Zero-Day: CVE-2023-45866 and CVE-2024-21306 exploitation. Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing. Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing https://youtu.be/dj1lGqL8lXo https://t.me/cKure/13434
All posts in Uncategorized
January 29, 2024 at 08:38AM
■■■■□ Exploits released for critical Jenkins RCE flaw, patch now. https://www.bleepingcomputer.com/news/security/exploits-released-for-critical-jenkins-rce-flaw-patch-now/ https://t.me/cKure/13432
January 29, 2024 at 08:29AM
■■■■□ Building a Password Cracker. https://www.sevnx.com/blog/post/building-a-password-cracker https://t.me/cKure/13431
January 29, 2024 at 08:29AM
■■■□□ A modern 64-bit position independent implant template. https://github.com/Cracked5pider/Stardust https://t.me/cKure/13430
January 28, 2024 at 01:34AM
■■□□□ HizbAllah Hacktivist group hacks scores of Indian website on daily basis. Most of their attacks end up in defacement. https://t.me/cKure/13429
January 28, 2024 at 01:14AM
■■■■□ Route-Detect – Find Authentication (Authn) And Authorization (Authz) Security Bugs In Web Application Routes. https://github.com/mschwager/route-detect https://www.kitploit.com/2024/01/route-detect-find-authentication-authn.html https://t.me/cKure/13428
January 27, 2024 at 12:35PM
■■■■□ Cyber-War between Israel and Palestine groups. Telegram channel of the hacktivist group that lists mostly defaced websites. ● The channel is not available on telegram downloaded from Google Play Store or other western / genocide backed tech companies. https://t.me/HizbullahCyb3rTeam https://t.me/cKure/13427
January 26, 2024 at 08:29PM
Citrix Bleed Zero-Day CVE-2023-4966 by AssetNote team. #!/usr/bin/env python3 import sys import requests import urllib3 import argparse urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) parser = argparse.ArgumentParser() parser.add_argument(‘–target’, help=’The Citrix ADC / Gateway target, excluding the protocol (e.g. 192.168.1.200)’) args = parser.parse_args() if args.target is None: print(‘Target must be provided (e.g. –target 192.168.1.200)’) sys.exit(0) hostname = args.target if name == “main”:…
January 26, 2024 at 11:20AM
■■■■□ 3 Years in Prison for Fraudster Who Drove SMS-Blasting IMSI-Catcher around Norway. https://www.okokrim.no/doemt-til-3-aar-i-fengsel-etter-digitalt-massebedrageri-i-oslo-og-bergen.6643270-549344.html https://commsrisk.com/3-years-in-prison-for-fraudster-who-drove-sms-blasting-imsi-catcher-around-norway/ https://t.me/cKure/13424
January 23, 2024 at 11:52AM
■■■■■ TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793. https://www.fortinet.com/blog/threat-research/teamcity-intrusion-saga-apt29-suspected-exploiting-cve-2023-42793 https://t.me/cKure/13422
