https://lovely.finance
Partnership/Collab: @JeromeSanxchez
Last updated 2 weeks, 3 days ago
Subscribe, Claim & Earn!
The First Proof of Subscribe coin
Powered by @notgram_game_bot
inspired by @notcoin
cooperation: @teamngt
No investment required
Notgram operates on the @TONblockchain independently and doesn't affiliated with Telegram
Last updated 2 months, 1 week ago
SRA Program Guidelines
Last updated 1 year, 2 months ago
WTS SMS SENDER.
- DM: @SurpriseMTFK
*We provide automation services to add new services to your infrastructure. With this service, you can easily add new services by just providing the required credentials, such as content ID, etc.
The process is simple:
You provide the required credentials, such as login credentials, to us.
We implement new services based on the information you provide.
Once the implementation is complete, you will receive a final response containing the MPD (Media Presentation Description) Manifest URL and the required keys.
With this service, you can quickly and efficiently add new services without having to worry about the technical details of the implementation. We will handle all matters related to implementation so that you can focus on the development (backend) of your business.*
Front: https://dev.kepala-pantas.xyz/ (Under Construction)
Back: https://dev.kepala-pantas.xyz/dev/docs/
Sincerely: @SurpriseMTFK
PLEASE DONT POSTING SOME SHIT TOOL LIKE AUTO BACKDOOR SHELL ETC. ACTUALLY THE SOURCE ONLY FOR SHELL FINDING, NOT THE EXPLOIT, HOW IDIOT, PLEASE DONT GIVE OTHER A FAKEHOPE ?
https://github.com/ThatNotEasy/CVE-2024-3273
GitHub
GitHub - ThatNotEasy/CVE-2024-3273: D-Link NAS Command Execution Exploit
D-Link NAS Command Execution Exploit. Contribute to ThatNotEasy/CVE-2024-3273 development by creating an account on GitHub.
Btw, so many ask me for Source Code cPanel Cracking, please read on the git description first, if still confusing, can DM!
https://github.com/ThatNotEasy/CVE-2024-23897
- This repository contains a Python script that exploits a critical vulnerability (CVE-2024-23897) in Jenkins, leading to arbitrary file read and remote code execution (RCE). This vulnerability allows an unauthenticated attacker to execute arbitrary commands on the target Jenkins server, potentially compromising the entire system.
GitHub
GitHub - ThatNotEasy/CVE-2024-23897: Perform with massive Jenkins Reading-2-RCE
Perform with massive Jenkins Reading-2-RCE. Contribute to ThatNotEasy/CVE-2024-23897 development by creating an account on GitHub.
any wanna continue my repo?
SMF 2.0.4 admin payload code execution
⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.
⚪️ payload code must escape from \', so you should try with something like that:
⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.
⚪️ For character_set - another story, as far as I remember, because here we have
⚪️ a nice stored xss. ;)
⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:
Code:
'.$page; curl\_close($ch); // to close 'logged\-in' part ?>#Execution #XSS #Payload
➖➖➖➖➖➖➖➖➖➖
https://lovely.finance
Partnership/Collab: @JeromeSanxchez
Last updated 2 weeks, 3 days ago
Subscribe, Claim & Earn!
The First Proof of Subscribe coin
Powered by @notgram_game_bot
inspired by @notcoin
cooperation: @teamngt
No investment required
Notgram operates on the @TONblockchain independently and doesn't affiliated with Telegram
Last updated 2 months, 1 week ago
SRA Program Guidelines
Last updated 1 year, 2 months ago