❤3
😱2
CVE-2023-0398 modoboa – mail Server
Description
Description
GET /admin/domains/{id}/delete/ page is vulnerable to a CSRF attack.
Exploit: https://system32.ink/news-feed/p/165/Forwarded from Biała Bł
📚 ILLEGAL7 HACKERS ALL COURSES 📚
Software cracking
🟢Advanced software cracking
🟢Cracker Tools 2.8
🟢Dotnet Software Reverse Engineering And Static Analysis Course
🟢Ransomware virus course
🟢Reverse Engineering Course
🟢Software Cracking Course
Size : 6.11 GB
⬇️Link :- https://mega.nz/folder/DpM2jT4J#Kl_o0ryTXeIZtsMKyUgJVQ
password : Theillegalhacker7@@@
Software cracking
🟢Advanced software cracking
🟢Cracker Tools 2.8
🟢Dotnet Software Reverse Engineering And Static Analysis Course
🟢Ransomware virus course
🟢Reverse Engineering Course
🟢Software Cracking Course
Size : 6.11 GB
⬇️Link :- https://mega.nz/folder/DpM2jT4J#Kl_o0ryTXeIZtsMKyUgJVQ
password : Theillegalhacker7@@@
mega.nz
File folder on MEGA
#exploit
1. CVE-2022-42864:
Concurrent Execution using Shared Resource with Improper Synchronization ("Race Condition")
https://muirey03.blogspot.com/2023/01/cve-2022-42864-diabolical-cookies.html
2. CVE-2022-25637:
Multiple TOCTOU vulns in peripheral devices (Razer, EVGA, MSI, AMI)
https://www.cyberark.com/resources/threat-research-blog/inglourious-drivers-a-journey-of-finding-vulnerabilities-in-drivers
1. CVE-2022-42864:
Concurrent Execution using Shared Resource with Improper Synchronization ("Race Condition")
https://muirey03.blogspot.com/2023/01/cve-2022-42864-diabolical-cookies.html
2. CVE-2022-25637:
Multiple TOCTOU vulns in peripheral devices (Razer, EVGA, MSI, AMI)
https://www.cyberark.com/resources/threat-research-blog/inglourious-drivers-a-journey-of-finding-vulnerabilities-in-drivers
#Offensive_security
1. Scripts and Executables for Pentest & Forensics
https://github.com/S3cur3Th1sSh1t/Creds
2. APCLdr - Payload Loader With Evasion Features
https://github.com/NUL0x4C/APCLdr
1. Scripts and Executables for Pentest & Forensics
https://github.com/S3cur3Th1sSh1t/Creds
2. APCLdr - Payload Loader With Evasion Features
https://github.com/NUL0x4C/APCLdr
#tools
#Blue_Team_Techniques
Patches for Waterfall to improve overall performance, fix memory issues and protect against attacks
https://github.com/2lstudios-mc/FlameCord
#Blue_Team_Techniques
Patches for Waterfall to improve overall performance, fix memory issues and protect against attacks
https://github.com/2lstudios-mc/FlameCord
#tools
Utility to find hidden Linux kernel modules
https://github.com/jafarlihi/modreveal
]-> LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64):
https://github.com/m0nad/Diamorphine
Utility to find hidden Linux kernel modules
https://github.com/jafarlihi/modreveal
]-> LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64):
https://github.com/m0nad/Diamorphine
NIST_IR_8401.pdf
1.8 MB
#Infosec_Standards
NIST IR 8401:
"Satellite Ground Segment:
Applying the Cybersecurity Framework to Assure Satellite Command and Control", December 2022.
NIST IR 8401:
"Satellite Ground Segment:
Applying the Cybersecurity Framework to Assure Satellite Command and Control", December 2022.
WDIMT.pdf
834.4 KB
#Research
"Website Defacement Detection and Monitoring Methods: A Review", 2022.
]-> Web Defacement Detection Tool:
https://github.com/CERT-hr/Web-Defacement-Detection-Tool
"Website Defacement Detection and Monitoring Methods: A Review", 2022.
]-> Web Defacement Detection Tool:
https://github.com/CERT-hr/Web-Defacement-Detection-Tool