
Full Stack Web Development By using Python And Django [DurgaSoft]
Hello Everyone As Today Is The Third Phase Of The Voting Of Loksabha Election Those Who Are Under The Phase (III) Election, Do Cast Your Vote As Your Responsibility .
๐3
https://system32.ink/wordpress-core-stored-xss-cve-2024-4439-exploit/
A significant security vulnerability has been identified in WordPress Core versions up to 6.5.1, tracked as CVE-2024-4439. This vulnerability is a stored Cross-Site Scripting (XSS) flaw, allowing attackers to inject harmful web scripts through the Avatar block. The flaw arises due to insufficient output escaping of user display names, enabling both authenticated and unauthenticated attackers to execute arbitrary PHP commands.
WordPress Core Stored XSS CVE-2024-4439 Exploit
A significant security vulnerability has been identified in WordPress Core versions up to 6.5.1, tracked as CVE-2024-4439. This vulnerability is a stored Cross-Site Scripting (XSS) flaw, allowing attackers to inject harmful web scripts through the Avatar block. The flaw arises due to insufficient output escaping of user display names, enabling both authenticated and unauthenticated attackers to execute arbitrary PHP commands.
https://system32.ink/cve-2024-33788-cve-2024-33789-command-injection-exploit/
Linksys E5600 Router CVE-2024-33788,CVE-2024-33789 Command Injection Exploit
โค2
๐ Attention, everyone! ๐
We have an important task at hand that can significantly enhance our nation's security. If you come across anyone selling Indian data (and only Indian data), we urge you to notify us immediately via DM at @Mynk0x00. Your cooperation can play a pivotal role in apprehending these individuals.
Your contribution could be the key to safeguarding our country's sensitive information. If you don't have such information, please help spread this message across your groups and channels.
Kindly note that we are specifically interested in reports related to the selling of data. Reports concerning fraud or spamming will not be entertained.
Together, let's ensure the safety and security of our nation's data. Thank you for your assistance! ๐ฎ๐ณ
We have an important task at hand that can significantly enhance our nation's security. If you come across anyone selling Indian data (and only Indian data), we urge you to notify us immediately via DM at @Mynk0x00. Your cooperation can play a pivotal role in apprehending these individuals.
Your contribution could be the key to safeguarding our country's sensitive information. If you don't have such information, please help spread this message across your groups and channels.
Kindly note that we are specifically interested in reports related to the selling of data. Reports concerning fraud or spamming will not be entertained.
Together, let's ensure the safety and security of our nation's data. Thank you for your assistance! ๐ฎ๐ณ
๐10๐พ1๐พ1
https://system32.in/product/adobe-dreamweaver-2021-v21-4-0-15620/
Adobe Dreamweaver 2021 (v21.4.0.15620)
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
https://www.linkedin.com/posts/swayamsopnic_osint-cti-cybersecurity-activity-7194210129200742400-HVkU?utm_source=combined_share_message&utm_medium=member_desktop
Here is the list of Some prominent Free certifications about OSINT and Cyber Threat Intelligence. So please Like, Share and utilize the resources.
Here is the list of Some prominent Free certifications about OSINT and Cyber Threat Intelligence. So please Like, Share and utilize the resources.
LinkedIn
Free Courses on OSINT and Threat Intelligence | Swayam Sopnic posted on the topic | LinkedIn
Here is the list of top Free Courses on OSINT and Threat Intelligence which will help you to upskill your Intelligence and Research skills:โ
1. Introduction to OSINT(Security Blue Team ) - https://lnkd.in/dmXeRk7w
2.Introduction to Dark Web Operations(Securityโฆ
1. Introduction to OSINT(Security Blue Team ) - https://lnkd.in/dmXeRk7w
2.Introduction to Dark Web Operations(Securityโฆ
๐ซก3
CrackCodes ๐ฎ๐ณ pinned ยซ๐ Attention, everyone! ๐ We have an important task at hand that can significantly enhance our nation's security. If you come across anyone selling Indian data (and only Indian data), we urge you to notify us immediately via DM at @Mynk0x00. Your cooperationโฆยป
https://system32.ink/big-ip-next-central-manager-api-sqli-exploit/
BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION Exploit
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
The Wednesday Updates #6(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-62024?r=2j8zpd
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-62024?r=2j8zpd
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://system32.in/topic/leaked-ransom-ware-collection-from-dark-web/
LEAKED RANSOM-WARE COLLECTION FROM DARK-WEB
โคโ๐ฅ2โค2
Forwarded from Cybertix
๐ฆ๐ฆ๐ฅ๐ ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
YouTube
SSRF on project import on a Note | Got Bounty of $10,000 ๐ฑ #cybersecurity #india #technology #hacker
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/826361
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/826361
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐ฅ1
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1๐ฅ1๐1
https://system32.in/topic/web-application-pentesteting-on-mobile/
WEB APPLICATION PENTESTETING ON MOBILE
๐3