https://system32.in/product/the-art-of-web-reconnaissance-learn-how-to-recon-like-a-pro/
The Art Of Web Reconnaissance: Learn How To Recon Like a Pro
โค1๐1
โค2
https://system32.ink/qnap-devices-rce-cve-2024-27130-exploit/
QNAP Devices RCE CVE-2024-27130 Exploit
โค1
https://system32.in/product/hands-on-bro-scripting-applied-network-defense/
Hands On Bro Scripting [Applied Network Defense]
๐1
โ ๏ธ VIEWERS DISCRETION ADVISED โ ๏ธ
Pakistani students indulged in violence against Local students in Kyrgyzstan.
Allegedly, 13 pakistani students reportedly died.
Pakistani students indulged in violence against Local students in Kyrgyzstan.
Allegedly, 13 pakistani students reportedly died.
Good Treatment for porkistanis
๐ซก7โคโ๐ฅ2
Forwarded from โ ๏ธLรจx Lรฉgรฎรธnโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐1๐ฅ1
https://system32.ink/zabbix-server-cve-2024-22120-sqli-exploit/
Zabbix Server CVE-2024-22120 SQLi Exploit
โคโ๐ฅ3
โค6๐1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฏ4๐ฅ1๐พ1
Forwarded from Cybertix
๐ฆ๐ฆ๐ง๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐
๐ฝ๐น๐ฎ๐ถ๐ป๐ฒ๐ฑ ๐๐ฅ
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ๐๐ป
๐ญ.What are Template Engine?
๐ฎ. What is SSTI Vulnerability?
๐ฏ. Practically Exploiting on live websites ๐ซจ
๐๐๐ฉ๐๐ ๐๐ค๐ฌ ๐๐ป
https://youtu.be/ml5LXJFxaQY?si=tLbVA1qlscbHSkL5
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ ๐๐ป, ๐๐๐๐ง๐ ๐ค, & ๐๐ช๐๐จ๐๐ง๐๐๐โถ๏ธ
๐๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก, ๐๐ค๐ง ๐๐๐๐ ๐๐๐ช๐๐๐ฉ๐๐ค๐ฃ๐๐ป
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ๐๐ป
๐ญ.What are Template Engine?
๐ฎ. What is SSTI Vulnerability?
๐ฏ. Practically Exploiting on live websites ๐ซจ
๐๐๐ฉ๐๐ ๐๐ค๐ฌ ๐๐ป
https://youtu.be/ml5LXJFxaQY?si=tLbVA1qlscbHSkL5
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ ๐๐ป, ๐๐๐๐ง๐ ๐ค, & ๐๐ช๐๐จ๐๐ง๐๐๐โถ๏ธ
๐๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก, ๐๐ค๐ง ๐๐๐๐ ๐๐๐ช๐๐๐ฉ๐๐ค๐ฃ๐๐ป
YouTube
SSTI Explained ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ฟ2
https://system32.in/buy-cyber-security-pentesting-exam-vouchers-in-half-rates/
Buy Vouchers In Half Rates fROM Hacklock
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
YouTube OSINT cheat sheet
- search tools
- browser extensions
- view metadata
- channel stats
- comments search
and more.
Text version and other cheats sheets:
https://github.com/cipher387/cheatsheets
- search tools
- browser extensions
- view metadata
- channel stats
- comments search
and more.
Text version and other cheats sheets:
https://github.com/cipher387/cheatsheets
https://system32.ink/cve-2024-4367-cve-2024-34342-arbitrary-javascript-execution-in-pdf.js/
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
CVE-2024-4367 & CVE-2024-34342: Arbitrary JavaScript execution in PDF.js
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.