OEBuilder | Hack Using Excel And Doc
OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.
Features:
*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.
Features:
*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
A new blog on OWASP ZAP Tool
A perfect tool for beginners to start their web application security testing journey
Here is the links to that blog:
https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/
Join our group for more such Cyber Security content:
t.me/ethicalhackingtechofide
A perfect tool for beginners to start their web application security testing journey
Here is the links to that blog:
https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/
Join our group for more such Cyber Security content:
t.me/ethicalhackingtechofide
๐1
๐ฅ How to Start Bug Bounty for Beginners ๐ฅ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://pentestingguide.com/bug-bounty-for-beginners/
(Click on Ads to Support us๐ฅบ)
Share if you found it helpful โค๏ธ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://pentestingguide.com/bug-bounty-for-beginners/
(Click on Ads to Support us๐ฅบ)
Share if you found it helpful โค๏ธ
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still โeasy winsโ out there which can be found, if you have a good strategy when it comes to reconnaissance.
Read: https://bit.ly/AdvanceRecon_Guide
Read: https://bit.ly/AdvanceRecon_Guide
Forwarded from BlackDragonSec ๐ฎ๐ณ
This media is not supported in your browser
VIEW IN TELEGRAM
Team insane right now๐
๐ฅ4
Forwarded from ONE-FOUR-ONE 1-4-1 ๐ฎ๐ณ
Scada system of Chemical factory of porkis has been compromised by Team 1-4-1 ๐ฎ๐ณ
โคโ๐ฅ5
This media is not supported in your browser
VIEW IN TELEGRAM
Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
๐ฅ Bad Spin : Android Binder LPE
Privilege escalation exploit from unstrusted_app for Android Binder vulnerability (CVE-2022-20421).
Run from shell:
1๏ธโฃCompile the libbadspin.so library by typing make push in the src/ directory. This will also push the library to /data/local/tmp.
2๏ธโฃRun adb shell.
3๏ธโฃRun LD_PRELOAD=/data/local/tmp/libbadspin.so sleep 1. This will load the library and start the exploit.
Run from demo app:
1๏ธโฃCompile libbadspin.so by typing make push in the src/ directory. This will copy the library to the assets directory for the demo Android app.
2๏ธโฃCompile the demo Android app in the app/ directory. (You might need Android Studio to do this.)
3๏ธโฃRun the app and click on the "Exploit" button.
4๏ธโฃConsume logs using: adb logcat -s BADSPIN
Download
Privilege escalation exploit from unstrusted_app for Android Binder vulnerability (CVE-2022-20421).
Run from shell:
1๏ธโฃCompile the libbadspin.so library by typing make push in the src/ directory. This will also push the library to /data/local/tmp.
2๏ธโฃRun adb shell.
3๏ธโฃRun LD_PRELOAD=/data/local/tmp/libbadspin.so sleep 1. This will load the library and start the exploit.
Run from demo app:
1๏ธโฃCompile libbadspin.so by typing make push in the src/ directory. This will copy the library to the assets directory for the demo Android app.
2๏ธโฃCompile the demo Android app in the app/ directory. (You might need Android Studio to do this.)
3๏ธโฃRun the app and click on the "Exploit" button.
4๏ธโฃConsume logs using: adb logcat -s BADSPIN
Download
Forwarded from BlackDragonSec ๐ฎ๐ณ
https://portal.lics.pk
https://aquastar.com.pk/
http://pjn.com.pk/
https://electro.aquastar.com.pk/
https://ha.aquastar.com.pk/
http://alkifl.com/
http://overseasestate.pk/
http://amazingquranacademy.com/
http://mail.amazingquranacademy.com
http://mail.overseasestate.pk/
http://mail.alkifl.com/
#IndianCyberMafia #KeralaCyberXtractors #IndianCyberForce #NewWorldHacktivist #IndianDarknetAssociation
#TEAMONEfourONE
#UnknownCyberCult
#AnonymousIndia
#INDIANHACKERS
https://aquastar.com.pk/
http://pjn.com.pk/
https://electro.aquastar.com.pk/
https://ha.aquastar.com.pk/
http://alkifl.com/
http://overseasestate.pk/
http://amazingquranacademy.com/
http://mail.amazingquranacademy.com
http://mail.overseasestate.pk/
http://mail.alkifl.com/
#IndianCyberMafia #KeralaCyberXtractors #IndianCyberForce #NewWorldHacktivist #IndianDarknetAssociation
#TEAMONEfourONE
#UnknownCyberCult
#AnonymousIndia
#INDIANHACKERS
โคโ๐ฅ4
Forwarded from BlackDragonSec ๐ฎ๐ณ
University of Dir Pakistan HACKED
https://uodir.edu.pk/
http://lms.uodir.edu.pk/
Mirror โ
@BlackDragonSec
Greetings to ALL INDIAN HACKERS
Jai Hind ๐ฎ๐ณ
https://uodir.edu.pk/
http://lms.uodir.edu.pk/
Mirror โ
@BlackDragonSec
Greetings to ALL INDIAN HACKERS
Jai Hind ๐ฎ๐ณ
โคโ๐ฅ5๐1
SSH Harvester | We get ssh passwords of users in plain text.
Well, yes, yes, yes, a couple of years ago there was an article that, during authorization, the ssh server spawns 2 processes, on one of which the pass rolls in the clear, in fact, at this moment it is pulled out.
In general, they put the script, fishing goes by itself
Well, yes, yes, yes, a couple of years ago there was an article that, during authorization, the ssh server spawns 2 processes, on one of which the pass rolls in the clear, in fact, at this moment it is pulled out.
In general, they put the script, fishing goes by itself
๐6
๐๐๐ ๐ผ๐ช๐ฉ๐ค๐ข๐๐ฉ๐๐ค๐ฃ ๐โจ
XSS automation offers efficient and accurate detection of cross-site scripting vulnerabilities, saving time and resources compared to manual testing methods.
๐๐๐ฃ๐ : https://youtu.be/I5NTW8GTKvE
Please Share your Views โบ๏ธ๐
XSS automation offers efficient and accurate detection of cross-site scripting vulnerabilities, saving time and resources compared to manual testing methods.
๐๐๐ฃ๐ : https://youtu.be/I5NTW8GTKvE
Please Share your Views โบ๏ธ๐
YouTube
08 XSS Automation
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ฉ๐๐ช๐ ๐๐๐ฃ๐ : https://github.com/thecybertixโฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ฉ๐๐ช๐ ๐๐๐ฃ๐ : https://github.com/thecybertixโฆ
Forwarded from BlackDragonSec ๐ฎ๐ณ
It was not necessary to show these stupid stuff but for the shake of my son's (Top porkis hemkers) knowledge I'm showing you. Btw congratulations beta you are advance than us in that field. It's a shame though. Read Reference here .
#PKMKB FOREVER
#PKMKB FOREVER
๐ฏ2
PowerLessShell
PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.
PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.
๐2