Category: Public-Release-Code
[ 0day (xc) Our ] File Upload Vulnerabilities and Security Best Practices by skraitow ( Lord Jesus Christ ) with skraito , HAVE FUN READING … .
On many web applications, the option of uploading files is a standard feature. Whether it’s adding a profile photo or sending a document, file upload simplifies user interaction. But this functionality is not without risks. Poorly configured or insufficiently protected, this functionality can open the door to serious attacks, ranging from the execution of malicious
[ 0day (xc) Our ] Research How to By pass antivirus while developing malware by skraito and Lord Jesus Christ any comment ? how to ? please include in Our comment … . Antivirus and EDR Bypass Techniques by vaadata … .
Antivirus, anti-malware and EDR are tools commonly used to prevent attacks. However, these solutions can be bypassed. In this article, we take a closer look at the various antivirus and EDR bypass techniques that can be implemented in a loader: a program whose aim is to execute a malicious payload on a machine by bypassing
[ 0day (xc) Our ] Pew Pew 0day MikroTik RouterOS Cross Site Scripting 2025 Code by skraito with skraitow … . Have Fun Patching it … .
Exploit Title: MikroTik RouterOS < v7 – Reflected Cross-Site Scripting (XSS) in UserManager Web InterfaceGoogle Dork: N/A (UserManager interface is typically not publicly exposed)Date: 2025-07-03Author: Ahmed MutaherVendor Homepage: https://mikrotik.com/Software Link: https://mikrotik.com/downloadVersion: All versions prior to v7.0Tested on:
[ 0day (xc) Our ] Microsoft PowerPoint 2019 Remote Code Execution 2025 0day EXPLOIT CODE BY skraito with skraitow … . Enjoy Patching … .
Date: 2025-07-02Tested on: Microsoft PowerPoint 2019 / Office 365 (version before June 2025 Patch)CVE: CVE-2025-47175Type: Use-After-Free (UAF) Remote Code Execution (local user required)Platform: Windows (PowerPoint)Author Country: JordanAttack Vector: Local (User must open crafted PPTX file)Description:This exploit leverages a Use-After-Free vulnerability in Microsoft PowerPointallowing an attacker to execute arbitrary code by tricking a user into openinga
[ 0day (xc) Our ] 0day Microsoft Edge (Chromium-based) Privilege Escalation 2025 FRESH 0day , Code by skraito with skraitow … . Good Luck Patching … .
This repository contains a conceptual proof-of-concept (PoC) for **CVE-2025-47181**, a “link following” privilege escalation vulnerability in **Microsoft Edge (Chromium-based)**. This vulnerability allows an attacker to exploit improper link resolution and symbolic link (symlink) handling by a trusted Edge updater process to write to privileged system files and potentially gain **SYSTEM** privileges. ## Vulnerability Details –
[ 0day (xc) Our ] Releasing Windows 11 Exploit 0day , Checker Vulnerability , Code By skraito with skraitow ( Lord Jesus Christ ) 2025 vulnerability 0day … .
Overview This repository contains a PowerShell script to validate whether a Windows 11 system is vulnerable to CVE-2025-49744—a critical localprivilege escalation vulnerability involving the gdi32.dll andwin32kfull.sys system components. The script performs the following checks: Usage “`powershell.\Validate-CVE-2025-49744-PoC.ps1 Important Notes DOWNLOAD LINK : https://www.worldhacker.org/download-0day.xc.Our.license.apply/2025-0day-xc-Our-Windows-Exploit-LocalExploit.tgz
Newly discovered cyber weapon uses elaborate multi-stage infection-chain to make detection and analysis difficult
Hackers Using Previously Unknown Backdoor . Researchers have discovered a new cyber espionage weapon they believe was developed and is used by a China-based APT group they have named SharpPanda. A previously unknown Windows backdoor enables remote access and the collection of considerable live data – but only during Chinese working hours. An ongoing campaign
How to trick ChatGPT into revealing Windows keys? I give up
No, really, those are the magic words A clever AI bug hunter found a way to trick ChatGPT into disclosing Windows product keys, including at least one owned by Wells Fargo bank, by inviting the AI model to play a guessing game. In this case, a researcher duped ChatGPT 4.0 into bypassing its safety guardrails,
0day SubSeven L33T H4X0R 31337 L33T H4X0R , NOSTALGIA OUR OLD SOURCE CODE RELEASE TO PUBLIC … . BY SKRAITO WITH LORD JESUS CHRIST … .
SubSeven Legacy “SubSeven Legacy is a complete remake of the infamous SubSeven Backdoor (also known as Sub7), a popular remote access trojan from the late 90s. More information about the original Sub7 Backdoor can be found on the official Wikipedia page. Like the original Sub7 program, SubSeven Legacy is entirely coded in Delphi and supports the
PHD THEME PEW PEW CARTIER JEWELERY SUPER GOLD BITCHA V2 BY SKRAITO WITH LORD JESUS CHRIST , RELEASE TO PUBLIC … .
SUPER BITCHA PEW PEW SNIPER FOR YOUR SHOP KID … . https://worldhacker.org/download-0day.xc.Our.license.apply/graceful-gold-blog.1.0.4.zip
Archives
Categories
- 0day
- 0day Anime Watch Online
- AI Secret
- AntiVirus Evasion Technique
- Blackcat Anime
- Crayon Sinchan
- Demon School! Iruma-kun
- Donald Duck And Friend
- Dr. Stone Season 1
- Dr. Stone Season 2
- Exploit-0day
- Fairy Tail
- God and Christianity
- Hunter X Hunter
- PHD THESIS
- Project
- Public-Release-Code
- Ragna Crimson
- Rurouni Kenshin -Kyoto Disturbance-
- Security Tutorial
- The Seven Dealy Sins
- Uncategorized
- World Game By Us
- World Havoc Tarif
- World Tarif Secret
- WormGPT