Thursday, February 27, 2025

Intel politics Trump tariffs and ChatGPT by police ( while Trump is refinancing economy fast euro bonds drop no big shit they say some big police @INTERPOL_Cyber r using ChatGPT for a big crack)

 



https://www.msn.com/en-us/money/news/experts-race-to-extract-intel-from-black-basta-internal-chat-leaks/ar-AA1zw158

https://www.msn.com/en-us/money/markets/the-mar-a-lago-accord-explained-trump-s-ultimate-plan-to-reshape-the-dollar-and-america-s-debt/ar-AA1zUMQ2


Thursday, February 13, 2025

Elsa Trojan 1 (composition hack)


 








https://docs.google.com/document/d/e/2PACX-1vTwxO7WgdGk2_oykpMfyERzHh5EEXEb1e1yqVP1CSFgKDa3a3hgZpBzRPgn7x7t1ZsiEXb_A9uPcbPU/pub


function loadImage() {

    // Example public link that returns a new image URL

    var publicLink = 'https://example.com/api/getImageUrl';


    fetch(publicLink)

        .then(response => response.json())

        .then(data => {

            var imageElement = document.getElementById('dynamicImage');

            var newImageUrl = data.imageUrl; // Assuming the API returns a JSON object with an imageUrl property


            // Update the image source

            imageElement.src = newImageUrl;

            console.log(`Image source updated to: ${newImageUrl}`);

        })

        .catch(error => {

            console.error('Error fetching new image URL:', error);

        });

}


function saveToLocalStorage() {

    var data = {

        username: 'Elsa',

        password: 'supersecret'

    };

    localStorage.setItem('credentials', JSON.stringify(data));

    document.getElementById('output').innerText = 'Credentials saved to LocalStorage.';

}


<!DOCTYPE html>

<html lang="en">

<head>

    <meta charset="UTF-8">

    <meta name="viewport" content="width=device-width, initial-scale=1.0">

    <title>Parent Page</title>

</head>

<body>

    <h1>Parent Page</h1>

    <button onclick="openChildPage()">Open Child Page</button>

    <script>

        function openChildPage() {

            var childWindow = window.open('child.html', 'ChildWindow', 'width=600,height=400');

            childWindow.addEventListener('load', function() {

                var message = { action: 'save', key: 'sharedData', value: 'Hello from Parent Page' };

                childWindow.postMessage(message, '*');

            });

        }


        window.addEventListener('message', function(event) {

            if (event.origin !== window.location.origin) {

                return;

            }

            var message = event.data;

            if (message.action === 'save') {

                localStorage.setItem(message.key, message.value);

                console.log('Data saved in Parent Page:', message.value);

            }

        });

    </script>

</body>

</html>




function retrieveFromLocalStorage() {

    var data = JSON.parse(localStorage.getItem('credentials'));

    if (data) {

        document.getElementById('output').innerText = `Username: ${data.username}, Password: ${data.password}`;

    } else {

        document.getElementById('output').innerText = 'No credentials found in LocalStorage.';

    }

}


function clearLocalStorage() {

    localStorage.removeItem('credentials');

    document.getElementById('output').innerText = 'LocalStorage cleared.';


Monday, February 10, 2025

 

Kapda HTML PoC For Nukedit <= 4.9.6
Kapda HTML PoC For Nukedit <= 4.9.6 (With Security Patch) Unauthorized Admin Add Exploit
Discovered and coded by 3nitro - farhadkey {AT} kapda [dot] ir
Change the form's action in source : "http://victim.com/nukedit/utilities/register.asp"
Fill the blank and submit . After that login with your email ! + your password .

DRONES HACK ( what about if u hv caught a tablet acccssing their drones commands?) ( admi nukedit vulnerability unauthorized access code)

 


Drones Hack TC2 Dump Code delay ( hack) ( AI) (python code)