Right-click menu manager | Delete right-click menu tool | Delete right-click menu, enable or disable files, folders, new, send to, open with, custom file formats, IE browser, WinX and other right-click menu items, customize menu commands, modify the name and icon of right-click menu items, navigate to the registry location, navigate to the file location, permanently delete, and other operations @Xiaonil
Education, graduation certificate, degree certificate, student information network query, hacker
You are invited to a group chat on Telegram. Click to join:
Графики
📊 Средний охват постов
📉 ERR % по дням
📋 Публикации по дням
📎 Типы контента
Лучшие публикации
17 из 17CVE-2023-21839 WebLogic Server RCE. This easily exploitable vulnerability allows unauthenticated attackers to disrupt Oracle WebLogic Server through network access via T3 and IIOP. A successful attack on this vulnerability could lead to unauthorized access to critical data. @Xiaonil
When we identify an XSS vulnerability, we usually use a simple alert(1) payload to demonstrate the successful execution of XSS. Although this can effectively prove the execution of JavaScript, it cannot highlight the type of actions that malicious attackers might actually perform on vulnerable web applications. Developing weaponized XSS payloads can better demonstrate the next steps that malicious attackers might take. @Xiaonil
Deeply understanding the open-source LMS codebase to find vulnerabilities | CVE-2021-43558, [Camilo]: Vulnerabilities can be chained together to achieve remote code execution, [Moodle]: Vulnerabilities may lead to the takeover of the site/platform. Using a large codebase means it's not practical to check every file. We must carefully filter out less important code and focus on potentially vulnerable code. @Xiaonil
Tmall Shopping Information 1. The format is as above, including the Alibaba account name, the Alipay payment account, the recipient's name and address, phone number, and no other sensitive information. 2. You can specify other shopping platforms such as JD.com and Vipshop. 3. You can specify time and region requirements. Note: This is not the type of refund information that does not include the express tracking number. @Xiaonil
By attacking the domain controller, we can inject the identity of DC3$. Next, we will use the identity of DC3$ to export the hash of the domain administrator, dcadmin, using dcsync. (Translation note: The term "dcsync" is a common command used in Active Directory administration to synchronize domain controllers. It is typically used to export the hash of a domain administrator account, which can then be used for authentication purposes.) @Xiaonil
Refunds for education are issued every day. Whether you have made a profit or not, just report the platform to me, and I'll handle the rest for you. @Xiaonil
— 专业索引工具 · 整合海量信息资源 — 索引机器 @SUOBOT|@SYJQ 专业的信息索引与搜索平台,能帮你快速发现、重要资讯,出海推广营销助手!telegram频道、群组、视频等内容收录检索。
— 让搜索更高效 · 让信息更有价值 — 🔍帮你找到有趣的群组、频道、视频、音乐、电影、新闻 📢: @CJYQNEWS | 🤖: @CJYQ 👇点击下方按钮,进行搜索👇
🐂🐂 One-click authentication to hijack data, with 100% resources for login and registration 🐂🐂 Industry-wide order acceptance. We currently only cooperate with clients who require daily order volumes, with high accuracy. New databases are now available for collection. Don't wait until the channels are closed and then complain about the lack of good channels! It is a substitute for SDK and DPI in the current sluggish industry environment. Disadvantage: Currently, it is not possible to specify ...