BokuLoader | is a Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
Now supports: sleepmask, cleanup, and obfuscate evasion features!
Download: https://system32.ink/news-feed/p/238/
Now supports: sleepmask, cleanup, and obfuscate evasion features!
Download: https://system32.ink/news-feed/p/238/
🏆3
Hey everyone!
Check out our another blog on SQL Injection.
SQL Injection attack | Prevention| Cyber Security Professionals
Let's learn and grow together
https://techofide.com/blogs/sql-injection-attack-sqli-sql-injection-prevention-sql-injection-cheat-sheet-practical-demo/
Check out our another blog on SQL Injection.
SQL Injection attack | Prevention| Cyber Security Professionals
Let's learn and grow together
https://techofide.com/blogs/sql-injection-attack-sqli-sql-injection-prevention-sql-injection-cheat-sheet-practical-demo/
❤1🔥1
Forwarded from Biała Bł
ExploitLeakedHandle: Identify and exploit leaked handles for local privilege escalation
https://github.com/0x00Check/ExploitLeakedHandle
https://github.com/0x00Check/ExploitLeakedHandle
Forwarded from 卩ro 爪Cracker
ConfFuzz
Fuzzing for Interface Vulnerabilities
ConfFuzz is an in-memory fuzzer aimed at detecting interface vulnerabilities in compartmentalized contexts. ConfFuzz is a cooperation between the University of Manchester, University Politehnica of Bucharest, Rice University, and Unikraft.io. It has been accepted to appear in NDSS'23.
https://github.com/conffuzz/conffuzz
Fuzzing for Interface Vulnerabilities
ConfFuzz is an in-memory fuzzer aimed at detecting interface vulnerabilities in compartmentalized contexts. ConfFuzz is a cooperation between the University of Manchester, University Politehnica of Bucharest, Rice University, and Unikraft.io. It has been accepted to appear in NDSS'23.
https://github.com/conffuzz/conffuzz
Forwarded from 卩ro 爪Cracker
CVE-2023-0669
GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
#cve
GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
#cve
Forwarded from 卩ro 爪Cracker
UIT Pwned 🔒
This project replicates the functionality of haveibeenpwned.com by checking if a student's roll number has been breached or not (breached in this context is having used a weak password for your UIT portal i.e 12345678 or 123456789). It uses a Flask web server to check the status of a student's roll number and tells if password was breached by uitPortalLogin.py.
https://github.com/cocomo29/UIT-Pwned
This project replicates the functionality of haveibeenpwned.com by checking if a student's roll number has been breached or not (breached in this context is having used a weak password for your UIT portal i.e 12345678 or 123456789). It uses a Flask web server to check the status of a student's roll number and tells if password was breached by uitPortalLogin.py.
https://github.com/cocomo29/UIT-Pwned
❤🔥4
🔓CVE-2022-23935 exploit PoC exiftool version 12.37
Usage:
Usage:
./CVE-2022-23935 <IP> <PORT>Download: https://system32.ink/news-feed/p/239/
👍3
Forwarded from 卩ro 爪Cracker
DDoS-Protection-Lite
Anti-DDoS-Lite (Anti-Crawler app) is a small PHP app to protect your site against DDoS attack.
https://github.com/CleanTalk/anti-ddos-lite
Anti-DDoS-Lite (Anti-Crawler app) is a small PHP app to protect your site against DDoS attack.
https://github.com/CleanTalk/anti-ddos-lite
⚡2👍2
Forwarded from Biała Bł
hunter.how
Hunter Search Engine
Internet Search Engines For Security Researchers
👍3
Forwarded from 卩ro 爪Cracker
EU-22-Fitzl-Knockout-Win-Against-TCC.pdf
9.2 MB
📕Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms
Hello everyone!
Here is our new article on Aircrack-ng
This will show you everything that you need to learn before start with a practical demonstration
Blog + Video
https://techofide.com/blogs/how-to-use-aircrack-ng-aircrack-ng-tutorial-practical-demonstration/
Here is our new article on Aircrack-ng
This will show you everything that you need to learn before start with a practical demonstration
Blog + Video
https://techofide.com/blogs/how-to-use-aircrack-ng-aircrack-ng-tutorial-practical-demonstration/
🔥2
Forwarded from Team BlackDragonSec 🇮🇳
❤🔥3
Forwarded from Team BlackDragonSec 🇮🇳
Inspector General of Police | Balochistan Police
site: https://balochistanpolice.gov.pk/
Taken Down !!
https://check-host.net/check-report/ea77aafkae3
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥5
❤🔥3👍1
Forwarded from pkg
Yesterday I found a shell(backdoor) of a der-rupiya hackers probably sponsered by chavanni Intelligence agency in one of the Indian Govt website.
The total number of govt website hosted on that server was 70+ there, so it means any or all 70 websites could have been defaced against Indian govt any time, or could have been used in other mean.
It was part of my official work so can't disclose more about website or servers in this channel and you must be aware that these things doesn't come out.
Although, Vulnerabilities is patched.
The shell implant date was of 26th January 2023, the same timeline when nagpur shell implant/leak occurred.
It's good that one foothold was removed but one man can't do everything, all the geeks should contribute and report at least pass the Intel's to make Indian cyberspace safe.
Don't think what the country will give you, think what you will give to the country.
Winding up, You know what fun is still remaining about those (Script-kiddies) ?
They dropped shell and trace of Indonasian hackers.
Waah Tatte Pakistan Waaah. 😂
Sale apn yahan chaal se pehchaan lete hai kon belly dancer hai or kon bar dancer... 😉 😆😆
The total number of govt website hosted on that server was 70+ there, so it means any or all 70 websites could have been defaced against Indian govt any time, or could have been used in other mean.
It was part of my official work so can't disclose more about website or servers in this channel and you must be aware that these things doesn't come out.
Although, Vulnerabilities is patched.
The shell implant date was of 26th January 2023, the same timeline when nagpur shell implant/leak occurred.
It's good that one foothold was removed but one man can't do everything, all the geeks should contribute and report at least pass the Intel's to make Indian cyberspace safe.
Don't think what the country will give you, think what you will give to the country.
Winding up, You know what fun is still remaining about those (Script-kiddies) ?
They dropped shell and trace of Indonasian hackers.
Waah Tatte Pakistan Waaah. 😂
Sale apn yahan chaal se pehchaan lete hai kon belly dancer hai or kon bar dancer... 😉 😆😆
❤🔥4🤓3
Forwarded from Team BlackDragonSec 🇮🇳 (BlackDragonSec)
https://aamir.edo.org.pk
https://aatif.edo.org.pk
https://abd-al-ala.edo.org.pk
https://abdul-aleem.emp.edo.org.pk
https://abdul-ali.emp.edo.org.pk
https://abdul-fattah.edo.org.pk
https://abdul-jabbar.edo.org.pk
https://abdul-mueed.edo.org.pk
https://accollege.edo.org.pk
https://ahmad.edo.org.pk
https://ahmedcollege.edo.org.pk
https://ahmedgaza.edo.org.pk
https://al-hafiz.edo.org.pk
https://al-quran.edo.org.pk
https://al-raza.edo.org.pk
https://ali.edo.org.pk
https://azad.edo.org.pk
#BlackDayForIndia #PakistanTerrorist #FckPak
https://aatif.edo.org.pk
https://abd-al-ala.edo.org.pk
https://abdul-aleem.emp.edo.org.pk
https://abdul-ali.emp.edo.org.pk
https://abdul-fattah.edo.org.pk
https://abdul-jabbar.edo.org.pk
https://abdul-mueed.edo.org.pk
https://accollege.edo.org.pk
https://ahmad.edo.org.pk
https://ahmedcollege.edo.org.pk
https://ahmedgaza.edo.org.pk
https://al-hafiz.edo.org.pk
https://al-quran.edo.org.pk
https://al-raza.edo.org.pk
https://ali.edo.org.pk
https://azad.edo.org.pk
#BlackDayForIndia #PakistanTerrorist #FckPak
🔥1🍾1