Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ7โก1๐1
https://cyfare.net/
- ExploitDB - Exploits, Shellcodes, Dorks
- Malware Query Engine - Download, Search, Hunt & Intel
- Sandbox - Best Free Deep File Scanner with Unlimited file scans, 100+ yara rules, based on OPSWAT next-gen sandbox
- ExploitDB - Exploits, Shellcodes, Dorks
- Malware Query Engine - Download, Search, Hunt & Intel
- Sandbox - Best Free Deep File Scanner with Unlimited file scans, 100+ yara rules, based on OPSWAT next-gen sandbox
๐5
Brut Security pinned ยซhttps://cyfare.net/ - ExploitDB - Exploits, Shellcodes, Dorks - Malware Query Engine - Download, Search, Hunt & Intel - Sandbox - Best Free Deep File Scanner with Unlimited file scans, 100+ yara rules, based on OPSWAT next-gen sandboxยป
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - initstring/cloud_enum: Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. - initstring/cloud_enum
๐1
If you're into generating subdomains quickly ๐
check out this website: husseinphp.github.io/subdomain/
#bugbountytips #bugbountytip #BugBounty
check out this website: husseinphp.github.io/subdomain/
#bugbountytips #bugbountytip #BugBounty
โค6
Which One Applies To You?
Anonymous Poll
39%
Red Teamer ๐
5%
Blue Teamer ๐ง
3%
Purple Teamer ๐
35%
Bug Hunter ๐ค
3%
Forensic ๐ป
15%
Beginner ๐
Thank You All Who Wished Me A Happy Teacher's Day ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4
Some of the BEST Extensions for Burp Suite,
1. Autorize
2. Turbo Intruder
3. JS Link Finder
4. SQLiPy Sqlmap Integration
5. Burp NoSQLi Scanner
6. InQL Scanner
7. Logger++
8. Param Miner
9. Upload Scanner
10. Auto Repeater
1. Autorize
2. Turbo Intruder
3. JS Link Finder
4. SQLiPy Sqlmap Integration
5. Burp NoSQLi Scanner
6. InQL Scanner
7. Logger++
8. Param Miner
9. Upload Scanner
10. Auto Repeater
๐6โค4
CVE-2024-44000: Unauthenticated Account Takeover in LiteSpeed Cache plugin for WordPress, 9.8 rating ๐ฅ
A vulnerability in the debug log allows attackers to gain access to user sessions, potentially leading to complete control over a website.
Search at Netlas.io:
๐ Link: https://nt.ls/syLAy
๐ Dork: http.body:"plugins/litespeed-cache"
Read more: https://securityonline.info/cve-2024-44000-cvss-9-8-litespeed-cache-flaw-exposes-millions-of-wordpress-sites-to-takeover-attacks/
A vulnerability in the debug log allows attackers to gain access to user sessions, potentially leading to complete control over a website.
Search at Netlas.io:
๐ Link: https://nt.ls/syLAy
๐ Dork: http.body:"plugins/litespeed-cache"
Read more: https://securityonline.info/cve-2024-44000-cvss-9-8-litespeed-cache-flaw-exposes-millions-of-wordpress-sites-to-takeover-attacks/
๐4
๐จ Breaking O-Auth: 2 Days Challenge ๐จ
Are you ready to dive into the world of OAuth attacks? Join us for an intense 2-day challenge where you'll master the art of breaking OAuth through hands-on practicals and solid theory!
๐ก Whatโs in store?
๐ Day 1: Learn the fundamentals of OAuth and how it's implemented across applications. Weโll cover OAuth flows, token types, scopes, and common pitfalls.
๐ ๏ธ Day 2: Get your hands dirty with real-world OAuth vulnerabilities. Experience first-hand how attackers exploit misconfigurations and weaknesses, and learn how to patch them!
This challenge is for hackers and security professionals looking to level up their skills in OAuth security. Whether youโre a beginner or a pro, this challenge will help you understand the inner workings of OAuth and its vulnerabilities.
๐ฉโ๐ป Practical + Theory: Each day is a balanced mix of hands-on exercises and deep-dive discussions to help you truly understand OAuthโs attack surface.
๐ Where: https://nas.io/brutsecurity/challenges/breaking-oauth-4-days-challenge-copy
Donโt miss out on this opportunity to learn and conquer OAuth!
Are you ready to dive into the world of OAuth attacks? Join us for an intense 2-day challenge where you'll master the art of breaking OAuth through hands-on practicals and solid theory!
๐ก Whatโs in store?
๐ Day 1: Learn the fundamentals of OAuth and how it's implemented across applications. Weโll cover OAuth flows, token types, scopes, and common pitfalls.
๐ ๏ธ Day 2: Get your hands dirty with real-world OAuth vulnerabilities. Experience first-hand how attackers exploit misconfigurations and weaknesses, and learn how to patch them!
This challenge is for hackers and security professionals looking to level up their skills in OAuth security. Whether youโre a beginner or a pro, this challenge will help you understand the inner workings of OAuth and its vulnerabilities.
๐ฉโ๐ป Practical + Theory: Each day is a balanced mix of hands-on exercises and deep-dive discussions to help you truly understand OAuthโs attack surface.
๐ Where: https://nas.io/brutsecurity/challenges/breaking-oauth-4-days-challenge-copy
Donโt miss out on this opportunity to learn and conquer OAuth!
nas.io
Breaking O-Auth : 2 Days Challenge
2 days โข Challenge by Rahim7x
Brut Security pinned ยซ๐จ Breaking O-Auth: 2 Days Challenge ๐จ Are you ready to dive into the world of OAuth attacks? Join us for an intense 2-day challenge where you'll master the art of breaking OAuth through hands-on practicals and solid theory! ๐ก Whatโs in store? ๐ Day 1: Learnโฆยป
Filed another report explaining the root cause in detail. If we get 200 members in the O-auth challenge I'll disclose the report exclusively here
โค1
๐ฎ NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data for given IP addresses using various online services.
๐https://github.com/nullenc0de/netscan
๐https://github.com/nullenc0de/netscan
๐ฅ6โค1