Forwarded from 卩ro 爪Cracker
SharpEventPersist
Persistence by writing/reading shellcode from Event Log
https://github.com/improsec/SharpEventPersist
Persistence by writing/reading shellcode from Event Log
https://github.com/improsec/SharpEventPersist
Forwarded from 卩ro 爪Cracker
fuxploider
Open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.
This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server.
https://github.com/almandin/fuxploider
Open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.
This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server.
https://github.com/almandin/fuxploider
Forwarded from 卩ro 爪Cracker
Xepor
Web Routing Framework For Reverse Engineers And Security Researchers, Brings The Best Of Mitmproxy And Flask.
https://github.com/xepor/xepor
Web Routing Framework For Reverse Engineers And Security Researchers, Brings The Best Of Mitmproxy And Flask.
https://github.com/xepor/xepor
Forwarded from K0wk
{SQLi Guide for Beginners}
>> https://www.mediafire.com/file/5djwhqrmgwn7vw3/SQL+Dorks.pdf/file
>> https://www.mediafire.com/file/qpjo5yq7evy3bjh/SQL+Injection+Explanation+(Ph.h4rh4r).pdf/file
>> https://www.mediafire.com/file/z8cxmsro6xnfcjr/Some_SQL_injection_DIOS_for_WAF_by_Kashmiri_Cheetah.pdf/file
>> https://www.mediafire.com/file/4qrukebq2sadpry/Sqli_Book_.pdf/file
>> https://www.mediafire.com/file/5djwhqrmgwn7vw3/SQL+Dorks.pdf/file
>> https://www.mediafire.com/file/qpjo5yq7evy3bjh/SQL+Injection+Explanation+(Ph.h4rh4r).pdf/file
>> https://www.mediafire.com/file/z8cxmsro6xnfcjr/Some_SQL_injection_DIOS_for_WAF_by_Kashmiri_Cheetah.pdf/file
>> https://www.mediafire.com/file/4qrukebq2sadpry/Sqli_Book_.pdf/file
XSS Game by Google | Bug Bounty - XSS | Live Broadcast Hacking
https://youtube.com/watch?v=YHNRYa1gOzk
https://youtube.com/watch?v=YHNRYa1gOzk
👍4
Forwarded from Open Data
activitiescabo.com.7z
5.8 MB
http://activitiescabo.com/ - Tours and Activities in Cabo
adnanaswad.ae.7z
67.4 KB
http://adnanaswad.ae/ - Adnan Aswad Engineering Consultants
adresseauto.com.7z
241.7 KB
http://adresseauto.com/ - Used car sales
sequelpro.com.7z
6.9 MB
http://sequelpro.com/ - Sequel Pro
Forwarded from 卩ro 爪Cracker
burpsuite_pro_v2022.3.9.zip
516.9 MB
Forwarded from 卩ro 爪Cracker
#HacKingPro - Hack Like A Pro
Menu / To Do
[p] - Planning and Scoping
Asking for Target IP:
Asking for Target Name:
Asking for Target Phone:
Asking for Target Nik Name:
Asking for Target Email:
00 - Anonymity
00 - Firewall Rules
01 - Clear Logs
02 - Clear History
03 - Change MAC Address
04 - Change IP Address
05 - Change Routing
01 - Information Gathering
01 - Systems Information
02 - Networks Information
03 - Social Information
04 - SubDomain Information
02 - Vulnerability Assessment
03 - Web Application HacKing
04 - Database Assessment
05 - Password HacKing
06 - Wireless HacKing
07 - Reverse Engineering
08 - Exploit Frameworks & DataBases
09 - Sniffing - Spoofing
10 - Gaining & Maintaining Access
11 - Digital Forensic
12 - Analysis & Reporting
13 - Social Engineering
14 - Privilege Enumeration & Escalation
15 - Malware Analysis Labs/Tools
16 - Covering Tracks
https://github.com/Anlominus/HacKingPro
Menu / To Do
[p] - Planning and Scoping
Asking for Target IP:
Asking for Target Name:
Asking for Target Phone:
Asking for Target Nik Name:
Asking for Target Email:
00 - Anonymity
00 - Firewall Rules
01 - Clear Logs
02 - Clear History
03 - Change MAC Address
04 - Change IP Address
05 - Change Routing
01 - Information Gathering
01 - Systems Information
02 - Networks Information
03 - Social Information
04 - SubDomain Information
02 - Vulnerability Assessment
03 - Web Application HacKing
04 - Database Assessment
05 - Password HacKing
06 - Wireless HacKing
07 - Reverse Engineering
08 - Exploit Frameworks & DataBases
09 - Sniffing - Spoofing
10 - Gaining & Maintaining Access
11 - Digital Forensic
12 - Analysis & Reporting
13 - Social Engineering
14 - Privilege Enumeration & Escalation
15 - Malware Analysis Labs/Tools
16 - Covering Tracks
https://github.com/Anlominus/HacKingPro
Forwarded from 卩ro 爪Cracker
radius178.214.77.8.zip
382.1 MB
Palestinian Gemzo ISP Full DB 200K Records
→ Contains full info about gemzo customers/administrators ISP
→ Contains full info about gemzo customers/administrators ISP
Forwarded from 卩ro 爪Cracker
There are dozens of tools for automating Google Dorking and collecting search results.
Many of them are based on the python module "googlesearch".
It is extremely simple.
But it can be applied to a multitude of investigative purposes.
You can learn it in two minutes and use it to create the perfect search automation script for your purposes.
1. Installation:
pip install googlesearch-python
2. Simple search:
from googlesearch import search
search("Osint")
3. Search with output URL of the results to the console:
for url in search('Osint'):
print(url)
4. Search in Russian:
search('Osint', lang="ru")
5. Search with a fixed number of results:
search('Osint', num_results=3)
The picture above shows an example of search automation with results output to a text file.
Official project repository: https://github.com/MarioVilas/googlesearch
Many of them are based on the python module "googlesearch".
It is extremely simple.
But it can be applied to a multitude of investigative purposes.
You can learn it in two minutes and use it to create the perfect search automation script for your purposes.
1. Installation:
pip install googlesearch-python
2. Simple search:
from googlesearch import search
search("Osint")
3. Search with output URL of the results to the console:
for url in search('Osint'):
print(url)
4. Search in Russian:
search('Osint', lang="ru")
5. Search with a fixed number of results:
search('Osint', num_results=3)
The picture above shows an example of search automation with results output to a text file.
Official project repository: https://github.com/MarioVilas/googlesearch
Forwarded from 卩ro 爪Cracker
Hacking the Cloud
Encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on cloud exploitation (#AWS, #Azure, #GoogleCloud, #Terraform,)
https://hackingthe.cloud
Contributor twitter.com/Frichette_n
Encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on cloud exploitation (#AWS, #Azure, #GoogleCloud, #Terraform,)
https://hackingthe.cloud
Contributor twitter.com/Frichette_n