Did you know Google once paid nearly $150k to a security researcher for discovering a single SSRF vulnerability? That vulnerability was Server-Side Request Forgery (SSRF), a potentially devastating flaw that can allow attackers to manipulate web servers. If you’re interested …
Hey guys! In this video, we will discuss how to generate a payload and a listener via Empire, and trick users into clicking a .pdf shortcut that has that backdoor. This is How Hackers Take Over Your Device! Empire is a …
A step-by-step guide teaching you how to discover and exploit IDOR vulnerabilities + xp_cmdshell + local buffer overflow to hack a RaaS (Ransomware-as-a-Service) platform and gain full remote control over their servers. Check out the video below: Hacking the Hackers …
This video will show you how hackers can hack cryptocurrency and how to secure your crypto from the mentioned methods.Check out the video below: How Crypto Gets Hacked? ————————————————————————————Resources:How Phishing Links Are Generated: https://www.youtube.com/watch?v=2crXwg-a_SQCrypto scam tracker: https://dfpi.ca.gov/consumers/crypto/crypto-scam-tracker/LaZagne: https://github.com/AlessandroZ/LaZagneMimikatz: https://github.com/gentilkiwi/mimikatz————————————————————————————Maythom social media:Personal Youtube channel: @maythomPatreon: https://patreon.com/MAYTHOMInstagram: https://www.instagram.com/mayth0m Twitter: https://twitter.com/mayth0m————————————————————————————-zSecurity …
This video showcases a tool named Xeuledoc that can extract metadata from publicly shared Google documents such as Docs, Sheets, and Slides.
This video explains the concept of return-to-libc attacks in binary exploitation. The discussion focuses on how to exploit a vulnerable program using the ‘libc’ library to execute a shell without directly calling system functions in the code.