CVE-2022-3723: Google Chrome zero-day Vulnerability.
Link
#0day
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#0day
——————
0Day.Today
@LearnExploit
@Tech_Army
Daily CyberSecurity
CVE-2022-3723: Google Chrome 0-day Vulnerability
Google is aware that an exploit for CVE-2022-3723 exists in the wild. It is only known that this vulnerability is a Type Confusion in V8
هشدار گوگل مبنی بر جاسوسی بودن روبیکا . هر چه سریع تر روبیکا رو پاک کنید .
——————
0Day.Today
@LearnExploit
@Tech_Army
——————
0Day.Today
@LearnExploit
@Tech_Army
👍7👎5
VMWare_NSX_rce.py
2.2 KB
VMWare NSX Manager
Pre-authenticated Remote Code Execution
CVSS 9.8/10
#exploit #vmware
——————
0Day.Today
@LearnExploit
@Tech_Army
Pre-authenticated Remote Code Execution
CVSS 9.8/10
#exploit #vmware
——————
0Day.Today
@LearnExploit
@Tech_Army
Discord Image Token Password Grabber Exploit Cve
Github
#Discord #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Discord #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
🔸 Telegram's Posts Viewer (Proxy)
📥 Download: TeleViewer
#telegram #view #seen
TG256
——————
0Day.Today
@LearnExploit
@Tech_Army
📥 Download: TeleViewer
#telegram #view #seen
TG256
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡7👍2👎1
Give Your Linux Desktop a Halloween Makeover
Link
#Halloween #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#Halloween #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
It's FOSS
Give Your Linux Desktop a Halloween Makeover
Halloween is around the corner. How about giving your Linux desktop a Halloween makeover? Let me help you with this 'scary' idea.
👍1
هالویین رو با docker جشن بگیرید :)
#Halloween #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
docker run -it --rm docker/doodle:halloween2019
#Halloween #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-40146_Exploit_Jar-master.zip
5.9 KB
CVE-2022-40146 ( SSRF and RCE Through Remote Class Loading ) Exploit
Link
#Exploit #RCE #SSRF
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#Exploit #RCE #SSRF
——————
0Day.Today
@LearnExploit
@Tech_Army
❤1
CVE-2021-39144 ( VMware Cloud Foundation RCE vulnerability via XStream )
Github
#RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
Not only crawling but you can do Subdomain Enumeration using Wayback.
——————
0Day.Today
@LearnExploit
@Tech_Army
curl --insecure --silent "http://web.archive.org/cdx/search/cdx…" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u
#bugbounty ——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z
We have added some adjustments to the payload that may bypass some WAFs & to help you with the hunt!#BugBountyTips
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
cve-2022-3602
cve-2022-3786 / openssl-poc
Github
#Openssl #poc
——————
0Day.Today
@LearnExploit
@Tech_Army
cve-2022-3786 / openssl-poc
Github
#Openssl #poc
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-33679 ( Harmful RC4 and 1day exploit )
Exploit
READ
#windows #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Exploit
READ
#windows #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
#Quotes
——————
0Day.Today
@LearnExploit
@Tech_Army
V: Tellme, do you know what day it is, Evey?
Evey: November the 4th?
V: Not Anymore
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡6❤1