- 121
- 35 053
nu11secur1ty
Приєднався 4 тра 2023
I'm a System Administrator IT Infrastructure Engineer, Linux Architect, and Penetration Testing Engineer. I'm also an exploits developer and security researcher at packetstormsecurity.com. 0day.today cxsecurity.com. exploit-db.com, and cve.mitre.org - red-team oriented. I am also helping people who buy something dangerous for themselves without them knowing it, by publishing the software vulnerabilities of famous and many other vendors!
POMS PHP by oretnom23 v1.0 RCE
more: www.patreon.com/nu11secur1ty
PoC: www.nu11secur1ty.com/2024/11/poms-php-by-oretnom23-v10-copyright_18.html
PoC: www.nu11secur1ty.com/2024/11/poms-php-by-oretnom23-v10-copyright_18.html
Переглядів: 17
Відео
POMS PHP by oretnom23 v1.0 File Upload Vulnerability
Переглядів 2819 годин тому
more: www.patreon.com/nu11secur1ty PoC: www.nu11secur1ty.com/2024/11/poms-php-by-oretnom23-v10-copyright_8.html
POMS PHP by oretnom23 v1.0 SQLi Bypass Authentication
Переглядів 919 годин тому
more: www.patreon.com/nu11secur1ty PoC: www.nu11secur1ty.com/2024/11/poms-php-by-oretnom23-v10-copyright.html
CVE-2024-30055 A.K.A MISSING DEFENDER
Переглядів 1733 місяці тому
You can get all exploit docs and files here: [www.patreon.com/posts/cve-2024-30055-110018974] more: [www.rapid7.com/db/vulnerabilities/microsoft-edge-cve-2024-30055/] Best Regards
ossec-hids-automation-installer
Переглядів 705 місяців тому
Link: github.com/nu11secur1ty/ossec-hids.git
KORTEX-1.0 SQLi
Переглядів 1036 місяців тому
To see the full video with details, please subscribe to the channel on Patreon: [www.patreon.com/posts/kortex-1-0-sqli-103918506] The Penetration testing tool G0BurpSQLmaPI-PRO-24.3.1.4 source:[github.com/nu11secur1ty/G0BurpSQLmaPI/releases/tag/master] Best Regards
G0BurpSQLmaPI-PRO-24.3.1.4
Переглядів 836 місяців тому
Link: [github.com/nu11secur1ty/G0BurpSQLmaPI/releases/tag/master]
Travel Manager OTMSP-1.0
Переглядів 396 місяців тому
Demo for the latest version of G0BurpSQLmaPI: github.com/nu11secur1ty/G0BurpSQLmaPI/releases/tag/master Enjoy watching.
CVE 2024-21413 RCE
Переглядів 1,4 тис.6 місяців тому
IE security BUG! Here there is no cookie response, only an IP response, it depends on the case. This could be very dangerous and the endpoint users can lose sensitive information! If you want to get the exploit for your LAB, please subscribe to the Patreon:[www.patreon.com/posts/cve-2024-21413-102642948]
kruxton-1.0 Multiple-SQLi
Переглядів 1147 місяців тому
To get information about the exploit and how to reproduce it, please become a member of a Pаtreon channel:[www.patreon.com/posts/kruxton-1-0-sqli-102376444] Best Regards
kruxton-1.0 FileUpload-RCE
Переглядів 907 місяців тому
Уou can get more information if you become a member of a Patreon: [www.patreon.com/nu11secur1ty] channel and help it spread.
OpenVPN-GUI-AS
Переглядів 627 місяців тому
Web application management for your company with OpenVPN source:[github.com/nu11secur1ty/OpenVPN-AS] Donate if you respect someone's work, for you! And if you don't, shame on you! www.paypal.com/donate/?hosted_button_id=ZPQZT5XMC5RFY Best Regards
CVE-2024-21413 User Interaction Shutdown PC CRITICAL
Переглядів 1217 місяців тому
IMPORTANT: The exploit is оn the remote server, during and after the attack! This is a 0 DAY exploit based on Follina. DO NOT OPEN FILES or SAVE THEM, BY USING Outlook app, FROM UNAUTHORIZED PEOPLE! m0r3:[www.nu11secur1ty.com/2024/03/microsoft-outlook-remote-code-execution.html] m0r3:[www.patreon.com/posts/microsoft-remote-100840891] For an explanation of this vulnerability and to order a demo ...
CVE-2024-21413-RCE Python Exploit - 0DAY
Переглядів 3037 місяців тому
CVE-2024-21413-RCE Python Exploit - 0DAY
CVE-2024-21413-RCE Alias attack - 0DAY
Переглядів 5367 місяців тому
CVE-2024-21413-RCE Alias attack - 0DAY
Quick-Cms v6.7-en-updated-2023.08.01-SQLi
Переглядів 747 місяців тому
Quick-Cms v6.7-en-updated-2023.08.01-SQLi
MSMS PHP by oretnom23 v1.0 File Upload RCE web browser using
Переглядів 2648 місяців тому
MSMS PHP by oretnom23 v1.0 File Upload RCE web browser using
employee_akpoly 1.0-2024 Multiple SQLi
Переглядів 988 місяців тому
employee_akpoly 1.0-2024 Multiple SQLi
fuelflow-1.0 Copyright © 2024 Project Develop by Mayuri K Multiple-SQLi
Переглядів 628 місяців тому
fuelflow-1.0 Copyright © 2024 Project Develop by Mayuri K Multiple-SQLi
Message from Ella Without Consent
Переглядів 1,1 тис.10 місяців тому
Message from Ella Without Consent
Purchase Order Management System 1.0 File Upload - RCE
Переглядів 6811 місяців тому
Purchase Order Management System 1.0 File Upload - RCE
Purchase Order Management System 1.0 Bypass-Login-SQLi
Переглядів 7111 місяців тому
Purchase Order Management System 1.0 Bypass-Login-SQLi
newbie.
I like this video make more File Upload and RCE vulnerability ❤
😑
😁😁
i need help to find my first cve can you plz guide me
1. Open your browser and start searching! There is nothing special, you need only for time :) And VERY HUGE SKILLS! BR
So great sir
Very nice this lecture sir
Can you explain step by step?
Is code source avaioability calendar booking free.?
Don't you make any discount for the patreon videos ?😢
where could learn this new techniques ?
No where, тhis is my creation =) But you can help me here: www.patreon.com/nu11secur1ty Best Regards
massive W
welcome to the rabbit hole my friend =)
*Promo sm*
Sir can you create a telegram channel
I am NOT using Telegram or any messengers / social networks! Please, beware of scammers!
🎉❤
How to perform Blind Time Based SQL Injection Attacks through HTTP Headers with SQLMAP Burpsuite? Please make video on it. Thanks ✅️
Hello @MrWritemeyou, actually you don't need Burp Suite to perform an SQLi attack. You need Burp only to detect these vulnerabilities! After you detect those vulnerabilities you have to try to exploit them, and this is the hard part of the Penetration Testing job! =) Right now at this moment, I'm I reveal to you the truth of the structure of the secrets of the Pen-testers! =) Every Pen-testers must find his own tactics to find the vulnerabilities and exploit them! Sometimes I write my own tools to detect some vulnerabilities, sometimes not. The things with the exploits are the same but 100% =) Of course, you can use a third-party software package, but you must exploit the target yourself, or you can exploit the target by using collaboration work with someone else. It's up to you, dear friend. Thank you for the good question! =) KR @nu11secur1ty
Nice work(っ'-')╮=͟͟͞͞💌
You are welcome ;)
👾
yo, do you have tg?
I'm NOT using Telegram, Facebook, and other scamming social software garbage if you asking this. Please, beware of scammers! BR