XSS Payloads :
#XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=prompt(document.cookie)//>\x3e
#XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
👍2
CrimeFlare for bypassing websites protected by CloudFlare WAF
Github
#tools #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#tools #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
Exploiting CVE-2022-42703 ( Bringing back the stack attack )
Read
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
——————
0Day.Today
@LearnExploit
@Tech_Army
Blogspot
Exploiting CVE-2022-42703 - Bringing back the stack attack
Seth Jenkins, Project Zero This blog post details an exploit for CVE-2022-42703 (P0 issue 2351 - Fixed 5 September 2022), a bug Jann Horn ...
Good wordlist for backup files FUZZ
Github
Github
Github
Github
Github
#Wordlist #passlist
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
Github
Github
Github
Github
#Wordlist #passlist
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
wordlists/discovery/backup_files_only.txt at master · xajkep/wordlists
Infosec Wordlists and more. Contribute to xajkep/wordlists development by creating an account on GitHub.
👍5
Hooking System Calls in Windows 11 22H2 like Avast Antivirus ( Research, analysis and bypass )
Read
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥4👍2
👍5⚡1
CVE-2022-28672_exploit.zip
16.3 KB
CVE-2022-28672 ( Foxit PDF Reader Remote Code Execution Exploit )
#exploit #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
#exploit #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡3
Super Xray ( Web Vulnerability Scanner )
Github
#scanner #Vulnerability
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#scanner #Vulnerability
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3🔥3👎1
0Day.Today | Learn Exploit | Zero World | Dark web |
In This Ceek بررسی CVEهای پر سر و صدای این هفته (5 تا 11 آذر 1401) https://vrgl.ir/ai8Vt #ITC #CVE —————— 0Day.Today @LearnExploit @Tech_Army
In This Ceek
بررسی CVEهای پر سر و صدای این هفته (19 تا 25 آذر 1401)
https://vrgl.ir/geTOU
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
بررسی CVEهای پر سر و صدای این هفته (19 تا 25 آذر 1401)
https://vrgl.ir/geTOU
#ITC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
testing 403 bypass ?
You found a /wp-admin with 403 status.
Bypass it using /wp-admin/setup-config.php?step=1
This will allow you to create a database.
From here, you can escalate it to any other big vulnerability
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
You found a /wp-admin with 403 status.
Bypass it using /wp-admin/setup-config.php?step=1
This will allow you to create a database.
From here, you can escalate it to any other big vulnerability
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6⚡2👍1
Dirty Vanity ( a new injection technique that abuses the Windows fork API to bypass the EDR )
PDF
POC
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug)
Github
#CVE #macOS
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #macOS
——————
0Day.Today
@LearnExploit
@Tech_Army
PS5 Kernel Exploit: ELF Loader added to BD-JB version
Link
#exploit #ps5
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#exploit #ps5
——————
0Day.Today
@LearnExploit
@Tech_Army
Wololo.net
PS5 Kernel Exploit: ELF Loader added to BD-JB version - Wololo.net
We’ve mentioned it yesterday, John Tornblom has been working on putting the Blu-Ray version of the PS5 exploit up to speed with the Webkit version. He’s now ported one of the most important features...
🔥2
Cloudmare ( Cloudflare, Sucuri, Incapsula real IP tracker )
Github
#bypass #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#bypass #tools
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
Hikvision log4j PoC ( Hikvision pre-auth log4j Poc )
Github
#POC #log4j
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #log4j
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-2602 ( PoC Kernel Privilege Escalation Linux Published ( Exploit )
Read
Read
PoC
Exploit
#Exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
Read
PoC
Exploit
#Exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
Php Remote file Inclusion and RCE in flatpressblog/flatpress
Read
#php
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#php
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1