Please open Telegram to view this post
VIEW IN TELEGRAM
👏5❤3 3💩1
Forwarded from 黑 大帅🇨🇳
Google Dorks for Bug Bounty | Find Sensitive Information
1. Discovering Exposed Files:
- intitle:"index of" "site:http://site.com"
- filetype:log inurl:log site:http://site.com
- filetype:sql inurl:sql site:http://site.com
- filetype:env inurl:.env site:http://site.com
2. Finding Sensitive Directories:
- inurl:/phpinfo.php site:http://site.com
- inurl:/admin site:http://site.com
- inurl:/backup site:http://site.com
- inurl:wp- site:http://site.com
3. Exposed Configuration Files:
- filetype:config inurl:config site:http://site.com
- filetype:ini inurl:wp-config.php site:http://site.com
- filetype:json inurl:credentials site:http://site.com
4. Discovering Usernames and Passwords:
- intext:"password" filetype:log site:http://site.com
- intext:"username" filetype:log site:http://site.com
- filetype:sql "password" site:http://site.com
5. Finding Database Files:
- filetype:sql inurl:db site:http://site.com
- filetype:sql inurl:dump site:http://site.com
- filetype:bak inurl:db site:http://site.com
6. Exposed Git Repositories:
- inurl:".git" site:http://site.com
- inurl:"/.git/config" site:http://site.com
- intitle:"index of" ".git" site:http://site.com
7. Finding Publicly Exposed Emails:
- intext:"email" site:http://site.com
- inurl:"contact" intext:"
@site
.com" -www.site.com
- filetype:xls inurl:"email" site:http://site.com
8. Discovering Vulnerable Web Servers:
- intitle:"Apache2 Ubuntu Default Page: It works" site:http://site.com
- intitle:"Index of /" "Apache Server" site:http://site.com
- intitle:"Welcome to nginx" site:http://site.com
9. Finding API Keys:
- filetype:env "DB_PASSWORD" site:http://site.com
- intext:"api_key" filetype:env site:http://site.com
- intext:"AWS_ACCESS_KEY_ID" filetype:env site:http://site.com
10. Exposed Backup Files:
- filetype:bak inurl:backup site:http://site.com
- filetype:bak inurl:backup site:http://site.com
- filetype:zip inurl:backup site:http://site.com
- filetype:tgz inurl:backup site:http://site.com
#分析 #exploit
1. Discovering Exposed Files:
- intitle:"index of" "site:http://site.com"
- filetype:log inurl:log site:http://site.com
- filetype:sql inurl:sql site:http://site.com
- filetype:env inurl:.env site:http://site.com
2. Finding Sensitive Directories:
- inurl:/phpinfo.php site:http://site.com
- inurl:/admin site:http://site.com
- inurl:/backup site:http://site.com
- inurl:wp- site:http://site.com
3. Exposed Configuration Files:
- filetype:config inurl:config site:http://site.com
- filetype:ini inurl:wp-config.php site:http://site.com
- filetype:json inurl:credentials site:http://site.com
4. Discovering Usernames and Passwords:
- intext:"password" filetype:log site:http://site.com
- intext:"username" filetype:log site:http://site.com
- filetype:sql "password" site:http://site.com
5. Finding Database Files:
- filetype:sql inurl:db site:http://site.com
- filetype:sql inurl:dump site:http://site.com
- filetype:bak inurl:db site:http://site.com
6. Exposed Git Repositories:
- inurl:".git" site:http://site.com
- inurl:"/.git/config" site:http://site.com
- intitle:"index of" ".git" site:http://site.com
7. Finding Publicly Exposed Emails:
- intext:"email" site:http://site.com
- inurl:"contact" intext:"
@site
.com" -www.site.com
- filetype:xls inurl:"email" site:http://site.com
8. Discovering Vulnerable Web Servers:
- intitle:"Apache2 Ubuntu Default Page: It works" site:http://site.com
- intitle:"Index of /" "Apache Server" site:http://site.com
- intitle:"Welcome to nginx" site:http://site.com
9. Finding API Keys:
- filetype:env "DB_PASSWORD" site:http://site.com
- intext:"api_key" filetype:env site:http://site.com
- intext:"AWS_ACCESS_KEY_ID" filetype:env site:http://site.com
10. Exposed Backup Files:
- filetype:bak inurl:backup site:http://site.com
- filetype:bak inurl:backup site:http://site.com
- filetype:zip inurl:backup site:http://site.com
- filetype:tgz inurl:backup site:http://site.com
#分析 #exploit
❤4
Forwarded from SSShizoDEVcore🫧
СТАВИМ ВИНДУ В QEMU
Ставим Qemu desktop там весь нужный кал для запуска нашей прекрасной SpyWareOS11
создаем диск
Запускаем и ставим образ ос я брал тут
Далее проходим процес установки и стартуем ос
#куберсекс
pacman -S qemu-desktop
Ставим Qemu desktop там весь нужный кал для запуска нашей прекрасной SpyWareOS11
qemu-img create -f qcow2 win11.qcow2 64G
создаем диск
qemu-system-x86_64 \
-enable-kvm \
-m 4096 \
-cpu host \
-smp 4 \
-boot d \
-cdrom '/home/shizodev/Downloads/[Windows X-Lite] Optimum 11 25H2 Pro/[Windows X-Lite] Optimum 11 25H2 Pro.iso' \
-drive file=/home/shizodev/vmachines/win11.qcow2,format=qcow2 \
-netdev user,id=net0 \
-device e1000,netdev=net0
Запускаем и ставим образ ос я брал тут
Далее проходим процес установки и стартуем ос
qemu-system-x86_64 \
-enable-kvm \
-m 4096 \
-cpu host \
-smp 4 \
-boot d \
-drive file=/home/shizodev/vmachines/win11.qcow2,format=qcow2 \
-netdev user,id=net0 \
-device e1000,netdev=net0
#куберсекс
Forwarded from SSShizoDEVcore🫧
Windows 10 ВСЁ
Решения
Поставить Linux
Рекомендую Arch, EndavourOS, Kali
Или SpywareOS11 сборку от https://windowsxlite.com
Сборка где вырезанно все говно и малвари в подарок (я не делал аудит етих сборок и не могу сказать точно)
Ну либо уебите LTSC 11
RIP Windows 10
#куберсекс
Решения
Поставить Linux
Рекомендую Arch, EndavourOS, Kali
Или SpywareOS11 сборку от https://windowsxlite.com
Сборка где вырезанно все говно и малвари в подарок (я не делал аудит етих сборок и не могу сказать точно)
Ну либо уебите LTSC 11
#куберсекс