Forwarded from OSINT AMBITION
Unlocking the Power of Google Advanced Search for OSINT in Cybersecurity: Tips and Tricks to Improve Your Investigations! 🔍🔒👀 #OSINT #Cybersecurity #GoogleAdvancedSearch #Investigations #OpenSourceIntelligence #DigitalForensics #InformationSecurity #CyberThreatIntelligence #OnlineResearch
Vulnerabilities in the TPM 2.0 reference implementation code
Blog+TMP_vuln_POC = https://system32.ink/news-feed/p/267/
Blog+TMP_vuln_POC = https://system32.ink/news-feed/p/267/
System32
MCracker2002 posted an update
Vulnerabilities in the TPM 2.0 reference implementation code https://blog.quarkslab.com/vulnerabilities-in-the-tpm-20-reference-implementation-code.html In this blog post we discuss the details of two vulnerabilities we discovered in the Trusted Platform…
Employers_Federation_of_Pakistan.zip
173.5 MB
Employers_Federation_of_Pakistan.zip
gg's hacker's ( have a good day —❤️
‼️Here we go again
Use AI to generate the perfect professional excuse 😂😂
#hacker_bano_chutiya_nhe 👀👀
‼️Here we go again
Use AI to generate the perfect professional excuse 😂😂
#hacker_bano_chutiya_nhe 👀👀
Forwarded from C¥B€R H€LL (D€∆!L - C¥B€R H€LL)
This media is not supported in your browser
VIEW IN TELEGRAM
ETH 💸 MINER/FINDER SCAM exposed
By @Devil_Anon💻 ☢️
Watch the video▶️ to see the illustration on how it's done, and get the code from our forum post below.
Spread awareness🎙 📞 and let more people be aware of this trick which many people are being ripped off upon.
Share🌐 and support⭐️
@cyberhellcommunity
By @Devil_Anon
Watch the video
Spread awareness
Share
@cyberhellcommunity
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from ᴴᴬᶜᴷᴸᴼᶜᴷ
SQL INJECTION CLASS FOR BEGNEERS
LEARN SQL FROM BASICS
TIME - 17 MARCH( TOMMOROW ) AT 7:30 PM
OUR WEBSITE - system32.ink
BY CERTIFIED ETHICAL HACKER - @x_cyanide_x
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
LEARN SQL FROM BASICS
TIME - 17 MARCH( TOMMOROW ) AT 7:30 PM
OUR WEBSITE - system32.ink
BY CERTIFIED ETHICAL HACKER - @x_cyanide_x
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
How Scammers Scam you To Show You How they hack Android using PDF They Use Old Adobe App (A RCE VULN. In IT) to Exploit Android
full Blog: https://hulkvision.github.io/blog/post1/
full Blog: https://hulkvision.github.io/blog/post1/
hulkvision.github.io
RCE in Adobe Acrobat Reader for android(CVE-2021-40724)
# Summary While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability. Abode reader was also using Google play core library for dynamic…
Learn how to use Metasploit in detail with a practical video and detailed demonstration
Metasploit with detailed command+ video
https://techofide.com/blogs/how-to-use-metasploit-metasploit-commands-metasploit-tutorial/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
Metasploit with detailed command+ video
https://techofide.com/blogs/how-to-use-metasploit-metasploit-commands-metasploit-tutorial/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
Forwarded from pkg
In India the best way to come in limelight or Increase Buisness is to abuse the sentiments against the nation itself, People will start talking about you or could be in your perimeter.
Same happening in cybersecurity industry where online telegram users of so called company just see the posts of small kids attacking websites of India which dont have any severe vulnerability of Any APT level/type attack but portraits as huge attack or they are the best company. How ? With telegramic employees ?? Seriously !!! Employees Who see the posts of script kiddies on telegram and makes out the reasearch report. No it will be wrong if i also said research report actually that is paid media reports which is published to make the company big.
Earlier also that company with zero knowledge of employees published the report about malaysian hackers who were just a script Kiddies.
In fact, There are many State Sponsered APT level workers who continuously work for the nation in every country, You never know. The real attacks should be researched out not any attacks which is publically available.
The old generation was disgusting in field of understanding the cybersecurity but these kind of people make this today's generation fool too.
Same happening in cybersecurity industry where online telegram users of so called company just see the posts of small kids attacking websites of India which dont have any severe vulnerability of Any APT level/type attack but portraits as huge attack or they are the best company. How ? With telegramic employees ?? Seriously !!! Employees Who see the posts of script kiddies on telegram and makes out the reasearch report. No it will be wrong if i also said research report actually that is paid media reports which is published to make the company big.
Earlier also that company with zero knowledge of employees published the report about malaysian hackers who were just a script Kiddies.
In fact, There are many State Sponsered APT level workers who continuously work for the nation in every country, You never know. The real attacks should be researched out not any attacks which is publically available.
The old generation was disgusting in field of understanding the cybersecurity but these kind of people make this today's generation fool too.
Forwarded from 卩ro 爪Cracker
🔥Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems
Until security updates are available, users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings.Turning off these settings will remove the exploitation risk of these vulnerabilities.
Chipsets to devices, affected products likely include:
💾Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04 series;
💾Mobile devices from Vivo, including those in the S16, S15, S6, X70, X60 and X30 series;
💾The Pixel 6 and Pixel 7 series of devices from Google;
💾any wearables that use the Exynos W920 chipset; and
💾any vehicles that use the Exynos Auto T5123 chipset.
Until security updates are available, users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings.Turning off these settings will remove the exploitation risk of these vulnerabilities.
Chipsets to devices, affected products likely include:
💾Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04 series;
💾Mobile devices from Vivo, including those in the S16, S15, S6, X70, X60 and X30 series;
💾The Pixel 6 and Pixel 7 series of devices from Google;
💾any wearables that use the Exynos W920 chipset; and
💾any vehicles that use the Exynos Auto T5123 chipset.
Forwarded from 卩ro 爪Cracker
CVE-2023-23397.ps1
2.9 KB
💥CVE-2023-23397-POC-Powershell
Script functions to either send or save calendar NTLM leakage using the ReminderSoundFile option. Run script to load the functions in Powershell, then you can use the examples below as a starting point for using the functions. Requires to be run on a Windows machine with Outlook installed since it uses the Outlook COM object to send emails. Note that it will send the email from the email account associated with Outlook. The current functions will add the meeting start time as of when the script is execute and set it to last 2 hours.
Script functions to either send or save calendar NTLM leakage using the ReminderSoundFile option. Run script to load the functions in Powershell, then you can use the examples below as a starting point for using the functions. Requires to be run on a Windows machine with Outlook installed since it uses the Outlook COM object to send emails. Note that it will send the email from the email account associated with Outlook. The current functions will add the meeting start time as of when the script is execute and set it to last 2 hours.
SQL INJECTION CLASS FOR BEGNEERS
LEARN SQL FROM BASICS
TIME - STARTING IN 5 MINUTES ( 7:30)
OUR WEBSITE - system32.ink
BY CERTIFIED ETHICAL HACKER - @x_cyanide_x
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
LEARN SQL FROM BASICS
TIME - STARTING IN 5 MINUTES ( 7:30)
OUR WEBSITE - system32.ink
BY CERTIFIED ETHICAL HACKER - @x_cyanide_x
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
Burp Suite tool with a practical demonstration
https://techofide.com/blogs/what-is-burp-suite-how-to-use-burp-suite-burp-suite-tutorial-for-beginners/
Join our group for Exclusive Cyber security content
t.me/ethicalhackingtechofide
https://techofide.com/blogs/what-is-burp-suite-how-to-use-burp-suite-burp-suite-tutorial-for-beginners/
Join our group for Exclusive Cyber security content
t.me/ethicalhackingtechofide
CYBER SECURITY ROADMAP
TIME - 18 MARCH( TODAY ) AT 7:30 PM
OUR WEBSITE - system32.ink
BY PROFESSIONALS
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
TIME - 18 MARCH( TODAY ) AT 7:30 PM
OUR WEBSITE - system32.ink
BY PROFESSIONALS
ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD