Forwarded from 卩ro 爪Cracker
lankagadgetshome.com.7z
167.5 KB
http://lankagadgetshome.com, LankaGadgetsHome | +94 778 3939 25 | Cheapest Online Gadget Store in Colombo Sri Lanka
Forwarded from 卩ro 爪Cracker
luxuryguideps.com.7z
541.2 KB
http://luxuryguideps.com, Hotel Supplier Luxury Guide - News, Products and Services for the Hospitality Industry!
Forwarded from 卩ro 爪Cracker
nanougat.alwaysdata.net.7z
68 KB
Forwarded from 卩ro 爪Cracker
old.humanasia.org.7z
67 KB
http://old.humanasia.org, 사단법인 휴먼아시아에 오신것을 환영합니다.
👍2
1500 Members Special :-
Direct Access To Private Group
Link Valid Only 24 Hours
Only 50 Members Allowed (Members Full)
Link Expired
https://t.me/+5rgE1-1OG981ZDc1
Direct Access To Private Group
Link Valid Only 24 Hours
Only 50 Members Allowed (Members Full)
Link Expired
❤4😁2
👍5
Hello friends, I am going to be offline for 7-8 days because I am going on a spiritual journey (himachal). So my friends, now it is the job of all of you to take care of this channel.
❤11👍4🥰2
EyeRat: A tool for building remote access trojan
Whenever the user has an instruction to send to RAT, the user's application sends a special command to RAT such as: Tpict (to take a photo from the camera).
📖 Read
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #opensource #linux #rat #trojan #tools #kali
@YourJiniNews
Whenever the user has an instruction to send to RAT, the user's application sends a special command to RAT such as: Tpict (to take a photo from the camera).
📖 Read
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #opensource #linux #rat #trojan #tools #kali
@YourJiniNews
GitHub
GitHub - AdolfMacro/eyeRat: A tool for building remote access trojan.
A tool for building remote access trojan. Contribute to AdolfMacro/eyeRat development by creating an account on GitHub.
👍2
Forwarded from 卩ro 爪Cracker
windows-kernel-exploits-mini-pack.zip
141.6 KB
Windows Kernel Exploits
miniPack + bonus (HEVD-HackSys Extreme Vulnerable Driver)
miniPack + bonus (HEVD-HackSys Extreme Vulnerable Driver)
Forwarded from 卩ro 爪Cracker
CVE-2022-26809 RCE Exploit
Weakness in a core Windows component (RPC) earned a CVSS score of 9.8 not without a reason, as the attack does not require authentication and can be executed remotely over a network, and can result in remote code execution (RCE) with the privileges of the RPC service, which depends on the process hosting the RPC runtime.
That critcal bug, with a bit of luck, allows to gain access to unpatched Windows host running SMB. The vulnerability can be exploited both from outside the network in order to breach it as well as between machines in the network.
https://github.com/rkxxz/CVE-2022-26809
Vendor Information:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809
https://www.pwndefend.com/2022/04/14/cve-2022-26809/
#cve #poc #exploit
Weakness in a core Windows component (RPC) earned a CVSS score of 9.8 not without a reason, as the attack does not require authentication and can be executed remotely over a network, and can result in remote code execution (RCE) with the privileges of the RPC service, which depends on the process hosting the RPC runtime.
That critcal bug, with a bit of luck, allows to gain access to unpatched Windows host running SMB. The vulnerability can be exploited both from outside the network in order to breach it as well as between machines in the network.
https://github.com/rkxxz/CVE-2022-26809
Vendor Information:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809
https://www.pwndefend.com/2022/04/14/cve-2022-26809/
#cve #poc #exploit
Forwarded from 卩ro 爪Cracker
CVE-2022-26717
Safari WebGL XFB Use After Free Vulnerability
https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit
#cve #exploit
Safari WebGL XFB Use After Free Vulnerability
https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit
#cve #exploit
GitHub
GitHub - theori-io/CVE-2022-26717-Safari-WebGL-Exploit
Contribute to theori-io/CVE-2022-26717-Safari-WebGL-Exploit development by creating an account on GitHub.
Forwarded from 卩ro 爪Cracker
Forwarded from Bhartiya Hunters🇮🇳 (Founder & CEO •)
Quip
A Tale of Confusing IDOR 😤
Hi!!