L33T

Description
Author: @SurpriseMTFK

Github: https://github.com/ThatNotEasy
Youtube: https://www.youtube.com/@w00t_
Advertising
We recommend to visit

https://lovely.finance

Partnership/Collab: @JeromeSanxchez

Last updated 2 weeks, 3 days ago

Subscribe, Claim & Earn!
The First Proof of Subscribe coin

Powered by @notgram_game_bot

inspired by @notcoin

cooperation: @teamngt

No investment required
Notgram operates on the @TONblockchain independently and doesn't affiliated with Telegram

Last updated 2 months, 1 week ago

SRA Program Guidelines

Last updated 1 year, 2 months ago

5 months, 2 weeks ago

WTS SMS SENDER.

- DM: @SurpriseMTFK

5 months, 2 weeks ago

*We provide automation services to add new services to your infrastructure. With this service, you can easily add new services by just providing the required credentials, such as content ID, etc.

The process is simple:

You provide the required credentials, such as login credentials, to us.
We implement new services based on the information you provide.
Once the implementation is complete, you will receive a final response containing the MPD (Media Presentation Description) Manifest URL and the required keys.
With this service, you can quickly and efficiently add new services without having to worry about the technical details of the implementation. We will handle all matters related to implementation so that you can focus on the development (backend) of your business.*

Front: https://dev.kepala-pantas.xyz/ (Under Construction)
Back: https://dev.kepala-pantas.xyz/dev/docs/

Sincerely: @SurpriseMTFK

6 months ago

PLEASE DONT POSTING SOME SHIT TOOL LIKE AUTO BACKDOOR SHELL ETC. ACTUALLY THE SOURCE ONLY FOR SHELL FINDING, NOT THE EXPLOIT, HOW IDIOT, PLEASE DONT GIVE OTHER A FAKEHOPE ?

8 months, 2 weeks ago

https://github.com/ThatNotEasy/CVE-2024-3273

GitHub

GitHub - ThatNotEasy/CVE-2024-3273: D-Link NAS Command Execution Exploit

D-Link NAS Command Execution Exploit. Contribute to ThatNotEasy/CVE-2024-3273 development by creating an account on GitHub.

L33T
8 months, 4 weeks ago
L33T
9 months, 2 weeks ago

Btw, so many ask me for Source Code cPanel Cracking, please read on the git description first, if still confusing, can DM!

10 months, 1 week ago

https://github.com/ThatNotEasy/CVE-2024-23897

- This repository contains a Python script that exploits a critical vulnerability (CVE-2024-23897) in Jenkins, leading to arbitrary file read and remote code execution (RCE). This vulnerability allows an unauthenticated attacker to execute arbitrary commands on the target Jenkins server, potentially compromising the entire system.

GitHub

GitHub - ThatNotEasy/CVE-2024-23897: Perform with massive Jenkins Reading-2-RCE

Perform with massive Jenkins Reading-2-RCE. Contribute to ThatNotEasy/CVE-2024-23897 development by creating an account on GitHub.

- This repository contains a Python script that exploits a critical vulnerability (CVE-2024-23897) in Jenkins, leading to arbitrary file read …
10 months, 2 weeks ago
any wanna continue my repo?

any wanna continue my repo?

11 months, 1 week ago

SMF 2.0.4 admin payload code execution

⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.

⚪️ payload code must escape from \', so you should try with something like that:

⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.

⚪️ For character_set - another story, as far as I remember, because here we have

⚪️ a nice stored xss. ;)

⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:

Code:

'.$page; curl\_close($ch); // to close 'logged\-in' part ?>

#Execution #XSS #Payload

12 months ago
L33T
We recommend to visit

https://lovely.finance

Partnership/Collab: @JeromeSanxchez

Last updated 2 weeks, 3 days ago

Subscribe, Claim & Earn!
The First Proof of Subscribe coin

Powered by @notgram_game_bot

inspired by @notcoin

cooperation: @teamngt

No investment required
Notgram operates on the @TONblockchain independently and doesn't affiliated with Telegram

Last updated 2 months, 1 week ago

SRA Program Guidelines

Last updated 1 year, 2 months ago