cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

👿☠💀MH-13-CYB3R 💀☠👿

👿WELCOME To MH-13-CYB3R COMMUNITY👿 ➡️HACKING TRICKS ➡️CARDING TRICKS ➡️DARKWEB TUTORIALS ➡️PROGRAMMING THINGS ➡️MODDED APPS ➡️HIGH QUALITY BINS ➡️PREMIUM ACCOUNTS ➡️PREMIUM COURSES

نمایش بیشتر
پست‌های تبلیغاتی
431
مشترکین
اطلاعاتی وجود ندارد24 ساعت
اطلاعاتی وجود ندارد7 روز
اطلاعاتی وجود ندارد30 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

🔰 BEST OPEN SOURCE SQL INJECTION TOOLS 🔰 1 SQLMap – Automatic SQL Injection And Database Takeover Tool 2 jSQL Injection – Java Tool For Automatic SQL Database Injection 3 BBQSQL – A Blind SQL-Injection Exploitation Tool 4 NoSQLMap – Automated NoSQL Database Pwnage 5 Whitewidow – SQL Vulnerability Scanner 6 DSSS – Damn Small SQLi Scanner 7 explo – Human And Machine Readable Web Vulnerability Testing Format 8 Blind-Sql-Bitshifting – Blind SQL-Injection via Bitshifting 9 Leviathan – Wide Range Mass Audit Toolkit 10 Blisqy – Exploit Time-based blind-SQL-injection in HTTP-Headers (MySQL/MariaDB)
نمایش همه...
نمایش همه...
Analysis of MS Word to drop Remcos RAT

As-salamu Alaykum

24 of 2021_UIDAI-0624d8136a02d72.65885742.pdf3.32 MB
Aadhar Card Audit by CAG CAG's audit report on UIDAI is out and it clearly expresses some of the critical issues which have been part of the debate for so long. Particularly - 1) de-duplication - Issuing of Aadhaar with the same biometric data to different residents that rips apart the basic foundation of the system - the uniqueness. 2) No full proof documents are required for verification of residency i.e. there is no assurance that all the Aadhaar holders in the country are its residents. 3) Missing documents in the database linked with its Aadhar number is again a serious issue that is called out here. 4) The uniqueness further takes a hit while issuing the Aadhaar numbers to minor children below the age of five because it is based on the biometrics of their parents hence going against the basic tenet of the Aadhaar Act. Hope this might awaken something in UIDAI to accept, act and commit to improving the system. Full report - https://lnkd.in/dBW9gU3M #aadhar #india #Copied More at @MH13CYB3R
نمایش همه...
Bypassing EDR real-time injection detection logic https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection More at @MH13CYB3R
نمایش همه...

Subfinder: Fast Passive Subdomain Enumeration Tool in Linux trendoceans.com/subfinder-linu… ●▬۩❁ @MH13CYB3R ❁۩▬● #recon #dns
نمایش همه...
Subfinder: Fast Passive Subdomain Enumeration Tool in Linux - TREND OCEANS

Subfinder is a free and open-source subdomain discovery tool that discovers valid subdomains for websites. It uses passive online sources to find the subdomain of the site following all the licenses and usage restrictions.

🪙 Owasp Cheat Sheet Series: Huge collection of resources on application security for implementing controls. Covers list of 78 cheat sheets on topics such as: - XSS - AuthZ - Input Validation - MFA, & so on https://cheatsheetseries.owasp.org/Glossary.html ●▬۩❁ @MH13CYB3R ❁۩▬● #owasp
نمایش همه...
Index Alphabetical - OWASP Cheat Sheet Series

Website with the collection of all the cheat sheets of the project.

🕵️ The Collection of 4000+ OSINT resources to use for Information Gathering & More. 🔗 https://metaosint.github.io/table/ ●▬۩❁ @MH13CYB3R ❁۩▬● #OSINT
نمایش همه...
MetaOSINT | Jumpstart Your OSINT Investigation

MetaOSINT enables open source intelligence ("OSINT") practitioners to jumpstart their investigations by quickly identifying relevant, publicly-available tools and resources, saving valuable time during investigations, research, and analysis.

🌟Top XSS (Cross Site Scripting) Tools : 🌟 1) BeeF 2) BlueLotus_XSSReceiver 3) xssor2 4) Xsser-Varbaek 5) Xsser-Epsylon 6) Xenotix ●▬۩❁ @MH13CYB3R ❁۩▬● #xss
نمایش همه...