Forwarded from Team BlackDragonSec 🇮🇳 (Index F*cker)
mirror 👍
https://zone-xsec.com/mirror/id/302774
https://zone-xsec.com/mirror/302778
https://zone-xsec.com/mirror/302779
https://zone-xsec.com/mirror/302780
https://zone-xsec.com/mirror/302781
https://zone-xsec.com/mirror/302782
https://zone-xsec.com/mirror/302783
https://zone-xsec.com/mirror/302784
https://zone-xsec.com/mirror/302785
https://zone-xsec.com/mirror/302786
https://zone-xsec.com/mirror/302787
https://zone-xsec.com/mirror/302788
https://zone-xsec.com/mirror/302789
https://zone-xsec.com/mirror/302790
https://zone-xsec.com/mirror/302791
https://zone-xsec.com/mirror/302792
https://zone-xsec.com/mirror/302793
https://zone-xsec.com/mirror/302794
https://zone-xsec.com/mirror/302795
https://zone-xsec.com/mirror/302796
https://zone-xsec.com/mirror/302797
https://zone-xsec.com/mirror/302798
https://zone-xsec.com/mirror/id/302774
https://zone-xsec.com/mirror/302778
https://zone-xsec.com/mirror/302779
https://zone-xsec.com/mirror/302780
https://zone-xsec.com/mirror/302781
https://zone-xsec.com/mirror/302782
https://zone-xsec.com/mirror/302783
https://zone-xsec.com/mirror/302784
https://zone-xsec.com/mirror/302785
https://zone-xsec.com/mirror/302786
https://zone-xsec.com/mirror/302787
https://zone-xsec.com/mirror/302788
https://zone-xsec.com/mirror/302789
https://zone-xsec.com/mirror/302790
https://zone-xsec.com/mirror/302791
https://zone-xsec.com/mirror/302792
https://zone-xsec.com/mirror/302793
https://zone-xsec.com/mirror/302794
https://zone-xsec.com/mirror/302795
https://zone-xsec.com/mirror/302796
https://zone-xsec.com/mirror/302797
https://zone-xsec.com/mirror/302798
Zone-Xsec
Zone-Xsec - Defacement Details of acservices.pk
acservices.pk hacked. Notified by 4LPH43V1L
Forwarded from Team BlackDragonSec 🇮🇳 (Index F*cker)
https://acservices.pk/axom.html
https://advancedchemicals.com.pk/axom.html
https://ammc.com.pk/axom.html
https://asnsystem.pk/axom.html
https://blog.fumigation.pk/axom.html
https://blog.securitycompanies.pk/axom.html
https://cleaningservices.pk/axom.html
https://drrafiqtareen.com.pk/axom.html
https://eccmaterial.com.pk/axom.html
https://eccompany.pk/axom.html
https://emarketing.gsemarketing.pk/axom.html
https://evergreen.pk/axom.html
https://fumigation.pk/axom.html
https://fumigationservices.pk/axom.html
https://theestatearts.com.pk/axom.html
https://tkpestsolutions.co.uk/axom.html
https://universalfumigationservice.com/axom.html
https://uri.com.pk/axom.html
https://watertankcleaningservices.pk/axom.html
https://web.gsemarketing.pk/axom.html
https://whattire.pk/axom.html
https://whattyre.pk/axom.html
https://advancedchemicals.com.pk/axom.html
https://ammc.com.pk/axom.html
https://asnsystem.pk/axom.html
https://blog.fumigation.pk/axom.html
https://blog.securitycompanies.pk/axom.html
https://cleaningservices.pk/axom.html
https://drrafiqtareen.com.pk/axom.html
https://eccmaterial.com.pk/axom.html
https://eccompany.pk/axom.html
https://emarketing.gsemarketing.pk/axom.html
https://evergreen.pk/axom.html
https://fumigation.pk/axom.html
https://fumigationservices.pk/axom.html
https://theestatearts.com.pk/axom.html
https://tkpestsolutions.co.uk/axom.html
https://universalfumigationservice.com/axom.html
https://uri.com.pk/axom.html
https://watertankcleaningservices.pk/axom.html
https://web.gsemarketing.pk/axom.html
https://whattire.pk/axom.html
https://whattyre.pk/axom.html
Forwarded from 卩ro 爪Cracker
CVE-2022-35256: HTTP Request Smuggling in NodeJS https://feed.prelude.org/p/cve-2022-35256
f33d by Prelude
CVE-2022-35256
HTTP Request Smuggling in NodeJS
Forwarded from Biała Bł
Hacking Bluetooth enabled mobile phones and beyond.pdf
353.6 KB
Forwarded from 卩ro 爪Cracker
CVE-2022-41974: Authorization bypass
CVE-2022-41973: Symlink attack
https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
CVE-2022-41973: Symlink attack
https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
Forwarded from 卩ro 爪Cracker
Viper
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration.
Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on.
Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation
/ Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
Viper supports running native msfconsole in browser and multi - person collaboration
https://github.com/FunnyWolf/Viper
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration.
Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on.
Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation
/ Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
Viper supports running native msfconsole in browser and multi - person collaboration
https://github.com/FunnyWolf/Viper
Forwarded from 卩ro 爪Cracker
PowerHub
PowerHub is a convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection. Check out the Wiki!
Features:
▫️ Fileless
▫️ Stateless
▫️ Cert pinning
▫️ String "obfuscation" by RC4 encryption
▫️ Choose your AMSI Bypass
▫️ Transparent aliases for in-memory execution of C# programs
https://github.com/AdrianVollmer/PowerHub
PowerHub is a convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection. Check out the Wiki!
Features:
▫️ Fileless
▫️ Stateless
▫️ Cert pinning
▫️ String "obfuscation" by RC4 encryption
▫️ Choose your AMSI Bypass
▫️ Transparent aliases for in-memory execution of C# programs
https://github.com/AdrianVollmer/PowerHub
Forwarded from 卩ro 爪Cracker
TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis
https://ift.tt/PA5RrJh
Submitted October 28, 2022 at 09:04AM by sanitybit
via reddit https://ift.tt/lo2qpXd
https://ift.tt/PA5RrJh
Submitted October 28, 2022 at 09:04AM by sanitybit
via reddit https://ift.tt/lo2qpXd
Medium
Analysis and Summary of TCP/IP Protocol Remote Code Execution Vulnerability CVE-2022–34718
An Analysis of Remote Code Execution Vulnerability CVE-2022–34718
Forwarded from 卩ro 爪Cracker
ayaopay_ayao.7z
83.4 KB
www.ayaopay.com Database
👍7