https://system32.ink/big-ip-next-central-manager-api-sqli-exploit/
BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION Exploit
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
The Wednesday Updates #6(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-62024?r=2j8zpd
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-62024?r=2j8zpd
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://system32.in/topic/leaked-ransom-ware-collection-from-dark-web/
LEAKED RANSOM-WARE COLLECTION FROM DARK-WEB
โคโ๐ฅ2โค2
Forwarded from Cybertix
๐ฆ๐ฆ๐ฅ๐ ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
YouTube
SSRF on project import on a Note | Got Bounty of $10,000 ๐ฑ #cybersecurity #india #technology #hacker
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/826361
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/826361
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐ฅ1
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1๐ฅ1๐1
https://system32.in/topic/web-application-pentesteting-on-mobile/
WEB APPLICATION PENTESTETING ON MOBILE
๐3
Where Are you from?
Final Results
80%
Bharat
5%
USA
1%
Bangladesh
2%
U.K.
3%
Russia
3%
Africa
3%
Europe++
3%
Pakistan ๐
๐1
https://system32.in/product/hacker-arise-otws-getting-started-bug-bounty-hunting/
Hacker Arise OTW's - Getting Started Bug Bounty Hunting
1. Analyze the scope
2. Look for valid targets
3. High level testing of discovered target
4. Review all the applications
5. Fuzzing
6. Exploit the vulnerabilities
โก1
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
DM @CYBERDIN IF YOU NEED
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ2
https://system32.ink/cve-2024-32113-apache-ofbiz-poc/
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.
CVE-2024-32113 Apache-OFBiz PoC
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.
๐2
Forwarded from Lucifer
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4๐ฅ2๐1
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
The Wednesday Updates #7(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-72024
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-72024
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
โค1
https://system32.in/product/the-art-of-web-reconnaissance-learn-how-to-recon-like-a-pro/
The Art Of Web Reconnaissance: Learn How To Recon Like a Pro
โค1๐1
โค2
https://system32.ink/qnap-devices-rce-cve-2024-27130-exploit/
QNAP Devices RCE CVE-2024-27130 Exploit
โค1
https://system32.in/product/hands-on-bro-scripting-applied-network-defense/
Hands On Bro Scripting [Applied Network Defense]
๐1
โ ๏ธ VIEWERS DISCRETION ADVISED โ ๏ธ
Pakistani students indulged in violence against Local students in Kyrgyzstan.
Allegedly, 13 pakistani students reportedly died.
Pakistani students indulged in violence against Local students in Kyrgyzstan.
Allegedly, 13 pakistani students reportedly died.
Good Treatment for porkistanis
๐ซก7โคโ๐ฅ2