Hacking Brasil
241 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
Vulnerabilidades executadas em Bug Bounty

1️⃣ Remote Code Execution através de Local File Inclusion

2️⃣ Reflected XSS em um subdomínio da American Airlines

3️⃣ Stored XSS no site da Microsoft

@HackingBRA
- exploit
CVE-2024-23208:
Apple tvOS Memory Corruption
https://github.com/hrtowii/CVE-2024-23208-test

CVE-2023-35759:
WhatsUp Gold 2022 22.1.0 - XSS
https://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html

IOS screentime remover using the KFD exploit (WIP)
https://github.com/cintagram/ScreenTimeRemover
MultiDump

This is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly. MultiDump supports LSASS dump via ProcDump.exe or Comsvc.dll, it offers two modes: a local mode that encrypts and stores the dump file locally, and a remote mode that sends the dump to a handler for decryption and analysis

https://github.com/Xre0uS/MultiDump
Infosec Awesome.

- Um repositório com vários materiais e ferramentas de segurança da informação. Você pode encontrar informações úteis para todos os gostos e cores:

Adversary Simulation & Emulation;
Application Security;
Binary Analysis;
Cloud Security;
Courses;
Cryptography;
Data Sets;
Digital Forensics and Incident Response;
Exploits;
Hardening;
Hardware;
Malware Analysis;
Mobile Security;
Network Security;
Open-source Intelligence (OSINT);
Password Cracking and Wordlists;
Social Engineering;
Smart Contract;
Vulnerable.


@hackingbra
Proof of Concept (PoC) for #CVE-2024-23334, demonstrating how #malicious actors can exploit vulnerabilities in aiohttp using #LFI .

https://github.com/jhonnybonny/CVE-2024-23334
Já adquiri meu brinquedinho 😅
#FlipperZero
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2024-1086 Linux kernel LPE

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.

A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.