Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Our Team Was Able To Breach More Than 5 Sites Databases Of Bangladeshi Websites Including Goverment,food, Municipality And More...
Web List
1 Office of the Chief Account's Finance Officer
2 Bangladesh Geographical Information System Platform
3 Bangladesh Computers
4 BD Foods Limited Company
5 Baizi STEEL COMPANY
Just A Simple Warning For Bd Skids
Do Not Attack On Indian Cyberspace
Counter Cyberattack
GREETZ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥4👍3🏆1🗿1
https://system32.in/product/oscp-ethical-hacking-with-bug-bountyclouddefensive-mobile/
OSCP Ethical Hacking With Bug Bounty,Cloud,Defensive & Mobile
🔥2
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Famous Platforms to practice Pentesting
Roadmap for Hackers:
https://hackproofhacks.com/how-to-become-an-ethical-hacker-in-2024/
tryhackme
https://tryhackme.com
bWAPP
http://itsecgames.com
flAWS Cloud
http://flaws.cloud
Hack Yourself First
http://hackyourselffirst.troyhunt.com
OWASP Juice Shop
http://juice-shop.herokuapp.com
Google Gruyere
https://google-gruyere.appspot.com
Hack Me
https://hack.me
HackTheBox
https://hackthebox.eu
Root-Me
https://root-me.org
XSS Game
https://xss-game.appspot.com
Pentesterlab
https://pentesterlab.com
OverTheWire
https://overthewire.org/wargames/
Hacking Lab
https://hacking-lab.com/index.html
IO
http://io.netgarage.org
smashthestack
http://smashthestack.org
microcorruption
https://microcorruption.com/login
ExploitMe Mobile
http://securitycompass.github.io/AndroidLabs/index.html
Hax.Tor
http://hax.tor.hu/welcome/
Java Vulnerable Lab
https://github.com/CSPF-Founder/JavaVulnerableLab
Pwnos
http://pwnos.com
Ringzero
https://ringzer0team.com/challenges
Avatao
https://avatao.com
GameOver
https://sourceforge.net/projects/null-gameover/
HSCTF3
http://hsctf.com
Join us👹👹:-https://t.me/cybertrickzone 👺👺
Roadmap for Hackers:
https://hackproofhacks.com/how-to-become-an-ethical-hacker-in-2024/
tryhackme
https://tryhackme.com
bWAPP
http://itsecgames.com
flAWS Cloud
http://flaws.cloud
Hack Yourself First
http://hackyourselffirst.troyhunt.com
OWASP Juice Shop
http://juice-shop.herokuapp.com
Google Gruyere
https://google-gruyere.appspot.com
Hack Me
https://hack.me
HackTheBox
https://hackthebox.eu
Root-Me
https://root-me.org
XSS Game
https://xss-game.appspot.com
Pentesterlab
https://pentesterlab.com
OverTheWire
https://overthewire.org/wargames/
Hacking Lab
https://hacking-lab.com/index.html
IO
http://io.netgarage.org
smashthestack
http://smashthestack.org
microcorruption
https://microcorruption.com/login
ExploitMe Mobile
http://securitycompass.github.io/AndroidLabs/index.html
Hax.Tor
http://hax.tor.hu/welcome/
Java Vulnerable Lab
https://github.com/CSPF-Founder/JavaVulnerableLab
Pwnos
http://pwnos.com
Ringzero
https://ringzer0team.com/challenges
Avatao
https://avatao.com
GameOver
https://sourceforge.net/projects/null-gameover/
HSCTF3
http://hsctf.com
Join us👹👹:-https://t.me/cybertrickzone 👺👺
👍2❤1
https://system32.ink/openssh-unauthenticated-rce-flaw-regresshion-cve-2024-6387-exploit/
CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw ‘regreSSHion’ Exposes Millions of Linux Systems
OpenSSH Unauthenticated RCE Flaw ‘regreSSHion’ CVE-2024-6387 Exploit
❤2
https://system32.in/product/certified-mobile-application-penetration-tester-android-red-team-360/
Certified Mobile Application Penetration Tester (Android) By RedTeam 360
Forwarded from Team-Network-Nine 🇮🇳
WEEKLY SUPER SEVEN NEWS CHANNEL OF PAKISTAN HAS BEEN HACKED BY TEAM-NETWORK-NINE
☢️ Site https://weeklysuperseven.com.pk/
☢️ Site https://e.weeklysuperseven.com.pk/
✅ Poc https://ownzyou.com/zone/239536
✅ Poc https://ownzyou.com/zone/239535
☢️ Threat Actor : Solveig & odiyan
Greetz to
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#ʀᴀsʜᴛʀɪʏᴀ ᴄʏʙᴇʀ ғᴏʀᴄᴇ
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
☢️ Site https://weeklysuperseven.com.pk/
☢️ Site https://e.weeklysuperseven.com.pk/
✅ Poc https://ownzyou.com/zone/239536
✅ Poc https://ownzyou.com/zone/239535
☢️ Threat Actor : Solveig & odiyan
Greetz to
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#ʀᴀsʜᴛʀɪʏᴀ ᴄʏʙᴇʀ ғᴏʀᴄᴇ
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
❤4❤🔥1👍1🏆1
Forwarded from darkdrag0nz
Media is too big
VIEW IN TELEGRAM
Bhitai Dental & Medical College
Pwned by Darkdrag0nz
M4D_GH057 was here
https://bdmch.edu.pk/
https://mirror-h.org/zone/5693038/
Pwned by Darkdrag0nz
M4D_GH057 was here
https://bdmch.edu.pk/
https://mirror-h.org/zone/5693038/
🔥5👍2
https://system32.ink/geoserver-reverse-system-shell-cve-2024-36401-rce-exploit/
How it Works
Sets up a listener on your machine for incoming reverse shell from the target.
This POC will send a post request with the payloads.
Attempts to establish a shell on the target server.
This technique assumes nc is installed on the target.
GeoServer Reverse System Shell CVE-2024-36401 RCE Exploit
How it Works
Sets up a listener on your machine for incoming reverse shell from the target.
This POC will send a post request with the payloads.
Attempts to establish a shell on the target server.
This technique assumes nc is installed on the target.
https://system32.ink/prince-ransomware-chacha20-and-ecies-encryption/
Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.
Prince Ransomware - ChaCha20 And ECIES Encryption
Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.
https://system32.ink/splunk-enterprise-windows-path-traversal-cve-2024-36991-exploit/
Splunk Enterprise (windows) Path Traversal CVE-2024-36991 Exploit
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Find public files in Amazon S3
http://s3digger.com
Find public files in Dropbox
https://www.drodigger.com/
Find public files in Disk Yandex
https://www.yadigger.com/
Find public files in Google Drive
https://www.drodigger.com/
Find public files in other file sharing sites
https://www.fidigger.com/
Find public files on url shortening sites
https://www.shortdigger.com/
By @osintambition
http://s3digger.com
Find public files in Dropbox
https://www.drodigger.com/
Find public files in Disk Yandex
https://www.yadigger.com/
Find public files in Google Drive
https://www.drodigger.com/
Find public files in other file sharing sites
https://www.fidigger.com/
Find public files on url shortening sites
https://www.shortdigger.com/
By @osintambition
👍3
https://system32.in/product/coding-botnet-backdoor-in-python-for-ethical-hacking-udemy/
Coding Botnet & Backdoor In Python For Ethical Hacking! [Udemy]
Forwarded from OSINT AMBITION (Dheeraj Yadav)
❤1
https://system32.ink/cve-2024-34361-pi-hole-remote-code-execution-exploit/
Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the
CVE-2024-34361 Pi-hole Remote Code Execution Exploit
Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the
gravity_DownloadBlocklistFromUrl() function. Depending on some circumstances, the vulnerability could lead to remote command execution.https://system32.ink/progress-whatsup-gold-unauthenticated-rce-cve-2024-4885-exploit/
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
WhatsUp Gold Unauthenticated RCE (CVE-2024-4885) Exploit
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
https://system32.ink/microsoft-sharepoint-remote-code-execution-cve-2024-38094-exploit/
Microsoft SharePoint Remote Code Execution CVE-2024-38094 Exploit
👍2