https://system32.ink/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-cve-2024-0044-exploit/
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
Join our vibrant community of tech enthusiasts, where we discuss the latest in technology, share insights, and help each other grow. Whether you're into software development, hardware innovations, AI, cybersecurity, or just love tech, this is the place for you. Connect, learn, and collaborate with like-minded individuals. Let's innovate together!
https://t.me/sikesharkchat
https://t.me/sikesharkchat
โค2๐1
https://system32.ink/ivanti-epm-sql-injection-remote-code-execution-cve-2024-29824-exploit/
Ivanti EPM Sqli RCE Cve-2024-29824 Exploit
https://system32.ink/zyxel-nas326-firmware-command-injection-cve-2024-29973-exploit/
The command injection vulnerability in the โsetCookieโ parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
The command injection vulnerability in the โsetCookieโ parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Zyxel NAS326 Firmware Command Injection CVE-2024-29973 Exploit
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
Wednesday Updates #2 is now out and in this release we have covered some amazing topics.
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
https://osintambition.substack.com/p/wednesday-updates-2
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
https://osintambition.substack.com/p/wednesday-updates-2
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
Osintupdates
Wednesday Updates #2
Highlights: 6 blogs, 4 external reading, 7 videos, 3 podcast episodes, 4 event updates, 4 awesome tools, a meme and many more.
๐ฅ2
This media is not supported in your browser
VIEW IN TELEGRAM
เค
เคเคคเคฐเคฐเคพเคทเฅเคเฅเคฐเฅเคฏ เคฏเฅเค เคฆเคฟเคตเคธ เคเฅ เคถเฅเคญเคเคพเคฎเคจเคพเคเค!
Indian Army personnel perform Yoga in icy heights on the northern frontier on #InternationalYogaDay2024
Indian Army personnel perform Yoga in icy heights on the northern frontier on #InternationalYogaDay2024
๐ซก8๐1๐ฟ1
https://system32.ink/horuseyes-rat/
Horus Eyes RAT (HE-RAT) is a tool used by cybercriminals to bypass security mechanisms. It has been used in high-profile activities, such as the Warsaw banking trojan, which tricks victims into infecting their systems using a fake bank overlay window. HE-RAT has the following features: Persistence, Gathering details, Capturing data, Matching data, and Executing remote commands. {2021 Report}
Horus Eyes RAT (HE-RAT) is a tool used by cybercriminals to bypass security mechanisms. It has been used in high-profile activities, such as the Warsaw banking trojan, which tricks victims into infecting their systems using a fake bank overlay window. HE-RAT has the following features: Persistence, Gathering details, Capturing data, Matching data, and Executing remote commands. {2021 Report}
HorusEyes Rat
๐ฅ1
https://system32.in/product/aerospace-cybersecurity-satellite-hacking-w53-pentestmag/
Aerospace Cybersecurity: Satellite Hacking (W53) [PentestMag]
๐3๐ฅ1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
YouTube
How to read paid medium articles for free? Error fixed (100% working)
Hello guys, in this video I'm going to show you how to fix the internal service bookmark error for reading medium paid articles, watch the video till the end you'll find solution of it.
Bookmark Github repository Link : https://github.com/Freedium-cfd
โฆ
Bookmark Github repository Link : https://github.com/Freedium-cfd
โฆ
๐2๐ฅ1
https://system32.ink/soul-stealer-most-powerful-stealer/
The MOST powerful stealer (Cookie stealer, Discord token stealer, Roblox stealer, Password stealer, Credit card stealer, Autofill stealer, Steam stealer) Much MORE
The MOST powerful stealer (Cookie stealer, Discord token stealer, Roblox stealer, Password stealer, Credit card stealer, Autofill stealer, Steam stealer) Much MORE
Soul Stealer - Most Powerful Stealer
https://system32.ink/xwiki-platform-rce-cve-2024-31982-exploit/
XWiki Platform RCE CVE-2024-31982 Exploit
๐ฅ1
https://system32.in/product/offensive-penetration-testing-cybrary/
Offensive Penetration Testing [Cybrary]
๐ฅ2
https://system32.ink/opencart-sql-injection-cve-2024-21514-exploit/
SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart
OpenCart Sql Injection CVE-2024-21514 Exploit
SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart
๐3
https://system32.ink/solarwinds-platform-cve-2024-28999-exploit/
SolarWinds Platform CVE-2024-28999 Exploit
https://system32.ink/php-injection-m4-pdf-extensions-cve-2023-50029-exploit/
CVE-2023-50029 is a PHP injection vulnerability in the M4 PDF Extensions module. This vulnerability allows attackers to inject and execute arbitrary PHP code on the server, enabling them to gain full control over the targeted system. The issue lies in the improper validation of inputs, allowing malicious code to be passed through user parameters.
CVE-2023-50029 is a PHP injection vulnerability in the M4 PDF Extensions module. This vulnerability allows attackers to inject and execute arbitrary PHP code on the server, enabling them to gain full control over the targeted system. The issue lies in the improper validation of inputs, allowing malicious code to be passed through user parameters.
PHP Injection M4-PDF Extensions CVE-2023-50029 Exploit
https://system32.in/product/sensepost-training-pragmactic-api-exploration-orange-cyberdefence/
SensePost training: Pragmactic API Exploration [Orange Cyberdefence]
๐4
https://crackcodes.in/weeablind-program-to-dub-non-english-media-with-modern-ai-speech-synthesis-diarization-and-voice-cloning/
Weeablind - program to dub non-english media with modern AI speech synthesis, diarization, and voice cloning
๐ซก3
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐Web Attack Cheat Sheet๐จ๐ป
Table of Contents
Discovering
Targets
IP Enumeration
Subdomain Enumeration
Wayback Machine
Cache
Crawling
Wordlist
Directory Brute Forcing
Parameter Brute Forcing
DNS and HTTP detection
Acquisitions/Names/Addresses/Contacts/Emails/etc.
HTML/JavaScript Comments
Google Dorks
Content Security Policy (CSP)
Tiny URLs Services
GraphQL
General
Enumerating
Fingerprint
Buckets
Cloud Enumeration
Containerization
Visual Identification
Scanning
Static Application Security Testing
Dependency Confusion
Send Emails
Search Vulnerabilities
Web Scanning
HTTP Request Smuggling
Subdomain Takeover
SQLi (SQL Injection)
XSS
Repositories Scanning
Secret Scanning
Google Dorks Scanning
CORS Misconfigurations
Monitoring
CVE
Attacking
Brute Force
Exfiltration
General
Manual
Payloads
Bypass
Deserialization
SSRF (Server-Side Request Forgery)
OAuth
DNS Rebinding
SMTP Header Injection
Web Shell
Reverse Shell
SQLi (SQL Injection)
XSS
XPath Injection
LFI (Local File Inclusion)
SSTI (Server Side Template Injection)
Information Disclosure
WebDAV (Web Distributed Authoring and Versioning)
Generic Tools
AI
General
https://lnkd.in/gE9uXvKS
๐ฅ Join @cybertrickzone For More Amazing Updates ๐ฏโ๏ธ
Table of Contents
Discovering
Targets
IP Enumeration
Subdomain Enumeration
Wayback Machine
Cache
Crawling
Wordlist
Directory Brute Forcing
Parameter Brute Forcing
DNS and HTTP detection
Acquisitions/Names/Addresses/Contacts/Emails/etc.
HTML/JavaScript Comments
Google Dorks
Content Security Policy (CSP)
Tiny URLs Services
GraphQL
General
Enumerating
Fingerprint
Buckets
Cloud Enumeration
Containerization
Visual Identification
Scanning
Static Application Security Testing
Dependency Confusion
Send Emails
Search Vulnerabilities
Web Scanning
HTTP Request Smuggling
Subdomain Takeover
SQLi (SQL Injection)
XSS
Repositories Scanning
Secret Scanning
Google Dorks Scanning
CORS Misconfigurations
Monitoring
CVE
Attacking
Brute Force
Exfiltration
General
Manual
Payloads
Bypass
Deserialization
SSRF (Server-Side Request Forgery)
OAuth
DNS Rebinding
SMTP Header Injection
Web Shell
Reverse Shell
SQLi (SQL Injection)
XSS
XPath Injection
LFI (Local File Inclusion)
SSTI (Server Side Template Injection)
Information Disclosure
WebDAV (Web Distributed Authoring and Versioning)
Generic Tools
AI
General
https://lnkd.in/gE9uXvKS
๐ฅ Join @cybertrickzone For More Amazing Updates ๐ฏโ๏ธ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐2