Search results

  1. D

    CVE-2024-4358 | Telerik Report Server

    Telerik Report Server deserialization and authentication bypass exploit Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) :sneaky: https://github.com/sinsinology/CVE-2024-4358
  2. D

    recovering files from anonfiles?

    hi, I see that there are several publications with interesting information but have the file in anonfiles (which no longer works), is there any way to see these files again? anonfiles no longer works completely or has a different domain maybe where it still stores and you can see the uploaded files?
  3. D

    dockers page?

    hi, any website that you recommend to download dockers but that does not have malware please, there are already many like that...
  4. D

    ip rotation tool: catspin

    maybe some of you have already heard of this tool, there are websites that have a very powerful waf, which at the minimum scan already blocks you, this tool allows you to scan rotating your ip in the process, if it blocks one you can continue scanning with another. You will need an aws account...
  5. D

    How to download and start OpenBullet 2

    This guide explains all the necessary steps to get OpenBullet 2 running on your system. 😁 There are two official clients for OpenBullet 2, choose the one that best suits your needs. https://discourse.openbullet.dev/t/how-to-download-and-start-openbullet-2/29
  6. D

    r4ven ~ Track the IP address and GPS location

    Track the IP address and GPS location of the user's smartphone or PC and capture a picture of the target, along with device information. https://github.com/spyboy-productions/r4ven This tool is a Proof of Concept and is for Educational Purposes Only. Using this tool, you can find out what...
  7. D

    trufflehog - Find and verify credentials

    TruffleHog is an open source security tool used to search and detect confidential or secret information embedded in code repositories. The main goal of TruffleHog is to identify potential leaks of sensitive information such as passwords, API keys, access tokens, certificates and other secrets...
  8. D

    FrostBank Checker By G-KLIT

    very cool, I will try it, thanks for the post. 🤠
  9. D

    DOME - A subdomain enumeration tool

    Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports https://github.com/v4d1/Dome Top Features Easy to use. Just install the requirements.txt and run Active and Passive scan (read above) Faster...
  10. D

    What are you up to tomorrow?

    I was thinking of doing some hack the box machine, then going to the hairdresser to get a haircut, in the evening I don't know maybe do some sport or go out partying, whichever comes first. :)
  11. D

    KARMA-DDoS

    DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. ) https://github.com/HyukIsBack/KARMA-DDoS
  12. D

    awesome hacker search engines

    if you are just starting out in the world of hacking this may be useful for you A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more General • Servers • Vulnerabilities • Exploits • Attack surface •...
  13. D

    AI WEBSITES

    Marketing and Design : https://leonardo.ai/ AI Copywriting, Graphic Design, Video Editing : https://app.simplified.com Text to image AI : https://stablediffusionweb.com/ Image editing AI : https://prisma-ai.com Realistic images from description : https://openai.com/dall-e-2 Perplexity AI with...
  14. D

    Get FREE Digital Products on G2A & Sell Them on Paxful for 100% Profit - $5K+ A DAY

    then I will be rich :moneyxd:, thanks for sharing, I will try the method , from what I see in the video if it works.
  15. D

    CRLFsuite - CRLF injection scanner

    The most powerful CRLF injection (HTTP Response Splitting) scanner. https://github.com/Raghavd3v/CRLFsuite Features Single URL scanning Multiple URL scanning Stdin supported WAF detection Powerful payload generator CRLF Injection to XSS Chaining feature GET & POST method supported Concurrency...
  16. D

    Skupper - Multicloud communication

    Skupper is an implementation of a Virtual Application Network, enabling hybrid cloud communication. Skupper enables cloud communication by enabling you to create a Virtual Application Network. This application layer network decouples addressing from the underlying network infrastructure. This...
  17. D

    HBSQLI: Automated Tester For Header Based Blind SQL Injection

    Hi guys, I'm sharing a new tool I found. HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the process of detecting Header Based Blind SQL injection vulnerabilities, making it easier for security researchers ...
  18. D

    Database scanner CMS config

    thanks for the code, nice content, I will try it, this is very useful for me. :)
  19. D

    Investigating Network Intrusions and Cyber Crime - BOOK

    Computer Forensics - Investigating Network Intrusions and Cyber Crime Source: EC-Council Certification: C|HFI – Computer Hacking Forensic Investigator Function: to identify an intruder’s footprints Content: CHAPTER 1: Network Forensics and Investigating Logs.. CHAPTER 2: Investigating Network...
  20. D

    osint tools for social networks ?

    Hi guys, I want to learn how to make osint to social networks, what tools do you recommend to use in these cases, thanks.
Top Bottom