Jump to content

KRONZY

Member
  • Posts

    20
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by KRONZY

  1. dusmanilor vin peste voi

     

  2. KRONZY

    test

    "><img src=muie onerror=alert(1)> ????
  3. Salut, cautam persoane care sa se alature unei echipe de redactie in cadrul unui site de stiri IT / Tehnologie / Securitate, suntem in cautare de persoane serioase. Articolele postate trebuie sa fie originale (nu copy paste de pe alte site-uri), si sa fie usor de inteles. Model aplicatie: - Nume: - Nick discord Castiguri vor fi pentru toata lumea implicata si serioasa. In 2-3 luni daca merge bine treaba nu pot garanta bani (poate 6-12 luni) dar stiu pe cineva de la o firma mare din ro iar staff-ul va putea sa ceara produse (de pe numeletau@1337x.vip) pentru review, dupa review produsele vor ramane la scriitori.
  4. https://community.mybb.com/thread-92404-post-674080.html#pid674080
  5. https://www.hackthebox.eu http://www.wechall.net/ https://www.hellboundhackers.org/ https://www.enigmagroup.org/ http://www.lost-chall.org/ http://www.yashira.org/ http://www.caesum.com/ https://www.net-force.nl/ http://www.hacker.org/
  6. https://firebounty.com/ https://www.hackerone.com/ https://www.bugcrowd.com/ https://www.vulnerability-lab.com/list-of-bug-bounty-programs.php
  7. Wi-Fi Security/ 2015-02-08 08:27 - [unknown item..] Web App Security/ 2015-02-08 08:27 - [unknown item..] System Security/ 2015-02-08 08:27 - [unknown item..] Ruby and Metasploit/ 2015-02-08 08:27 - [unknown item..] Network Security/ 2015-02-08 08:26 - [unknown item..] [Protected content]
  8. sa va dau la views la toti care miati dat -1 atrofiatilor

  9. am zi k cn imi mai da -1 mama lor e curva, deci mama voastra e curva kare miati dat vam facuto

  10. https://www.owasp.org/index.php/Testing_for_HTML_Injection_(OTG-CLIENT-003) HTML injection is a type of injection issue that occurs when a user is able to control an input point and is able to inject arbitrary HTML code into a vulnerable web page. This vulnerability can have many consequences, like disclosure of a user's session cookies that could be used to impersonate the victim, or, more generally, it can allow the attacker to modify the page content seen by the victims. Nu mai posta de +1, mersi. T/C INACTIV
  11. Este un program util ( Are toate tool-urile din Kali ) Consola: Tool-uri: De ceva timp nu sau mai facut update-uri da va faceti singur de pe github. Download: [Protected content]
  12. Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS. subbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist. The credit goes to TheRook who is the author of subbrute. installation git clone https://github.com/aboul3la/Sublist3r.git Recommended Python Version: Sublist3r currently supports Python 2 and Python 3. The recommended version for Python 2 is 2.7.x The recommened version for Python 3 is 3.4.x Dependencies: Sublist3r depends on the requests, dnspython, and argparse python modules. These dependencies can be installed using the requirements file: Installation on Windows: c:\python27\python.exe -m pip install -r requirements.txt Installation on Linux sudo pip install -r requirements.txt Alternatively, each module can be installed independently as shown below. Requests Module (http://docs.python-requests.org/en/latest/) Install for Windows: c:\python27\python.exe -m pip install requests Install for Ubuntu/Debian: sudo apt-get install python-requests Install for Centos/Redhat: sudo yum install python-requests Install using pip on Linux: sudo pip install requests dnspython Module (http://www.dnspython.org/) Install for Windows: c:\python27\python.exe -m pip install dnspython Install for Ubuntu/Debian: sudo apt-get install python-dnspython Install using pip: sudo pip install dnspython argparse Module Install for Ubuntu/Debian: sudo apt-get install python-argparse Install for Centos/Redhat: sudo yum install python-argparse Install using pip: sudo pip install argparse for coloring in windows install the following libraries c:\python27\python.exe -m pip install win_unicode_console colorama Usage Short Form Long Form Description -d --domain Domain name to enumerate subdomains of -b --bruteforce Enable the subbrute bruteforce module -p --ports Scan the found subdomains against specific tcp ports -v --verbose Enable the verbose mode and display results in realtime -t --threads Number of threads to use for subbrute bruteforce -e --engines Specify a comma-separated list of search engines -o --output Save the results to text file -h --help show the help message and exit Examples To list all the basic options and switches use -h switch: python sublist3r.py -h To enumerate subdomains of specific domain: python sublist3r.py -d example.com To enumerate subdomains of specific domain and show only subdomains which have open ports 80 and 443 : python sublist3r.py -d example.com -p 80,443 To enumerate subdomains of specific domain and show the results in realtime: python sublist3r.py -v -d example.com To enumerate subdomains and enable the bruteforce module: python sublist3r.py -b -d example.com To enumerate subdomains and use specific engines such Google, Yahoo and Virustotal engines python sublist3r.py -e google,yahoo,virustotal -d example.com Using Sublist3r as a module in your python scripts Example import sublist3r subdomains = sublist3r.main(domain, no_threads, savefile, ports, silent, verbose, enable_bruteforce, engines) The main function will return a set of unique subdomains found by Sublist3r Function Usage: domain: The domain you want to enumerate subdomains of. savefile: save the output into text file. ports: specify a comma-sperated list of the tcp ports to scan. silent: set sublist3r to work in silent mode during the execution (helpful when you don't need a lot of noise). verbose: display the found subdomains in real time. enable_bruteforce: enable the bruteforce module. engines: (Optional) to choose specific engines. Example to enumerate subdomains of Yahoo.com: import sublist3r subdomains = sublist3r.main('yahoo.com', 40, 'yahoo_subdomains.txt', ports= None, silent=False, verbose= False, enable_bruteforce= False, engines=None) Download [Protected content]
  13. Nume: KRONZY P.o.C ( Video, Poza): Site: https://sdl.developer.nokia.com ( Apartine de microsoft )
  14. Nu postați XSS-uri sau orice altă vulnerabilitate din site-urile care nu au program de Bug Bounty. Exemple: Poliție, FBI, Instituții guvernamentale, s.a.m.d. Site-uri în care găsiți programul Bug Bounty: https://www.bugcrowd.com/ https://www.hackerone.com/ MODE TOPIC: Nume: Dovadă (video, poze) : Website: Autor: KRONZY
×
×
  • Create New...