cookie

Мы используем файлы cookie для улучшения сервиса. Нажав кнопку «Принять все», вы соглашаетесь с использованием cookies.

avatar

Bug bounty Tips

🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️‍♂️ OSINT Specialist Admin: @addyy_crazy

Больше
Рекламные посты
853
Подписчики
+224 часа
+237 дней
+8730 дней

Загрузка данных...

Прирост подписчиков

Загрузка данных...

Показать все...
Malware Reverse Engineering for Beginners - Part 1: From 0x0

Reverse engineering is an integral part of malware analysis and research - get started learning this advanced skill to investigate malware.

Фото недоступноПоказать в Telegram
Ethical Hacking Masterclass Contains every single thing you need to know from zero level to advanced. It's very comprehensive. Size: 56.1 GB Link: https://drive.google.com/drive/folders/1mZwaNmPJB6OcGf-lSejIvbU8y2YxjDt4
Показать все...
00:27
Видео недоступноПоказать в Telegram
🖥 SQLMC - SQL Injection Massive Checker ▪install : pip3 install sqlmc @linuxkalii
Показать все...
demo (5).mp41.67 MB
🔥 1
Фото недоступноПоказать в Telegram
how many do you thing, this all will work
Показать все...
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) CVSS: 9.1 (CRITICAL) Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass. Exploit: https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806 This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2. Query: Hunter: /product.name="MOVEit Transfer" FOFA: app="Progress-MOVEit" SHODAN: product:"MOVEit Transfer"
Показать все...
GitHub - watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806: Exploit for the CVE-2024-5806

Exploit for the CVE-2024-5806. Contribute to watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806 development by creating an account on GitHub.

Wireshark.pdf
Показать все...
Wireshark.pdf1.69 KB
Показать все...
Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated)

Salt Labs researchers identified generative AI ecosystems as a new interesting attack vector. vulnerabilities found during this research on ChatGPT ecosystem could have granted access to accounts of users, including GitHub repositories, including 0-click attacks.

Фото недоступноПоказать в Telegram
this is mine what about your guys let's see
Показать все...
API Security Notes.pdf6.92 KB
07:39
Видео недоступноПоказать в Telegram
What is Hound? Hound is a tool that can remotely capture the exact GPS coordinates of a target device using a PHP server, and can also grab basic information about the system and ISP. This tool can be very helpful in information gathering. you can get following information of the target device Longitude Latitude Device Model Operating System Number of CPU Cores Screen Resolution User agent Public IP Address Browser Name ISP Information Features The tool offers a wide range of features and functionality, including: Capture Exact GPS Location Automated Data Collection User-friendly Interface This Tool Tested On : Kali Linux Windows(WSL) Termux MacOS Ubuntu Parrot Sec OS Installing and requirements This tool require PHP for webserver, wget & unzip for download and extract cloudflare. First run following command on your terminal apt-get -y install php unzip git wget Installing (Kali Linux/Termux): git clone https://github.com/techchipnet/hound cd hound bash hound.sh
Показать все...
How Ethical Hacker Capture GPS Coordinates | #hound Tool.mp453.04 MB
🤬 1
Выберите другой тариф

Ваш текущий тарифный план позволяет посмотреть аналитику только 5 каналов. Чтобы получить больше, выберите другой план.