cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

ARVIN

For Advertising And Contact Tox:D6164C90642CD93D9D3F353511B4BDBD1428309C90CDE13D3D7088AA5BE3010A52E485834E84

Mostrar más
Publicaciones publicitarias
7 773
Suscriptores
+2924 horas
+1477 días
+59030 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

⭕️ آسیب پذیری جدید به نام regreSSHion روی OpenSSH کشف شده که به هکرها اجازه اجرای کد از راه دور را میدهد. شماره CVE ثبت شده CVE-2024-6387 که تحلیل این آسیب پذیری رو میتونید اینجا بخونید. در ایران بالای 85 هزار سرور آسیب پذیر به این آسیب پذیری RCE وجود داره لطفا اطلاع رسانی کنید.
Mostrar todo...
🚨 CVE-2024-5352 A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
Mostrar todo...

hemrajsingh.com.tar.gz794.46 MB
deeptechbytes.com.gz721.79 MB
aknetworksolutions.com.gz675.61 MB
theaigrowthschool.com.tar.gz621.98 MB
thedigitalmates.com.tar.gz429.74 MB
acornhotels.in.tar.gz423.94 MB
aarzookhurana.com.tar.gz2063.04 MB
thetravellertrails.in.tar.gz2060.13 MB
kitabbhavan.net.tar.gz1261.41 MB
tourismscouts.com.tar.gz895.17 MB
- Fixed Bugs - Added Google token grabber - Now Stealer steal browsers without killing their process (tested on Chromium and FireFox) - Stealer now sends password tags and cookies tags along with the file
Mostrar todo...
Phemedrone Stealer V2.2.0.zip4.04 MB
📌 CVE-2024-34257 TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
Mostrar todo...
TOTOLINK EX1800T has an unauthorized arbitrary command execution vulnerability | Notion

1. Vulnerability description

Photo unavailableShow in Telegram
Neat trick for SVG file upload exploits. Add a foreignObject tag and include almost any working XSS payload in the SVG image file. Helpful for bypassing CSP or bypassing servers that strip strings. Many file uploads allow SVGs and are prone to tampering. <svg width="600" height="400" xmlns="w3.org/2000/svg" xmlns:xhtml="w3.org/1999/xhtml"> <foreignObject width="100%" height="100%"> <body xmlns="w3.org/1999/xhtml"> <iframe src='javascript:confirm(10)'></iframe> </body> </foreignObject> </svg>
Mostrar todo...
📌 WMIObject important command : 🔖 چون این دستورات فقط روی پاورشل ورژن 5 اجرا میشن و روی پاورشل ورژن 7 اجرا نمیشن پس برای جلوگیری از fileless اتک و بدست آوردن ریزالت این کامند ها، پاورشل ورژن 5 و همینطور cmd تون رو در سیستم عاملتون دیسیبل کنین و بجاش پاورشل ورژن 7 بیارین بالا # Get information about the BIOS Get-WmiObject -Class Win32_BIOS # Get information about the CPU Get-WmiObject -Class Win32_Processor # Get information about the memory (RAM) Get-WmiObject -Class Win32_PhysicalMemory # Get information about disk drives Get-WmiObject -Class Win32_DiskDrive # Get specific properties of the disk drives Get-WmiObject -Class Win32_DiskDrive | Select-Object Model, Size
Mostrar todo...
מסמכי ARROWNET.part1.rar3993.60 MB
מסמכי ARROWNET.part2.rar1487.08 MB
Arrownet.part1.rar3891.20 MB
Arrownet.part2.rar3891.20 MB
20GB ArrowNet PoC 👇🏻
Mostrar todo...
Repost from Handala Leak
מסמכי ARROWNET.part1.rar3993.60 MB
מסמכי ARROWNET.part2.rar1487.08 MB
Arrownet.part1.rar3891.20 MB
Arrownet.part2.rar3891.20 MB
Elige un Plan Diferente

Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.