https://system32.in/product/offensive-penetration-testing-cybrary/
Offensive Penetration Testing [Cybrary]
๐ฅ2
https://system32.ink/opencart-sql-injection-cve-2024-21514-exploit/
SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart
OpenCart Sql Injection CVE-2024-21514 Exploit
SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart
๐3
https://system32.ink/solarwinds-platform-cve-2024-28999-exploit/
SolarWinds Platform CVE-2024-28999 Exploit
https://system32.ink/php-injection-m4-pdf-extensions-cve-2023-50029-exploit/
CVE-2023-50029 is a PHP injection vulnerability in the M4 PDF Extensions module. This vulnerability allows attackers to inject and execute arbitrary PHP code on the server, enabling them to gain full control over the targeted system. The issue lies in the improper validation of inputs, allowing malicious code to be passed through user parameters.
CVE-2023-50029 is a PHP injection vulnerability in the M4 PDF Extensions module. This vulnerability allows attackers to inject and execute arbitrary PHP code on the server, enabling them to gain full control over the targeted system. The issue lies in the improper validation of inputs, allowing malicious code to be passed through user parameters.
PHP Injection M4-PDF Extensions CVE-2023-50029 Exploit
https://system32.in/product/sensepost-training-pragmactic-api-exploration-orange-cyberdefence/
SensePost training: Pragmactic API Exploration [Orange Cyberdefence]
๐4
https://crackcodes.in/weeablind-program-to-dub-non-english-media-with-modern-ai-speech-synthesis-diarization-and-voice-cloning/
Weeablind - program to dub non-english media with modern AI speech synthesis, diarization, and voice cloning
๐ซก3
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐Web Attack Cheat Sheet๐จ๐ป
Table of Contents
Discovering
Targets
IP Enumeration
Subdomain Enumeration
Wayback Machine
Cache
Crawling
Wordlist
Directory Brute Forcing
Parameter Brute Forcing
DNS and HTTP detection
Acquisitions/Names/Addresses/Contacts/Emails/etc.
HTML/JavaScript Comments
Google Dorks
Content Security Policy (CSP)
Tiny URLs Services
GraphQL
General
Enumerating
Fingerprint
Buckets
Cloud Enumeration
Containerization
Visual Identification
Scanning
Static Application Security Testing
Dependency Confusion
Send Emails
Search Vulnerabilities
Web Scanning
HTTP Request Smuggling
Subdomain Takeover
SQLi (SQL Injection)
XSS
Repositories Scanning
Secret Scanning
Google Dorks Scanning
CORS Misconfigurations
Monitoring
CVE
Attacking
Brute Force
Exfiltration
General
Manual
Payloads
Bypass
Deserialization
SSRF (Server-Side Request Forgery)
OAuth
DNS Rebinding
SMTP Header Injection
Web Shell
Reverse Shell
SQLi (SQL Injection)
XSS
XPath Injection
LFI (Local File Inclusion)
SSTI (Server Side Template Injection)
Information Disclosure
WebDAV (Web Distributed Authoring and Versioning)
Generic Tools
AI
General
https://lnkd.in/gE9uXvKS
๐ฅ Join @cybertrickzone For More Amazing Updates ๐ฏโ๏ธ
Table of Contents
Discovering
Targets
IP Enumeration
Subdomain Enumeration
Wayback Machine
Cache
Crawling
Wordlist
Directory Brute Forcing
Parameter Brute Forcing
DNS and HTTP detection
Acquisitions/Names/Addresses/Contacts/Emails/etc.
HTML/JavaScript Comments
Google Dorks
Content Security Policy (CSP)
Tiny URLs Services
GraphQL
General
Enumerating
Fingerprint
Buckets
Cloud Enumeration
Containerization
Visual Identification
Scanning
Static Application Security Testing
Dependency Confusion
Send Emails
Search Vulnerabilities
Web Scanning
HTTP Request Smuggling
Subdomain Takeover
SQLi (SQL Injection)
XSS
Repositories Scanning
Secret Scanning
Google Dorks Scanning
CORS Misconfigurations
Monitoring
CVE
Attacking
Brute Force
Exfiltration
General
Manual
Payloads
Bypass
Deserialization
SSRF (Server-Side Request Forgery)
OAuth
DNS Rebinding
SMTP Header Injection
Web Shell
Reverse Shell
SQLi (SQL Injection)
XSS
XPath Injection
LFI (Local File Inclusion)
SSTI (Server Side Template Injection)
Information Disclosure
WebDAV (Web Distributed Authoring and Versioning)
Generic Tools
AI
General
https://lnkd.in/gE9uXvKS
๐ฅ Join @cybertrickzone For More Amazing Updates ๐ฏโ๏ธ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐2
Tryhackme vouchers available at best rates
๐ช Monthly available ๐ช
inbox: @protocolnick to purchase
๐ช Monthly available ๐ช
inbox: @protocolnick to purchase
https://system32.ink/the-ejs-aka-embedded-javascript-templates-package-rce-cve-2024-33883-exploit/
Insufficient Prototype Pollution Validation Leading to RCE Exploitation
With prototype pollution, set opts.client to truthy value (condition)
Then, when render() runs, ejs will run opts.escapeFunction value as JS code.
The ejs (aka Embedded JavaScript templates) Package RCE CVE-2024-33883 Exploit
Insufficient Prototype Pollution Validation Leading to RCE Exploitation
With prototype pollution, set opts.client to truthy value (condition)
Then, when render() runs, ejs will run opts.escapeFunction value as JS code.
Forwarded from Team-Network-Nine ๐ฎ๐ณ
๐ฅ1
Forwarded from Team-Network-Nine ๐ฎ๐ณ
*Happy Birthday Commander Solveig* ๐
โข๏ธ China Scada ICS Pawned for My Big Brother Solveig Bhaiya
โข๏ธ Threat Actor : Rajput Haxor(Father of Drunken Bear)
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#สแดsสแดสษชสแด แดสสแดส าแดสแดแด
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
Birthday Special
Sorry For the delay in Gift
Tofah Kabul kariye hamara
โข๏ธ China Scada ICS Pawned for My Big Brother Solveig Bhaiya
โข๏ธ Threat Actor : Rajput Haxor(Father of Drunken Bear)
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#สแดsสแดสษชสแด แดสสแดส าแดสแดแด
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
Birthday Special
Sorry For the delay in Gift
Tofah Kabul kariye hamara
โค5๐ฅ5๐2๐พ1
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
Wednesday Updates #3 is now out.
We have presented 3 blogs, 5 external reading, 4 videos, 2 podcast episodes, 2 event updates, 8 awesome tools, a meme and many more in this issue of the newsletter.
https://osintambition.substack.com/p/wednesday-updates-3
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
We have presented 3 blogs, 5 external reading, 4 videos, 2 podcast episodes, 2 event updates, 8 awesome tools, a meme and many more in this issue of the newsletter.
https://osintambition.substack.com/p/wednesday-updates-3
Subscribe to the newsletter for receiving all OSINT updates directly in your inbox.
Join @osintambition for more.
Osintupdates
Wednesday Updates #3
Highlights: 3 blogs, 5 external reading, 4 videos, 2 podcast episodes, 2 event updates, 8 awesome tools, a meme and many more.
https://system32.in/topic/advanced-idors-9-techniques-by-intigriti/
Advanced IDORs - 9 Techniques by Intigriti
๐2
https://system32.ink/magento-adobe-commerce-xml-entity-injection-cve-2024-34102-exploit/
POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
Magento / Adobe Commerce XML Entity Injection CVE-2024-34102 Exploit
Forwarded from ฤฑllฤฑll โข TeAm UcC OpErAtIoNs โข ฤฑllฤฑll
Bangladesh Navy Military Mail Inbox Dump.tar
579.7 MB
[~] Leaked By Team UCC India !!
~> We entered the Bangladesh Navy's military email system and are now exposing the material we discovered. This dump contains critical information, confidential documents, and even high-ranking military personnel's phone numbers, making it a veritable goldmine of intelligence.
#Team_UCC #Network_Nine #All_Indian_Hacker
~> We entered the Bangladesh Navy's military email system and are now exposing the material we discovered. This dump contains critical information, confidential documents, and even high-ranking military personnel's phone numbers, making it a veritable goldmine of intelligence.
#Team_UCC #Network_Nine #All_Indian_Hacker
๐ฅ8
https://system32.ink/mozilla-firefox-spidermonkey-jit-rce-cve-2024-29943-exploit/
Mozilla FireFox SpiderMonkey JIT RCE CVE-2024-29943 Exploit
๐1