更新了:CVE-2021 描述:Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) URL. Zero-Day https://github.com/knqyf263/CVE-2021-41773 https://t.me/cKure/9660
All posts by cK-bot
October 5, 2021 at 09:23PM
■■■■■ Tool for OSINT: terra: OSINT Tool on Twitter and Instagram. https://github.com/xadhrit/terra OS-INTEL https://t.me/cKure/9659
October 5, 2021 at 09:21PM
■■■■■ Phrack: Twenty years of Escaping the Java Sandbox (Ieu Eauvidoum & disk noise) https://www.exploit-db.com/papers/45517 #Phrack https://t.me/cKure/9658
October 5, 2021 at 09:21PM
■■■■■ Phrack: Attacking JavaScript Engines : A case study of JavaScriptCore and CVE-2016-4622. https://www.exploit-db.com/papers/42881 #phrack https://t.me/cKure/9657
October 5, 2021 at 09:00PM
■■■■■ Zero-Day exploit code: https://github.com/numanturle/CVE-2021-41773 https://t.me/cKure/9656
October 5, 2021 at 09:00PM
■■■■■ Zero-Day exploit code: https://github.com/Vulnmachines/cve-2021-41773 https://t.me/cKure/9655
October 5, 2021 at 08:54PM
☆ Breaking: Phrack 2021 has been released. http://phrack.org/issues/70/1.html https://t.me/cKure/9653
October 5, 2021 at 06:37PM
■■□□□ PoC (not included) for path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) https://twitter.com/ducnt_/status/1445386557574324234 https://t.me/cKure/9652
October 5, 2021 at 03:26PM
■■■■□ Ukraine : Law enforcement agencies have announced the arrest of two “prolific ransomware operators” in Ukraine who allegedly conducted a string of targeted attacks against large industrial entities in Europe and North America since at least April 2020, marking the latest step in combating ransomware incidents. https://www.europol.europa.eu/newsroom/news/ransomware-gang-arrested-in-ukraine-europol%E2%80%99s-support https://thehackernews.com/2021/10/ransomware-hackers-who-attacked-over.html https://t.me/cKure/9651
October 5, 2021 at 02:35PM
● Yet another website: aaqeel01.wordpress.com (Malware Research Website) https://t.me/cKure/9650
