Forwarded from OSINT AMBITION (Dheeraj Yadav)
Top 10 OSINT Courses for Beginners | The Top10 Series
https://osintambition.substack.com/p/free-osint-courses-for-beginners
Finally, Our top 10 OSINT series is back, so stay tuned for amazing OSINT resource to improve your learning.
#osint #resources #osintforgood #infosec #cybersec #socmint #freecourses
Join @osintambition for more.
https://osintambition.substack.com/p/free-osint-courses-for-beginners
Finally, Our top 10 OSINT series is back, so stay tuned for amazing OSINT resource to improve your learning.
#osint #resources #osintforgood #infosec #cybersec #socmint #freecourses
Join @osintambition for more.
Osintupdates
Free OSINT Courses for Beginners | Top 10 OSINT Series
This post consists of best OSINT courses for beginners which are absolutely free along with a brief description and review of each.
https://system32.ink/solarwinds-serv-u-directory-transversal-cve-2024-28995-exploit/
On June 5, 2024, SolarWinds published an advisory for CVE-2024-28995, a high-severity directory traversal vulnerability affecting their file transfer solution Serv-U. The vulnerability was discovered by researcher Hussein Daher of Web Immunify.
SolarWinds Serv-U Directory Transversal CVE-2024-28995 Exploit
On June 5, 2024, SolarWinds published an advisory for CVE-2024-28995, a high-severity directory traversal vulnerability affecting their file transfer solution Serv-U. The vulnerability was discovered by researcher Hussein Daher of Web Immunify.
https://system32.ink/windows-wi-fi-driver-rce-cve-2024-30078-exploit/
This project contains a NASL script that detects the CVE-2024-30078 vulnerability and executes a specified command if the target is vulnerable. The script is designed to work with the Nessus tool, automatically handling target IP addresses and ports provided by Nessus during a scan.
Windows Wi-Fi Driver RCE CVE-2024-30078 Exploit
This project contains a NASL script that detects the CVE-2024-30078 vulnerability and executes a specified command if the target is vulnerable. The script is designed to work with the Nessus tool, automatically handling target IP addresses and ports provided by Nessus during a scan.
https://system32.in/product/network-pentesting-pentester-academy/
Network Pentesting | Pentester Academy
https://crackcodes.in/what-is-keyfinder/
Keyfinder๐ is a tool that let you find keys while surfing the web!
https://crackcodes.in/cassowary-run-windows-applications-on-linux/
Run Windows Applications on Linux as if they are native, Use linux applications to launch files files located in windows vm without needing to install applications on vm. With easy to use configuration GUI
Cassowary - Run Windows Applications on Linux
Run Windows Applications on Linux as if they are native, Use linux applications to launch files files located in windows vm without needing to install applications on vm. With easy to use configuration GUI
The Murk Stealer
Powerful multi-platform stealer with a huge pack of grabbed data. Wallets stealer, browsers stealer, sessions stealer, etc. All logs will be sent using discord webhooks or telegram bot.
https://system32.ink/the-murk-stealer/
โคโ๐ฅ1
https://system32.in/product/backend-domination-create-scalable-secured-backend-sheryians-coding-school/
Backend Domination - Create Scalable & Secured Backend.
Powerful multi-platform stealer with a huge pack of grabbed data. Wallets stealer, browsers stealer, sessions stealer, etc. All logs will be sent using discord webhooks or telegram bot.
โค1
https://crackcodes.in/xnl-reveal-chrome-firefox-browser-extension-to-show-alerts-for-reflected-query-params/
Xnl Reveal โ Chrome/Firefox browser extension to show alerts for reflected query params
https://system32.ink/mspy-spyware-software-company-data-leak-180gb/
mSpy - Spyware Software Company Data Leak (180GB)
This media is not supported in your browser
VIEW IN TELEGRAM
Instagram Otp Bypass CVE-2024-67812 Demo
๐คฃ7๐1
Forwarded from ๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐ฎ๐ณ
โ ๏ธI Request All to RETWEET THIS POST : https://x.com/HacktivistVan/status/1803068387196633156 !! tag (
We Are Still Getting Issue in Ground FIR REPORT ! ๐๐๐ป
@KolkataPolice @KPCentralDiv
@WBPolice @DCCyberKP @DCPEastKP @KPSoutheastDiv @KPTrafficDept @Nikhilsingh21_ @HacktivistVan @DCCyberKP )We Are Still Getting Issue in Ground FIR REPORT ! ๐๐๐ป
๐3๐ฟ1
https://system32.ink/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-cve-2024-0044-exploit/
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
Join our vibrant community of tech enthusiasts, where we discuss the latest in technology, share insights, and help each other grow. Whether you're into software development, hardware innovations, AI, cybersecurity, or just love tech, this is the place for you. Connect, learn, and collaborate with like-minded individuals. Let's innovate together!
https://t.me/sikesharkchat
https://t.me/sikesharkchat
โค2๐1
https://system32.ink/ivanti-epm-sql-injection-remote-code-execution-cve-2024-29824-exploit/
Ivanti EPM Sqli RCE Cve-2024-29824 Exploit
https://system32.ink/zyxel-nas326-firmware-command-injection-cve-2024-29973-exploit/
The command injection vulnerability in the โsetCookieโ parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
The command injection vulnerability in the โsetCookieโ parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Zyxel NAS326 Firmware Command Injection CVE-2024-29973 Exploit
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
Wednesday Updates #2 is now out and in this release we have covered some amazing topics.
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
https://osintambition.substack.com/p/wednesday-updates-2
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
https://osintambition.substack.com/p/wednesday-updates-2
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
Osintupdates
Wednesday Updates #2
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
๐ฅ2
This media is not supported in your browser
VIEW IN TELEGRAM
เค
เคเคคเคฐเคฐเคพเคทเฅเคเฅเคฐเฅเคฏ เคฏเฅเค เคฆเคฟเคตเคธ เคเฅ เคถเฅเคญเคเคพเคฎเคจเคพเคเค!
Indian Army personnel perform Yoga in icy heights on the northern frontier on #InternationalYogaDay2024
Indian Army personnel perform Yoga in icy heights on the northern frontier on #InternationalYogaDay2024
๐ซก8๐1๐ฟ1
https://system32.ink/horuseyes-rat/
Horus Eyes RAT (HE-RAT) is a tool used by cybercriminals to bypass security mechanisms. It has been used in high-profile activities, such as the Warsaw banking trojan, which tricks victims into infecting their systems using a fake bank overlay window. HE-RAT has the following features: Persistence, Gathering details, Capturing data, Matching data, and Executing remote commands. {2021 Report}
Horus Eyes RAT (HE-RAT) is a tool used by cybercriminals to bypass security mechanisms. It has been used in high-profile activities, such as the Warsaw banking trojan, which tricks victims into infecting their systems using a fake bank overlay window. HE-RAT has the following features: Persistence, Gathering details, Capturing data, Matching data, and Executing remote commands. {2021 Report}
HorusEyes Rat
๐ฅ1
https://system32.in/product/aerospace-cybersecurity-satellite-hacking-w53-pentestmag/
Aerospace Cybersecurity: Satellite Hacking (W53) [PentestMag]
๐3๐ฅ1