Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3🗿3❤1
Forwarded from Netlas.io
🔥 Improved Interaction with Private Scanner 🔥
Netlas 0.25.1 Update was published. IP/Domain information is now sourced from private scans if they are more relevant than general results. Check out the example in the picture! 👾
👉 Read about other changes: https://docs.netlas.io/changelog/
Netlas 0.25.1 Update was published. IP/Domain information is now sourced from private scans if they are more relevant than general results. Check out the example in the picture! 👾
👉 Read about other changes: https://docs.netlas.io/changelog/
👍2
Worlds fastest unlimited single and bulk subdomain finder! Use desktop!
https://cyfare.net/apps/subfind/
https://cyfare.net/apps/subfind/
🔥9
❤4
⚡Top Hacking / Cyber Security Related Posts
🪪By Daniel Kelley
🔗https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3
🪪By Daniel Kelley
🔗https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3
❤5👍3
CVE-2024-31449 and other: Multiple vulnerabilities in Redis, 4.5 - 8.8 rating❗️
Three fresh vulnerabilities allow an attacker to perform RCE due to errors in the Lua noscripting engine or DoS via malformed Access Control List selectors.
Search at Netlas.io:
👉 Link: https://nt.ls/1G7ul
👉 Dork: protocol:redis
Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
Three fresh vulnerabilities allow an attacker to perform RCE due to errors in the Lua noscripting engine or DoS via malformed Access Control List selectors.
Search at Netlas.io:
👉 Link: https://nt.ls/1G7ul
👉 Dork: protocol:redis
Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
👍6❤1
🌐 Google Dorking Made Easy
Link : https://dorksearch.com/
This Website help you with Google Dorking Try it Now and Give Reactions 🤟
#bugbounty #bugbountytips
Link : https://dorksearch.com/
This Website help you with Google Dorking Try it Now and Give Reactions 🤟
#bugbounty #bugbountytips
👍1🐳1
Please open Telegram to view this post
VIEW IN TELEGRAM
SubOwner - This tool is designed to check for subdomain takeovers by resolving the CNAME records and verifying them against known vulnerable services.
🔗 https://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7❤5
*CVE-2024-45409 | Ruby-SAML Auth Bypass In GitLab*
_*What You’ll Learn💡*_
1️⃣ *Overview | Dinoscription of CVE-2024-45409*
2️⃣ *Reconnaissance For CVE-2024-45409*
*Shodan.io*
*Censys.io*
*Fofa.info*
*Hunter.how*
*ZoomEYE.HK*
_<======================>_
3️⃣ *E͢x͢p͢l͢o͢i͢t͢ ☣️ CVE-2024-45409 | GiveWP WordPress Plugin Exploit*
4️⃣ *E͢x͢p͢l͢o͢i͢t͢ Installation📥*
5️⃣ *E͢x͢p͢l͢o͢i͢t͢ Tool Guide🧭*
6️⃣ *Impact_💥*
7️⃣ *Severity_⚠️*
8️⃣ *Remediation_♻️*
_https://yashsec.com/bug-bounty/cve-2024-45409-auth-bypass-in-gitlab/
_*What You’ll Learn💡*_
1️⃣ *Overview | Dinoscription of CVE-2024-45409*
2️⃣ *Reconnaissance For CVE-2024-45409*
*Shodan.io*
*Censys.io*
*Fofa.info*
*Hunter.how*
*ZoomEYE.HK*
_<======================>_
3️⃣ *E͢x͢p͢l͢o͢i͢t͢ ☣️ CVE-2024-45409 | GiveWP WordPress Plugin Exploit*
4️⃣ *E͢x͢p͢l͢o͢i͢t͢ Installation📥*
5️⃣ *E͢x͢p͢l͢o͢i͢t͢ Tool Guide🧭*
6️⃣ *Impact_💥*
7️⃣ *Severity_⚠️*
8️⃣ *Remediation_♻️*
_https://yashsec.com/bug-bounty/cve-2024-45409-auth-bypass-in-gitlab/
👍3
CVE-2024-43582: RCE in RDP Servers, 8.1 rating❗️
A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution. The patch is already available.
Search at Netlas.io:
👉 Link: https://nt.ls/Jyn4r
👉 Dork: protocol:rdp
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582
A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution. The patch is already available.
Search at Netlas.io:
👉 Link: https://nt.ls/Jyn4r
👉 Dork: protocol:rdp
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582
👍6
https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments/
how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
🔥6❤1
How would I exploit arbitrary file write into RCE on modern frameworks like Node js, Flask, Django ?
By overwriting existing templates with template injection payloads. ⭐
By overwriting existing templates with template injection payloads. ⭐
👍1
Don't miss this opportunity to boost your cybersecurity career!
#sponsored by
Please open Telegram to view this post
VIEW IN TELEGRAM