Category: 0day
[ 0day (xc) Our ] PHD THESIS , Why Cigarette , Coffee , Blood Test , Alcohol And Urine Test And Even Sickness Which is BY this thesis We only give example of sickness call Headache by skraito With Lord Jesus Christ … .
FIRST OF ALL WE WILL CLEAR THIS MISUNDERSTANDING ABOUT SMOKING WHICH IS CLEARLY FALSE … . SO NAME TO US WHAT TOXIC IS THAT , THAT CIGARATTE PRODUCE IF YOU KNOW ? … . ACCORDING TO FALSE RESEARCH UP TO 2025 18 / 07 / 2025 , CIGARATTE SMOKE CONTAIN BILLION OR SO CALL BILLION
[ 0day (xc) Our ] File Upload Vulnerabilities and Security Best Practices by skraitow ( Lord Jesus Christ ) with skraito , HAVE FUN READING … .
On many web applications, the option of uploading files is a standard feature. Whether it’s adding a profile photo or sending a document, file upload simplifies user interaction. But this functionality is not without risks. Poorly configured or insufficiently protected, this functionality can open the door to serious attacks, ranging from the execution of malicious
[ 0day (xc) Our ] Pew Pew 0day MikroTik RouterOS Cross Site Scripting 2025 Code by skraito with skraitow … . Have Fun Patching it … .
Exploit Title: MikroTik RouterOS < v7 – Reflected Cross-Site Scripting (XSS) in UserManager Web InterfaceGoogle Dork: N/A (UserManager interface is typically not publicly exposed)Date: 2025-07-03Author: Ahmed MutaherVendor Homepage: https://mikrotik.com/Software Link: https://mikrotik.com/downloadVersion: All versions prior to v7.0Tested on:
[ 0day (xc) Our ] Microsoft PowerPoint 2019 Remote Code Execution 2025 0day EXPLOIT CODE BY skraito with skraitow … . Enjoy Patching … .
Date: 2025-07-02Tested on: Microsoft PowerPoint 2019 / Office 365 (version before June 2025 Patch)CVE: CVE-2025-47175Type: Use-After-Free (UAF) Remote Code Execution (local user required)Platform: Windows (PowerPoint)Author Country: JordanAttack Vector: Local (User must open crafted PPTX file)Description:This exploit leverages a Use-After-Free vulnerability in Microsoft PowerPointallowing an attacker to execute arbitrary code by tricking a user into openinga
[ 0day (xc) Our ] 0day Microsoft Edge (Chromium-based) Privilege Escalation 2025 FRESH 0day , Code by skraito with skraitow … . Good Luck Patching … .
This repository contains a conceptual proof-of-concept (PoC) for **CVE-2025-47181**, a “link following” privilege escalation vulnerability in **Microsoft Edge (Chromium-based)**. This vulnerability allows an attacker to exploit improper link resolution and symbolic link (symlink) handling by a trusted Edge updater process to write to privileged system files and potentially gain **SYSTEM** privileges. ## Vulnerability Details –
[ 0day (xc) Our ] Proof Of Concept SSL AND TLS HACKING MAN IN THE MIDDLE ATTACK BY SKRAITOW ( LORD JESUS CHRIST ) WITH SKRAITO … .
The new PewPew attack is a sophisticated cross-protocol application layer desynchronization vulnerability that compromises TLS-based communications. This attack exploits fundamental differences between implicit and opportunistic TLS implementations, affecting critical protocols including HTTP, FTP, POP3, SMTP, LMTP, and NNTP. By leveraging man-in-the-middle positioning, attackers can inject unexpected messages into secure channels, causing persistent desynchronization between clients and servers
[ 0day (xc) Our ] Exploit for Apache Tomcat … . Coded By skraito with Lord Jesus Christ … . FRESH 0day … . ENJOY ALL L33T … .
Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813) 免责申明: 本文所描述的漏洞及其复现步骤仅供网络安全研究与教育目的使用。任何人不得将本文提供的信息用于非法目的或未经授权的系统测试。作者不对任何由于使用本文信息而导致的直接或间接损害承担责任。 如涉及侵权,请及时与我们联系,我们将尽快处理并删除相关内容。 利用条件较为苛刻,该脚本仅针对存在漏洞的环境进行概念性验证 使用方式: 批量检测支持多线程: python poc.py -l url.txt -t 5 单个检测: python poc.py -u your-ip https://www.worldhacker.org/download-0day.xc.Our.license.apply/pewpew.tomcat.exploit.zip
PEW PEW HACKING YOUR FRIEND BLUETOOH CONVERSATION AND LOGGING ALL YOUR EARPHONE … . EXPLOIT CODE BY SKRAITO WITH SKRAITOW ( LORD JESUS CHRIST ) … .
PEW PEW – PoC to record audio from a Bluetooth device proof of concept to record and replay audio from a bluetooth device without the legitimate user’s awareness. Requirements The code is written in Python and has been tested with Python 3.11.8, but it mainly uses widely available tools in Linux systems. The PoC uses
Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’
Tens of millions of job applicants’ information could be accessed via a very flimsy login credential. A recruitment platform used by McDonald’s is alleged to have had such poor cybersecurity that researchers were able to log into it using a non-password and thus gain access to information on tens of millions of job applicants, including
Millions of Cars Exposed to Remote Hacking via PeWPeW Attack BY SKRAITO WITH SKRAITOW AKA LORD JESUS CHRIST … .
WE HAS discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems. FOR L33T WE have discovered that critical vulnerabilities affecting a widely used Bluetooth stack could be exploited to remotely hack millions of cars . We conducted an analysis of the BlueSDK Bluetooth framework developed by
Archives
Categories
- 0day
- 0day Anime Watch Online
- AI Secret
- AntiVirus Evasion Technique
- Blackcat Anime
- Crayon Sinchan
- Demon School! Iruma-kun
- Donald Duck And Friend
- Dr. Stone Season 1
- Dr. Stone Season 2
- Exploit-0day
- Fairy Tail
- God and Christianity
- How Everything Work PHD Thesis
- Hunter X Hunter
- Lord Jesus Christ
- PHD THESIS
- Project
- Public-Release-Code
- Ragna Crimson
- Rurouni Kenshin -Kyoto Disturbance-
- Security Tutorial
- The Seven Dealy Sins
- Uncategorized
- World Game By Us
- World Havoc Tarif
- World Tarif Secret
- WormGPT