GDB HackerOne
512 subscribers
40 photos
81 videos
153 files
138 links
Google Database (GDB) is a categorized index of Internet search engine queries designed information publicly available
Download Telegram
Media is too big
VIEW IN TELEGRAM
14.6 Installing BeEF & Hooking Targets Over the Cloud.mp4
Exam passing services available
100% trusted and verified
Dm @Pass_exam
elearn certs
CEH ansi and practical
OSCP
OSEP
OSWE
OSWP
CRTP
CRTE
CRTO
Dms got deleted by mistake
People who messaged @Pass_exam dm again
Forwarded from cybermetics
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2022-20083
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-21744
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-33936
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-32449
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-31137
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-25046
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
THM RT.zip
100.9 MB
#Leaked โšก๏ธ Red Teaming tryhackme ๐Ÿง‘โ€๐Ÿ’ป

Learn the skills needed to become a Red Team Operator

Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory

Level: Intermediate | 48 hours

@redteamcollection
โ”œโ”€โ”€โ”€1 Red Team Fundamentals
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Intro to C2_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Engagements_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Fundamentals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team OPSEC_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Red Team Threat Intel_files
โ”œโ”€โ”€โ”€2 Initial Access
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Password Attacks_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Phishing_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Recon_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Weaponization_files
โ”œโ”€โ”€โ”€3 Post Compromise
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Data Exfiltration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Enumeration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ The Lay of the land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Windows Local Persistence_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Privilege Escalation_files
โ”œโ”€โ”€โ”€4 Host Evasions
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Abusing Windows Internals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ AV Evasion_ Shellcode_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Bypassing UAC_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Evading Logging and Monitoring_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Antivirus_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Windows API_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Living Off the Land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Obfuscation Principles_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Runtime Detection Evasion_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Signature Evasion_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Internals_files
โ”œโ”€โ”€โ”€5 Network Scurity Evasion
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Firewalls_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Network Security Solutions_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Sandbox Evasion_files
โ””โ”€โ”€โ”€6 Compromising AD
โ”œโ”€โ”€โ”€TryHackMe _ Active Directory Basics_files
โ”œโ”€โ”€โ”€TryHackMe _ Breaching Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Credentials Harvesting_files
โ”œโ”€โ”€โ”€TryHackMe _ Enumerating Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Exploiting Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ””โ”€โ”€โ”€TryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course

Module 1:
https://bit.ly/2tgjipU

Module 2:
https://bit.ly/2DBrHJc

Module 3:
https://bit.ly/2RSAmfH

Module 4:
https://bit.ly/2N0uZu0

password for the course is โ€œxamnviewerโ€
CELLEBRITE AND MSAB

Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce

MSAB download link:
magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
โœจ
          ๐Ÿงต๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง
          ๐Ÿงตโฌœ๏ธโฌœ๏ธ๐Ÿ”ตโฌœโฌœ
          ๐Ÿงต๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ
          ๐Ÿงต      ๐ŸŒฟ      
          ๐Ÿงต            ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒฑ        ๐ŸŒธ
          ๐Ÿงต ๐Ÿ’
          ๐Ÿงต         ๐Ÿƒ       ๐Ÿ€
          ๐Ÿงต
          ๐Ÿงต      ๐Ÿ         ๐ŸŒบ
          ๐Ÿงต
          ๐Ÿงต๐Ÿ‚       ๐Ÿƒ    ๐Ÿ‚
          ๐Ÿงต                    ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒธ         
     ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
  ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰


HAPPY  REPUBLIC  DAY ๐ŸŽ ๐Ÿ

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰

๐Ÿ’ฅ๐™…๐™–๐™ฎ ๐™ƒ๐™ž๐™ฃ๐™™ ๐™…๐™–๐™ฎ ๐˜ฝ๐™๐™–๐™ง๐™–๐™ฉ๐Ÿ’ฅ

๐Ÿ‡ฎ๐Ÿ‡ณ๐‡๐€๐๐๐˜ 74๐ญ๐ก ๐‘๐„๐๐”๐๐‹๐ˆ๐‚ ๐ƒ๐€๐˜
QRLJacker

QRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method

OWASP's links reference
https://www.owasp.org/index.php/QRLJacking

https://www.owasp.org/index.php/OWASP_QRLJacker

If you want to write your own module
Read here