MrVGunz
537 subscribers
855 photos
53 videos
15 files
782 links
🇮🇷

Osint
Tools
News
Exploit
Database
Bug Bounty
Vulnerablity

My team:

@Team1979

Contact:

@MrVGunz1979

mrvgunz@gmail.com

Twitter.com/MrVGunz

Instagram.com/MrVGunz
Download Telegram
Collection of Awesome XSS resources
Repo : https://github.com/s0md3v/AwesomeXSS
Bypassing Windows Defender (10 Ways)
Link : https://www.fo-sec.com/articles/10-defender-bypass-methods
Analyzing an arm64 mach-O version of LockBit
Link : https://objective-see.org/blog/blog_0x75.html
CVE-2023-27350 : PaperCut - Deep Dive and Indicators of Compromise
Link : https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/
CVE-2023-27524 : Apache Superset Insecure Default Configuration To Remote Code Execution
Blog : https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/
RASPBERRY ROBIN : ANTI-EVASION HOW-TO & EXPLOIT ANALYSIS
Link : https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/
CVE-2023-29489 : Finding XSS in a million websites (cPanel -Reflected Cross-Site Scripting)
POC : https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
Link : https://blog.assetnote.io/2023/04/26/cpanel-xss-advisory/
Bypass IIS Authorisation with this One Weird Trick - Three RCEs and Two Auth Bypasses in Sitecore 9.3
Blog : https://blog.assetnote.io/2023/05/10/sitecore-round-two/
CVE-2023-27363 : Foxit PDF Reader / Editor <= 12.1.1.15289 - 'exportXFAData Exposed Dangerous Method' - Remote Code Execution
POC : https://github.com/j00sean/SecBugs/tree/main/CVEs/CVE-2023-27363
XFA / PW : https://github.com/siberas/arpwn
Details : https://www.zerodayinitiative.com/advisories/ZDI-23-491/
An XSS JSON payload to bypass WAF

Payload : ["');alert('XSS');//"]@xyz.xxx
CVE-2023-25690 : Apache HTTP Server 2.4.0 > 2.4.55 / 56 - HTTP Request Smuggling
Post/More : https://t.me/MrVGunz/762
Lab/PoC : https://github.com/dhmosfunk/CVE-2023-25690-POC