Tuesday, 25 September 2018

DOWNLOAD PUBG MOBILE ALL HACKING FILES modes of mods

DOWNLOAD LATEST MOD APK+OBB DATA OF 0.8.5 PUBG MOBILE UPDATE : 

MODES OF MODS :

🔕DOWNLOAD MOD DATA🔊 : http://wirecellar.com/2xCl 

📻DOWNLOAD APK+OBB📻(IF YOU DONT HAVE PUBG GAME IN YOUR PHONE): http://wirecellar.com/2xHI

✴❇DOWNLOAD SCRIPT❇❇ : 

➿RCH_v29.lua :(pass 29)

☑ Mediafire : http://zipansion.com/43648

✴❇DOWNLOAD SCRIPT❇❇ : 

📦Ric_8.4V22~10.LUA : http://wirecellar.com/2xS7

SUBSCRIBE MY YOUTUBE CHANNEL FOR MORE PUBG MOBILE HACKS AND MODS FOR FREE!!




⭕OTHER HACK SCRIPTS : 

(2)Beta Senex Script (0.8.0) : 

☑ Mediafire : http://zipansion.com/4378m

(3)Pubg XMV 0.8.1 : 


(4)PMH.3.5.lua : 


PUBG MOBILE ALL HACK APPS REQUIRED :

(1) DUAL SPACE LITE : 


(2) GAME GUARDIAN MOD APK :

⭕OUR OTHER POPULAR VIDEOS ⭕






CVE-2018-16509: Ghostscript - Failed Restore Command Execution (Metasploit)

EDB-ID: 45367
CVE:  CVE-2018-16509
E-DB Verified: Yes
Author: Metasploit
Type: Local
Advisory/Source: GitHub
Published: 2018-09-10
Platform: Linux

Description about CVE-2018-16509:

   An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.


And have something to say about GitHackTools or CVE-2018-16509? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.



Monday, 24 September 2018

Flipkart Big Billon days are back, Amazing offers on smartphones, laptops and much more | 2018

Flipkart is back with its The Big Billon days sale . The sale will be live from 10 Oct to 14 Oct. The Flipkart will be offering deals on smartphones, TVs, laptops, home appliances, and more.


The sale will bring huge discounts and cashback offers on various products, EMI option on purchases from debit card, no cost EMI and much more. The sale will  begin from 10 Oct to 14 Oct. Talking about Flipkart plus members, they will get 3 hours early access to the sale. There will be exclusive offers for the HDFC debit and credit card holders. Phonepe users will get amazing cashback offers, and MasterCard holder can also win amazing rewards.

Also read: nokia-5.1-plus-coming-on-sept-24

The offers on fashion, TVs, appliances, beauty, sports, furniture, toys and on smart devices will be on from 10 October and while the offers on Mobiles, electronic devices will be on from 11 October.

For more updates, please do like, subscribe and share.

CVE-2018-11776: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit module)

EDB-ID: 45367
CVE: CVE-2018-11776
E-DB Verified: Yes
Author: Metasploit
Type: Remote
Advisory/Source: GitHub
Published: 2018-09-10
Platform: Multiple (Windows, Linux)

Description aboout CVE-2018-11776:
   Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.

And have something to say about GitHackTools or CVE-2018-11776? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.



[ZeroDay] ZDI-CAN-6135: A Remote Code Execution Vunlnerability in the Windows JET Database Engine

September 20, 2018, Zero Day Initiative are releasing additional information regarding a bug report that has exceeded the 120-day disclosure timeline. More details on this process can be found here in their disclosure policy.

An out-of-bounds (OOB) write in the Microsoft JET Database Engine that could allow remote code execution was initially reported to Microsoft on May 8, 2018. An attacker could leverage this vulnerability to execute code under the context of the current process, however it does require user interaction since the target would need to open a malicious file. As of today, this bug remains unpatched.

The Vulnerability
   The root cause of this issue resides in the Microsoft JET Database Engine. Microsoft patched two-other issues in JET in the September Patch Tuesday updates. While the patched bugs are listed as buffer overflows, this additional bug is actually an out-of-bounds write, which can be triggered by opening a Jet data source via OLEDB. Here’s a look at the resulting crash:

   To trigger this vulnerability, a user would need to open a specially crafted file containing data stored in the JET database format. Various applications use this database format. An attacker using this would be able to execute code at the level of the current process.

   If you’d like to test this out for yourself, you can find the proof of concept code here:

Recommendation
   Our investigation has confirmed this vulnerability exists in Windows 7, but Zero Day Initiative believe that all supported Windows version are impacted by this bug, including server editions. You can view their advisory here. Microsoft continues to work on a patch for this vulnerability, and Zero Day Initiative hope to see it in the regularly scheduled October patch release. In the absence of a patch, the only salient mitigation strategy is to exercise caution and not open files from untrusted sources. 

   As always, As always, Simon Zuckerbraun can be found on Twitter at @HexKitchen, and follow the team for the latest in exploit techniques and security patches.

Disclosure Timeline:
 * 05/08/18 - ZDI reported vulnerability to vendor and the vendor acknowledged that same day
 * 05/14/18 – The vendor replied that they successfully reproduced the issue ZDI reported
 * 09/09/18 – The vendor reported an issue with the fix and that the fix might not make the September release
 * 09/10/18 – ZDI cautioned potential 0-day
 * 09/11/18 – The vendor confirmed the fix did not make the build
 * 09/12/18 – ZDI confirmed to the vendor the intention to 0-day on 09/20/18
 * 09/20/18 - Coordinated public release of advisory

And have something to say about GitHackTools or ZDI-CAN-6135? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.