GDB HackerOne
512 subscribers
40 photos
81 videos
153 files
138 links
Google Database (GDB) is a categorized index of Internet search engine queries designed information publicly available
Download Telegram
Forwarded from cybermetics
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2022-20083
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-21744
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-33936
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-32449
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-31137
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-25046
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
THM RT.zip
100.9 MB
#Leaked โšก๏ธ Red Teaming tryhackme ๐Ÿง‘โ€๐Ÿ’ป

Learn the skills needed to become a Red Team Operator

Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory

Level: Intermediate | 48 hours

@redteamcollection
โ”œโ”€โ”€โ”€1 Red Team Fundamentals
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Intro to C2_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Engagements_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Fundamentals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team OPSEC_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Red Team Threat Intel_files
โ”œโ”€โ”€โ”€2 Initial Access
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Password Attacks_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Phishing_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Recon_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Weaponization_files
โ”œโ”€โ”€โ”€3 Post Compromise
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Data Exfiltration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Enumeration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ The Lay of the land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Windows Local Persistence_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Privilege Escalation_files
โ”œโ”€โ”€โ”€4 Host Evasions
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Abusing Windows Internals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ AV Evasion_ Shellcode_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Bypassing UAC_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Evading Logging and Monitoring_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Antivirus_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Windows API_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Living Off the Land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Obfuscation Principles_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Runtime Detection Evasion_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Signature Evasion_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Internals_files
โ”œโ”€โ”€โ”€5 Network Scurity Evasion
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Firewalls_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Network Security Solutions_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Sandbox Evasion_files
โ””โ”€โ”€โ”€6 Compromising AD
โ”œโ”€โ”€โ”€TryHackMe _ Active Directory Basics_files
โ”œโ”€โ”€โ”€TryHackMe _ Breaching Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Credentials Harvesting_files
โ”œโ”€โ”€โ”€TryHackMe _ Enumerating Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Exploiting Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ””โ”€โ”€โ”€TryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course

Module 1:
https://bit.ly/2tgjipU

Module 2:
https://bit.ly/2DBrHJc

Module 3:
https://bit.ly/2RSAmfH

Module 4:
https://bit.ly/2N0uZu0

password for the course is โ€œxamnviewerโ€
CELLEBRITE AND MSAB

Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce

MSAB download link:
magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
โœจ
          ๐Ÿงต๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง
          ๐Ÿงตโฌœ๏ธโฌœ๏ธ๐Ÿ”ตโฌœโฌœ
          ๐Ÿงต๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ
          ๐Ÿงต      ๐ŸŒฟ      
          ๐Ÿงต            ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒฑ        ๐ŸŒธ
          ๐Ÿงต ๐Ÿ’
          ๐Ÿงต         ๐Ÿƒ       ๐Ÿ€
          ๐Ÿงต
          ๐Ÿงต      ๐Ÿ         ๐ŸŒบ
          ๐Ÿงต
          ๐Ÿงต๐Ÿ‚       ๐Ÿƒ    ๐Ÿ‚
          ๐Ÿงต                    ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒธ         
     ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
  ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰


HAPPY  REPUBLIC  DAY ๐ŸŽ ๐Ÿ

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰

๐Ÿ’ฅ๐™…๐™–๐™ฎ ๐™ƒ๐™ž๐™ฃ๐™™ ๐™…๐™–๐™ฎ ๐˜ฝ๐™๐™–๐™ง๐™–๐™ฉ๐Ÿ’ฅ

๐Ÿ‡ฎ๐Ÿ‡ณ๐‡๐€๐๐๐˜ 74๐ญ๐ก ๐‘๐„๐๐”๐๐‹๐ˆ๐‚ ๐ƒ๐€๐˜
QRLJacker

QRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method

OWASP's links reference
https://www.owasp.org/index.php/QRLJacking

https://www.owasp.org/index.php/OWASP_QRLJacker

If you want to write your own module
Read here
โ™‚๏ธ Github repositories every Developer should know โ™‚๏ธ


โ—๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.

https://github.com/sindresorhus/awesome


โ—๏ธClean Code JavaScript

https://github.com/ryanmcdermott/clean-code-javascript


โ—๏ธTech Interview Handbook

https://github.com/yangshun/tech-interview-handbook


โ—๏ธDeveloper Roadmaps, articles and resources for developers.

https://github.com/kamranahmedse/developer-roadmap


โ—๏ธ33 JS Concepts

https://github.com/leonardomso/33-js-concepts


โ—๏ธBest websites a programmer should visit

https://github.com/sdmg15/Best-websites-a-programmer-should-visit


โ—๏ธDesign Resources for Developers

https://github.com/bradtraversy/design-resources-for-developers


โ—๏ธBig List of Naughty Strings:

https://github.com/minimaxir/big-list-of-naughty-strings
The repository includes links to various tools, frameworks, and resources that can be used by Red Teamers to conduct attacks, as well as resources for defenders to improve their security posture.

The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.

Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.

In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.

Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.

https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
Forwarded from RED TEAM COLLECTIONS
โœ”๏ธ The First ๐Ÿ” ๐Ÿ”  On ๐Ÿ” ๐Ÿ” 

Artificial Intelligence (โ˜„๏ธ) has revolutionized the world in ways we never thought possible. From healthcare to education, from finance to transportation, AI has been making our lives easier and more efficient.

As we move towards the future, the importance of AI is only going to increase. The growth of AI has been exponential, especially in the fields of development and cybersecurity. There are new tools, techniques, and innovations being introduced every day, and it's important to keep up with the latest trends.

That's why we're excited to announce that we're hosting a discussion on the topic "AI the Future" today from 9๏ธโƒฃ PM to 1๏ธโƒฃ0๏ธโƒฃ PM IST. During the discussion, we will be exploring different aspects of AI and its impact on the world. We invite everyone to participate, share their ideas, and discuss the latest tools, topics, and innovations related to AI.

We hope that this discussion will be an opportunity for all of us to learn and explore something new. It's a chance to expand our knowledge and to stay up to date with the latest trends in the world of AI.

Don't forget to subscribe to us on Instagram to stay updated with our latest events and discussions.
Follow us at https://www.instagram.com/googledevlop/
Powered By @GDB_HackerOne ๐Ÿคซ

๐Ÿ“Š Let's explore the world of AI together and shape the future. ๐Ÿ’ฒ
Please open Telegram to view this post
VIEW IN TELEGRAM