Forwarded from 卩ro 爪Cracker
Etisalcom Bahrain Telecom Bahrain
SIZE: 840 MB
Files: 1,110
Documents: DNI, Contracts, identification messages, formats JPEG, PNG, XLS, DOC, PDF
Description:
Etisalcom Bahrain W.L.L Information technology and communications (ICT) company
Download:
https://anonfiles.com/D5O6e3y7yd/Etisalcom_Bahrain_zip
SIZE: 840 MB
Files: 1,110
Documents: DNI, Contracts, identification messages, formats JPEG, PNG, XLS, DOC, PDF
Description:
Etisalcom Bahrain W.L.L Information technology and communications (ICT) company
Download:
https://anonfiles.com/D5O6e3y7yd/Etisalcom_Bahrain_zip
Updates On Hackbyte Forum:-
📌Leman2 Leak
📌26M ESKIMI.COM DATABASE
📌Etisalcom Bahrain Telecom Bahrain
📌Proton_Privacy_Decoded: Script to Explore ProtonMail and Vpn
📌Randy: A pre-authenticated RCE exploit for Inductive Automation Ignition
📌OnionWallet Leak
📌UAC bypass for x64 Windows 7 – 11
📌Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
📌Abuse Cloudflare Zerotrust for C2 channels
📌Cobaltstrike_all_kits
📌LEAK WORK.UA
📌Turniketov.net Leak
📌VK.com Leak 2022
📌Kuban 1k b2b Leak
📌9k_doc_fr_selfie Kyc Leak
📌IDA Plugin to reconstruct .proto files used in the analyzed binary
📌LDAP shell
📌FAME - Recursive acronym meaning “FAME Automates Malware Evaluation”.
📌Active Directory Attacks
📌CVE-2022-22047: Windows CSRSS Elevation of Privilege Zero-Day Vulnerability.
📌Leman2 Leak
📌26M ESKIMI.COM DATABASE
📌Etisalcom Bahrain Telecom Bahrain
📌Lock Screen Bypass Exploit of Android Devices (CVE-2022–20006)📌SonarQube_Data_Center
📌Proton_Privacy_Decoded: Script to Explore ProtonMail and Vpn
📌Randy: A pre-authenticated RCE exploit for Inductive Automation Ignition
📌OnionWallet Leak
📌UAC bypass for x64 Windows 7 – 11
📌Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
📌Abuse Cloudflare Zerotrust for C2 channels
📌Cobaltstrike_all_kits
📌Bypass Windows Defender by utilizing malicious SMB requests inside MS Word Macro📌HTB Business CTF 2022: Dirty Money
📌LEAK WORK.UA
📌Turniketov.net Leak
📌VK.com Leak 2022
📌Kuban 1k b2b Leak
📌9k_doc_fr_selfie Kyc Leak
📌IDA Plugin to reconstruct .proto files used in the analyzed binary
📌LDAP shell
📌HiddenCPG - a vulnerable clone detection system📌Investigator - An online handy-recon tool.
📌BFAC - Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)📌ElectroMagnetic Mining Array (EMMA)
📌ReoSploit - A Tool that Finds, Enumerates, and #exploits Reolink Cameras.
📌blindssl - Disable SSL certificate verification using eBPF📌Antares - Cross-platform #SQL client.
📌PCICrash - PCIDriverKit PoC for CVE-2022-26763 (exec arbitrary code w/ system privileges).
📌FAME - Recursive acronym meaning “FAME Automates Malware Evaluation”.
📌Active Directory Attacks
📌CVE-2022-22047: Windows CSRSS Elevation of Privilege Zero-Day Vulnerability.
📌Account hijacking using “dirty dancing” in sign-in OAuth-flows👉🏻👉🏻 Updates:- https://bit.ly/3yRyah3 👈🏻👈🏻
👍2
Forwarded from Biała Bł
www.upload.ee
UPLOAD.EE - File does not exist
File does not exist. Upload.ee
Adidas[.]com Reflected XSS | 403 Forbidden Bypass | Bug Bounty
https://youtu.be/K38KnQnWL60
https://youtu.be/K38KnQnWL60
👍4
Forwarded from Biała Bł
www.upload.ee
UPLOAD.EE - ComboTools_Premium.zip - Download
ComboTools_Premium.zip - Download. Upload.ee
👍3
Updates On Hackbyte Forum:-
📌Smbpentest: Test Samba Servers which may have been configured improperly for anonymous access to vulnerable shares
📌LBOZO: A hybrid Windows Ransomware
📌Hoaxshell: An unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions, solely based on http(s) traffic
📌Ping Castle Cloud
📌CoffeeLdr
📌Zimbra #Exploit CVE-2022-30333
📌CVE-2022-24086 RCE POC
📌data.gov.uk – UK Government Backups
📌telefonica Ecuador CRM Files Leaks
📌Svetlogorsk39.ru leak
📌rbcd-attack
📌RustyTokenManipulation
📌Oralyzer - Open Redirection Analyzer
📌Salus – SBOM Tool
📌Sliver GUI client.
📌CVE-2022-32119 - Arox-Unrestricted-File-Upload
📌NodeJS Ransomware
📌Dirble - Fast directory scanning and scraping tool
📌WebView2-Cookie-Stealer
📌ZombieThread - Another meterpreter injection technique using C# that attempts to bypass WD.
📌Evil Clippy
📌Evtx Log (xml) Browser
📌CVE-2022-30333
📌CVE-2022-23614: PoC for CVE-2022-23614 (Twig sort filter code execution/sandbox bypass)
📌CVE-2022-33891 - Apache Spark shell command injection
📌EJS, Server side template injection RCE (CVE-2022-29078)
📌Binary Ninja Commercial 3.1.3469 (2022-05-31)
📌citycollege.edu Health University Leak
📌Full HHIDE.ORG forum dump
📌danish.my Leak
📌stripchat.com Leak
———————————————————————————————————————-
👉🏻👉🏻 Updates:- https://bit.ly/3yRyah3 👈🏻👈🏻
📌Smbpentest: Test Samba Servers which may have been configured improperly for anonymous access to vulnerable shares
📌LBOZO: A hybrid Windows Ransomware
📌Hoaxshell: An unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions, solely based on http(s) traffic
📌Ping Castle Cloud
📌CoffeeLdr
📌Zimbra #Exploit CVE-2022-30333
📌CVE-2022-24086 RCE POC
📌data.gov.uk – UK Government Backups
📌telefonica Ecuador CRM Files Leaks
📌Svetlogorsk39.ru leak
📌rbcd-attack
📌RustyTokenManipulation
📌Oralyzer - Open Redirection Analyzer
📌Salus – SBOM Tool
📌Sliver GUI client.
📌CVE-2022-32119 - Arox-Unrestricted-File-Upload
📌NodeJS Ransomware
📌Dirble - Fast directory scanning and scraping tool
📌WebView2-Cookie-Stealer
📌ZombieThread - Another meterpreter injection technique using C# that attempts to bypass WD.
📌Evil Clippy
📌Evtx Log (xml) Browser
📌CVE-2022-30333
📌CVE-2022-23614: PoC for CVE-2022-23614 (Twig sort filter code execution/sandbox bypass)
📌CVE-2022-33891 - Apache Spark shell command injection
📌EJS, Server side template injection RCE (CVE-2022-29078)
📌Binary Ninja Commercial 3.1.3469 (2022-05-31)
📌citycollege.edu Health University Leak
📌Full HHIDE.ORG forum dump
📌danish.my Leak
📌stripchat.com Leak
———————————————————————————————————————-
👉🏻👉🏻 Updates:- https://bit.ly/3yRyah3 👈🏻👈🏻
👍3
Forwarded from Bhartiya Hunters🇮🇳 (Founder & CEO •)
Paramspider lead to find SQLI vulnerability
https://medium.com/@arshiadev/paramspider-lead-to-find-sqli-vulnerability-995f6159564c
https://medium.com/@arshiadev/paramspider-lead-to-find-sqli-vulnerability-995f6159564c
👍2