Forwarded from 卩ro 爪Cracker
Browser Password Stealer [Source Code]
This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers. Supports chromium 80 and above.
Modules Required
To install all the required modules use the following code:
py -m pip install -r requirements.txt
or
pip3 install -r requirements.txt
Supported browsers
Chrome
Brave
Edge (Chromium)
This tools are GUI supported
https://github.com/henry-richard7/Browser-password-stealer
This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers. Supports chromium 80 and above.
Modules Required
To install all the required modules use the following code:
py -m pip install -r requirements.txt
or
pip3 install -r requirements.txt
Supported browsers
Chrome
Brave
Edge (Chromium)
This tools are GUI supported
https://github.com/henry-richard7/Browser-password-stealer
🥰1
Forwarded from 卩ro 爪Cracker
Entrust DataCard Leak
http://lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion/entrust.com/entrust-datacard/
magnet:?xt=urn:btih:d19daf6e690d5374b17d869c56239ab958f0ef04&dn=entrust.com&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announceForwarded from 卩ro 爪Cracker
PrintNightmare (CVE-2021-34527)
This version of the PrintNightmare exploit is heavily based on the code created by Cube0x0, with the following features:
▫️ Ability to target multiple hosts.
▫️ Built-in SMB server for payload delivery, removing the need for open file shares.
▫️ Exploit includes both MS-RPRN & MS-PAR protocols (define in CMD args).
▫️ Implements @gentilkiwi's UNC bypass technique.
https://github.com/m8sec/CVE-2021-34527
Exploiting PrintNightmare (CVE-2021–34527)
https://infosecwriteups.com/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f
#cve
This version of the PrintNightmare exploit is heavily based on the code created by Cube0x0, with the following features:
▫️ Ability to target multiple hosts.
▫️ Built-in SMB server for payload delivery, removing the need for open file shares.
▫️ Exploit includes both MS-RPRN & MS-PAR protocols (define in CMD args).
▫️ Implements @gentilkiwi's UNC bypass technique.
https://github.com/m8sec/CVE-2021-34527
Exploiting PrintNightmare (CVE-2021–34527)
https://infosecwriteups.com/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f
#cve
Forwarded from 卩ro 爪Cracker
Geogramint
#OSINT Geolocalization tool for Telegram
Geogramint is an OSINT tool that uses Telegram's API to find nearby users and groups. Inspired by Tejado's Telegram Nearby Map, which is no longer maintained, it aims to provide a more user-friendly alternative.
Geogramint only finds Telegram users and groups which have activated the nearby feature. Per default it is deactivated.
The tool is fully supported on Windows and partially supported on Mac OS and Linux distributions.
https://github.com/Alb-310/Geogramint
#OSINT Geolocalization tool for Telegram
Geogramint is an OSINT tool that uses Telegram's API to find nearby users and groups. Inspired by Tejado's Telegram Nearby Map, which is no longer maintained, it aims to provide a more user-friendly alternative.
Geogramint only finds Telegram users and groups which have activated the nearby feature. Per default it is deactivated.
The tool is fully supported on Windows and partially supported on Mac OS and Linux distributions.
https://github.com/Alb-310/Geogramint
👍1
zyxel ipc camera pwn
This is a minimal proof of concept to remotely open a root shell on a Zyxel IP enabled camera. Known vulnerable models are:
▫️ Zyxel IPC-3605N
▫️ Zyxel IPC-4605N
https://github.com/hydrogen18/zyxel_ipc_camera_pwn
This is a minimal proof of concept to remotely open a root shell on a Zyxel IP enabled camera. Known vulnerable models are:
▫️ Zyxel IPC-3605N
▫️ Zyxel IPC-4605N
https://github.com/hydrogen18/zyxel_ipc_camera_pwn
👍1
All time best proxies website collection:- https://www.hackersblog.tech/2022/06/all-time-best-proxies-website-collection.html
👏1
Free website hosting sites collection 🔥🔥
https://www.protocolnick.me/2022/02/free-website-hosting-sites.html
https://www.protocolnick.me/2022/02/free-website-hosting-sites.html
Updates On Hackbyte Forum:-
1. PrintNightmare (CVE-2021-34527)
2. START.ru Leak
3. SEC Sonora Mexico DataBase Leak
4. mpa.zj.gov.cn Food and Drug Administration Computers files
5. Moriarty-Project: This tool gives information about the phone number that you entered
6. Discord-QR-Token-Logger: Utilises Discord QR Login Feature To Create a Token Logger Scannable QR code
7. Elevator - Allows to bypass the UAC and spawn an elevated process with full administrator privileges.
8. Linksys E1200 buffer overflow vulnerability
9. GrabAccess - A tool for bypassing Windows login passwords and Bitlocker.
10. FiberHome VDSL2 Modem HG150-Ub_V3.0 (PTCL) – Admin Credentials are submitted in the URL
11. Gel4y Mini Shell Backdoor
12. Wpushell
13. r77 Rootkit
14. autodeauth - A tool built to automatically deauth local networks
👉🏻👉🏻All Updates On :- https://bit.ly/3yRyah3 👈🏻👈🏻
1. PrintNightmare (CVE-2021-34527)
2. START.ru Leak
3. SEC Sonora Mexico DataBase Leak
4. mpa.zj.gov.cn Food and Drug Administration Computers files
5. Moriarty-Project: This tool gives information about the phone number that you entered
6. Discord-QR-Token-Logger: Utilises Discord QR Login Feature To Create a Token Logger Scannable QR code
7. Elevator - Allows to bypass the UAC and spawn an elevated process with full administrator privileges.
8. Linksys E1200 buffer overflow vulnerability
9. GrabAccess - A tool for bypassing Windows login passwords and Bitlocker.
10. FiberHome VDSL2 Modem HG150-Ub_V3.0 (PTCL) – Admin Credentials are submitted in the URL
11. Gel4y Mini Shell Backdoor
12. Wpushell
13. r77 Rootkit
14. autodeauth - A tool built to automatically deauth local networks
👉🏻👉🏻All Updates On :- https://bit.ly/3yRyah3 👈🏻👈🏻
👍3
📣📢 Try new advance #pentesting challenges on @Vulnmachines 👩💻
❌ No VPN required
✔️ Free Access
✔️ Access the lab using your favorite browser
Challenge Name: Family Man 🕵️👩💻
Checkout: https://www.vulnmachines.com
#infosec #cybersecurity #ctf
❌ No VPN required
✔️ Free Access
✔️ Access the lab using your favorite browser
Challenge Name: Family Man 🕵️👩💻
Checkout: https://www.vulnmachines.com
#infosec #cybersecurity #ctf
👍6