Forwarded from 卩ro 爪Cracker
Viper
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration.
Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on.
Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation
/ Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
Viper supports running native msfconsole in browser and multi - person collaboration
https://github.com/FunnyWolf/Viper
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration.
Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on.
Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation
/ Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
Viper supports running native msfconsole in browser and multi - person collaboration
https://github.com/FunnyWolf/Viper
Forwarded from 卩ro 爪Cracker
PowerHub
PowerHub is a convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection. Check out the Wiki!
Features:
▫️ Fileless
▫️ Stateless
▫️ Cert pinning
▫️ String "obfuscation" by RC4 encryption
▫️ Choose your AMSI Bypass
▫️ Transparent aliases for in-memory execution of C# programs
https://github.com/AdrianVollmer/PowerHub
PowerHub is a convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection. Check out the Wiki!
Features:
▫️ Fileless
▫️ Stateless
▫️ Cert pinning
▫️ String "obfuscation" by RC4 encryption
▫️ Choose your AMSI Bypass
▫️ Transparent aliases for in-memory execution of C# programs
https://github.com/AdrianVollmer/PowerHub
Forwarded from 卩ro 爪Cracker
TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis
https://ift.tt/PA5RrJh
Submitted October 28, 2022 at 09:04AM by sanitybit
via reddit https://ift.tt/lo2qpXd
https://ift.tt/PA5RrJh
Submitted October 28, 2022 at 09:04AM by sanitybit
via reddit https://ift.tt/lo2qpXd
Medium
Analysis and Summary of TCP/IP Protocol Remote Code Execution Vulnerability CVE-2022–34718
An Analysis of Remote Code Execution Vulnerability CVE-2022–34718
Forwarded from 卩ro 爪Cracker
ayaopay_ayao.7z
83.4 KB
www.ayaopay.com Database
👍7
Forwarded from 亗Lone Warrior亗
https://hacklido.com/d/66-yara-language
A blog on YARA Language for beginner Malware analysts and digital forensics researchers.
A blog on YARA Language for beginner Malware analysts and digital forensics researchers.
HACKLIDO
What is YARA language?
What is YARA??? YARA is a type of language where we write rules to detect strings, files, file formats etc. Which will ultimately help us in detecting mal...
👍1
Amazon AWS Certifications Courses Worth Thousands of Dollars are available FREE on Amazon Store
Not sure Till how much this offer will be available, But add them in your account to watch and complete certification later :)
Reference Link
#hacker_bano_chutiya_nhe ❤️❤️
Not sure Till how much this offer will be available, But add them in your account to watch and complete certification later :)
Reference Link
#hacker_bano_chutiya_nhe ❤️❤️
👍4🔥1
Forwarded from 卩ro 爪Cracker
Forwarded from 卩ro 爪Cracker
#cisco-comamnd-sender
Cisco, Zyxel, Ubiquiti, Sophos, Aruba, Mikrotik and others auto command sender
Informations
Example : python cisco_connection.py cisco_xe localhost user pass veri.txt
Installing
pip install netmiko
https://github.com/alicangnll/cisco-command-sender
Cisco, Zyxel, Ubiquiti, Sophos, Aruba, Mikrotik and others auto command sender
Informations
Example : python cisco_connection.py cisco_xe localhost user pass veri.txt
Installing
pip install netmiko
https://github.com/alicangnll/cisco-command-sender
GitHub
GitHub - alicangnll/cisco-command-sender: Cisco, Zyxel, Ubiquiti, Sophos, Aruba, Mikrotik and others auto command sender
Cisco, Zyxel, Ubiquiti, Sophos, Aruba, Mikrotik and others auto command sender - alicangnll/cisco-command-sender
Forwarded from Biała Bł
Forwarded from 卩ro 爪Cracker
Hardware Trojans Under a Microscope
https://ift.tt/kYjhuLM
Submitted October 28, 2022 at 06:49AM by Ryancor
via reddit https://ift.tt/PjHNq34
https://ift.tt/kYjhuLM
Submitted October 28, 2022 at 06:49AM by Ryancor
via reddit https://ift.tt/PjHNq34
Medium
Hardware Trojans Under a Microscope
Table of Contents
Forwarded from 卩ro 爪Cracker
List of (un)affected software OpenSSL vulnerability (still being updated)
https://ift.tt/yGNFJBE
Submitted November 01, 2022 at 05:31PM by Triyujin
via reddit https://ift.tt/4GwYUaf
https://ift.tt/yGNFJBE
Submitted November 01, 2022 at 05:31PM by Triyujin
via reddit https://ift.tt/4GwYUaf
GitHub
OpenSSL-2022/software at main · NCSC-NL/OpenSSL-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022