https://system32.ink/magento-adobe-commerce-xml-entity-injection-cve-2024-34102-exploit/
POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
Magento / Adobe Commerce XML Entity Injection CVE-2024-34102 Exploit
Forwarded from ฤฑllฤฑll โข TeAm UcC OpErAtIoNs โข ฤฑllฤฑll
Bangladesh Navy Military Mail Inbox Dump.tar
579.7 MB
[~] Leaked By Team UCC India !!
~> We entered the Bangladesh Navy's military email system and are now exposing the material we discovered. This dump contains critical information, confidential documents, and even high-ranking military personnel's phone numbers, making it a veritable goldmine of intelligence.
#Team_UCC #Network_Nine #All_Indian_Hacker
~> We entered the Bangladesh Navy's military email system and are now exposing the material we discovered. This dump contains critical information, confidential documents, and even high-ranking military personnel's phone numbers, making it a veritable goldmine of intelligence.
#Team_UCC #Network_Nine #All_Indian_Hacker
๐ฅ8
https://system32.ink/mozilla-firefox-spidermonkey-jit-rce-cve-2024-29943-exploit/
Mozilla FireFox SpiderMonkey JIT RCE CVE-2024-29943 Exploit
๐1
๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐
INDIA WINS THE T20 WORLD CUP !!!
๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐
INDIA WINS THE T20 WORLD CUP !!!
๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐ ๐
๐ฅฐ7๐2๐ฟ1
This media is not supported in your browser
VIEW IN TELEGRAM
Celebrations going on in style through out the nation...
๐9๐2๐1
https://system32.ink/wannacry-ransomware-builder/
GhostCrypt is a type of malware that encrypts your files and demands a ransom to decrypt them. This ransomware may add an extension to your encrypted files, making them unable to be opened without the decryption key.
GhostCrypt is a type of malware that encrypts your files and demands a ransom to decrypt them. This ransomware may add an extension to your encrypted files, making them unable to be opened without the decryption key.
WannaCRY GhostCrypt Ransomware Builder
โก3
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
[~] Greetings Citizens [~]
๐ฎ Our Team Was Able To Breach Database Of One Of The Most Popular Taxi Services Of Bangladesh "PRABASHIIR TAXI"
๐ท๏ธ Threat actor: Doremon
We Compressed The File's Size
Counter Cyberattack
GREETZ๐ฎ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
We Compressed The File's Size
Counter Cyberattack
GREETZ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ๐ฅ3๐3๐ฟ1
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
probashirtaxi.com.zip
856.2 KB
โค4
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
Our Team Was Able To Breach More Than 5 Sites Databases Of Bangladeshi Websites Including Goverment,food, Municipality And More...
Web List
1 Office of the Chief Account's Finance Officer
2 Bangladesh Geographical Information System Platform
3 Bangladesh Computers
4 BD Foods Limited Company
5 Baizi STEEL COMPANY
Just A Simple Warning For Bd Skids
Do Not Attack On Indian Cyberspace
Counter Cyberattack
GREETZ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ๐ฅ4๐3๐1๐ฟ1
https://system32.in/product/oscp-ethical-hacking-with-bug-bountyclouddefensive-mobile/
OSCP Ethical Hacking With Bug Bounty,Cloud,Defensive & Mobile
๐ฅ2
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Famous Platforms to practice Pentesting
Roadmap for Hackers:
https://hackproofhacks.com/how-to-become-an-ethical-hacker-in-2024/
tryhackme
https://tryhackme.com
bWAPP
http://itsecgames.com
flAWS Cloud
http://flaws.cloud
Hack Yourself First
http://hackyourselffirst.troyhunt.com
OWASP Juice Shop
http://juice-shop.herokuapp.com
Google Gruyere
https://google-gruyere.appspot.com
Hack Me
https://hack.me
HackTheBox
https://hackthebox.eu
Root-Me
https://root-me.org
XSS Game
https://xss-game.appspot.com
Pentesterlab
https://pentesterlab.com
OverTheWire
https://overthewire.org/wargames/
Hacking Lab
https://hacking-lab.com/index.html
IO
http://io.netgarage.org
smashthestack
http://smashthestack.org
microcorruption
https://microcorruption.com/login
ExploitMe Mobile
http://securitycompass.github.io/AndroidLabs/index.html
Hax.Tor
http://hax.tor.hu/welcome/
Java Vulnerable Lab
https://github.com/CSPF-Founder/JavaVulnerableLab
Pwnos
http://pwnos.com
Ringzero
https://ringzer0team.com/challenges
Avatao
https://avatao.com
GameOver
https://sourceforge.net/projects/null-gameover/
HSCTF3
http://hsctf.com
Join us๐น๐น:-https://t.me/cybertrickzone ๐บ๐บ
Roadmap for Hackers:
https://hackproofhacks.com/how-to-become-an-ethical-hacker-in-2024/
tryhackme
https://tryhackme.com
bWAPP
http://itsecgames.com
flAWS Cloud
http://flaws.cloud
Hack Yourself First
http://hackyourselffirst.troyhunt.com
OWASP Juice Shop
http://juice-shop.herokuapp.com
Google Gruyere
https://google-gruyere.appspot.com
Hack Me
https://hack.me
HackTheBox
https://hackthebox.eu
Root-Me
https://root-me.org
XSS Game
https://xss-game.appspot.com
Pentesterlab
https://pentesterlab.com
OverTheWire
https://overthewire.org/wargames/
Hacking Lab
https://hacking-lab.com/index.html
IO
http://io.netgarage.org
smashthestack
http://smashthestack.org
microcorruption
https://microcorruption.com/login
ExploitMe Mobile
http://securitycompass.github.io/AndroidLabs/index.html
Hax.Tor
http://hax.tor.hu/welcome/
Java Vulnerable Lab
https://github.com/CSPF-Founder/JavaVulnerableLab
Pwnos
http://pwnos.com
Ringzero
https://ringzer0team.com/challenges
Avatao
https://avatao.com
GameOver
https://sourceforge.net/projects/null-gameover/
HSCTF3
http://hsctf.com
Join us๐น๐น:-https://t.me/cybertrickzone ๐บ๐บ
๐2โค1
https://system32.ink/openssh-unauthenticated-rce-flaw-regresshion-cve-2024-6387-exploit/
CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw โregreSSHionโ Exposes Millions of Linux Systems
OpenSSH Unauthenticated RCE Flaw โregreSSHionโ CVE-2024-6387 Exploit
โค2
https://system32.in/product/certified-mobile-application-penetration-tester-android-red-team-360/
Certified Mobile Application Penetration Tester (Android) By RedTeam 360
Forwarded from Team-Network-Nine ๐ฎ๐ณ
WEEKLY SUPER SEVEN NEWS CHANNEL OF PAKISTAN HAS BEEN HACKED BY TEAM-NETWORK-NINE
โข๏ธ Site https://weeklysuperseven.com.pk/
โข๏ธ Site https://e.weeklysuperseven.com.pk/
โ Poc https://ownzyou.com/zone/239536
โ Poc https://ownzyou.com/zone/239535
โข๏ธ Threat Actor : Solveig & odiyan
Greetz to
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#สแดsสแดสษชสแด แดสสแดส าแดสแดแด
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
โข๏ธ Site https://weeklysuperseven.com.pk/
โข๏ธ Site https://e.weeklysuperseven.com.pk/
โ Poc https://ownzyou.com/zone/239536
โ Poc https://ownzyou.com/zone/239535
โข๏ธ Threat Actor : Solveig & odiyan
Greetz to
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#สแดsสแดสษชสแด แดสสแดส าแดสแดแด
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
โค4โคโ๐ฅ1๐1๐1
Forwarded from darkdrag0nz
Media is too big
VIEW IN TELEGRAM
Bhitai Dental & Medical College
Pwned by Darkdrag0nz
M4D_GH057 was here
https://bdmch.edu.pk/
https://mirror-h.org/zone/5693038/
Pwned by Darkdrag0nz
M4D_GH057 was here
https://bdmch.edu.pk/
https://mirror-h.org/zone/5693038/
๐ฅ5๐2
https://system32.ink/geoserver-reverse-system-shell-cve-2024-36401-rce-exploit/
How it Works
Sets up a listener on your machine for incoming reverse shell from the target.
This POC will send a post request with the payloads.
Attempts to establish a shell on the target server.
This technique assumes nc is installed on the target.
GeoServer Reverse System Shell CVE-2024-36401 RCE Exploit
How it Works
Sets up a listener on your machine for incoming reverse shell from the target.
This POC will send a post request with the payloads.
Attempts to establish a shell on the target server.
This technique assumes nc is installed on the target.
https://system32.ink/prince-ransomware-chacha20-and-ecies-encryption/
Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.
Prince Ransomware - ChaCha20 And ECIES Encryption
Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.